Channel Avatar

The Security Table @UCLodR5gtnVo0e8PAtwcr4Lg@youtube.com

225 subscribers

The Security Table is three cybersecurity industry veterans


48:38
More Cowbell Security and Speed in Agile
35:36
Privateering the Cyber Seas New Legislation on Cybercrime
28:15
Making Privacy Less Cringey
49:07
Decoding Mastro: AI Threat Modeling
42:19
Vibe Startups, AI Problems, and Matt’s Precious Computer
45:10
AI, AppSec and the Meaning of Life: The Answer is 42
49:43
Building the World's Largest Threat Model Library
43:37
Vibe Coding: Can You Put Your Trust in the Machine?
43:31
Traversing the Conference Circuit Highlights and Insights
45:46
MCP…Something Could Go Wrong A
29:54
Threat Modeling or Threat Intelligence, Are they the Same
39:54
Skillset Over Experience Rethinking Qualifications in Cybersecurity
36:35
Vibe Coding What Could Possibly Go Wrong
45:13
The Department of No
47:13
The Cyber Trust Mark Debate
35:01
Hovercrafts and the Evolution of AppSec in 2025
29:14
Find Your Conferences and Watch Die Hard And the Princess Bride
42:40
Is it Necessary Not everything requires an LLM
41:12
The STRIDE Controversy Evolution vs Extinction in Security Models
44:55
Why 100X Isn't the Answer
27:49
We'll Be Here Until We Become Obsolete
30:00
S2E29 -- Everything is boring
44:08
S2E28 -- Experts want to Excel
32:23
Numb to Data Breaches, and How it Impacts Security of the Average Feature
28:41
Philosophizing Cloud Security
31:37
Innovations in Threat Modeling
40:19
The Illusion of Secure Software
30:26
The Intersection of Hardware and Software Security
46:10
Computing Has Trust Issues
24:06
The Stages of Grief in Incident Response
28:09
To SSH or not?
26:04
Rethinking Security Conferences Engagement and Innovation
35:49
Privacy vs Security: Complexity at the Crossroads
52:05
Security, Stories, Jazz and Stage Presence with Brook Schoenfield
39:42
Debating the CISA Secure by Design Pledge
48:11
Why Developers Will Take Charge of Security, Tests in Prod
45:40
12 Factors of Threat Modeling
43:55
XZ and the Trouble with Covert Identities in Open Source
39:32
Nobody's Going To Mess with Our STRIDE
37:56
SQLi All Over Again
42:20
How I Learned to Stop Worrying and Love the AI
43:47
Secure by Default in the Developer Toolset and DevEx
34:59
Debating the Priority and Value of Memory Safety
41:10
Selling Fear, Uncertainty, and Doubt
37:10
Prioritizing AppSec -- A Conversation Between a VP of Eng, a Product Manager, and a Security "Pro"
32:03
Villainy, Open Source, and the Software Supply Chain
46:24
Adam Shostack -- Thinking like an Attacker and Risk Management in the Capabilities
27:14
Bug Bounty Theater and Responsible Bug Bounty
41:58
Threat Modeling Capabilities
40:35
Open Source Puppies and Beer
47:45
AppSec Resolutions
46:15
Looking Back, Looking Forward
45:40
An SBOM Lifecycle
37:18
An SBOM Fable
20:10
NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
54:59
The Future Role of Security and Shifting off the Table
33:33
A Show About Nothing that Turned into Something
56:29
The Hamster Wheel of Scan and Fix
32:19
Threat Modeling Conference
37:07
AppSec vs. ProdSec