
In AppSec Unlocked, I dive deep into application security, featuring expert interviews and discussions that unpack the latest threats and best practices in the field. This podcast is a must-listen for developers, security professionals, and anyone interested in safeguarding their applications.

1
/
2


Hackblitz 2025

S2E3 – Measuring Security Awareness – Metrics That Matter

S2E2: Developer Security Training – Beyond Annual Compliance

S2E1: Building a Security Champions Program That Actually Works

Season 2 Intro: Training and Awareness

Help! There’s too many Vulnerabilities! A Practical Guide to Tackling Open-Source Security

S1E10 – A FAIR Approach to Vulnerability Patch Prioritization

S1E9 – Open-Source Vulnerability Management Policy: A Balanced Approach

A FAIR Approach to Vulnerability Prioritization

S1S8 – A Cautionary Tale on Supply Chain Attacks: My Recent Encounter with a Compromised NPM Library

S1E7 – Introduction to SSVC

S1E6 – Software Composition Analysis Selection Criteria

S1E5 – Embarking on the Open Source Security Journey

S1E4 – 5 Steps for Securing Your Open Source Supply Chain

S1E3 – How Secure Is Open Source Software
1
/
2
