Artwork

Player FM - Internet Radio Done Right
Checked 2d ago
Added three years ago
Content provided by IT Audit Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IT Audit Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
icon Daily Deals

Building Resilient, Secure Software: Lessons from DevSecOps Experts

47:32
 
Share
 

Manage episode 446186688 series 3404023
Content provided by IT Audit Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IT Audit Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Building secure software isn't optional—It's critical. Here’s how you can do it right!

In this episode of The Audit presented by IT Audit Labs, we’re joined by Francis Ofungwu, CEO of DevSecFlow, to break down the urgent topic of software security. Together with Nick Mellom and Bill Harris, we dive into the common security threats developers face today and discuss the vital steps every company should take to secure their software development lifecycle.

In this episode, we’ll cover:

  • The biggest software security threats developers face in 2024
  • How to integrate security seamlessly into the software development lifecycle
  • The convergence of infrastructure security and software security
  • The role of AI in secure coding and software development
  • The importance of threat modeling and attack surface reviews
  • How to create a more resilient software supply chain and manage risk effectively

Whether you’re a developer, security pro, or IT decision-maker, this episode is packed with actionable insights to elevate your security strategy and ensure your software is built to withstand today’s evolving cyber threats.

Don’t forget to hit that subscribe button and drop a comment below on your top takeaway!

#CyberSecurity #DevSecOps #SoftwareSecurity #AICoding #IncidentResponse #ITSecurity #CloudSecurity #RiskManagement

  continue reading

Chapters

1. Building Resilient, Secure Software: Lessons from DevSecOps Experts (00:00:00)

2. Securing Software Development and Infrastructure (00:00:04)

3. Building Trust Between Security and Developers (00:11:41)

4. Managing Software and Security Risks (00:17:08)

5. Enhancing Software Security Practices (00:27:26)

6. AI's Role in Software Development Security (00:40:26)

65 episodes

Artwork
iconShare
 
Manage episode 446186688 series 3404023
Content provided by IT Audit Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IT Audit Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Building secure software isn't optional—It's critical. Here’s how you can do it right!

In this episode of The Audit presented by IT Audit Labs, we’re joined by Francis Ofungwu, CEO of DevSecFlow, to break down the urgent topic of software security. Together with Nick Mellom and Bill Harris, we dive into the common security threats developers face today and discuss the vital steps every company should take to secure their software development lifecycle.

In this episode, we’ll cover:

  • The biggest software security threats developers face in 2024
  • How to integrate security seamlessly into the software development lifecycle
  • The convergence of infrastructure security and software security
  • The role of AI in secure coding and software development
  • The importance of threat modeling and attack surface reviews
  • How to create a more resilient software supply chain and manage risk effectively

Whether you’re a developer, security pro, or IT decision-maker, this episode is packed with actionable insights to elevate your security strategy and ensure your software is built to withstand today’s evolving cyber threats.

Don’t forget to hit that subscribe button and drop a comment below on your top takeaway!

#CyberSecurity #DevSecOps #SoftwareSecurity #AICoding #IncidentResponse #ITSecurity #CloudSecurity #RiskManagement

  continue reading

Chapters

1. Building Resilient, Secure Software: Lessons from DevSecOps Experts (00:00:00)

2. Securing Software Development and Infrastructure (00:00:04)

3. Building Trust Between Security and Developers (00:11:41)

4. Managing Software and Security Risks (00:17:08)

5. Enhancing Software Security Practices (00:27:26)

6. AI's Role in Software Development Security (00:40:26)

65 episodes

All episodes

×
 
Your network is talking behind your back—but Pi-hole is listening. Join The Audit as Pi-hole co-founders Dan Schaefer and Adam Warner reveal how their open-source DNS sinkhole technology has become the secret weapon for over 200,000 privacy-conscious users worldwide. In this episode, we discuss: How Pi-hole evolved from a simple ad blocker to a critical network security tool Why DNS-level filtering stops threats before they reach any of your devices The performance benefits that make browsing noticeably faster Setting up Pi-hole on everything from Raspberry Pi to enterprise hardware How the global development team maintains this powerful security shield Protecting vulnerable IoT devices from malicious traffic The future roadmap for Pi-hole and opportunities to contribute Don't miss this deep dive into the technology that's reclaiming control of digital footprints one DNS request at a time. Connect with the Pi-hole community at discourse.pi-hole.net and discover why cybersecurity professionals consider this an essential defensive tool. Like, share, and subscribe for more cutting-edge cybersecurity insights and expert analysis! #pihole #DNSfiltering #networksecurity #adblocking #privacytools #cybersecurity #opensource #infosec…
 
Join The Audit for a news-packed episode as cybersecurity expert Matt Starland recounts a chilling near-miss with an E-Z Pass phishing scam—received just minutes after renting a car in Florida. His close call highlights how scammers exploit timing and context to deceive even seasoned professionals. In this episode, we discuss: How a security pro nearly fell for a perfectly timed phishing text The FBI’s 2023 Internet Crime Report and its $16.6B warning Why nearly $5B in losses hit Americans over 60—and why many stay silent The psychological barriers victims face when reporting cybercrime The rise of the “Dead Internet Theory” and AI-generated online content How Meta and others are blurring the line between real and artificial Practical ways to spot AI-generated interactions Why maintaining human connection is key in the age of AI Don’t miss this timely conversation packed with real-world insights and strategies to help you stay secure in an increasingly digital (and artificial) world. Like, share, and subscribe for more cutting-edge cybersecurity stories and expert analysis. #infosec #cybersecurity #E-ZPass #phishing #FBI #deadinternet #meta…
 
Join The Audit as we dive into the high-stakes intersection of critical infrastructure and cybersecurity with Tim Herman, President of InfraGard Minnesota. InfraGard is a unique public-private partnership with the FBI designed to protect the 85% of America's essential systems owned by the private sector. From power grids to transportation, the vulnerabilities are real—and increasingly complex. In this episode, we discuss: How joystick-operated tugboats on the Mississippi reveal hidden cyber risks Why tabletop exercises are vital for incident readiness Common mistakes in organizational response plans (and how to fix them) The importance of physical backups and redundant communication systems Actionable steps to bridge the gap between planning and execution Cybersecurity isn’t just an IT issue—it’s national security. Don’t miss this compelling conversation on how InfraGard is helping organizations build resilience before the next breach hits. Like, share, and subscribe for more expert insights from the frontlines of cybersecurity.…
 
Join The Audit as we explore the cutting-edge world of quantum computing with information security architect, Bill Harris. Quantum technology is advancing at breakneck speed, pushing the boundaries of computation, while Quantum Key Distribution (QKD) is making encrypted communications nearly unbreakable. As multiple sectors race to integrate quantum and AI, cybersecurity experts are racing to implement quantum-resistant encryption before traditional cryptographic methods become obsolete. Beyond the technical breakthroughs, quantum computing is also raising profound questions about reality itself. In this episode, we discuss: The rise of 1,000-qubit machines and persistent error challenges How QKD is reshaping secure communication worldwide Microsoft’s Majorana particle claims—fact or hype? NASA’s mysterious quantum shutdown in February 2024 Google’s research into quantum and unexpected findings The cybersecurity arms race to counter quantum decryption Quantum computing isn’t just the future—it’s here, and it’s reshaping everything from cybersecurity to our understanding of the universe. Don’t miss this deep dive into the most mind-bending technology of our time! Like, share, and subscribe for more in-depth cybersecurity insights. #QuantumComputing #Cybersecurity #Encryption #AI #ParallelUniverses…
 
What Really Happens to Your Trash? Inside Modern Waste Management Is your trash really being recycled, or is it ending up in a landfill? In this episode of The Audit , we sit down with Trista Martinson, Executive Director at Ramsey Washington Recycling & Energy, to uncover the surprising technology and cybersecurity challenges behind modern waste management. Trista joins the IT Audit Labs team to reveal how AI, robotics, and environmental science are transforming recycling, while also sharing how The Audit's own Eric Brown helped strengthen her organization’s cybersecurity to protect critical infrastructure. In this episode, we discuss: How AI and robotics are revolutionizing waste processing The reality behind China’s global recycling market Why recycling facilities are prime targets for cyberattacks The role of cybersecurity in protecting critical infrastructure How a military mindset influences risk assessment The biggest mistakes people make when disposing of trash From optimizing recycling with data to securing waste facilities against ransomware, this episode dives deep into the hidden world of trash, tech, and security. 🔔 Subscribe for more cybersecurity and technology insights! #Cybersecurity #WasteManagement #Recycling #AI #TheAuditPodcast…
 
Are SOC audits just another compliance requirement, or do they provide real security value? In this episode of The Audit , we sit down with Adam Russell from Schellman to debunk common misconceptions about SOC audits and explore why they’re more than just a checkbox exercise—especially for startups. Adam joins the IT Audit Labs team for a deep dive into the often-misunderstood world of attestations, sharing expert insights on how organizations can effectively prepare for a SOC audit and determine which security assessments best fit their needs. In this episode we discuss: - The biggest mistakes startups make with SOC audits - Why SOC 2 is more flexible than you might think - The myth that big companies are always secure - How SOC assessments can strengthen security culture - Gamified training & newsletters for better compliance engagement - How external auditors can empower internal teams Whether you're preparing for your first SOC audit or navigating complex compliance requirements, this episode is packed with actionable insights to help you enhance security and compliance strategies. 🔔 Subscribe for more cybersecurity insights! #Cybersecurity #SOCAudit #Compliance #StartupSecurity #TheAuditPodcast…
 
Think audits are just paperwork? Think again. They’re the frontline defense against security gaps, data breaches, and unchecked access. In this episode of The Audit , we break down how Elon Musk’s unexpected access to FEMA’s sensitive data underscores the critical role of audits in organizational security. We reveal how regular audits and third-party reviews expose vulnerabilities, enforce accountability, and strengthen cyber defenses before attackers can exploit them. Key Topics We Cover: • How audits uncover hidden cybersecurity risks • Finland’s cutting-edge approach to cyber resilience • Why tabletop exercises and real-world drills are game changers • A shocking social engineering attack at a library—and what it teaches us Cyber threats evolve fast—don’t wait until you’re the next headline. Whether you're a cybersecurity pro or just getting started, this episode is packed with actionable insights you can’t afford to miss. Like, share, and subscribe for the latest cybersecurity news and expert analysis! #Cybersecurity #Auditing #Infosec #SocialEngineering #SecurityNews…
 
You’re Being Hacked Right Now—And You Don’t Even Know It Ever wonder how cybercriminals manipulate human behavior to breach even the most secure organizations? In this episode of The Audit, Eric Brown and Nick Mellum sit down with renowned social engineer and penetration tester Alethe Denis to break down real-world hacking techniques, red team strategies, and the shocking ways attackers exploit trust. From winning DEF CON’s Black Badge Social Engineering competition to executing high-stakes red team engagements, Alith shares jaw-dropping stories and expert insights on modern security threats. Key topics we cover: The art of social engineering and why it still works Wildly effective pretexts hackers use to gain access How AI and deepfakes are shaping the future of cybercrime Physical penetration testing stories that will make you rethink office security Simple but powerful strategies to protect yourself and your organization Don't wait until your organization is the next headline. Whether you're a cybersecurity pro or just getting started, this episode is packed with eye-opening insights you can’t afford to miss. Like, share, and subscribe for more in-depth security discussions! #Cybersecurity #SocialEngineering #PenTesting #EthicalHacking #RedTeam…
 
Discover the hidden risks of browser extensions, cybersecurity incidents, and more with hosts Eric Brown and Nick Mellum. In this episode, we dive into the dangers of tools like Honey, the fallout from Proton’s global outage, and the ingenious tactics used by cybercriminals to target unsuspecting users. Eric and Nick also share their insights on using big data to enhance security, the role of AI in addressing threats, and practical tips for staying ahead of the ever-changing tech landscape in 2025. We'll cover: The surprising risks behind popular browser extensions like Honey Lessons from Proton’s global outage and the importance of preparation How cybercriminals use voice phishing to exploit tech giants Practical steps to improve organizational security and educate users Balancing security and accessibility in modern systems From practical advice to thought-provoking insights, this episode delivers actionable takeaways for anyone navigating today’s tech landscape. #Cybersecurity #TechNews #DataPrivacy #RiskManagement #DigitalSafety…
 
Dive into the transformative power of data in cybersecurity in this must-watch episode with Wade Baker, where cutting-edge insights meet real-world applications. Hear from The Audit Team as we discover how massive data sets are reshaping risk management, AI’s evolving role in combating cyber threats, and the surprising insights data can unveil about security incidents. We also dive into ransomware trends, phishing techniques, the ethics of AI, and the critical role of storytelling in decision-making, with some fun nods to fantasy swords along the way. In this episode, we discuss: Using big data to tackle cybersecurity challenges Ransomware and phishing trends The ethical debate around AI in security Unique discoveries from security data analysis Practical strategies for influencing decision-makers Catch this insightful conversation and stay ahead of the cybersecurity curve. Like, share, and subscribe for more expert discussions on the latest security trends! #Cybersecurity #DataAnalytics #RiskManagement…
 
Join us for an eye-opening discussion on cybersecurity in travel with ethical hacker Matthew Wold from Ramsey County. Matthew shares how his passion for cybersecurity took root at Ramsey County, leading to collaborations with co-hosts Eric Brown and Nick Mellem. We kick things off with a lighthearted chat about survival items on a deserted island, setting the stage for a lively and insightful conversation. From RFID shields to OMG cables, we unpack practical tips for protecting your digital and personal safety while traveling. Learn how to navigate risks like compromised USB ports, hidden cameras in hotel rooms, and data privacy challenges across borders. With advice on VPNs, securing SIM cards, managing passwords, and safeguarding luggage, this episode is packed with essential strategies to ensure your travel experiences remain secure and worry-free.…
 
From Gmail 2FA bypass warnings to SEO poisoning campaigns, we’re diving into the latest cybersecurity headlines reshaping the industry. We explore how attackers are using hyper-specific search terms—like the legality of Bengal cats—to deliver malware and manipulate search results. Plus, we discuss advancements in AI-powered behavioral analytics, from cutting down false alerts to streamlining incident response. With real-world insights and actionable tips, this episode is packed with must-know updates for IT professionals navigating today’s ever-evolving threat landscape. In this episode, we'll discuss: Gmail session cookie theft and bypassing two-factor authentication. SEO poisoning campaigns delivering malware via niche search terms. AI-driven behavioral analytics improving incident response. Real-world social engineering and user behavior risks. Balancing usability and security with tools like passkeys. Thanks for tuning into The Audit . Subscribe on Spotify, Apple Podcasts, or YouTube to stay informed on the latest in cybersecurity. Don’t forget to follow us on social media and share with your network! #CybersecurityNews #2FA #BehavioralAnalytics #IncidentResponse #SEOPoisoning #ITSecurity #DataProtection…
 
In this episode of The Audit , we dive into key takeaways from a top cybersecurity event. From IoT hacking and RFID bypasses to AI governance and vishing bots, we explore the tools and strategies shaping security. Plus, real-world lessons, social engineering insights, and a few unexpected laughs—because security isn’t always all business. In This Episode We’ll Cover: RFID hacking and social engineering insights from WWHF. Cameron’s IoT hacking training highlights. AI advancements and governance takeaways. Challenges with regulations and compliance in cybersecurity. Project management lessons inspired by Elon Musk. Thanks for joining us for this glimpse into one of the year’s most unique cybersecurity events. Don’t forget to subscribe and share this episode with your team—we’ll see you at the next conference. #WWHackinFest #InfoSecConferences #Cybersecurity #AIThreats #IoTSecurity #SocialEngineering…
 
In this episode, we dive into emerging tech with Marsha Maxwell, co-founder of If These Lands Could Talk and Head of Innovation at Atlanta International School. Marsha shares insights on empowering indigenous and underserved communities through AI and VR, the ethical challenges of integrating AI, and the importance of digital inclusion. We discuss the impact of AI on knowledge, culture, and education and examine how to responsibly bridge gaps in tech access worldwide. In this episode we cover: Exploring AI and VR for indigenous and underserved communities Bridging digital divides: Tech access for all Ethical challenges in AI and identity How to navigate digital authenticity in the age of deepfakes The future of AI in creative and cultural spaces Practical strategies for blending AI with education and learning Tune in for a compelling look at the intersection of technology, education, and culture. Don’t forget to like, subscribe, and share to stay updated with our latest episodes! #ArtificialIntelligence #EmergingTech #DigitalInclusion #CyberSecurity #DataProtection #AIinSecurity…
 
Building secure software isn't optional—It's critical. Here’s how you can do it right! In this episode of The Audit presented by IT Audit Labs, we’re joined by Francis Ofungwu, CEO of DevSecFlow, to break down the urgent topic of software security. Together with Nick Mellom and Bill Harris, we dive into the common security threats developers face today and discuss the vital steps every company should take to secure their software development lifecycle. In this episode, we’ll cover: The biggest software security threats developers face in 2024 How to integrate security seamlessly into the software development lifecycle The convergence of infrastructure security and software security The role of AI in secure coding and software development The importance of threat modeling and attack surface reviews How to create a more resilient software supply chain and manage risk effectively Whether you’re a developer, security pro, or IT decision-maker, this episode is packed with actionable insights to elevate your security strategy and ensure your software is built to withstand today’s evolving cyber threats. Don’t forget to hit that subscribe button and drop a comment below on your top takeaway! #CyberSecurity #DevSecOps #SoftwareSecurity #AICoding #IncidentResponse #ITSecurity #CloudSecurity #RiskManagement…
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

Quick Reference Guide

Listen to this show while you explore
Play