
Useful ransomware protection for you.
Guest Roger Grimes, Data Driven Defense Evangelist at KnowBe4, joins Dave to discuss his new book "Ransomware Protection Playbook," Dave has a story about a Meta (Facebook) group with a cryptocurrency...
27 Tammi 202244min
![OWASP security misconfiguration (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
OWASP security misconfiguration (noun) [Word Notes]
The state of a web application when it's vulnerable to attack due to an insecure configuration.
25 Tammi 20227min

The perfect environment for ATOs (account takeovers) to breed.
Guest Jane Lee, Trust and Safety Architect at Sift, joins Dave to talk about the Digital Trust and Safety Index, Joe and Dave share some follow up from a listener, Ben, with a suggestion as an alterna...
20 Tammi 202246min

OWASP insecure design (noun)
A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.
18 Tammi 20228min

The only locks you should pick are your own.
Guest Tom Tovar, CEO and Co-Creator of AppDome, joins Dave and Joe to discuss the results of a recent consumer survey, Dave's story is based on a tweet where the user's child's middle school had some ...
13 Tammi 202244min
![Log4j vulnerability (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
Log4j vulnerability (noun) [Word Notes]
An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information.
11 Tammi 20229min

Changing the game on ransomware.
Guest Adam Flatley, Director of Threat Intelligence at Redacted, talks with Dave about "the only way to truly disrupt the ransomware problem is to target the actors themselves," Joe shares some statis...
6 Tammi 202249min
![OWASP injection (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
OWASP injection (noun) [Word Notes]
A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality.
4 Tammi 20226min





















