Rephonic
Artwork for Application Security Weekly

Application Security Weekly (Video)

Security Weekly
Application Security
Owasp
Threat Modeling
Qualys
Devops
Devsecops
Generative AI
Software Assurance Maturity Model
Conference Presentations
Gnu C Library
Secure Pipeline Verification Standard
Software Supply Chain Security
AI Security
Log4j
Kubernetes
Cybersecurity
B-Sides San Francisco
Jenkins
Apple
Code Security

About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.

PublishesWeeklyEpisodes676Founded8 years ago
Number of ListenersCategories
NewsTechnologyTech News

Listen to this Podcast

Artwork for Application Security Weekly

Latest Episodes

In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the ... more

This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking o... more

YouTube

Up first, the ASW news of the week.

At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity’s door. They discuss the terrifying reality of quantum computing’s power to b... more

YouTube

In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber ... more

YouTube

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Recent Guests

Scott Clinton
Board member and co-chair of the OWASP GenAI Security Project
OWASP
Episode: How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
Seemant Sehgal
Founder of BreachLock
BreachLock
Episode: Limitations and Liabilities of LLM Coding - Ted Shorter, Seemant Sehgal - ASW #347
Ted Shorter
CTO and co-founder of Keyfactor
Keyfactor
Episode: Limitations and Liabilities of LLM Coding - Ted Shorter, Seemant Sehgal - ASW #347
Michael Callahan
Chief Marketing Officer at Salt Security
Salt Security
Episode: AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Michael Callahan, Idan Plotnik, Josh Lemos, Chris Boehm - ASW #346
Josh Lemos
Chief Information Security Officer at GitLab
GitLab
Episode: AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Michael Callahan, Idan Plotnik, Josh Lemos, Chris Boehm - ASW #346
Chris Boehm
Field CTO of Zero Networks
Zero Networks
Episode: AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Michael Callahan, Idan Plotnik, Josh Lemos, Chris Boehm - ASW #346
Emily Fox
DevOps enthusiast, security unicorn, and advocate for women in technology with over 15 years in security.
Episode: Translating Security Regulations into Secure Projects - Emily Fox, Roman Zhukov - ASW #345
Roman Zhukov
Security communities lead at Red Hat, contributor to various open source security initiatives.
Red Hat
Episode: Translating Security Regulations into Secure Projects - Emily Fox, Roman Zhukov - ASW #345
Neil Carpenter
Security professional with over a decade of experience leading security incident response teams at Microsoft and working with cloud-native security.
Minimus
Episode: Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344

Reviews

4.9 out of 5 stars from 8 ratings
  • Occasional good content

    Keith occasionally has something worth saying, but he lacks solid experience with hardcore software development, and knows almost nothing about lean/agile. He approaches software like an operations problem.

    Paul is unpleasant to listen to and seldom adds anything of value. I wouild not listent to this podcast at all if Paul was the only contributor.

    This week's episode is particularlt vexing, as the bros bray on about American Football. Please find another forum for that. Your listeners are he... more

    Apple Podcasts
    2
    jdtangney
    United States7 years ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

There are occasional criticisms about certain guest appearances and their fit within the discussion.
The content is informative and helps me understand the complexities of application security.
Topics are relevant and align well with current industry trends; however, not every episode is engaging.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#125
Italy/News/Tech News
Apple Podcasts
#22
Singapore/News/Tech News
Apple Podcasts
#23
Saudi Arabia/News/Tech News
Apple Podcasts
#35
Philippines/News/Tech News
Apple Podcasts
#55
Argentina/News/Tech News
Apple Podcasts
#62
Finland/News/Tech News

Talking Points

Recent interactions between the hosts and their guests.

AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Michael Callahan, Idan Plotnik, Josh Lemos, Chris Boehm - ASW #346
Q: What kind of process would you use to understand whether an AI tool is hype or will actually benefit the organization?
Verify whether the AI tool can provide transparency and an audit trail for its actions, and assess how it impacts business operations without creating unnecessary friction.
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Michael Callahan, Idan Plotnik, Josh Lemos, Chris Boehm - ASW #346
Q: How do we start the journey of AI governance?
Begin with gaining visibility into your relative risk or attack surface, in partnership with the tools and vendors you are using.
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Michael Callahan, Idan Plotnik, Josh Lemos, Chris Boehm - ASW #346
Q: What's the CISO's first move when new AI technology is introduced into their business process?
The CISO should assess the risks associated with the new technology and determine if it is acceptable or if measures need to be put in place to mitigate those risks.
The Future of Supply Chain Security - Janet Worthington - ASW #343
Q: What should organizations do to protect themselves from supply chain threats?
Organizations should utilize software composition analysis tools, implement artifact repositories, and manage dependency updates to mitigate risks associated with known vulnerabilities and malicious packages.
The Future of Supply Chain Security - Janet Worthington - ASW #343
Q: What role do software bills of materials play in trust for components?
Software bills of materials provide visibility into components used but do not indicate the actual risks behind them; they must be enriched with vulnerability and maintenance information to be more useful.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Application Security Weekly

What is Application Security Weekly about and what kind of topics does it cover?

This podcast explores critical topics around application security, DevOps, and DevSecOps, aiming to educate and inform its audience on effective methods for identifying and mitigating software vulnerabilities. It features discussions with industry experts who provide insights on emerging technologies, best practices, and the ever-evolving landscape of cybersecurity, particularly in relation to AI and automation in software development. The content varies from deep dives into specific security frameworks to broad discussions on the roles of AI in enhancing software security, emphasizing a proactive approach to secure coding and maintaining efficient workflows.

Where can I find podcast stats for Application Security Weekly?

Rephonic provides a wide range of podcast stats for Application Security Weekly. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Application Security Weekly and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Application Security Weekly get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Application Security Weekly, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Application Security Weekly?

Rephonic provides comprehensive predictive audience data for Application Security Weekly, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Application Security Weekly have?

To see how many followers or subscribers Application Security Weekly has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Application Security Weekly?

These podcasts share a similar audience with Application Security Weekly:

1. The Application Security Podcast
2. SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
3. TED Tech
4. Security Now (Audio)
5. Hacking Humans

How many episodes of Application Security Weekly are there?

Application Security Weekly launched 8 years ago and published 676 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Application Security Weekly?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Application Security Weekly?

Rephonic pulls ratings and reviews for Application Security Weekly from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Application Security Weekly?

Rephonic provides full transcripts for episodes of Application Security Weekly. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Application Security Weekly?

Recent guests on Application Security Weekly include:

1. Scott Clinton
2. Seemant Sehgal
3. Ted Shorter
4. Michael Callahan
5. Josh Lemos
6. Chris Boehm
7. Emily Fox
8. Roman Zhukov

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days