ASWEpisode88

From Paul's Security Weekly
Jump to: navigation, search

Recorded December 9, 2019 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Paul Asadoorian
    Embedded device security researcher, security podcaster, and CEO of Active Countermeasures .
  • John Kinsella
    is the Vice President of Container Security for Qualys.

  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Interview: Allan Friedman, NTIA (National Telecommunication and Information Administration) US Dept of Commerce

    Dr. Allan Friedman is Director of Cybersecurity at the National Telecommunications and Information Administration in the US Department of Commerce. He coordinates NTIA’s multi-stakeholder processes on cybersecurity, convening cross-sector working groups with a focus on resilience in a vulnerable ecosystem. This has included pioneering government engagement on coordinated vulnerability disclosure, IoT security, and software component transparency.

    Prior to joining the Federal government, Friedman spent over 15 years as a noted cybersecurity and tech policy scholar at Harvard’s Computer Science Department, the Brookings Institution and George Washington University’s Engineering School. He is the co-author of the popular text Cybersecurity and Cyberwar: What Everyone Needs to Know, has a degree in computer science from Swarthmore College and a PhD in public policy from Harvard University.

    Segment Topic:
    Software Bill of Materials (SBOM)

    Segment Description:
    The problem: unknown software supply chain. Following a newly identified software risk, very few firms can answer the simple question: Am I affected?
    An overview of the solution: what is an SBOM, and how is it used
    Where we are: some background on why the govt is doing this, the results thus far, and where we are going next. Potential to discuss regulation, govt policy, etc.

    Segment Resources:



    News

    1. IoT and Agile Framework Partners in Efficacy - One thing missing here is the contract with security. Sure, Agile works to ensure the requirements are met for the customer, but what are the security requirements and who is testing for them?
    2. Top 10 Useful GitHub Repos That Every Developer Should Follow - GeeksforGeeks - I wish I had found this 8 months ago! Some great examples.
    3. GitHub Seeks Security Dominance With Developers - CodeQL, obtained from its acquisition of Semmle in September 2019, is being provided free-of-charge to open source developers and academic researchers. The goal is to build up a library of CodeQL queries that can detect security flaws in an automated fashion, and GitHub has created financial incentives under a bug bounty program with two main payout classes: individual bugs and broader, cross-ecosystem bug types.
    4. Java vs. Python: Which should you choose? - As applications become more distributed, in containers and access each other via API, conceivably you could have both in your application. What does this mean for security?
    5. WhiteSource acquires & open sources Renovate dependency update toolset - Open Source Insider - Founder of Renovate Rhys Arkins explains that Renovate was developed because running user-facing applications with outdated dependencies is not a serious option for software projects – or at least it shouldn’t be. As we know, using outdated dependencies increases the likelihood of unfixed bugs and increases the quantity and impact of security vulnerabilities within software applications.
    6. Which movies or series about programming would you recommend? - Just wanted to mention "Halt and Catch Fire", which I thought was awesome (So did this person).
    7. THE WORLD RUNS ON OPEN-SOURCE, BUT WHOS PAYING FOR GAS? - It's a great point: Thousands of open source projects are abandoned every year by their developers, leaving their users in a bind. That is a big issue for the companies who spend billions of dollars every year for handling obsolete, undocumented and generally unmaintained open source projects used in their commercial software. When a company assigns a $50/hr developer to fix a bug in a ‘free’ piece of software, it stops being free. Why not pay the original developer for a great open source project that frees corporate resources to tackle mission-critical tasks?
    8. SOLID Principles of Object-Oriented Design - When starting to write Object-Oriented programing the SOLID principles could be difficult to understand and, if they are understood, see where and when to apply them is not trivial. But they are an example of one of the most important things in software development, practice and experience will make you apply these principles in a very natural and intuitive way. - I also think you end up with more secure software...
    9. TOP 10 ALGORITHMS EVERY SOFTWARE ENGINEER SHOULD KNOW BY HEART - from the comments on this article: Software Engineering is about problem solving and creatively composing code to do complex things. Not rote memorizing of common knowledge..
    10. Microsoft: We're creating a new Rust-like programming language for secure coding | ZDNet


    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+