loader from loading.io
The Future of Supply Chain Security - Janet Worthington - ASW #343 show art The Future of Supply Chain Security - Janet Worthington - ASW #343

Application Security Weekly (Video)

Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most effective solutions are old techniques. Resources Show Notes:

info_outline
Uniting software development and application security - Jonathan Schneider, Will Vandevanter - ASW #342 show art Uniting software development and application security - Jonathan Schneider, Will Vandevanter - ASW #342

Application Security Weekly (Video)

Maintaining code is a lot more than keeping dependencies up to date. It involved everything from keeping old code running to changing frameworks to even changing implementation languages. Jonathan Schneider talks about the engineering considerations of refactoring and rewriting code, why code maintenance is important to appsec, and how to build confidence that adding automation to a migration results in code that has the same workflows as before. Resources Then, instead of our usual news segment, we do a deep dive on some recent vulns NVIDIA's Triton Inference Server disclosed by Trail of...

info_outline
How Product-Led Security Leads to Paved Roads - Julia Knecht - ASW #341 show art How Product-Led Security Leads to Paved Roads - Julia Knecht - ASW #341

Application Security Weekly (Video)

A successful strategy in appsec is to build platforms with defaults and designs that ease the burden of security choices for developers. But there's an important difference between expecting (or requiring!) developers to use a platform and building a platform that developers embrace. Julia Knecht shares her experience in building platforms with an attention to developer needs, developer experience, and security requirements. She brings attention to the product management skills and feedback loops that make paved roads successful -- as well as the areas where developers may still need or choose...

info_outline
Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340 show art Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340

Application Security Weekly (Video)

AI is more than LLMs. Machine learning algorithms have been part of infosec solutions for a long time. For appsec practitioners, a key concern is always going to be how to evaluate the security of software or a system. In some cases, it doesn't matter if a human or an LLM generated code -- the code needs to be reviewed for common flaws and design problems. But the creation of MCP servers and LLM-based agents is also adding a concern about what an unattended or autonomous piece of software is doing. Sohrob Kazerounian gives us context on how LLMs are designed, what to expect from them, and...

info_outline
Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339 show art Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339

Application Security Weekly (Video)

What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared vocabularies and the (hopefully!) shared goal of protecting software, data, and users. The better question is, "What do you want to secure?" We discuss the Cybersecurity Skills Framework put together by the OpenSSF and the Linux Foundation and how you might prepare for one of its job families. The important basics aren't about memorizing lists or technical details, but demonstrating experience in...

info_outline
Checking in on the State of Appsec in 2025 - Sandy Carielli, Janet Worthington - ASW #338 show art Checking in on the State of Appsec in 2025 - Sandy Carielli, Janet Worthington - ASW #338

Application Security Weekly (Video)

Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is expanding a new (but not very different) attack surface. We look at where orgs are investing in appsec, who appsec teams are collaborating with, and whether we need security awareness training for LLMs. Resources: Show Notes:

info_outline
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337 show art Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337

Application Security Weekly (Video)

Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from an LLM assistant, and then applies that understanding to a search for developer patterns that lead to common mistakes like mishandling data, not enforcing a control flow, or not defending against unexpected application states. He explains how finding...

info_outline
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336 show art How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336

Application Security Weekly (Video)

Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests and fuzzing coverage, nudging fuzzers into deeper code paths, and how LLMs can help guide a fuzzer into using better inputs for its testing. Resources Show Notes:

info_outline
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335 show art Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335

Application Security Weekly (Video)

What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that are more conducive to useful threat models. Resources: In the news, learning from outage postmortems, an EchoLeak image speaks a 1,000 words from Microsoft 365 Copilot, TokenBreak attack targets tokenizing techniques, Google's layered strategy...

info_outline
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334 show art Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334

Application Security Weekly (Video)

CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements on safety and many of them rely on protocols that are four (or more!) decades old. He explains how the considerations in this space go far beyond just memory safety concerns. Segment Resources: Show Notes:

info_outline
 
More Episodes

Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most effective solutions are old techniques.

Resources

Show Notes: https://securityweekly.com/asw-343