Home > Podcasts > Information Technology

OnSecurity (Audio + Video)

Conversations & tips from the world’s leading Security experts across network, system, & software security topics: Building Secure Software, Exploiting Software, Rootkits, Cybercrime, Hacks, Patterns, Visualization, Testing, Metrics, Firewalls, & more.

Subscribe RSS Details

Topics: Certification, Engineering, Information Technology, Networking, Programming, Security, Software Development & Management

EpisodeDurationDateFormat

Interview with Thomas Erl on SOA and SOA Certification (Video) Part 1

By Thomas Erl

In this episode Tim interviews Thomas Erl, the world's top selling author on service-oriented architecture (SOA). Discussion topics include the basics of SOA and how the SOASchool.com certification program works.

10:50May 6, 2010Video MP4

Exploratory Testing with James Whittaker (Video)

By James A. Whittaker

James Whittaker provides an overview of Exploratory Testing--the subject of his latest book. Learn about ways to explore your application with intent, strategy, and tactics that find bugs and validate functionality.

1:47Dec 29, 2008Video MP4

Exploratory Testing: How to Test Software (Video)

By Adam Shostack

Adam Shostack discusses he state of Software Quality with James Whittaker. Learn about the current transition from testing infrastructure to testing business logic.

14:36Dec 22, 2008Video MP4

Future of Software Testing (Video)

By Adam Shostack

Adam Shostack discusses the future of software testing with James Whittaker. Learn about the evolution of software testing methodologies and where the exploratory testing industry is heading.

12:15Dec 22, 2008Video MP4

Security Testing (Video)

By Adam Shostack

Adam Shostack dives deep into security testing methodologies with How to Break Software Security author James Whittaker.

8:56Dec 22, 2008Video MP4

The Crisis in Information Security: Part 1 of 3 (Video)

By Adam Shostack

Adam Shostack discusses the crisis of credibility today in security. Learn about how this lack of credibility is driven by the fear economy.

5:46Dec 17, 2008Video MP4

The Crisis in Information Security: Part 2 of 3 (Video)

By Adam Shostack

Adam Shostack presents real-world solutions to fix the crisis of information security. Learn about ways to address the economy of fear from a sociologic, psychological, and anthropological perspective.

6:29Dec 17, 2008Video MP4

The Crisis in Information Security: Part 3 of 3 (Video)

By Adam Shostack

Adam Shostack offers specific steps to resolve the current crises in information security. Learn what academia, security professionals, and vendors can do to improve information security.

6:09Dec 17, 2008Video MP4

The New School of Information Security - Part 1 of 3 (audio)

By Adam Shostack

Adam Shostack and Ben Rothke discuss the crisis in information Security, and Adam's new book "The New School of Information Security."

10:54Oct 28, 2008Audio MP3

The New School of Information Security - Part 2 of 3 (audio)

By Adam Shostack

Adam Shostack and Ben Rothke continue their discussion of Adam's new book, "The New School of Information Security." Learn why the security data you have doesn’t support effective decision-making, and what to do about it.

8:31Oct 28, 2008Audio MP3

The New School of Information Security - Part 3 of 3 (audio)

By Adam Shostack

Adam Shostack and Ben Rothke continue their discussion of Adam's new book, "The New School of Information Security." Learn why it’s so hard to improve security in isolation, and how the entire industry can make it happen and evolve.

13:08Oct 28, 2008Audio MP3

Secure Coding Patterns with Scott Matsumoto (video)

By Scott Matsumoto

Scott Matsumoto discusses why application developers should care about security. Learn about secure coding patterns, threat modeling, and defensive coding.

11:34Oct 14, 2008Video MP4

Designing Secure Software with Scott Matsumoto (video)

By Scott Matsumoto

Scott Matsumoto discusses why and how to introduce security into your software development lifecycle. Learn why anyone involved in designing, coding, specifying, or testing software needs to be concerned about software security.

9:46Oct 7, 2008Video MP4

Googling Security & the Privacy Implications of Cloud Computing - Part 1 of 2 (audio)

By Greg Conti

As we enter the era of cloud computing, it is vitally important to consider the risks of sharing our data with third parties. Greg Conti and Ben Rothke examine these risks and the privacy implications of popular online tools and services.

22:44Oct 7, 2008Audio MP3

Googling Security & the Privacy Implications of Cloud Computing - Part 2 of 2 (audio)

By Greg Conti

In part 2, Ben Rothke and Greg Conti continue their discussion of the risks of sharing data with third parties in the cloud computing era.

13:41Oct 7, 2008Audio MP3

The dotCrime Manifesto: How to Stop Internet Crime - Part 1 of 3 (audio)

By Phillip Hallam-Baker, Ben Rothke

Phillip Hallam-Baker discusses his new book “The dotCrime Manifesto,” and presents a plan for implementing accountability-driven security infrastructure to create a safer Internet without sacrificing power, ubiquity, simplicity, flexibility, or privacy.

13:44Sep 17, 2008Audio MP3

The dotCrime Manifesto: How to Stop Internet Crime - Part 2 of 3 (audio)

By Ben Rothke, Phillip Hallam-Baker

Phillip Hallam-Baker continues the discussion of his book "The dotCrime Manifesto" with Ben Rothke. Learn about accountability as it pertains to stopping phishing, spam, and botnets. Part 2 of 3.

15:42Sep 17, 2008Audio MP3

The dotCrime Manifesto: How to Stop Internet Crime - Part 3 of 3 (audio)

By Phillip Hallam-Baker, Ben Rothke

Phillip Hallam-Baker discusses key components of his book "The dotCrime Manifesto" with Ben Rothke. Learn strategies and tactics for reconstructing the Internet to ensure it resists online crime and how we can started building the “Accountable Web.”

22:29Sep 17, 2008Audio MP3

Applied Security Visualization (audio)

By Raffael Marty

Martin McKeay discusses Raffael Marty's new book, Applied Security Visualization. Learn concepts, techniques, and tools you need to use visualization on your network.

9:26Aug 20, 2008Audio MP3

How to Start a Secure Software Development Program (audio)

By Julia H. Allen, Gary McGraw

Gary McGraw and Julia Allen discuss the state of the practice of Software Security and how to integrate security practices into your software development life-cycle.

20:27Aug 20, 2008Audio MP3

Build More Secure Software (audio)

By Julia H. Allen

CERT senior researcher Julia Allen and Bill Pollack discuss why business leaders need to start paying attention to software security.

0:16:41Jul 25, 2008Audio MP3

Identifying Software Security Requirements Early, Not After the Fact (audio)

By Julia H. Allen, Nancy R. Mead

Nancy Mead and Julia Allen, of CERT's research efforts in security requirements engineering, discuss why it's important to identify software security requirements early in the software development life cycle (SDLC) and practices for getting started.

0:22:56Jul 25, 2008Audio MP3

Virtual Honeypots: From Botnet Tracking to Intrusion Detection (audio)

By Niels Provos

Niels Provos and Thorsten Holz, authors of the most authoritative book in the field, discuss the advantages of virtual Honeypots.

13:41Jul 16, 2008Audio MP3

Crimeware & the Emerging Online Threat Landscape - Part 1 (audio)

By Zulfikar Ramzan

Symantec’s Zulfikar Ramzan, author of “Crimeware: Understanding New Attacks and Defenses,” discusses silent, stealthy, profit-driven online threats. Learn about the technological, social, psychological, & economic aspects of this problem.

0:13:49May 21, 2008Audio MP3

Crimeware & the Emerging Online Threat Landscape - Part 2 (audio)

By Zulfikar Ramzan

Zulfikar Ramzan, author of, “Crimeware: Understanding New Attacks and Defenses,” guides you through essential security principles, techniques, & countermeasures to keep you one step ahead of the criminals, regardless of evolving technology and tactics.

0:15:23May 21, 2008Audio MP3

Geekonomics: The Real Cost of Insecure Software - Part 1 of 3 (audio)

By David Rice

You’re a crash test dummy for software manufacturers. You have little, if any, meaningful consumer protection. Why? "Geekonomics" author David Rice discusses how current market incentives might be changed to protect you & your identity with Ben Rothke.

00:20:20Apr 3, 2008Audio MP3

Geekonomics: The Real Cost of Insecure Software - Part 2 of 3 (audio)

By David Rice

In part 2 of this three-part audio podcast series, "Geekonomics: The Real Cost of Insecure Software" author David Rice and Ben Rothke discuss the "cement" metaphor as it pertains to software security.

00:19:21Apr 3, 2008Audio MP3

Geekonomics: The Real Cost of Insecure Software - Part 3 of 3 (audio)

By David Rice

In part 3 of this three-part audio podcast series, "Geekonomics: The Real Cost of Insecure Software" author David Rice and Ben Rothke discuss accountability for vulnerable software.

00:16:26Apr 3, 2008Audio MP3

Bridging Visualization and Security (video)

By Raffael Marty

Raffael Marty presents concepts from his forthcoming book, Applied Security Visualization. Learn valuable techniques to literally see what is happening on your networks and take decisive action without getting lost in a sea of data.

0:14:06Jan 16, 2008Video MP4

Applied Security Visualization (video)

By Raffael Marty

Raffael Marty presents concepts from his forthcoming book, Applied Security Visualization. Learn valuable techniques to literally see what is happening on your networks and take decisive action without getting lost in a sea of data.

0:09:42Jan 9, 2008Video MP4

The Art of Software Security Testing (video)

By Chris Wysopal

Chris Wysopal, CTO Veracode discusses his book, The Art of Software Security Testing – an indispensable guide for every technical professional responsible for software security: testers, QA specialists, security professionals, developers, and IT Managers.

0:09:51Jan 2, 2008Video MP4

Future of Secure Networking Technology (video)

By Greg Abelar

Cisco Network Security expert and author, Greg Abelar, offers valuable insights into the future of secure networking technology.

0:08:34Dec 26, 2007Video MP4

Software Security and Cybercrime (video)

By Gary McGraw

The world's leading Software Security authority, Dr. Gary McGraw, CTO Cigital, Inc. discusses software security, cybercrime, and how to break the barriers to security implementation in software engineering.

0:08:49Dec 19, 2007Video MP4

Software Security: Building Security In (video)

By Gary McGraw

The world's leading Software Security authority, Dr. Gary McGraw, CTO Cigital, Inc. discusses the need for security throughout the software development lifecycle, and how to break the barriers to security implementation in software engineering.

0:09:18Dec 12, 2007Video MP4

Rootkits: Developments and Prevention (video)

By Greg Hoglund

Greg Hoglund, author of Rootkits: Subverting the Windows Kernel, presents all you need to know about the threat that Rootkits pose to cyber-security. Learn about new developments in Rootkit technology & how to prevent your systems from being subverted.

0:10:12Dec 5, 2007Video MP4

Rootkits: Importance of Full Disclosure - Part 2 (video)

By Jamie Butler

James Butler, co-author of “Rootkits: Subverting the Windows Kernel,” continues his discussion of the importance of full disclosure. Learn everything you need to know about rootkits: what they are, how they work, how to build them, & how to detect them.

0:07:38Nov 28, 2007Video MP4

Rootkits: Importance of Full Disclosure - Part 1 (video)

By Jamie Butler

James Butler, co-author of “Rootkits: Subverting the Windows Kernel,” the first comprehensive guide to rootkits: what they are, how they work, how to build them, & how to detect them, discusses the importance of full disclosure.

0:08:21Nov 21, 2007Video MP4

The Cost of Network Security (video)

By Greg Abelar

Greg Abelar, author of "Security Threat Mitigation and Response: Understanding Cisco Security MARS," discusses the cost of Network Security. Learn to secure critical data, prevent & mitigate network attacks, and build end-to-end self-defending networks.

0:08:11Nov 14, 2007Video MP4

Security Threat Mitigation and Response (video)

By Greg Abelar

Greg Abelar presents tips from his book, Security Threat Mitigation and Response: Understanding Cisco Security MARS. Learn to secure critical data & resources, prevent & mitigate network attacks, and build end-to-end self-defending networks.

7:12Nov 7, 2007Video MP4

Software Security Testing: Demanding Software Security (video)

By Chris Wysopal

Chris Wysopal, CTO of Veracode, discusses his book, The Art of Software Security Testing – an indispensable guide for software security professionals. Learn techniques for anticipating and identifying software security problems before the “bad guys” do.

0:08:42Oct 31, 2007Video MP4

Software Security Testing: Strengthening Your Defense Strategy (video)

By Chris Wysopal

Chris Wysopal, CTO Veracode discusses his book, The Art of Software Security Testing – an indispensable guide for every technical professional responsible for software security: testers, QA specialists, security professionals, developers, and IT Managers.

0:07:19Oct 24, 2007Video MP4

Breaking Barriers to Security Implementation (video)

By Gary McGraw

The world's leading Software Security authority, Dr. Gary McGraw, CTO Cigital, Inc. discusses the need for security throughout the software development lifecycle, and how to break the barriers to security implementation in software engineering.

0:09:57Oct 17, 2007Video MP4

The Implicit Demand of Software Security (video)

By Gary McGraw

Cigital CTO Dr. Gary McGraw, the world's leading software security authority, discusses the implicit demand of software security. Learn about static analysis, penetration testing, architectural risk analysis & enterprise software security programs.

0:09:59Oct 10, 2007Video MP4

Security Metrics: Benchmarking (video)

By Andrew Jaquith

Join "Security Metrics" author Andrew Jaquith as he discusses benchmarking within security metrics.

0:07:01Oct 3, 2007Video MP4

Java Security Challenges and Risks: Part 2 (video)

By Ramesh Nagappan

Join "Core Security Patterns" author Ramesh Nagappan as he discusses the security challenges and risks in Java in part two of this video series.

0:08:48Sep 26, 2007Video MP4

Java Security Challenges and Risks: Part 1 (video)

By Ramesh Nagappan

Join "Core Security Patterns" author Ramesh Nagappan as he discusses the security challenges and risks in Java.

0:08:12Sep 18, 2007Video MP4

Securing Your Business With Cisco ASA and PIX Firewalls (video)

By Ted Neward, Greg Abelar

Join "Security Threat Mitigation and Response" author Greg Abelar as he talks about the best way to secure your business with cisco ASA and PIX firewalls.

0:07:56Sep 12, 2007Video MP4

Firewall Fundamentals - Part 2 (video)

By Wes Noonan

Join "Firewall Fundamentals" author Wes Noonan as he discusses he discusses the need for firewalls in computer security in part two of this video series.

0:07:17Sep 5, 2007Video MP4

Firewall Fundamentals - Part 1 (video)

By Wes Noonan

Join "Firewall Fundamentals" author Wes Noonan as he discusses the need for firewalls in computer security.

0:08:04Aug 29, 2007Video MP4

Online Gaming: Addiction, Hacking, & Protection (video)

By Greg Hoglund

Join "Exploiting Software: How to Break Code" author Greg Hoglund as he discusses the intricacies of online gaming.

0:09:19Aug 22, 2007Video MP4

Online Gaming Threats (video)

By Greg Hoglund

Join "Exploiting Software: How to Break Code" author Greg Hoglund as he discusses online gaming threats.

0:10:37Aug 15, 2007Video MP4

NAC Security (video)

By Jerry Lin

Join "Cisco NAC Appliance" author Jerry Lin as he discusses the creation of NAC technology.

0:09:22Aug 10, 2007Video MP4

Rootkits: Detecting the Threat (video)

By Jamie Butler

Join "Rootkits" author Jamie Butler as he discusses how best to detect rootkits.

0:11:23Aug 1, 2007Video MP4

Secure Programming: C Versus Java (video)

By Brian Chess, Jacob West

Join host Ted Neward as he discusses secure programming with Brian Chess, Chief Scientist at Fortify Software and Jacob West, Manager of Fortify's Secure Research Group.

0:11:44Jul 25, 2007Video MP4

Secure Networking Challenges (video)

By Greg Abelar

Join "Security Threat Mitigation and Response" author Greg Abelar as he discusses the challenges of secure networking.

0:09:22Jul 16, 2007Video MP4

Online Gaming and Criminality (video)

By Gary McGraw

Join "Exploiting Online Games: Cheating Massively Distributed Systems" author, Gary McGraw, as he discusses security issues in online gaming.

0:09:57Jul 3, 2007Video MP4

Core Security Patterns (video)

By Ramesh Nagappan

Author Ramesh Nagappan discusses core security patterns that are crucial for secure programming.

00:06:39Jun 20, 2007Video MP4

Security Metrics, Part 1 (video)

By Andrew Jaquith

Author Andrew Jaquith discusses the importance of security metrics in software development.

00:09:58Jun 20, 2007Video MP4

Security Metrics, Part 2 (video)

By Andrew Jaquith

Author Andrew Jaquith continues his discussion on the importance of security metrics in software development.

00:07:54Jun 20, 2007Video MP4

Software Security Testing: Identifying Software Security Flaws (video)

By Chris Wysopal

Author Chris Wyposal discusses techniques for identifying software security flaws.

00:11:24Jun 20, 2007Video MP4

OnSecurity (Audio + Video)