Rephonic
Artwork for The Security Table
Cybersecurity
Threat Modeling
Vibe Coding
Cyber Trust Mark
Model Context Protocol
Software Development
Data Breaches
Skills Vs Experience
Security Vulnerabilities
Security Best Practices
Iot Devices
AI In Hiring Practices
Critical Thinking
AI Communication
Ransomware
Vulnerabilities
Shift Left
Large Language Models
FCC
Regulation In Tech Industry

The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!

PublishesTwice monthlyEpisodes100Founded3 years ago
Number of ListenersCategory
Technology

Listen to this Podcast

Artwork for The Security Table

Latest Episodes

We made it to 100 episodes, so naturally, we decided to look back and see how wrong we’ve been. In this episode, we revisit some of our past topics, predictions, and hot takes to figure out what still holds up and what didn’t quite land. From “we don... more

In this episode, we dive into the messy reality of AI agents acting inside your systems and what that means for modern security. We explore the idea of agents as actors with real access—credentials, APIs, and permissions—and why this isn’t as new as ... more

In this episode, we dive into the strange world of invisible Unicode attacks and what they could mean for modern software security. We explore how hidden characters can be used to conceal malicious code within packages, why this isn’t entirely a new ... more

In this episode, we discuss the implications of AI technologies like OpenClaw and Moltbot, exploring the potential threats and societal changes that may arise from their integration into daily life. We talk about the nature of AI communication, the c... more

Are cybersecurity technologies really dead, or are reports of their demise greatly exaggerated? Today’s episode is a discussion on how AI is reshaping the classic build vs. buy debate, empowering non-engineers to create working prototypes and potenti... more

We’re predicting what 2026 has in store for AI and cybersecurity. We explore the wild possibilities of AI integration gone wrong, from people accidentally connecting their AI to sensitive file systems to blaming their AI agents for losing critical da... more

We’re pulling back the curtain on the technology industry to reveal what life looks like when you're constantly aware of what can go wrong. From the loss of childlike wonder when encountering new tech to the ethical dilemmas posed by autonomous vehic... more

What do roller coasters and threat modeling have in common? More than you'd think. In this episode, we explore how security professionals view risk differently than everyone else—and why that matters. From roller coaster anxiety to the ethics of iden... more

Key Facts

Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

The Azure Security Podcast
The Azure Security PodcastMichael Howard, Sarah Young, Gladys Rodriguez and Mark Simos
Risky Business
Risky BusinessRisky Business Media

Recent Guests

Dr. Kim Wuyts
Expert in application privacy
OWASP
Episode: Making Privacy Less Cringey
Avi Douglen
Cybersecurity trainer
Episode: Making Privacy Less Cringey
Adam Shostak
Key figure in threat modeling and recognized author.
Formerly of Microsoft
Episode: Experts Want to Excel

Hosts

Matt Coles
Co-host with extensive experience in cybersecurity and software development.
Izar Tarandash
Co-host specializing in cybersecurity frameworks and threat modeling.
Chris Romeo
Co-host with expertise in application security and risk management.

Top Technology Podcasts

Acquired
AcquiredBen Gilbert and David Rosenthal
Tomorrow, Today
Tomorrow, TodayShekhar Natarajan
Hard Fork
Hard ForkThe New York Times
The Room Podcast
The Room PodcastClaudia Laurie and Madison McIlwain
Building AI Boston
Building AI BostonBuilding AI Boston

Talking Points

Recent interactions between the hosts and their guests.

The Debate: Is the CIA Triad Truly Dead?
Q: What is the central proposition of this article?
The article claims that the fundamental properties of security are outdated and should be refactored to include modern principles.
AI, AppSec and the Meaning of Life: The Answer is 42
Q: If I were building an AppSec team today, what skills, what technical skills would you focus on?
The technical skills should include understanding code, systems thinking, and the ability to integrate into the development lifecycle.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About The Security Table

What is The Security Table about and what kind of topics does it cover?

Engaging discussions on cybersecurity and software development form the core of this podcast, where experienced professionals exchange insights on a range of pressing topics in the industry. Episodes focus on critical themes such as innovation in cybersecurity, the intersection of artificial intelligence and application security, and contemporary methodologies like threat modeling and agile development practices. Interesting debates regarding the evolving roles of security teams and the implications of new legislative approaches to cybercrime contribute to a thought-provoking listening experience. The hosts' blend of humor, personal anecdotes, and professional wisdom makes complex subjects more accessible, encouraging listeners to appreciat... more

Where can I find podcast stats for The Security Table?

Rephonic provides a wide range of podcast stats for The Security Table. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to The Security Table and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does The Security Table get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for The Security Table, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for The Security Table?

Rephonic provides comprehensive predictive audience data for The Security Table, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does The Security Table have?

To see how many followers or subscribers The Security Table has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to The Security Table?

These podcasts share a similar audience with The Security Table:

1. Cloud Security Podcast
2. Cloud Security Podcast by Google
3. The Azure Security Podcast
4. Risky Business

How many episodes of The Security Table are there?

The Security Table launched 3 years ago and published 100 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact The Security Table?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for The Security Table?

Rephonic pulls ratings and reviews for The Security Table from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for The Security Table?

Rephonic provides full transcripts for episodes of The Security Table. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on The Security Table?

Recent guests on The Security Table include:

1. Dr. Kim Wuyts
2. Avi Douglen
3. Adam Shostak

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days