How SBOMs drive a smarter SCA strategy

How SBOMs drive a smarter SCA strategy

Modern software is largely assembled from open source components, constituting up to 90% of today's codebases. Managing the security and compliance risks associated with this external code is no longer optional — ...
Will the FDA Start Banning Chinese-Made Medical Devices?

Will the FDA Start Banning Chinese-Made Medical Devices?

Interview with Joe Silvia, CEO of MedWare Cyber Click here to listen. In late January, the FDA issued a safety warning on Contec CMS8000 patient monitors and those relabeled as MN-120. The ...
Application security trends: Shift-left security, AI, and open source malware

Application security trends: Shift-left security, AI, and open source malware

Software is at the heart of business operations across most industries, which means application security has never been more critical. However, as organizations embrace cloud-native architectures, microservices, and open source components, the ...
Everything in C with Tanya Janca

Everything While Training: Lessons on C and C++ Secure Coding Practices with Tanya Janca

Click here for full interview. In this show, we speak with Tanya Janca, aka SheHacksPurple, a renowned code security trainer with nearly 30 years of experience in application development, engineering, and testing ...

U.S. Bans Software and Firmware Products From Adversarial Countries

In January 2024, U.S. law went into effect that would ban smart cars with Russian and Chinese technology and protect the vehicle supply chain due to concerns about the privacy of consumer ...
Building a security-minded development team: DevSecOps tools and SDLC best practices

Building a security-minded development team: DevSecOps tools and SDLC best practices

In an increasingly adversarial threat landscape, software security can't be just one more checkpoint on the road to your next release. It should be integral to how every member of your development ...
AI Wars Playing Out in Application Attacks and Defenses

AI Wars Playing Out in Application Attacks and Defenses

Deb Radcliff interviews Bugcrowd founder and white hat hacker, Casey Ellis. As if protecting applications wasn’t tough enough, attackers are now leveraging AI to find and exploit application vulnerabilities faster, outpacing patch ...
OWASP Top 10 with Brian Glas

OWASP Top 10: What’s C Got to Do With It?

Deb Radcliff interviews OWASP Top Ten core team member Brian Glas. What do the OWASP Top Ten web application vulnerabilities have to do with C languages? And where do those vulnerabilities coincide ...

2025 Software Manufacturing Predictions: SBOMs, Regulations, and More

As we head into 2025, experts weigh in on trends affecting software products in the medical, vehicle, and energy sectors. They also talk about manufacturer readiness for the EU Cyber Resilience Act, ...
The Elephant in AppSec Talks Highlight: Shifting Left Doesn't Mean Anything Anymore

The Elephant in AppSec Talks Highlight: Shifting Left Doesn’t Mean Anything Anymore

Discover key highlights from Tanya Janca's talk at The Elephant in AppSec Conference on shifting security to be present throughout the entire Software Development Lifecycle ...