エピソード

  • The STRIDE Controversy: Evolution vs. Extinction in Security Models
    2024/11/13

    We discuss a controversial LinkedIn post claiming "Threat Modeling is Dead." While the STRIDE methodology may need updating, it remains a valuable "gateway" tool for teaching security concepts to developers without security backgrounds. We discuss how STRIDE serves as a useful categorization system, emphasize that dogmatic approaches to threat modeling are problematic, and argue that what matters most are results rather than strict adherence to any particular methodology. Our conclusion; STRIDE is still alive and relevant, but it could benefit from an update to demonstrate its continued applicability.

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    続きを読む 一部表示
    41 分
  • Why 100X Isn't the Answer
    2024/11/07

    A good discussion today covering two different articles, the first covers CISA's list of product security "bad practices", questioning whether it provides real value or is just content marketing. Then the discussion moves onto an article about Shift Left. The group debates whether it is truly more expensive to fix design flaws versus implementation bugs, noting the difficulty of quantifying the cost difference. They argue that the focus should be on providing proper training and incentives for developers to build secure software, rather than just adding more security tools.

    Articles discussed in the episode:

    Product Security Bad Practices

    Shift Left Pushback Triggers Security Soul Searching



    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    続きを読む 一部表示
    45 分
  • We'll Be Here Until We Become Obsolete
    2024/10/23

    This week we explore the multifaceted concept of obsolescence in technology, detailing its planned, unplanned, and forced forms. We delve into the security implications of outdated or unsupported devices and software, with a spotlight on cloud-connected vehicles and their vulnerabilities. We discuss architectural decisions, regulatory requirements, and real-world incidents like the OnStar hack, reflecting on the need for robust security protocols.



    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    続きを読む 一部表示
    28 分
  • Everything is Boring
    2024/10/16

    Is everything boring? Chris, Izar and Matt discuss why nothing seems interesting enough lately. Is the excitement of vulnerabilities and ransomware waning? The guys touch on Governance, Risk, and Compliance (GRC) in corporate auditing, the impact of ransomware and the contentious role of cyber insurance, the fading novelty of AI and its influence on security, and examine why essential security tasks might feel mundane yet remain vital. This is a candid conversation you won’t want to miss.



    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    続きを読む 一部表示
    30 分
  • Experts Want to Excel
    2024/10/09

    What constitutes an expert in the field of threat modeling? Today Matt, Chris and Izar explore cultural references, the intricacies of threat modeling practices, and the criteria that define an expert. The discussion touches on the evolution of threat modeling, the roles of facilitators, and the importance of experience and recognition in the field. The guys humorously debate the challenge of scaling practices in large organizations and share thoughts on how expertise can inspire others. Enjoy this amusing episode complete with tangents on movies, old media technologies, sports analogies, and competitive Excel.

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    続きを読む 一部表示
    44 分
  • Numb to Data Breaches, and How it Impacts Security of the Average Feature
    2024/09/18

    In this episode of the Security Table with Chris Romeo, Izar Tarandach, and Matt Coles, the team dives into the evolving landscape of modern security approaches. They discuss the shift from strategy to tactics, the impact of data breaches, and why people are becoming numb to such incidents. The episode also touches on the importance of understanding the business side of security and the role of product managers as security champions.

    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    続きを読む 一部表示
    32 分
  • Philosophizing Cloud Security
    2024/09/11

    In this episode of the Security Table, our hosts discuss the concept of the 'Shared Fate Model' in cloud security. The conversation explores how this model builds on the shared responsibility model and the implications for cloud service providers and consumers. From robust default security measures to the historical evolution of ISPs, the discussion covers technical and philosophical aspects of cloud infrastructure security. Join us for an informative and engaging session filled with the past and present of internet connectivity and cloud service security.



    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    続きを読む 一部表示
    29 分
  • Innovations in Threat Modeling?
    2024/08/28

    In this episode of The Security Table, hosts Chris Romeo, Izar Tarandach, and Matt Coles dive into the evolving concept of threat models, stepping beyond traditional boundaries. They explore 'Rethinking Threat Models for the Modern Age,' an article by author Evan Oslick. Focusing on user behavior, alert fatigue, and the role of psychological acceptability, they debate whether broader human factors should integrate into threat modeling.



    FOLLOW OUR SOCIAL MEDIA:

    ➜Twitter: @SecTablePodcast
    ➜LinkedIn: The Security Table Podcast
    ➜YouTube: The Security Table YouTube Channel

    Thanks for Listening!

    続きを読む 一部表示
    32 分