Latest episodes
![Infra-as-Code, OpenTofu, and Security w/ Ohad Maislish, Env0](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Infra-as-Code, OpenTofu, and Security w/ Ohad Maislish, Env0
DevSec For Startups,![Shift-Left Developer Security w/ Roy Avrahamy, Akeyless Security](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Shift-Left Developer Security w/ Roy Avrahamy, Akeyless Security
DevSec For Startups,![Machine Learning Against Cyber Attacks w/ Lidan Hazout, Transmit Security](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Machine Learning Against Cyber Attacks w/ Lidan Hazout, Transmit Security
DevSec For Startups,![DSOMM and Security Maturity Models w/ Raz Probstein, Jit](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
DSOMM and Security Maturity Models w/ Raz Probstein, Jit
DevSec For Startups,![Moving to a Password-less World w/ Mike Malone, Smallstep](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Moving to a Password-less World w/ Mike Malone, Smallstep
DevSec For Startups,![Secrets Management Pt 3: Managing Secrets for Real w/ Jeroen Willemsen](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Secrets Management Pt 3: Managing Secrets for Real w/ Jeroen Willemsen
DevSec For Startups,![Observability and Security w/ Yosef Arbiv, Epsagon (Cisco)](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Observability and Security w/ Yosef Arbiv, Epsagon (Cisco)
DevSec For Startups,![Secrets Management Pt 2: OWASP WrongSecerets w/ Jeroen Willemsen, OWASP Project Lead](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Secrets Management Pt 2: OWASP WrongSecerets w/ Jeroen Willemsen, OWASP Project Lead
DevSec For Startups,![Shift-Left Testing For Microservices w/ Arjun Iyer, Signadot](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Shift-Left Testing For Microservices w/ Arjun Iyer, Signadot
DevSec For Startups,![Secrets Management Pt 1: Trends w/ Jeroen Willemsen, OWASP Project Lead](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Secrets Management Pt 1: Trends w/ Jeroen Willemsen, OWASP Project Lead
DevSec For Startups,![From DevOps to DevSecOps w/ Gil Zellner, HourOne](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
From DevOps to DevSecOps w/ Gil Zellner, HourOne
DevSec For Startups,![Threat Modeling For Developers w/ Maran Gunasekaran, Practical DevSecOps](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Threat Modeling For Developers w/ Maran Gunasekaran, Practical DevSecOps
DevSec For Startups,![How to Eliminate Friction in Security Teams w/ Ravid Circus, Seemplicity](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
How to Eliminate Friction in Security Teams w/ Ravid Circus, Seemplicity
DevSec For Startups,![Where Sec Meets Dev w/ Duane Gran, Converge Technology Solutions](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Where Sec Meets Dev w/ Duane Gran, Converge Technology Solutions
DevSec For Startups,![Preventing Ransomware Attacks w/ Greg Edwards, CryptoStopper](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Preventing Ransomware Attacks w/ Greg Edwards, CryptoStopper
DevSec For Startups,![Common Kubernetes Security Misconfigurations w/ Rotem Refael, ARMO](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Common Kubernetes Security Misconfigurations w/ Rotem Refael, ARMO
DevSec For Startups,![Securing Development Environments w/ Guy Flechter, Cider Security](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Securing Development Environments w/ Guy Flechter, Cider Security
DevSec For Startups,![Development Velocity With Security w/ Harshit Chitalia, Tromzo](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Development Velocity With Security w/ Harshit Chitalia, Tromzo
DevSec For Startups,![Common Startup Security Mistakes w/ Dan Yelovitch, develeap](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Common Startup Security Mistakes w/ Dan Yelovitch, develeap
DevSec For Startups,![Securing Your CI/CD Pipeline w/ Zan Markan, CircleCI](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Securing Your CI/CD Pipeline w/ Zan Markan, CircleCI
DevSec For Startups,![Securing Secrets w/ Conor Mancone, Cimpress](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Securing Secrets w/ Conor Mancone, Cimpress
DevSec For Startups,![Auth Security (Part 1) w/ Dan Moore, FusionAuth](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Auth Security (Part 1) w/ Dan Moore, FusionAuth
DevSec For Startups,![Cybersecurity Advocacy w/ Ashish Rajan, cloudsecuritypodcast.tv](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Cybersecurity Advocacy w/ Ashish Rajan, cloudsecuritypodcast.tv
DevSec For Startups,![Open Source Security w/ Liran Tal, Snyk](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Open Source Security w/ Liran Tal, Snyk
DevSec For Startups,![Microservices Authentication & Authorization w/ Yuval Yogev, Sygnia](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Microservices Authentication & Authorization w/ Yuval Yogev, Sygnia
DevSec For Startups,![OSINT and Security w/ Nick DiPasquale](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
OSINT and Security w/ Nick DiPasquale
DevSec For Startups,![Better Security Awareness for DevOps w/ Hila Fish, Wix](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Better Security Awareness for DevOps w/ Hila Fish, Wix
DevSec For Startups,![Software Supply Chain Security w/ Anton Weiss, Otomato Software](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Software Supply Chain Security w/ Anton Weiss, Otomato Software
DevSec For Startups,![Securing Developer Access to Sensitive Data w/ Yoav Turgeman Levi, Harmonya](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)
Securing Developer Access to Sensitive Data w/ Yoav Turgeman Levi, Harmonya
DevSec For Startups,![Proactively Building Secure Software w/ Josh Grossman, Bounce Security](https://media2.dev.to/dynamic/image/width=240,height=240,fit=cover,gravity=auto,format=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fpodcast%2Fimage%2F740%2F9f150072-ec7d-4c42-8e8b-c6b3917a48ca.png)