Billede af showet Practical DevSecOps

Practical DevSecOps

Podcast af Practical DevSecOps Team

engelsk

Videnskab & teknologi

Begrænset tilbud

2 måneder kun 19 kr.

Derefter 99 kr. / månedOpsig når som helst.

  • 20 lydbogstimer pr. måned
  • Podcasts kun på Podimo
  • Gratis podcasts
Kom i gang

Læs mere Practical DevSecOps

Practical DevSecOps is a global cybersecurity education company specializing in hands-on DevSecOps, AI Security, and Application Security training and certifications.Listed on the NICCS/CISA National Initiative for Cybersecurity Careers and Studies platform, Practical DevSecOps has trained over 12,500 security professionals across 108+ countries and is trusted by organizations including Roche, Accenture, IBM, PWC, and Booz Allen Hamilton.𝗪𝗵𝗮𝘁 𝗪𝗲 𝗢𝗳𝗳𝗲𝗿Our certification programs are built for practitioners, not theory. Every course is delivered through browser-based labs where learners attack and defend real systems, with no downloads or installations required.Current certifications include:CDP - Certified DevSecOps ProfessionalCDE - Certified DevSecOps ExpertCAISP - Certified AI Security ProfessionalCCSE - Certified Container Security ExpertCCNSE - Certified Cloud Native Security ExpertCTMP - Certified Threat Modeling ProfessionalCASP - Certified API Security ProfessionalCSSE - Certified Software Supply Chain Security ExpertCSC -Certified Security Champion𝗪𝗵𝗼 𝗪𝗲 𝗧𝗿𝗮𝗶𝗻Security engineers, DevSecOps engineers, AppSec professionals, Red Teamers, and Security Leaders at Fortune 500 companies, Defense Agencies, and Government Organizations worldwide.𝗛𝗲𝗮𝗱𝗾𝘂𝗮𝗿𝘁𝗲𝗿𝘀: San Francisco, USA𝗙𝗼𝘂𝗻𝗱𝗲𝗱: 2018𝗪𝗲𝗯𝘀𝗶𝘁𝗲: practical-devsecops.com

Alle episoder

25 episoder

episode OWASP MCP Top 10: 2026 Security Framework and MCP Security Certification cover

OWASP MCP Top 10: 2026 Security Framework and MCP Security Certification

In this episode, we dive deep into the OWASP MCP Top 10, the first official security framework dedicated to the Model Context Protocol (MCP).  Ready to lead your team’s AI security strategy and bridge the skills gap? Enroll in the Certified MCP Security Expert (CMCPSE [https://www.practical-devsecops.com/certified-mcp-security-expert/]) Course today! Get hands-on experience in tool poisoning labs, OAuth 2.1 hardening, MCP red-teaming, and shadow server detection. This is the definitive certification to secure agentic AI in 2026. This framework addresses a critical shift in the threat model: as agentic AI moves into production, agents no longer rely on a small, hardcoded toolset but instead discover tools at runtime from any reachable server. This transition has turned every MCP server into a high-stakes trust boundary. We explore the sobering reality of 2026 security, where over 30 CVEs targeting MCP were filed in the first two months of the year alone; with shell injections making up 43% of those attacks. We break down the most critical risks, including: MCP01 (Token Mismanagement): How attackers exploit hard-coded credentials and long-lived tokens through prompt injection. MCP03 (Tool Poisoning): The danger of malicious instructions hidden in tool descriptions that the model reads, but the user never sees. MCP05 (Command Injection): The leading attack pattern in 2026, where agents build dangerous shell commands from untrusted input. MCP09 (Shadow MCP Servers): The risk of rogue servers impersonating trusted ones to hijack tool calls. Finally, we discuss a week-by-week prioritization strategy to help security teams close the most dangerous gaps first, starting with token hygiene and OAuth 2.1 implementation. With a massive skills gap currently facing the industry, mastering these categories is no longer optional for AppSec engineers. https://www.linkedin.com/company/practical-devsecops/ [https://www.linkedin.com/company/practical-devsecops/] https://www.youtube.com/@PracticalDevSecOps [https://www.youtube.com/@PracticalDevSecOps] https://twitter.com/pdevsecops [https://twitter.com/pdevsecops]

6. maj 2026 - 20 min
episode Navigating the Path to Application Security Manager in 2026 cover

Navigating the Path to Application Security Manager in 2026

Transitioning from a technical engineer to an Application Security (AppSec) Manager is rarely a straight line; it requires balancing technical expertise with the strategic mindset needed to lead a department.  In this episode, we break down the realistic 5–8 year career path for aspiring leaders, moving from hands-on development to managing end-to-end security programs. We dive into the "messy reality" of the role, where you must act as the bridge between fast-moving engineering teams and CTOs focused on the bottom line. Learn why the Security Champion phase is the most critical step in your journey, helping you develop the "influence without authority" and communication skills that define successful managers.  We also explore the KPIs that actually matter to leadership—like Mean Time to Remediate (MTTR) and developer adoption rates—and the essential technical skills in SAST, DAST, and threat modeling you'll need to stay sharp. Whether you are a developer looking to pivot or a senior engineer ready for the manager's seat, this episode provides a step-by-step blueprint for running a modern AppSec program. Ready to accelerate your career? The transition from individual contributor to security leader happens in the Security Champion phase. Don't just find vulnerabilities—learn to build the systems that fix them. Enroll in the Certified Security Champion (CSC) course [https://www.practical-devsecops.com/certified-security-champion/]today for just $599. Gain hands-on experience with 40+ guided exercises in secure CI/CD pipelines, SAST/SCA tooling, and threat modeling to prove you’re ready for the next level. [Enroll in the Certified Security Champion Course Now] https://www.linkedin.com/company/practical-devsecops/ [https://www.linkedin.com/company/practical-devsecops/] https://www.youtube.com/@PracticalDevSecOps [https://www.youtube.com/@PracticalDevSecOps] https://twitter.com/pdevsecops [https://twitter.com/pdevsecops]

24. apr. 2026 - 21 min
episode DevSecOps Certification Guide: CDP vs. ECDE Comparison and Courses cover

DevSecOps Certification Guide: CDP vs. ECDE Comparison and Courses

Welcome to The DevSecOps Edge, the podcast dedicated to helping you become one of the top 1% of cybersecurity engineers in the industry. In a world where APIs account for 80% of internet traffic and 94% of web breaches start at the API layer, staying ahead of the curve isn't just an advantage—it's a necessity. In our featured episodes, we tackle the biggest questions facing security professionals today. Our deep-dive comparison, "CDP vs. ECDE: Which DevSecOps Certification Is Worth Your Time?", breaks down the critical differences between the Certified DevSecOps Professional (CDP) [https://www.practical-devsecops.com/certified-devsecops-professional/] and EC-Council’s Certified DevSecOps Engineer (ECDE). We explore why seasoned practitioners are moving away from traditional multiple-choice exams (MCQs) in favour of hands-on, practical assessments. What you’ll learn in this series: Practical vs. Theoretical: Why the CDP’s 6-hour practical exam and 100+ browser-based labs are considered the gold standard for proving real-world capability compared to the 4-hour MCQ format of the ECDE. Career & Salary Impact: A look at the data showing that CDP holders frequently see a 15–20% salary increase within 12 months of certification, with senior roles in the US reaching average salaries of $174,900. The Toolset of 2026: How to master the tools engineers actually use, including GitLab CI, GitHub Actions, OWASP ZAP, and DefectDojo. Specialised Security Frontiers: Briefings on emerging tech, including AI Security (CAISP), Cloud-Native Security (CCNSE), and Software Supply Chain Security (CSSE). Lifetime Value: The benefits of a lifetime credential with no renewal fees or expiry-driven recertification cycles. This podcast is designed for Security Engineers, DevOps Engineers, Application Security Analysts, and Penetration Testers who want to demonstrate real-world pipeline security skills rather than just theoretical knowledge. Hosted by industry experts and drawing on insights from Practical DevSecOps—a specialist provider trusted by organisations like IBM, PwC, and Accenture—we provide research-backed insights you can actually use. Stop memorising study guides and start building secure CI/CD pipelines. Subscribe to The DevSecOps Edge and take the next step in your professional journey https://www.linkedin.com/company/practical-devsecops/ [https://www.linkedin.com/company/practical-devsecops/] https://www.youtube.com/@PracticalDevSecOps [https://www.youtube.com/@PracticalDevSecOps] https://twitter.com/pdevsecops [https://twitter.com/pdevsecops]

3. apr. 2026 - 19 min
episode Exploiting Hidden Endpoints and Centralizing Defense with Kong - Your API Documentation is a Lie cover

Exploiting Hidden Endpoints and Centralizing Defense with Kong - Your API Documentation is a Lie

Is your API documentation telling the truth? In this episode, we dive into the uncomfortable reality that API documentation is often a "lie" because of the gap between Swagger files and what is actually running in production. We explore how attackers exploit this gap using advanced fuzzing techniques and JWT manipulation, and why a centralised defense strategy using Kong API Gateway is the only way to effectively secure modern microservices. Key Topics Covered: The JWT Illusion: We debunk the myth that JSON Web Tokens (JWTs) are inherently secure. Because JWTs are encoded rather than encrypted, anyone who intercepts a token can read its payload in seconds. We discuss how attackers exploit servers that "trust" whatever a token says without a second opinion, leading to unauthorized admin access through signature flaws or "alg: none" exploits. The Power of API Fuzzing: Learn how attackers use the predictability of REST naming conventions to guess hidden routes. We highlight the use of high-speed tools like ffuf to fire tens of thousands of requests at a server to map out an application's shadow attack surface. The 405 Signal: Discover the "single most useful technique" in API discovery: the 405 Method Not Allowed response. While many security teams ignore this, it tells an attacker exactly where hidden admin or registration endpoints exist, even if they are unauthorized to access them at that moment. The Microservice Security Trap: Why writing security logic into every individual microservice is a "losing strategy". We explain how this creates a patchwork of inconsistent controls where one weak, legacy service can compromise the entire perimeter. Centralising Defense with Kong Gateway: We break down how Kong acts as a gatekeeper, ensuring no request reaches the backend without passing through global security controls. Learn how to use rate limiting to kill automated attacks and the critical importance of disabling direct access to backend server IP addresses. Featured Experts: This episode draws on a hands-on workshop led by Marudhamaran Gunasekaran, Principal Security Consultant, and insights from Aditya Patni, Security Research Writer at Practical DevSecOps. Call to Action: Stop relying on optional security suggestions. If you want to build real-world API security skills, check out the Certified API Security Professional (CASP) [https://www.practical-devsecops.com/certified-api-security-professional/]program, which focuses on hands-on labs rather than multiple-choice theory. You can also watch the full API Security Workshop on the Practical DevSecOps YouTube channel to see these exploits and defenses in action. Don't let an attacker find your hidden endpoints before you do. https://www.linkedin.com/company/practical-devsecops/ [https://www.linkedin.com/company/practical-devsecops/] https://www.youtube.com/@PracticalDevSecOps [https://www.youtube.com/@PracticalDevSecOps] https://twitter.com/pdevsecops [https://twitter.com/pdevsecops]

20. mar. 2026 - 20 min
episode CAISP vs. OSAI Certification Comparison Guide cover

CAISP vs. OSAI Certification Comparison Guide

n this episode, we tackle the rapidly evolving landscape of artificial intelligence and the critical need for specialized security expertise. As Large Language Models (LLMs) and autonomous agents become integrated into the modern enterprise, they bring a new set of risks, including prompt injection, training data poisoning, and insecure plugin designs.  To help you navigate your career path in this high-demand field, we provide an in-depth comparison of two premier certifications: the Certified AI Security Professional (CAISP)  [https://www.practical-devsecops.com/certified-ai-security-professional/]from Practical DevSecOps and the Advanced AI Red Teaming (OSAI) from OffSec. What You’ll Learn in This Episode: The Full-Spectrum Defensive Path: We explore why CAISP is the top choice for security engineers, AppSec leads, and DevSecOps professionals. Discover how it covers the full AI security lifecycle, from threat modeling with STRIDE and StrideGPT to securing AI pipelines against "poisoned pipeline" attacks. The Offensive Specialist Path: We dive into the OffSec OSAI, a certification designed for dedicated Red Teamers. Learn about its focus on adversarial operations, Retrieval Augmented Generation (RAG) abuse, and its grueling 48-hour endurance exam. Practical Skills for the Real World: We discuss the importance of hands-on experience. CAISP offers browser-based labs that allow you to start practicing immediately, covering essential frameworks like the OWASP LLM Top 10 and MITRE ATLAS. Career Growth and ROI: Understand the market demand that is driving a 15-20% salary increase for professionals who transition into AI-focused roles. We also explain how digital badges from platforms like Credly can help you prove your expertise to hiring managers. The Ultimate Comparison: We break down the key differences in exam styles—CAISP’s 6-hour practical challenge versus OSAI’s 48-hour red team engagement—to help you decide which path aligns with your professional goals. Which Certification is Right for You? Whether you are looking to build and defend production AI systems or specialize in high-level offensive exploitation, this episode provides the roadmap you need to stay relevant. CAISP is the industry favourite for those needing versatile, job-aligned skills to manage supply chain risks with AIBOMs and model signing, while OSAI is the definitive choice for full-time penetration testers. Join us as we break down the complexities of AI security and help you take the next step in your cybersecurity journey. https://www.linkedin.com/company/practical-devsecops/ [https://www.linkedin.com/company/practical-devsecops/] https://www.youtube.com/@PracticalDevSecOps [https://www.youtube.com/@PracticalDevSecOps] https://twitter.com/pdevsecops [https://twitter.com/pdevsecops]

5. mar. 2026 - 22 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Vælg dit abonnement

Mest populære

Begrænset tilbud

Premium

20 timers lydbøger

  • Podcasts kun på Podimo

  • Ingen reklamer i podcasts fra Podimo

  • Opsig når som helst

2 måneder kun 19 kr.
Derefter 99 kr. / måned

Kom i gang

Premium Plus

100 timers lydbøger

  • Podcasts kun på Podimo

  • Ingen reklamer i podcasts fra Podimo

  • Opsig når som helst

Prøv gratis i 7 dage
Derefter 129 kr. / måned

Prøv gratis

Kun på Podimo

Populære lydbøger

Kom i gang

2 måneder kun 19 kr. Derefter 99 kr. / måned. Opsig når som helst.