Hello SC-L,

I just pushed OWASP Podcast #26 live. We had Tom Brennan (White Hat Security), 
Jeff Williams (Aspect), Alex Smolen (Foundstone), Andre Gironda (The "House" of 
AppSec) on the show - a very mixed group with different perspectives. 

Download options and show notes are here 
http://www.owasp.org/index.php/Podcast_26 or just grab the mp3 
http://www.owasp.org/download/jmanico/owasp_podcast_26.mp3

Thanks for listening! (or at least downloading :)

Best Regards,
Jim Manico
OWASP Podcast Host

PS : We discussed the following articles on this show.
  4/16 http://www.informit.com/articles/article.aspx?p=1338343

  http://www.cigital.com/justiceleague/2009/04/16/software-security-2008/ Gary 
McGraw uses statistics to show that Software Security has come of ag
  4/17 http://research.zscaler.com/2009/04/we-used-to-laugh-at-xss.html

  Michael Sutton discusses history of XSS from Defcon 10 (2002) to the present 
day (Twitter worm)

  4/17 
http://jeremiahgrossman.blogspot.com/2009/04/software-security-grew-to-nearly-500m.html

  Jeremiah uses McDonalds and Mortons as comparatives for black-box vs. 
white-box security testing

  4/17 
http://jeremiahgrossman.blogspot.com/2009/04/website-threats-and-their-capabilities.html

  OWASP Catalyst announced

  4/20 http://paco.to/?p=305

  Paco lists 5 reasons for software certifications

  4/20 http://www.greensheet.com/newswire.php?newswire_id=11693

  Qualys, Inc., the leading provider of on demand IT security risk and 
compliance management solutions, today announced QualysGuard(R) PCI Connect 
which is the industry's first Software-as-as-Service (SaaS) ecosystem for PCI 
compliance connecting merchants to multiple partners and security solutions in 
order to document and meet all 12 requirements for PCI DSS

  4/20 
http://labs.securitycompass.com/index.php/2009/04/20/security-analysis-of-core-j2ee-design-patterns/

  Rohit Sethi of SecurityCompass posts a blog post on a new Security Compass 
Labs blog about "Security Analysis of Core Java Enterprise Patterns"

  4/21 http://docs.google.com/Doc?id=dd7x5smw_16hdd34ggz

  mario heiderich posts some results of browser fuzzing on extraneous 
characters in tags

  4/22 http://plynt.com/blog/2009/04/how-frequently-should-an-appli/

  The Plynt blog asks the question, "How frequently shoud Applications be 
Tested?"

  4/24 http://www.troopers09.org/content/e3/e445/index_eng.html 
  Wendel Guglielmetti Henrique from Trustwave and Sandro Gauchi of 
EnableSecurity spoke at TROOPERS09 in Munch about "The Truth of Web Application 
Firewalls: what the vendors do NOT want you to know"
  4/27 
http://tacticalwebappsec.blogspot.com/2009/04/scanner-and-waf-data-sharing.html
  Ryan Barnett gives guidance on how best to make VA+WAF work together
  4/27 http://www.owasp.org/index.php/Category:OWASP_PCI_Project 

  Ed Bellis and Trey Ford start a PCI effort to ensure their activities 
uniformly meet PCI requirements, and for those getting started - to aid in 
building a website security strategy that also ensures sustainable PCI 
compliance. 
_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to