Podchaser Logo
Home
AppSec Stats Flash: A Monthly Podcast on the State of Application Security

NTT Application Security

AppSec Stats Flash: A Monthly Podcast on the State of Application Security

A Technology podcast
Good podcast? Give it some love!
AppSec Stats Flash: A Monthly Podcast on the State of Application Security

NTT Application Security

AppSec Stats Flash: A Monthly Podcast on the State of Application Security

Episodes
AppSec Stats Flash: A Monthly Podcast on the State of Application Security

NTT Application Security

AppSec Stats Flash: A Monthly Podcast on the State of Application Security

A Technology podcast
Good podcast? Give it some love!
Rate Podcast

Episodes of AppSec Stats Flash

Mark All
Search Episodes...
There are two sides to any story - and it is no different here for Healthcare. While the applications in this sector are vulnerable, they still aren't as vulnerable as Retail applications. At the same time, consumers have personal responsibilit
The Alice and Bob characters were invented by Ron Rivest, Adi Shamir, and Leonard Adleman in their 1978 paper "A Method for Obtaining Digital Signatures and Public-key Cryptosystems". Alice and Bob were also joined by an additional cast of char
Download the supporting report hereDid the pandemic accelerate the adoption of technology in the education sector? This month we focus on education as we go back to school!Stay tuned for more upcoming episodes and reports on the AppSec Stats Fl
Special Guest: Jeremiah Grossman, Founder of WhiteHat Security and current Founder and CEO at Bit DiscoveryLinks for further reading & listening:https://www.scientificamerican.com/article/rumsfelds-wisdom/https://uxdesign.cc/the-knowns-and-unkn
Download the supporting report hereRising Windows of Exposure, increasing time to fix, falling remediation rates and pedestrian vulnerabilities make it easy for hackers to exploit vulnerabilities in business applications.Stay tuned for more upc
Download the accompanying report here.Applications are more vulnerable than last year. Time to fix serious vulnerabilities is increasing. Remediation rates are decreasing and the types of vulnerabilities that applications suffer from have not c
Download the supporting report hereIn this episode, we make a case for “Two Speed” Application Security to address the disparate needs of Legacy Applications and newer Greenfield Applications. In addition, hear about some simple takeaways for e
Download the supporting report hereHackers are not always an adversary – they can be heroes too. This month we dive into the hacker mindset and review the insightful data points and trends that our teams are finding and analyzing. Special Guest
Download the supporting report hereRead about the SAP CVE: SAP Security Notes March 2020: Two Critical Patches Released to Protect Solution Manager from CyberattacksWatch Simon Sinek's Ted Talk: Start with Why - How Great Leaders Inspire Action
Download the supporting report hereApplications are part of complex, connected systems with unpredictable amounts of interactions between other applications and APIs. Are our security programs strong enough to prevent supply chain type attacks?
Download the supporting report here.Learn more about HTTP Strict Transport Security.It's 2021 and we have more detailed security breach data than ever. Then how is the state of application security still so dismal and what if we look at it with
Download the supporting report here.In this month’s AppSec Stats Flash, we will dive into the first 3 key metrics when evaluating the current state of application security as well as broach the topic of shared responsibility for security as is
Rate

Join Podchaser to...

  • Rate podcasts and episodes
  • Follow podcasts and creators
  • Create podcast and episode lists
  • & much more

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features