Artwork

Treść dostarczona przez Chris Lindsey. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Chris Lindsey lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Player FM - aplikacja do podcastów
Przejdź do trybu offline z Player FM !

Compromised and Reactive to Proactive Approaches

40:22
 
Udostępnij
 

Manage episode 437874869 series 3589650
Treść dostarczona przez Chris Lindsey. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Chris Lindsey lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

In Episode 03 of Secrets of AppSec Champions podcast titled "Compromised: Proactive to Reactive," hosts Chris Lindsey and guest Phil Guimond tackle the critical distinctions between proactive and reactive security strategies. They emphasize the importance of access logging and visibility in detecting compromises early, pointing out how changes in access logs can signal potential threats. They stress the necessity of implementing secure, tamper-proof log storage and discuss automation solutions like the "Have I Been Pwned" API and CAPTCHA to mitigate risks such as account takeovers.
The discussion extends to network security, highlighting the dangers of rushed setups that overlook essential measures like network segmentation and client isolation. They examine the risks associated with flat networks in office environments and how external threats can penetrate poorly segmented Wi-Fi networks. Additionally, the episode covers the significance of managing software dependencies, advocating for regular updates to dependencies and leveraging multiple sources to detect vulnerabilities beyond the National Vulnerability Database (NVD). The utilization of container technologies like Kubernetes and Docker is highlighted for their ability to seamlessly update images and pods, thereby enhancing security.
Finally, Chris and Phil underscore the importance of proper repository management, focusing on active projects and addressing outdated or unused code that poses security risks. Training developers in security practices and involving security professionals who can write code are presented as key strategies for proactive security. Chris and Phil also acknowledge the challenges of finding and retaining skilled security personnel while encouraging the audience to engage with the podcast and provide feedback. Together, they advocate for a balanced approach to security—automating where possible, prioritizing proactive measures, and continuously improving the organization's overall security posture.

Key Topics with Time Stamps
00:00 Password Reuse Across Websites: Detection Methods
06:06 Managing Security Challenges and Password Reuse
08:30 Challenges of Unused Code in Development Projects
10:19 Managing Data Overload with GitHub API
15:33 The Risks of Network Interconnected Cloud Access
17:32 Security Risks of IP Whitelisting in Cloud Hadoop Clusters
20:23 Securing Network Logs from Tampering
24:12 The Impact of NVD Pausing on Vulnerability Detection
26:23 Efficiently Addressing Container Image Vulnerabilities
31:17 The Importance of Developer Training Over Tools
35:43 Tools for High-Level Security Posture Overview
38:13 The Vital Importance of App Security Leaders

Chris Lindsey LinkedIn: https://www.linkedin.com/in/chris-lindsey-39b3915/
AppSec Hive LinkedIn: https://www.linkedin.com/company/appsec-hive/

  continue reading

9 odcinków

Artwork
iconUdostępnij
 
Manage episode 437874869 series 3589650
Treść dostarczona przez Chris Lindsey. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Chris Lindsey lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.

In Episode 03 of Secrets of AppSec Champions podcast titled "Compromised: Proactive to Reactive," hosts Chris Lindsey and guest Phil Guimond tackle the critical distinctions between proactive and reactive security strategies. They emphasize the importance of access logging and visibility in detecting compromises early, pointing out how changes in access logs can signal potential threats. They stress the necessity of implementing secure, tamper-proof log storage and discuss automation solutions like the "Have I Been Pwned" API and CAPTCHA to mitigate risks such as account takeovers.
The discussion extends to network security, highlighting the dangers of rushed setups that overlook essential measures like network segmentation and client isolation. They examine the risks associated with flat networks in office environments and how external threats can penetrate poorly segmented Wi-Fi networks. Additionally, the episode covers the significance of managing software dependencies, advocating for regular updates to dependencies and leveraging multiple sources to detect vulnerabilities beyond the National Vulnerability Database (NVD). The utilization of container technologies like Kubernetes and Docker is highlighted for their ability to seamlessly update images and pods, thereby enhancing security.
Finally, Chris and Phil underscore the importance of proper repository management, focusing on active projects and addressing outdated or unused code that poses security risks. Training developers in security practices and involving security professionals who can write code are presented as key strategies for proactive security. Chris and Phil also acknowledge the challenges of finding and retaining skilled security personnel while encouraging the audience to engage with the podcast and provide feedback. Together, they advocate for a balanced approach to security—automating where possible, prioritizing proactive measures, and continuously improving the organization's overall security posture.

Key Topics with Time Stamps
00:00 Password Reuse Across Websites: Detection Methods
06:06 Managing Security Challenges and Password Reuse
08:30 Challenges of Unused Code in Development Projects
10:19 Managing Data Overload with GitHub API
15:33 The Risks of Network Interconnected Cloud Access
17:32 Security Risks of IP Whitelisting in Cloud Hadoop Clusters
20:23 Securing Network Logs from Tampering
24:12 The Impact of NVD Pausing on Vulnerability Detection
26:23 Efficiently Addressing Container Image Vulnerabilities
31:17 The Importance of Developer Training Over Tools
35:43 Tools for High-Level Security Posture Overview
38:13 The Vital Importance of App Security Leaders

Chris Lindsey LinkedIn: https://www.linkedin.com/in/chris-lindsey-39b3915/
AppSec Hive LinkedIn: https://www.linkedin.com/company/appsec-hive/

  continue reading

9 odcinków

Wszystkie odcinki

×
 
Loading …

Zapraszamy w Player FM

Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.

 

Skrócona instrukcja obsługi