<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The BoringAppSec Community: Podcast]]></title><description><![CDATA[Conversations with security practitioners on how security work actually gets done, what breaks at scale, and what rarely gets said out loud.]]></description><link>https://www.boringappsec.com/s/podcast</link><image><url>https://substackcdn.com/image/fetch/$s_!O8_X!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe8b671d9-6e9a-4835-b291-ee70fd4e9f74_1280x1280.png</url><title>The BoringAppSec Community: Podcast</title><link>https://www.boringappsec.com/s/podcast</link></image><generator>Substack</generator><lastBuildDate>Tue, 14 Apr 2026 15:18:57 GMT</lastBuildDate><atom:link href="https://www.boringappsec.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Sandesh Mysore Anand]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[boringappsec@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[boringappsec@substack.com]]></itunes:email><itunes:name><![CDATA[Sandesh Mysore Anand]]></itunes:name></itunes:owner><itunes:author><![CDATA[Sandesh Mysore Anand]]></itunes:author><googleplay:owner><![CDATA[boringappsec@substack.com]]></googleplay:owner><googleplay:email><![CDATA[boringappsec@substack.com]]></googleplay:email><googleplay:author><![CDATA[Sandesh Mysore Anand]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Ep 37: The Future of Security Testing in an AI-Driven World with Jason Haddix]]></title><description><![CDATA[Watch now (61 mins) | In this episode, Jason Haddix (CEO of Arcanum Information Security and creator of the Bug Hunter&#8217;s Methodology) joins us to examine how AI is changing penetration testing and security research.]]></description><link>https://www.boringappsec.com/p/ep-37-the-future-of-security-testing</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-37-the-future-of-security-testing</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Wed, 11 Mar 2026 08:10:35 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/190593781/a55c904ba1902329a5b9e019da9d3b1f.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, Jason Haddix (CEO of Arcanum Information Security and creator of the Bug Hunter&#8217;s Methodology) joins us to examine how AI is changing penetration testing and security research. He explains that while AI agents can automate reconnaissance, code analysis, and parts of vulnerability discovery, meaningful results still depend on human expertise, methodology, and context engineering.</p><p>The conversation explores how AI is shifting the entry path for new security practitioners, why deep research and critical thinking remain essential skills, and how experienced testers are embedding their knowledge into agent workflows using tools like Claude Code. Jason also discusses practical experimentation with AI assistants such as OpenClaw, including prompt-injection defenses, guardrails, and the operational risks of running autonomous systems.</p><p>The episode also addresses the growing debate around AI-generated code and AI-driven vulnerability discovery, highlighting the difference between marketing claims and real-world results. It closes with a discussion on why the industry needs better benchmarks and evaluation methods to measure whether AI security tools actually find meaningful vulnerabilities.</p><p>00:00&#8211;02:14 &#8212; Introduction to Jason Haddix and how his journey from bug hunter to Arcanum founder shapes his perspective on AI in security</p><p>02:14&#8211;08:00 &#8212; How AI agents are beginning to automate penetration testing workflows while still relying on expert methodology</p><p>08:00&#8211;10:45 &#8212; Why human expertise remains critical even as security automation improves</p><p>10:45&#8211;17:10 &#8212; How AI is changing the learning curve for the next generation of pentesters</p><p>17:10&#8211;25:27 &#8212; How agent frameworks and skills are transforming security tool building</p><p>25:27&#8211;35:41 &#8212; Security risks and defenses when running AI assistants like OpenClaw</p><p>35:41&#8211;40:32 &#8212; The rise of AI-powered personal assistants for research and security workflows</p><p>40:32&#8211;42:55 &#8212; Why the cybersecurity community is rapidly adopting AI tools</p><p>42:55&#8211;46:42 &#8212; How AI improves security coverage and turnaround time at scale</p><p>46:42&#8211;50:31 &#8212; Why newer models like Opus 4.5 unlocked practical AI security workflows</p><p>50:31&#8211;56:48 &#8212; The debate on whether AI should generate secure code or detect vulnerabilities</p><p>56:48&#8211;01:01:18 &#8212; Why AI security needs better evaluation benchmarks and real-world testbeds<br><br>Tune in for a deep dive!<br><br><strong>Connect with Jason Haddix:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/jhaddix/">https://www.linkedin.com/in/jhaddix/</a></p><p><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288; <a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a><br></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.boringappsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The BoringAppSec Community! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ep 36: Discussing AI's Current State of Affairs ]]></title><description><![CDATA[In this episode, we examine what is shifting in AI, AppSec, and product security and what remains fundamentally the same.]]></description><link>https://www.boringappsec.com/p/ep-36-discussing-ais-current-state</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-36-discussing-ais-current-state</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Mon, 02 Mar 2026 06:16:25 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/189622355/429a181cbbfbf94bcd75cddde23c229c.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we examine what is shifting in AI, AppSec, and product security and what remains fundamentally the same.</p><p>For years, application security has operated on a familiar model: siloed reviews, tool-driven findings, and periodic assessments that struggle to keep pace with modern development. AI doesn&#8217;t eliminate those pressures, it amplifies them. Code is generated faster, systems are more interconnected, and the surface area of change expands weekly.</p><p>The conversation explores agent-based workflows through tools like OpenClaw, not as novelty, but as a signal of a broader shift: from manually operating tools to orchestrating fleets of agents. As AI interfaces move from chat windows to terminals to messaging environments, security teams must reconsider where workflows live and how context is preserved across them.</p><p>For decades, AppSec has struggled to build a reliable understanding of what systems exist and how they connect. Large language models may finally make it possible to construct living maps of components, data flows, and trust boundaries  enabling assessments that talk to each other instead of existing in isolation.</p><p>The discussion also revisits threat modeling, not as a compliance artifact, but as a foundation for system-wide reasoning. If AI can automate baseline coverage and reduce repetitive toil, security teams may return to their original purpose: high-leverage risk judgment on critical systems. This leads to a broader debate whether AppSec as a distinct function evolves, shrinks, or dissolves into engineering itself and what the enduring &#8220;maker&#8211;checker&#8221; model of risk management demands in an AI-native world.</p><p>Finally, the episode reflects on the role of large AI labs in security: the gap between ambitious claims and shipped products, and what that means for founders and security leaders navigating change.</p><p>00:00&#8211;02:15 &#8212; Why this is a no-guest episode &amp; what&#8217;s changed since last year</p><p>02:15&#8211;06:30 &#8212; AI co-authoring, productivity gains, and writing workflows</p><p>06:30&#8211;10:20 &#8212; OpenClaw architecture, agent risks, and prompt injection realities</p><p>10:20&#8211;14:00 &#8212; The shifting UI of AI: chat &#8594; terminal &#8594; messaging agents</p><p>14:00&#8211;18:30 &#8212; Agent orchestration vs siloed security tooling</p><p>18:30&#8211;23:00 &#8212; Context graphs and assessments that &#8220;talk&#8221; to each other</p><p>23:00&#8211;27:30 &#8212; Threat modeling&#8217;s evolution and system-wide visibility</p><p>27:30&#8211;31:00 &#8212; Why inventory is still AppSec&#8217;s hardest problem</p><p>31:00&#8211;34:30 &#8212; Personal AI stacks: Obsidian, memory layers, and query tools</p><p>34:30&#8211;37:30 &#8212; Open source in the age of AI-generated PR spam</p><p>37:30&#8211;40:00 &#8212; AI labs: what they ship vs what they say</p><p>40:00&#8211;44:00 &#8212; Will AppSec disappear? A serious debate</p><p>44:00&#8211;48:00 &#8212; Maker&#8211;checker risk models in an AI-driven org</p><p>48:00&#8211;51:00 &#8212; Where AI replaces toil &#8212; and where humans stay critical</p><p>51:00&#8211;End &#8212; 2026 predictions for AI security and product security</p><p>Tune in for a deep dive!</p><p><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288; <a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.boringappsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The BoringAppSec Community! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Ep 35: Exploring Security After Determinism with Jens Ernstberger]]></title><description><![CDATA[In this episode, we sit down with Jens to explore why AI agents fundamentally break traditional security assumptions, from API keys and browser sessions to composability and access control.]]></description><link>https://www.boringappsec.com/p/ep-35-exploring-security-after-determinism</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-35-exploring-security-after-determinism</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Mon, 16 Feb 2026 07:44:09 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/188112462/f1b4855dd949dd91090f2a318f2db48a.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we sit down with Jens to explore why AI agents fundamentally break traditional security assumptions, from API keys and browser sessions to composability and access control.</p><p>Drawing parallels to DeFi exploits and smart contract failures, he explains why agent identity, short-lived delegated authorization, and zero trust aren&#8217;t optional add-ons, but the foundation for safely running autonomous systems.</p><p>We also dive into context compression as both a performance and security challenge, the real difference between MCP and skills, and a future where humans may stop reviewing code altogether. As agents become the primary actors on the internet, even writing itself begins to change in an AI-scraped world.</p><p>If agents are non-deterministic by design, the real question becomes: where do we reintroduce determinism?</p><p><strong>00:00 &#8212; AI agents as the next security reset moment. History repeating: automation + composability = new attack surfaces</strong></p><p><strong>03:25 &#8212; Challenges of context compression in AI</strong></p><p><strong>07:39 &#8212; Access control in a non-deterministic system and compaction issues</strong></p><p><strong>11:22 &#8212; MCP vs skills: horizontal infrastructure meets vertical execution logic</strong></p><p><strong>18:06 &#8212; Agent identity and security practices. Static credentials collapse under autonomous agent behavior</strong></p><p><strong>30:06 &#8212; The future of coding with AI agents</strong></p><p><strong>31:31 &#8212; DeFi attacks, composability issues, and how non-determinism multiplies risk</strong></p><p><strong>35:14 &#8212; Writing for humans vs writing for LLMs. Content, authenticity, and the economics of scraping</strong></p><p><strong>44:42 &#8212; Transition from academia to startup founder</strong></p><p>Tune in for a deep dive!</p><p><strong>Connect with Jens Ernstberger:</strong></p><p>Website: <a href="https://ernstberger.xyz/">https://ernstberger.xyz/</a></p><p>LinkedIn: <a href="https://www.linkedin.com/in/jens-ernstberger-phd-96b0ba14a/">https://www.linkedin.com/in/jens-ernstberger-phd-96b0ba14a/</a><br><br><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">&#8288;&#8288;anshumanbhartiya&#8288;&#8288;</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">&#8288;&#8288;https://x.com/anshuman_bh&#8288;&#8288;</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">&#8288;&#8288;https://anshumanbhartiya.com/&#8288;&#8288;</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram:<a href="https://www.instagram.com/anshuman.bhartiya/#"> &#8288;&#8288;anshuman.bhartiya&#8288;</a></p><p><a href="https://www.instagram.com/anshuman.bhartiya/#">&#8288;&#8288;&#8288;</a><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">&#8288;&#8288;anandsandesh&#8288;&#8288;</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">&#8288;&#8288;https://x.com/JubbaOnJeans</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.boringappsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The BoringAppSec Community! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Ep 34: Security at Scale in a Probabilistic World with Ankur Chakraborty]]></title><description><![CDATA[In this episode, Ankur Chakraborty, Senior Director of Platform Security at Box, joins us to examine what security looks like when systems no longer behave the same way twice.]]></description><link>https://www.boringappsec.com/p/ep-34-security-at-scale-in-a-probabilistic</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-34-security-at-scale-in-a-probabilistic</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Mon, 02 Feb 2026 07:31:22 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/186584851/fddda773ed187926ce0a3370014156f3.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, Ankur Chakraborty, Senior Director of Platform Security at Box, joins us to examine what security looks like when systems no longer behave the same way twice. Drawing from his experience across Google, Twitter, and Box, Ankur argues that while core security principles haven&#8217;t changed, the scale, speed, and uncertainty introduced by AI systems demand a fundamentally different approach.</p><p>For decades, security has relied on a comforting assumption: systems are predictable, and control flows are deterministic. Generative AI breaks that assumption. It introduces non-determinism and dramatically increases the speed and volume of change; security teams face a scaling problem that traditional workflows can&#8217;t keep up with.</p><p>We explore how AI can act as a force multiplier for defenders, boosting individual productivity and automating high-toil workflows, while also forcing a hard rethink of &#8220;human in the loop&#8221; models that add friction without real control.</p><p>The conversation goes deep into context engineering, decision traces, and explainability and why understanding <em>why</em> a system acted is becoming as important as <em>what</em> it did. We close by exploring how security leaders should evaluate tools in this new era: moving away from process-driven checklists toward outcome-based measures, and preparing for an industry on the brink of meaningful structural change.</p><p><strong>00:00&#8211;02:49 &#8212; Introduction to AI security and Ankur&#8217;s platform-security journey</strong></p><p><strong>02:49&#8211;05:27 &#8212; What changes (and what doesn&#8217;t) in AI security fundamentals</strong></p><p><strong>05:27&#8211;09:18 &#8212; Scaling security in a probabilistic, AI-generated code world</strong></p><p><strong>09:18&#8211;10:30 &#8212; Embracing AI as defenders</strong></p><p><strong>10:30&#8211;13:46 &#8212; Productivity gains from LLMs for security engineers</strong></p><p><strong>13:46&#8211;20:06 &#8212; Human-in-the-loop vs autonomous agents in security workflows</strong></p><p><strong>20:06&#8211;22:25 &#8212; Context graphs, observability, and decision traces</strong></p><p><strong>22:25&#8211;32:01 &#8212; Explainability, mechanistic interpretability, and security trust</strong></p><p><strong>32:01&#8211;35:36 &#8212; How security teams evaluate tools, platforms, and outcomes</strong></p><p><strong>35:36&#8211;42:42 &#8212; Measuring security outcomes, velocity, and cost trade-offs</strong></p><p><strong>42:42&#8211;46:46 &#8212; False positives, false negatives, and revealed preferences</strong></p><p><strong>46:46&#8211;50:16 &#8212; LLMs as triage engines and force multipliers for security</strong></p><p><strong>50:16&#8211;52:51 &#8212; Underlying fears in the security industry</strong></p><p><strong>52:51&#8211;55:05 &#8212; Context engineering, platforms, and the future of security teams</strong></p><p>Tune in for a deep dive!</p><p><strong>Connect with Ankur Chakraborty:</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/ankurchakraborty/">https://www.linkedin.com/in/ankurchakraborty/</a><br><br>Substack:  <a href="http://machinesagainsthumanity.substack.com/">https://machinesagainsthumanity.substack.com/</a><br><br><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">&#8288;&#8288;anshumanbhartiya&#8288;&#8288;</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">&#8288;&#8288;https://x.com/anshuman_bh&#8288;&#8288;</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">&#8288;&#8288;https://anshumanbhartiya.com/&#8288;&#8288;</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram:<a href="https://www.instagram.com/anshuman.bhartiya/#"> &#8288;&#8288;anshuman.bhartiya&#8288;</a></p><p><a href="https://www.instagram.com/anshuman.bhartiya/#">&#8288;&#8288;&#8288;</a><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">&#8288;&#8288;anandsandesh&#8288;&#8288;</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">&#8288;&#8288;https://x.com/JubbaOnJeans</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.boringappsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The BoringAppSec Community! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Ep 33: The Future of Identity in AI Agents with Ian Livingstone]]></title><description><![CDATA[In this episode, we sit down with Ian Livingstone to explore how AI is reshaping application security.]]></description><link>https://www.boringappsec.com/p/ep-33-the-future-of-identity-in-ai</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-33-the-future-of-identity-in-ai</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Wed, 28 Jan 2026 07:33:31 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/186052097/892a04c9889777fcec4ce7d15bb46f45.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we sit down with Ian Livingstone to explore how AI is reshaping application security. The conversation focuses on one of the hardest emerging problems: agent identity. Ian breaks down why traditional identity and permission models fall apart when applied to non-deterministic AI agents, and what this means for access control, data security, and system design.</p><p>We also discuss where agent identity is headed, how insurance may play a role in managing AI-driven risk, and what security teams need to rethink as AI systems become active participants rather than passive components.</p><p><strong>00:00&#8211;02:15 &#8212; Beyond AI hype: why security and agent identity matter</strong></p><p><strong>02:15&#8211;09:18 &#8212; Understanding identity in the age of AI agents</strong></p><p><strong>09:18&#8211;13:41 &#8212; Why service accounts and OAuth break down for agents</strong></p><p><strong>13:41&#8211;20:11 &#8212; Granular permissions, least privilege, and agent intent</strong></p><p><strong>20:11&#8211;25:55 &#8212; Security risks in agent workflows and prompt-driven systems</strong></p><p><strong>25:55&#8211;28:34 &#8212; Data security, IAM, and the agent exfiltration problem</strong></p><p><strong>28:34&#8211;30:47 &#8212; Non-determinism and rethinking how we secure systems</strong></p><p><strong>30:47&#8211;32:14 &#8212; The agent identity problem on the public internet</strong></p><p><strong>32:14&#8211;35:10 &#8212; Why the internet still lacks real application identity</strong></p><p><strong>35:10&#8211;39:12 &#8212; The future of authentication for agents and bots</strong></p><p><strong>39:12&#8211;40:28 &#8212; Emerging standards, AIUC, and insuring agents</strong></p><p><strong>40:28&#8211;43:09 &#8212; Liability, insurance, and accountability for autonomous systems</strong></p><p><strong>43:09&#8211;45:51 &#8212; How security roles evolve in an agent-native world</strong></p><p><strong>45:51&#8211;49:23 &#8212; Technical attack surfaces: MCPs, poisoned tools, and confusion</strong></p><p><strong>49:23&#8211;51:32 &#8212; Trust, contracts, and responsibility in software ecosystems</strong></p><p><strong>51:32&#8211;54:28 &#8212; Why AI adoption is top-down and what it means for security<br><br></strong>Tune in for a deep dive!</p><p><strong>Connect with Ian Livingstone:</strong></p><p>Website: <a href="https://www.ianlivingstone.ca/">https://www.ianlivingstone.ca/</a></p><p>Twitter: <a href="https://x.com/ianlivingstone">https://x.com/ianlivingstone</a><br><br><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">&#8288;&#8288;anshumanbhartiya&#8288;&#8288;</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">&#8288;&#8288;https://x.com/anshuman_bh&#8288;&#8288;</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">&#8288;&#8288;https://anshumanbhartiya.com/&#8288;&#8288;</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram:<a href="https://www.instagram.com/anshuman.bhartiya/#"> &#8288;&#8288;anshuman.bhartiya&#8288;</a></p><p><a href="https://www.instagram.com/anshuman.bhartiya/#">&#8288;&#8288;&#8288;</a><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">&#8288;&#8288;anandsandesh&#8288;&#8288;</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">&#8288;&#8288;https://x.com/JubbaOnJeans</a><br></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.boringappsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The BoringAppSec Community! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ep 32: Rethinking Enterprise Security in an AI- and Platform-First World with Kane Narraway]]></title><description><![CDATA[In this episode, we sit down with Kane Narraway to unpack how enterprise security is changing as AI, platforms, and developer-driven security become the norm.]]></description><link>https://www.boringappsec.com/p/ep-32-rethinking-enterprise-security</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-32-rethinking-enterprise-security</guid><dc:creator><![CDATA[Anshuman Bhartiya]]></dc:creator><pubDate>Mon, 19 Jan 2026 11:43:42 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/183596385/b5fc875fa1a9c0f42bc0946614605306.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we sit down with Kane Narraway to unpack how enterprise security is changing as AI, platforms, and developer-driven security become the norm. Kane shares his path from digital forensics to leading security at Canva, and why understanding company culture matters just as much as choosing the right tools.</p><p>We discuss why modern security is becoming platform-first, why much of the security vendor market optimizes for finding problems rather than fixing them, and why Kane believes security teams need more engineers and fewer manual processes.<br><br>The conversation also digs into AI security, shadow IT (and shadow AI), and the real-world trade-offs between usability and control, especially as low-code and no-code tools become more common inside companies.</p><p><strong>00:00&#8211;03:25 &#8212; Kane&#8217;s journey from law enforcement to platform security, shaped by our time at Atlassian</strong></p><p><strong>03:25&#8211;06:37 &#8212; Why enterprise security becomes platform-first faster than AppSec</strong></p><p><strong>06:37&#8211;09:26 &#8212; Why security teams fail when they fight company culture</strong></p><p><strong>09:26&#8211;13:36 &#8212; Platforms vs best-of-breed tools: trade-offs, not ideology</strong></p><p><strong>13:36&#8211;17:45 &#8212; Why most security startups are built to be acquired</strong></p><p><strong>17:45&#8211;22:16 &#8212; Open source agents, and business-specific vulnerability research</strong></p><p><strong>22:16&#8211;27:09 &#8212; AI security, prompt injection, and the access-control problem</strong></p><p><strong>27:09&#8211;31:29 &#8212; Build vs buy in the AI era. Speed is easy, and why maintenance remains the real bottleneck.</strong></p><p><strong>31:29&#8211;40:42 &#8212; Agents, MCPs, and why stopgap solutions dominate today</strong></p><p><strong>40:42&#8211;48:57 &#8212; Shadow AI, low-code automation, and familiar security failures</strong></p><p>Tune in for a deep dive!</p><p><strong>Connect with Kane Narraway:</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/kane-n/">https://www.linkedin.com/in/kane-n/</a></p><p>Blog: <a href="https://kanenarraway.com/">https://kanenarraway.com/</a></p><p><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a><br><br><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a><br></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.boringappsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The BoringAppSec Community! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Ep 31: The Future of Developer Security with Travis McPeak]]></title><description><![CDATA[In this episode, we sit down with Travis McPeak, one of the most prominent thinkers in the space of developer security.]]></description><link>https://www.boringappsec.com/p/the-future-of-developer-security</link><guid isPermaLink="false">https://www.boringappsec.com/p/the-future-of-developer-security</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Mon, 15 Dec 2025 16:00:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/181863163/8dfac7033ac62ef9efee38e47b5919f9.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we sit down with Travis McPeak, one of the most prominent thinkers in the space of developer security. Travis, who built his career at the intersection of security automation and developer productivity, shares his philosophy on achieving security at scale in the AI era. <br><br>His career spans security leadership roles at major tech companies, including Symantec, IBM, Netflix, and Databricks. Most recently, he founded and served as CEO of Resourcely, a startup built on the idea of making cloud infrastructure secure by default, before being &#8220;acqui-hired&#8221; by Cursor, the rapidly growing AI-powered code editor, to lead security and enterprise readiness.<br><br><strong>Key Takeaways</strong></p><ul><li><p><strong>AI for Secure by Default:</strong> AI tools provide the best injection point to shift security &#8220;all the way left&#8221; and move past the reactive &#8220;whack-a-mole&#8221; approach, because developers are already motivated to use these highly effective tools.</p></li></ul><ul><li><p><strong>Changing AppSec Strategy:</strong> AI dramatically changes the nature of AppSec by making previously unscalable strategies, such as threat modeling, applicable. AI can generate architecture diagrams on demand by tracing through code.</p></li></ul><ul><li><p><strong>The Compliance Bottleneck:</strong> The dramatic consolidation of cloud security vendors reflects how compliance-minded the security industry remains. Critical infrastructure misconfigurations (like public databases being left open) often go unaddressed because they are not measured by compliance standards.</p></li></ul><ul><li><p><strong>Platform vs. Point Solutions:</strong> Travis argues against platforms that are often amalgamations of poorly integrated acquired tools. He suggests buying the single best point solution for a high-leverage problem and using AI capabilities to operationalize and wire it into internal systems, thereby simplifying integrations that platforms traditionally provide.</p></li></ul><ul><li><p><strong>The Skeptical Coder:</strong> A fundamental limitation of Large Language Models (LLMs) is their desire to &#8220;make you happy,&#8221; causing them to provide answers even if they are incorrect. Therefore, engineers must use AI output only as a starting point and only consider the code finished when they understand it fully end to end.</p></li></ul><ul><li><p><strong>Prompt Injection Defined:</strong> Prompt injection is confirmed as a legitimate vulnerability, essentially a rehash of old issues like cross-site scripting and SQL injection, arising from the improper separation between the LLM instruction and the user instruction.<br><br>Tune in for a deep dive!<br><br><strong>Connect with Travis:</strong></p><p>LinkedIn:   travismcpeak  </p><p>Company Website: <a href="https://cursor.com/">https://cursor.com/</a></p><p><br><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a>  </p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya   </a></p><p><br><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288; <a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><p></p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;Boring AppSec&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">Boring AppSec</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div><p><br></p></li></ul><p></p>]]></content:encoded></item><item><title><![CDATA[Ep 30: Scaling Product Security In The AI Era with Teja Myneedu]]></title><description><![CDATA[In this episode, we sit down with Teja Myneedu, Sr.]]></description><link>https://www.boringappsec.com/p/ep-30-scaling-product-security-in</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-30-scaling-product-security-in</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Fri, 05 Dec 2025 11:12:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182497681/8d09d1a4e1ad46934b7fdd778207b02a.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we sit down with Teja Myneedu, Sr. Director, Security and Trust at Navan. He shares his philosophy on achieving security at scale, discussing some challenges and approaches specially in the AI era. <br><br>Teja's career spans over two decades on the front lines of product security at hyper-growth companies like Splunk. He currently operates at the complex intersection of FinTech and corporate travel, where his responsibilities include securing financial transactions and ensuring the physical duty of care for global travelers.<br><br><strong>Key Takeaways<br></strong><br>&#8226; <strong>Scaling Security Philosophy:</strong> Security programs should be built on developer empathy and innovative solutions, scaling with context and automation.<br><br>&#8226; <strong>Pragmatic Protection:</strong> Focus on incremental, practical improvements (like WAF rules) to secure the enterprise immediately, instead of letting the pursuit of perfection delay necessary defenses; security by obscurity is not always bad.<br><br>&#8226; <strong>Flawed Prioritization:</strong> Prioritization frameworks are often flawed because they lack organizational and business context, which security tools fail to provide.<br><br>&#8226; <strong>AI and Code Fixes:</strong> AI is changing the application security field by reducing the cognitive load on engineers and making it easier for security teams to propose vulnerability fixes (PRs).<br><br>&#8226; <strong>The Authorization Dilemma:</strong> The biggest novel threat introduced by LLMs is the complexity of identity and authorization, as agents require delegate access and dynamically determine business logic.<br><br>Tune in for a deep dive!<br><br><strong>Connect with Teja:</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/myneedu/">myneedu </a> </p><p>Company Website: <a href="https://www.navan.com">https://www.navan.com</a></p><p><strong><br>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a>  </p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: &#8288;&#8288;<a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya </a>  </p><p><strong><br>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a>  </p><p>X: <a href="http://&#8288;&#8288;&#8288;&#8288;https://x.com/JubbaOnJeans">&#8288;&#8288;&#8288;&#8288;https://x.com/JubbaOnJeans</a> &#8288;&#8288;&#8288;&#8288;</p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;The Boring AppSec Community&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">The Boring AppSec Community</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div>]]></content:encoded></item><item><title><![CDATA[
Ep 29: Architecting AI Security: Standards and Agentic Systems with Ken Huang]]></title><description><![CDATA[In this episode, we sit down with Ken Huang, a core architect behind modern AI security standards, to discuss the revolutionary challenges posed by agentic AI systems.]]></description><link>https://www.boringappsec.com/p/ep-29-architecting-ai-security-standards</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-29-architecting-ai-security-standards</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Tue, 25 Nov 2025 11:31:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182499152/4783489957ba36620b3bfec0fa8da06e.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we sit down with Ken Huang, a core architect behind modern AI security standards, to discuss the revolutionary challenges posed by agentic AI systems. Ken, who chairs the OWASP AIVSS project and co-chairs the AI safety working groups at the Cloud Security Alliance, breaks down how security professionals are writing the rulebook for a future driven by autonomous agents.</p><p><strong>Key Takeaways</strong></p><p>&#8226; <strong>AIVSS for Non-Deterministic Risk:</strong> The OWASP AIVSS project aims to provide a quantitative measure for core agent AI risks by applying an agent AI risk factor on top of CVSS, specifically addressing the autonomy and non-deterministic nature of AI agents.</p><p>&#8226; <strong>Need for Task-Scoped IAM:</strong> Traditional OAuth and SAML are inadequate for agentic systems because they provide coarse-grained, session-scoped access control. New authentication standards must be task-scoped, dynamically removing access once a specific task is complete, and driven by verifying the agent&#8217;s intent.</p><p>&#8226; <strong>A2A Security Requires New Protocols:</strong> Agent-to-Agent communication (A2A) introduces security issues beyond traditional API security (like BOLA). New systems must utilize protocols for Agent Capability Discovery and Negotiation&#8212;validated by digital signatures&#8212;to ensure the trustworthiness and promised quality of service from interacting agents.</p><p>&#8226; <strong>Goal Manipulation is a Critical Threat:</strong> Sophisticated attacks often utilize context engineering to execute goal manipulation against agents. These attacks include gradually shifting an agent&#8217;s objective (crescendo attack), using prompt injection to force the agent to expose secrets (malicious goal expansion), and forcing endless processing loops (exhaustion loop/denial of wallet).</p><p>Tune in for a deep dive!</p><p><strong>Connect with Ken:</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/kenhuang8/">kenhuang8</a>  </p><p>Company Website: <a href="https://distributedapps.ai/">https://distributedapps.ai/</a></p><p>Substack: <a href="https://kenhuangus.substack.com/">https://kenhuangus.substack.com/</a></p><p>Paper (Agent Capability Negotiation and Binding Protocol): <a href="https://arxiv.org/abs/2506.13590">https://arxiv.org/abs/2506.13590</a></p><p>Book (Securing AI Agents): <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqblpxQ3ZxM3B1MllFdlE5RzZ6YkZINkFzaWZnd3xBQ3Jtc0tsNGFfaTZwcmhfOUtpNmE2RlNHTlBQM2J2dkdoWEVoRVZiZlFYdkNjUlRCejBFWFZkMXVEdGFGMEVDRHVEdDlXVm9xNkpaV1VZQ3l2MHhvZzdZUzBsYkpsOXRnelFGU19XRnplOExtQWtpNzV3THNWbw&amp;q=https%3A%2F%2Fwww.amazon.com%2FSecuring-Agents-Foundations-Frameworks-Real-World%2Fdp%2F3032021294&amp;v=YNFO5xVvdzM">https://www.amazon.com/Securing-AI-Agents </a></p><p>AIVSS: <a href="https://aivss.owasp.org/">https://aivss.owasp.org/</a></p><p><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288; <a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;The Boring AppSec Community&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">The Boring AppSec Community</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ep 28: The Attacker's Perspective on AI Security with Aryaman Behera]]></title><description><![CDATA[In this episode, we chat with Aryaman Behera, the Co-Founder and CEO of Repello AI.]]></description><link>https://www.boringappsec.com/p/ep-28-the-attackers-perspective-on</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-28-the-attackers-perspective-on</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Thu, 02 Oct 2025 11:39:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182499582/81885d6484b686cbaab3fee5d835e18c.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we chat with Aryaman Behera, the Co-Founder and CEO of Repello AI. Aryaman shares his unique journey from being a bug bounty hunter and the captain of India&#8217;s top-ranked CTF team, InfoSec IITR, to becoming the CEO of an AI security startup. It is a deep dive into the attacker-centric mindset required to secure modern AI applications, which are fundamentally probabilistic and differ greatly from traditional deterministic software. <br><br>Aryaman explains the technical details behind Repello&#8217;s platform, which combines automated red teaming (Artemis) with adaptive guardrails (Argus) to create a continuous security feedback loop. The conversation explores the nuanced differences between AI safety and security, the critical role of threat modeling for agentic workflows, and the complex challenges of responsible disclosure for non-deterministic vulnerabilities.</p><p><strong>Key Takeaways</strong></p><ul><li><p><strong>From Hacker to CEO:</strong> Aryaman discusses the transition from an attacker&#8217;s mindset, focused on quick exploits, to a CEO&#8217;s mindset, which requires patience and long-term relationship building with customers.</p></li><li><p><strong>A New Kind of Threat:</strong> AI applications introduce a new attack surface built on prompts, knowledge bases, and probabilistic models, which increases the blast radius of potential security breaches compared to traditional software.</p></li><li><p><strong>Automated Red Teaming and Defense:</strong> Repello&#8217;s platform consists of two core products: Artemis, an offensive AI red teaming platform that discovers failure modes , and </p></li><li><p>Argus, a defensive guardrail system. The platforms create a continuous feedback loop where vulnerabilities found by Artemis are used to calibrate and create policies for Argus.</p></li><li><p><strong>Threat Modeling for AI Agents:</strong> For complex agentic systems, a black-box approach is often insufficient. Repello uses a gray-box method where a tool called AgentWiz helps customers generate a threat model based on the agent&#8217;s workflow and capabilities, without needing access to the source code.</p></li><li><p><strong>The Challenge of Non-Deterministic Vulnerabilities:</strong> Unlike traditional software vulnerabilities which are deterministic, AI exploits are probabilistic. An attack like a system prompt leak only needs to succeed once to be effective, even if it fails nine out of ten times.</p></li><li><p><strong>The Future of Attacks is Multimodal:</strong> Aryaman predicts that as AI applications evolve, major new attack vectors will emerge from new interfaces like voice and image, as their larger latent space offers more opportunities for malicious embeddings.</p></li></ul><p>Tune in for a deep dive!</p><p><strong>Connect with Aryaman:</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/aryaman-behera/">aryaman-behera </a> </p><p>Company Website: <a href="https://repello.ai/">https://repello.ai/</a></p><p><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288; <a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;The Boring AppSec Community&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">The Boring AppSec Community</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ep 27: From toil to intelligence, the future of AppSec & AI Agents with Brad Geesaman ]]></title><description><![CDATA[In this episode, host Anshuman Bhartiya sits down with Brad Geesaman, a Google Cloud Certified Fellow and Principal Security Engineer at Ghost Security, to explore the cutting edge of Application Security.]]></description><link>https://www.boringappsec.com/p/ep-27-from-toil-to-intelligence-brad</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-27-from-toil-to-intelligence-brad</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Tue, 09 Sep 2025 11:46:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182499956/ea159ce65e985160e2c21b2efe8fcb13.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, host Anshuman Bhartiya sits down with Brad Geesaman, a Google Cloud Certified Fellow and Principal Security Engineer at Ghost Security, to explore the cutting edge of Application Security. With 22 years in the industry, Brad shares his journey and discusses how his team is leveraging agentic AI and Large Language Models (LLMs) to tackle some of the oldest challenges in AppSec, aiming to shift security from a reactive chore to a proactive, intelligent function. <br><br>The conversation delves into practical strategies for reducing the &#8220;toil&#8221; of security tasks, the challenges of working with non-deterministic LLMs, the critical role of context in security testing, and the essential skills the next generation of security engineers must cultivate to succeed in an AI-driven world.</p><p><strong>Key Takeaways</strong></p><ul><li><p><strong>Reducing AppSec Toil:</strong> The primary focus of using AI in AppSec is to reduce repetitive tasks (toil) and surface meaningful risks. With AppSec engineers often outnumbered 100 to 1 by developers, AI can help manage the immense volume of work by automating the process of gathering context and assessing risk for findings from SCA, SAST, and secrets scanning.</p></li><li><p><strong>Making LLMs More Deterministic:</strong> To achieve consistent and high-quality results from non-deterministic LLMs, the key is to use them &#8220;as sparingly as possible&#8221;. Instead of having an LLM manage an entire workflow, break the problem into smaller pieces, use traditional code for deterministic steps, and reserve the LLM for specific tasks like classification or validation where its strengths are best utilized.</p></li><li><p><strong>The Importance of Evals:</strong> Continuous and rigorous evaluations (&#8221;evals&#8221;) are crucial to maintaining quality and consistency in an LLM-powered system. By running a representative dataset against the system every time a change is made&#8212;even a small prompt modification&#8212;teams can measure the impact and ensure the system&#8217;s output remains within desired quality boundaries.</p></li><li><p><strong>Context is Key (CAST):</strong> Ghost Security is pioneering Contextual Application Security Testing (CAST), an approach that flips traditional scanning on its head. Instead of finding a pattern and then searching for context, CAST first builds a deep understanding of the application by mapping out call paths, endpoints, authentication, and data handling, and then uses that rich context to ask targeted security questions and run specialized agents.</p></li><li><p><strong>Prototyping with Frontier vs. Local Models:</strong> The typical workflow for prototyping is to first use a powerful frontier model to quickly prove a concept&#8217;s value. Once validated, the focus shifts to exploring if the same task can be accomplished with smaller, local models to address cost, privacy, and data governance concerns.</p></li><li><p><strong>The Future Skill for AppSec Engineers:</strong> Beyond familiarity with LLMs, the most important skill for the next generation of AppSec engineers is the ability to think in terms of scalable, interoperable systems. The future lies in creating systems that can share context and work together&#8212;not just within the AppSec team, but across the entire security organization and with development teams&#8212;to build a more cohesive and effective security posture.</p></li></ul><p>Tune in for a deep dive into the future of AppSec with AI and AI Agents!</p><p><strong>Connect with Brad</strong></p><p>LinkedIn:   / bradgeesaman  </p><p>Company Website: https://ghostsecurity.com/<br><br><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288; <a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><p></p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;The Boring AppSec Community&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">The Boring AppSec Community</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Ep 26: The future of autonomous red teaming with Ads Dawson]]></title><description><![CDATA[In this episode, we talk to Ads Dawson (Staff AI Security Researcher @ Dreadnode).]]></description><link>https://www.boringappsec.com/p/ep-26-the-future-of-autonomous-red</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-26-the-future-of-autonomous-red</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Tue, 02 Sep 2025 12:05:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182500230/9dcb60e396bfc766b11a3aeb001e01cd.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we talk to Ads Dawson (Staff AI Security Researcher @ Dreadnode). </p><p>We discuss the evolving landscape of offensive security in the age of AI. The conversation covers the practical application of AI agents in red teaming, a critical look at industry standards like the OWASP Top 10 for LLMs, and Ad&#8217;s hands-on approach to building and evaluating autonomous hacking tools. He shares insights from his work industrializing offensive security with AI, his journey as a self-taught professional, and offers advice for others looking to grow in the field.</p><p><strong>Key Takeaways</strong></p><ul><li><p><strong>AI is a &#8220;Force Multiplier,&#8221; Not a Replacement:</strong> Ad emphasizes that AI should be viewed as a productivity tool that enhances the capabilities of human security professionals, allowing them to scale their efforts and tackle more complex tasks. Human expertise remains critical, especially since much of the data used to train AI models originates from human researchers.</p></li><li><p><strong>Prompt Injection is a Mechanism, Not a Vulnerability:</strong> A key insight is that &#8220;prompt injection&#8221; itself isn&#8217;t a vulnerability but a method used to deliver an exploit. The discussion highlights a broader critique of security frameworks like the OWASP Top 10, which can sometimes oversimplify complex issues and become compliance checklists rather than practical guides.</p></li><li><p><strong>Build Offensive Agents with Small, Focused Tasks:</strong> When creating offensive AI agents, the most successful approach is to break down the overall objective into small, concise sub-tasks. For example, instead of a single goal to &#8220;find XSS,&#8221; an agent would have separate tasks to log in, identify input fields, and then test those inputs.</p></li><li><p><strong>Hands-On Learning and Community are Crucial for Growth:</strong> As a self-taught professional, Ad advocates for getting deeply involved in the security community through meetups and CTFs. He stresses the importance of hands-on practice&#8212;&#8221;just play with it&#8221;&#8212;and curating your information feed by following trusted researchers to cut through the noise and continuously learn.</p></li></ul><p>Tune in for a deep dive into the future of security and the innovative approaches shaping the industry!</p><p><strong>Connect with Ads:</strong></p><p>Ad&#8217;s LinkedIn: <a href="https://www.linkedin.com/in/adamdawson0/">adamdawson0  </a></p><p>Ad&#8217;s website: <a href="https://ganggreentempertatum.github.io/">https://ganggreentempertatum.github.io/</a><br><br><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;The Boring AppSec Community&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">The Boring AppSec Community</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Ep 25: Navigating AI's new security landscape with Vineeth Sai]]></title><description><![CDATA[In this episode, we talk to Vineeth Sai Narajala (Senior Security Engineer @ Meta).]]></description><link>https://www.boringappsec.com/p/ep-25-navigating-ais-new-security</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-25-navigating-ais-new-security</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Thu, 28 Aug 2025 12:14:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182501220/58e5bc6b29007243f946e4511e7e5131.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we talk to Vineeth Sai Narajala (Senior Security Engineer @ Meta). </p><p>We discuss the evolving landscape of AI security, focusing on the Model Context Protocol (MCP), Enhanced Tool Definition Interface (ETDI), and the AI Vulnerability Scoring System (AIVSS). <br><br>We explore the challenges of integrating AI into existing systems, the importance of identity management for AI agents, and the need for standardized security practices. The discussion emphasizes the necessity of adapting security measures to the unique risks posed by generative AI and the collaborative efforts required to establish effective protocols.</p><p><strong>Key Takeaways</strong></p><ul><li><p>MCP simplifies AI integration but raises security concerns.</p></li><li><p>Identity management is crucial for AI agents.</p></li><li><p>ETDI addresses specific vulnerabilities in AI tools.</p></li><li><p>AIVSS aims to standardize AI vulnerability assessments.</p></li><li><p>Developers should start with minimal permissions for AI.</p></li><li><p>Trust in the agent ecosystem is vital for security.</p></li><li><p>Collaboration is key to developing effective security protocols.</p></li><li><p>Security fundamentals still apply in AI integration.</p></li></ul><p>Tune in for a deep dive into the future of security and the innovative approaches shaping the industry!</p><p><strong>Connect with Vineeth:</strong></p><p>Vineeth&#8217;s LinkedIn: vineethsai  </p><p>Vineeth&#8217;s website: <a href="https://vineethsai.com/">https://vineethsai.com/</a></p><p><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.boringappsec.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The BoringAppSec Community! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Ep 24: Agentic AI and transforming vulnerability management with Harry Wetherald]]></title><description><![CDATA[In this episode, we talk to Harry Wetherald (Co-Founder and CEO @ Maze).]]></description><link>https://www.boringappsec.com/p/ep-24-agentic-ai-transforming-vulnerability</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-24-agentic-ai-transforming-vulnerability</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Thu, 31 Jul 2025 12:24:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182501535/b6779685abc4d37663a3037ce7c18104.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we talk to Harry Wetherald (Co-Founder and CEO @ Maze). We explore the evolving landscape of vulnerability management. Harry shares insights from his journey in AI and machine learning, discussing the challenges of triaging vulnerabilities across diverse organizations. </p><p>The conversation delves into the concept of agentic AI, the importance of context engineering, and the hurdles of achieving enterprise-grade reliability in AI systems. Harry also reflects on the inflection points that led to the founding of Maze and the role of LLMs in transforming security practices. </p><p><strong>Key Takeaways</strong></p><ul><li><p><strong>Introduction to Maze and Harry&#8217;s Journey:</strong> Harry shares his background in AI and machine learning, emphasizing the persistent challenges in vulnerability management and the founding of Maze to address these issues.</p></li><li><p><strong>Agentic AI and Context Engineering:</strong> The discussion highlights the shift from static rules to agentic AI, where AI agents autonomously investigate vulnerabilities, and the critical role of context engineering in tailoring solutions to specific organizational needs.</p></li><li><p><strong>Challenges in AI Reliability:</strong> Harry talks about the engineering hurdles in making AI systems reliable and consistent, focusing on the importance of tight reasoning loops and human-AI symbiosis.</p></li><li><p><strong>Pricing Strategies:</strong> In AI-native security solutions, clear and fixed pricing is preferred, as it simplifies budgeting and aligns with traditional models, while vendors should manage costs to ensure predictability for customers.</p></li><li><p><strong>Future of Security with AI:</strong> The conversation concludes with insights into the future of security, where AI agents work in the background to provide innovative solutions, and the importance of human feedback in refining AI systems.</p></li></ul><p>Tune in for a deep dive into the future of security and the innovative approaches shaping the industry!</p><p><strong>Connect with Harry:</strong></p><p>Harry&#8217;s LinkedIn: <a href="https://www.linkedin.com/in/harrywetherald/">harrywetherald</a>  </p><p>Maze: <a href="https://mazehq.com/">https://mazehq.com/</a><br><br><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;The Boring AppSec Community&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">The Boring AppSec Community</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ep 23: The shift from traditional security tools with Surag Patel and Arshan Dabirsiaghi]]></title><description><![CDATA[In this episode, we talk to Surag Patel (CEO @ Pixee) and Arshan Dabirsiaghi (CTO @ Pixee).]]></description><link>https://www.boringappsec.com/p/ep-23-with-surag-patel-and-arshan</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-23-with-surag-patel-and-arshan</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Wed, 23 Jul 2025 12:42:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182502608/421833efa59e92991ed7fbc46dcf0109.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we talk to Surag Patel (CEO @ Pixee) and Arshan Dabirsiaghi (CTO @ Pixee). We discuss the transformative approach that Pixee is taking in application security. We explore the shift from traditional security tools that merely detect vulnerabilities to a model that emphasizes automated remediation. The discussion covers the evolving role of AppSec professionals, the integration of AI agents to scale coverage, the importance of trust in automated fixes, and the challenges of navigating a crowded security market. We also touch on the future of security in design specifications and the need for a comprehensive approach to security that includes all stakeholders in the software development lifecycle.</p><p><strong>Key Takeaways</strong></p><ul><li><p>The traditional model of security tools is being challenged.</p></li><li><p>Pixee aims to automate not just detection but also remediation.</p></li><li><p>AI agents can help scale coverage in application security.</p></li><li><p>The role of AppSec professionals will evolve with AI integration.</p></li><li><p>Trust is crucial for developers to accept automated fixes.</p></li><li><p>Developers want tools that reduce their workload, not add to it.</p></li><li><p>Contextual understanding is key for accurate vulnerability triage.</p></li><li><p>The security market is not saturated; there are still many unsolved problems.</p></li><li><p>Integrating security into design specifications is the future.</p></li><li><p>A comprehensive approach to security is necessary for effective risk management.</p></li></ul><p>Tune in to find out more! </p><p><strong>Connect with Surag &amp; Arshan:</strong></p><p>Surag&#8217;s LinkedIn: <a href="https://www.linkedin.com/in/suragpatel/">suragpatel</a></p><p>Arshan&#8217;s LinkedIn: <a href="https://www.linkedin.com/in/arshan-dabirsiaghi/">arshan-dabirsiaghi</a>  </p><p>Pixee: <a href="https://www.pixee.ai/">https://www.pixee.ai/</a><br><br><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;The Boring AppSec Community&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">The Boring AppSec Community</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ep 22: The evolution of application security with Ken Johnson]]></title><description><![CDATA[In this episode, we talk to Ken Johnson, Co-Founder & CTO @ DryRun Security.]]></description><link>https://www.boringappsec.com/p/the-boring-appsec-podcast-ep-22-with</link><guid isPermaLink="false">https://www.boringappsec.com/p/the-boring-appsec-podcast-ep-22-with</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Tue, 15 Jul 2025 14:09:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182507479/6da980e1e6a0263d01d95c2dd452765c.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we talk to Ken Johnson, Co-Founder &amp; CTO @ DryRun Security. Ken discusses the evolution of application security, focusing on the role of AI and LLMs in enhancing security practices. <br><br>He emphasizes the importance of context engineering over traditional prompt engineering, the challenges of consistency and repeatability in LLM outputs, and the ethical considerations surrounding AI in security. The discussion also highlights the need for orchestration in AI applications and the future potential of AI in the security landscape.</p><p><strong>Key Takeaways</strong></p><ul><li><p>DryRun Security utilizes AI to enhance code security.</p></li><li><p>Context engineering is crucial for effective AI applications.</p></li><li><p>LLMs can augment security practices but require careful orchestration.</p></li><li><p>Consistency in LLM outputs is a significant challenge.</p></li><li><p>Ethical considerations in AI are becoming increasingly important.</p></li><li><p>Finding the right balance in using LLMs is essential.</p></li><li><p>Community collaboration is vital for advancing AI solutions.</p></li><li><p>Orchestration is a key factor in AI performance.</p></li><li><p>AI will not replace jobs but will change how we work.</p></li><li><p>Tune in to find out more! </p></li></ul><p><strong>Connect with Ken:</strong></p><p>LinkedIn:  cktricky  </p><p>DryRun Security: https://www.dryrun.security/</p><p><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;The Boring AppSec Community&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">The Boring AppSec Community</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ep 21: The role of AI in security measures with Casey Ellis]]></title><description><![CDATA[In this episode, we talk to Casey Ellis, Founder & Advisor @Bugcrowd.]]></description><link>https://www.boringappsec.com/p/the-boring-appsec-podcast-ep-21-with</link><guid isPermaLink="false">https://www.boringappsec.com/p/the-boring-appsec-podcast-ep-21-with</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Thu, 03 Jul 2025 14:15:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182507494/a8843a92d327ebe154eeffd3e132d4de.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we talk to Casey Ellis, Founder &amp; Advisor @Bugcrowd.</p><p>Casey shares his personal journey through health challenges and his insights into the cybersecurity landscape. He discusses the evolution of the bug bounty industry, the importance of secure design, and the role of AI in both enhancing and complicating security measures. <br><br>Casey emphasizes the need for accountability and the potential of crowdsourcing in security, while also addressing the challenges of implementing effective standards. The conversation concludes with reflections on the future of AI in security and the necessity for focused problem-solving in the industry.</p><p><strong>Key Takeaways</strong></p><ul><li><p>The bug bounty industry has transformed lives and created new opportunities.</p></li><li><p>Founding a company involves learning from both successes and failures.</p></li><li><p>The cybersecurity industry often focuses on quick wins rather than fundamental problems.</p></li><li><p>Secure by design is essential for addressing root causes of vulnerabilities.</p></li><li><p>Crowdsourcing can enhance accountability in security practices.</p></li><li><p>Standards like ASVS are important but can be complex to implement.</p></li><li><p>AI is both a tool and a threat in the cybersecurity landscape.</p></li><li><p>Focusing on specific problems is key to leveraging AI effectively.</p></li></ul><p>Tune in to find out more! </p><p><strong>Connect with Casey:</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/caseyjohnellis/">caseyjohnellis  </a></p><p>Bugcrowd: <a href="https://www.bugcrowd.com/">https://www.bugcrowd.com/</a></p><p><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;The Boring AppSec Community&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">The Boring AppSec Community</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ep 20: The startup landscape with Vivek Ramachandran]]></title><description><![CDATA[In this episode, we talk to Vivek Ramachandran, Founder &#8234;@SquareXTeam&#8236; .]]></description><link>https://www.boringappsec.com/p/the-boring-appsec-podcast-s2e10-vivek</link><guid isPermaLink="false">https://www.boringappsec.com/p/the-boring-appsec-podcast-s2e10-vivek</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Sun, 09 Mar 2025 10:36:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182846887/d2c7bab5e6e852b6cc3c01dc5ce2819f.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we talk to Vivek Ramachandran, Founder &#8234;@SquareXTeam&#8236; .</p><p>Vivek shares his journey in cybersecurity, discussing the evolution of content creation, the importance of building for a global audience, and navigating the Indian cybersecurity market. He emphasizes the need for browser security, the challenges of local markets, and the significance of personal relationships in business. <br><br>In this conversation, Vivek Ramachandran shares insights on the challenges faced by founders, particularly in breaking into the U.S. market. He emphasizes the importance of building a strong advisor network and engaging in technical conversations. The discussion also delves into the evolving landscape of cybersecurity, highlighting the impact of AI on both attackers and defenders. Vivek offers valuable advice for new startup founders, stressing the need for patience, understanding the responsibilities of fundraising, and focusing on fundamental skills.</p><p><strong>Key Takeaways</strong></p><ul><li><p>The browser is now considered the new endpoint for security.</p></li><li><p>Pentester Academy was born out of a need to share knowledge.</p></li><li><p>Content creation has evolved significantly over the years. Today&#8217;s audience prefers bite-sized, impactful content.</p></li><li><p>Founders should think globally from the start.</p></li><li><p>Cybersecurity in India is often driven by compliance rather than necessity.</p></li><li><p>Technical founders must adapt to market needs and customer relationships.</p></li><li><p>Design partnerships can help startups gain traction in local markets. Founders often give up after a few rejections.</p></li><li><p>Building an advisor network is essential for success.</p></li><li><p>AI is changing the dynamics of cybersecurity.</p></li><li><p>Raising funds is a responsibility, not a success metric.</p></li><li><p>Focus on fundamentals to stay relevant in tech.</p></li><li><p>Learning by doing is becoming too easy with AI.</p></li><li><p>Engage with your target market to build credibility.</p></li></ul><p>Tune in to find out more! </p><p><strong>Connect with Vivek:</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/vivekramachandran/">vivekramachandran </a> </p><p>SquareX: <a href="https://www.sqrx.com/">https://www.sqrx.com/ </a></p><p><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;The Boring AppSec Community&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">The Boring AppSec Community</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ep 19: The evolution of security tools with Ali Mesdaq]]></title><description><![CDATA[In this episode, we talk to Ali Mesdaq, Founder & CEO @ Amplify Security.]]></description><link>https://www.boringappsec.com/p/ep-19-the-evolution-of-security-tools</link><guid isPermaLink="false">https://www.boringappsec.com/p/ep-19-the-evolution-of-security-tools</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Mon, 03 Mar 2025 10:49:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182848361/67b08a9109e49403e1e0265834757943.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we talk to Ali Mesdaq, Founder &amp; CEO @ Amplify Security.</p><p>We discuss the evolution of security tools, the importance of customer validation, and the role of AI agents in enhancing security practices. Ali shares insights on building a positive security culture within organizations and how Amplify Security differentiates itself in a competitive market. The conversation emphasizes the need for collaboration between security and development teams, the challenges of addressing known and unknown vulnerabilities, and the future of AI in cybersecurity.</p><p><strong>Key Takeaways</strong></p><ul><li><p>Amplify helps coders secure their code effectively.</p></li><li><p>Customer validation is crucial for startup confidence.</p></li><li><p>Security tools should enhance developer experience.</p></li><li><p>AI agents can automate security fixes intelligently.</p></li><li><p>Contextual understanding is vital for security solutions.</p></li><li><p>Developers should approve code changes for security fixes.</p></li><li><p>A positive security culture fosters collaboration.</p></li><li><p>AI can help prioritize and manage vulnerabilities.</p></li><li><p>The future of security involves AI-driven solutions.</p></li><li><p>Security issues must be addressed in a timely manner.</p></li></ul><p>Tune in to find out more! </p><p><strong>Connect with Ali:</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/amesdaq/">amesdaq </a> </p><p>Akto: <a href="https://amplify.security/">https://amplify.security/</a></p><p><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;The Boring AppSec Community&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">The Boring AppSec Community</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div>]]></content:encoded></item><item><title><![CDATA[Ep 18: Product differentiation in API security with Ankita Gupta]]></title><description><![CDATA[In this episode, we talk to Ankita Gupta, Co-Founder & CEO @ Akto.io]]></description><link>https://www.boringappsec.com/p/the-boring-appsec-podcast-s2e8-ankita</link><guid isPermaLink="false">https://www.boringappsec.com/p/the-boring-appsec-podcast-s2e8-ankita</guid><dc:creator><![CDATA[Sandesh Mysore Anand]]></dc:creator><pubDate>Tue, 25 Feb 2025 10:33:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/182846522/f439d933a17e87d84b92dfa427f0f5a3.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode, we talk to Ankita Gupta, Co-Founder &amp; CEO @ Akto.io</p><p>Ankita shares her unique journey into the cybersecurity space, discussing her diverse background and the inception of her API security company. She emphasizes the importance of understanding customer needs, the role of co-founders in a startup&#8217;s success, and the surprising maturity of buyers in the cybersecurity industry. <br><br>Ankita also delves into marketing strategies for cybersecurity startups, highlighting the need for differentiation and continuous iteration in messaging. In this conversation, Ankita discusses various aspects of marketing strategies for enterprise SaaS, the challenges of building a brand in a competitive market, and the importance of API security. She emphasizes the need for startups to identify specific problems within their target market and how LLMs can significantly enhance API security. The discussion also touches on the necessity of experimentation and iteration in integrating AI into products.</p><p><strong>Key Takeaways</strong></p><ul><li><p>Understanding customer needs is crucial for product development.</p></li><li><p>A strong co-founder relationship is vital for startup success.</p></li><li><p>Buyers in cybersecurity are more mature than in other industries.</p></li><li><p>Marketing should focus on product differentiation.</p></li><li><p>Iterate marketing positioning continuously based on feedback.</p></li><li><p>Networking is important, but building a customer base is essential.</p></li><li><p>Cybersecurity tools are often purchased through structured processes. Social media is crucial for enterprise SaaS marketing.</p></li><li><p>Branding requires a clear representation of the product&#8217;s value.</p></li><li><p>API security is a growing concern that needs addressing.</p></li><li><p>LLMs can revolutionize the way API security is approached.</p></li><li><p>It&#8217;s essential to iterate and experiment with AI technologies.</p></li><li><p>The market for API security is significant, even if not immediately recognized.</p></li><li><p>Startups should not shy away from basic use cases with LLMs.</p></li><li><p>Tune in to find out more! </p></li></ul><p><strong>Connect with Ankita:</strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/ankita-gupta-89214515/">ankita-gupta</a></p><p>Akto: <a href="https://www.akto.io/">https://www.akto.io/</a></p><p><strong>Connect with Anshuman:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anshumanbhartiya/">anshumanbhartiya</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/anshuman_bh">https://x.com/anshuman_bh</a></p><p>Website: &#8288;&#8288;&#8288;&#8288;<a href="https://anshumanbhartiya.com/">https://anshumanbhartiya.com/</a></p><p>&#8288;&#8288;&#8288;&#8288;Instagram: <a href="https://www.instagram.com/anshuman.bhartiya/#">anshuman.bhartiya</a></p><p><strong>Connect with Sandesh:</strong></p><p>LinkedIn: &#8288;&#8288;&#8288;&#8288;<a href="https://www.linkedin.com/in/anandsandesh/">anandsandesh</a></p><p>X: &#8288;&#8288;&#8288;&#8288;<a href="https://x.com/JubbaOnJeans">https://x.com/JubbaOnJeans</a></p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:58976,&quot;name&quot;:&quot;Boring AppSec&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://boringappsec.substack.com&quot;,&quot;hero_text&quot;:&quot;E1-27: Getting the Boring aspects of AppSec right \nE28+: All aspects of building AppSec products&quot;,&quot;author_name&quot;:&quot;Sandesh Mysore Anand&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://boringappsec.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">Boring AppSec</span><div class="embedded-publication-hero-text">E1-27: Getting the Boring aspects of AppSec right 
E28+: All aspects of building AppSec products</div><div class="embedded-publication-author-name">By Sandesh Mysore Anand</div></a><form class="embedded-publication-subscribe" method="GET" action="https://boringappsec.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div>]]></content:encoded></item></channel></rss>