<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 16 Apr 2026 15:37:54 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Off Script - Episodes Tagged with “Web Application Security”</title>
    <link>https://off-script.fireside.fm/tags/web%20application%20security</link>
    <pubDate>Wed, 22 Sep 2021 10:00:00 +0100</pubDate>
    <description>Hosted by CTOs Josh Nesbitt and James Hall, Off Script brings you unfiltered conversations about the highs, lows, and lessons of working in tech today. From leading engineering teams and scaling companies, to tackling burnout, bad bets, and breakthrough ideas, this is the show where raw honesty meets experience.
Alongside one-on-one conversations between Josh and James, you’ll hear from leaders, builders, designers, and entrepreneurs who aren’t afraid to share what’s really going on behind the scenes — the conversations usually left for DMs, side chats, and after-hours drinks.
Whether you’re building your first product or leading a fast-growing team, Off Script gives you a raw and refreshing perspective on the challenges and creativity that shape modern tech.
New episodes every few weeks. Subscribe and join the conversation.
</description>
    <language>en-gb</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Where raw honesty meets experience. Unfiltered conversations at the edge of tech, leadership, and creativity.</itunes:subtitle>
    <itunes:author>Hey! Presents</itunes:author>
    <itunes:summary>Hosted by CTOs Josh Nesbitt and James Hall, Off Script brings you unfiltered conversations about the highs, lows, and lessons of working in tech today. From leading engineering teams and scaling companies, to tackling burnout, bad bets, and breakthrough ideas, this is the show where raw honesty meets experience.
Alongside one-on-one conversations between Josh and James, you’ll hear from leaders, builders, designers, and entrepreneurs who aren’t afraid to share what’s really going on behind the scenes — the conversations usually left for DMs, side chats, and after-hours drinks.
Whether you’re building your first product or leading a fast-growing team, Off Script gives you a raw and refreshing perspective on the challenges and creativity that shape modern tech.
New episodes every few weeks. Subscribe and join the conversation.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/31ae211d-eae2-4914-bbc4-99ad1da36937/cover.jpg?v=5"/>
    <itunes:explicit>yes</itunes:explicit>
    <itunes:keywords>Technology leadership, CTO podcast, Creative technologists, Product development, Engineering culture, Software teams, AI and product, Startup stories, Agency leadership, Honest tech conversations, Scaling tech companies, Tech industry insights, Tech News</itunes:keywords>
    <itunes:owner>
      <itunes:name>Hey! Presents</itunes:name>
      <itunes:email>offscript@heypresents.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Business">
  <itunes:category text="Management"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="Self-Improvement"/>
</itunes:category>
<item>
  <title>Episode 08: Web application security</title>
  <link>https://off-script.fireside.fm/08</link>
  <guid isPermaLink="false">1fb18277-ba46-434d-ae3d-ef9f0e7825c0</guid>
  <pubDate>Wed, 22 Sep 2021 10:00:00 +0100</pubDate>
  <author>Hey! Presents</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/31ae211d-eae2-4914-bbc4-99ad1da36937/1fb18277-ba46-434d-ae3d-ef9f0e7825c0.mp3" length="69669453" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2</itunes:season>
  <itunes:author>Hey! Presents</itunes:author>
  <itunes:subtitle>Off Script hosts Josh and James discuss all things web application security. It’s something that is getting more and more important to get right. More cyber attacks. More ransomware attacks. They address good application hygiene and the common pitfalls they are seeing people fall for. </itunes:subtitle>
  <itunes:duration>47:51</itunes:duration>
  <itunes:explicit>yes</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/31ae211d-eae2-4914-bbc4-99ad1da36937/episodes/1/1fb18277-ba46-434d-ae3d-ef9f0e7825c0/cover.jpg?v=2"/>
  <description>Today, Off Script hosts Josh and James discuss all things web application security. It’s something that is getting more and more important to get right. More cyber attacks. More ransomware attacks. They address good application hygiene and the common pitfalls they are seeing people fall for. Big data breaches can lead to losing customer trust so it’s so important to makes sure you’re running a tight ship with security. 
Basic security maintenance is essential but what can companies and individuals be doing to make sure their web applications are secure during a time of high value bug bounties being offered to people for finding vulnerabilities?
Bug bounties. The positives, negatives and relevancy to different sized agencies
The use of bots to find MongoDB vulnerabilities
Encrypted vaults
The Slack issue
How hard is it to put secure processes in place from the start?
Canary and environment variables
If you’re a security researcher, what do you do with responsible disclosure?
The fine line between helping the hackers and helping the community
What makes a good, secure app?
Package managers
Modern libraries making it obvious when you are doing a bad thing
Open pull requests
Get your house in order with OWASP
Frameworks and the early standards they set with password management and security hygiene
Importance of rotating keys
Human interfaces and the floors surrounding them
What can we learn from Twelve-Factor?
Github Workspaces and recreatable environments
The issues of convenience
Macs vs dev accessibility and Windows catching up
Github and Atom
Good, automated test suites
How to have a good view on what makes a good security test
Falling into the trap of feeling productive
Sitting down with the team to discuss testing value and priorities
The creativity of SQL injection
Reinventing the wheel
Dangers of writing an encryption tool and importance of getting an external security company
Resources:
* GitHub Security Bug Bounty (https://bounty.github.com/)
* snyk (https://snyk.io/)
* Yarn (https://yarnpkg.com/)
* The Open Web Application Security Project (https://owasp.org/)
* 12 Factor (https://12factor.net/)
* Hyper (https://hyper.is/)
Find out more about Stac and Parallax:
* Stac (https://stac.works)
* Parallax (https://parall.ax)
</description>
  <itunes:keywords>tech, community, development, web, web tech, web technology, web development, web security, software alternatives, privacy, automated testing, bug bounties, encrypted vaults</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Today, Off Script hosts Josh and James discuss all things web application security. It’s something that is getting more and more important to get right. More cyber attacks. More ransomware attacks. They address good application hygiene and the common pitfalls they are seeing people fall for. Big data breaches can lead to losing customer trust so it’s so important to makes sure you’re running a tight ship with security. </p>

<p>Basic security maintenance is essential but what can companies and individuals be doing to make sure their web applications are secure during a time of high value bug bounties being offered to people for finding vulnerabilities?</p>

<ul>
<li>Bug bounties. The positives, negatives and relevancy to different sized agencies</li>
<li>The use of bots to find MongoDB vulnerabilities</li>
<li>Encrypted vaults</li>
<li>The Slack issue</li>
<li>How hard is it to put secure processes in place from the start?</li>
<li>Canary and environment variables</li>
<li>If you’re a security researcher, what do you do with responsible disclosure?</li>
<li>The fine line between helping the hackers and helping the community</li>
<li>What makes a good, secure app?</li>
<li>Package managers</li>
<li>Modern libraries making it obvious when you are doing a bad thing</li>
<li>Open pull requests</li>
<li>Get your house in order with OWASP</li>
<li>Frameworks and the early standards they set with password management and security hygiene</li>
<li>Importance of rotating keys</li>
<li>Human interfaces and the floors surrounding them</li>
<li>What can we learn from Twelve-Factor?</li>
<li>Github Workspaces and recreatable environments</li>
<li>The issues of convenience</li>
<li>Macs vs dev accessibility and Windows catching up</li>
<li>Github and Atom</li>
<li>Good, automated test suites</li>
<li>How to have a good view on what makes a good security test</li>
<li>Falling into the trap of feeling productive</li>
<li>Sitting down with the team to discuss testing value and priorities</li>
<li>The creativity of SQL injection</li>
<li>Reinventing the wheel</li>
<li>Dangers of writing an encryption tool and importance of getting an external security company</li>
</ul>

<p>Resources:</p>

<ul>
<li><a href="https://bounty.github.com/" rel="nofollow">GitHub Security Bug Bounty</a></li>
<li><a href="https://snyk.io/" rel="nofollow">snyk</a></li>
<li><a href="https://yarnpkg.com/" rel="nofollow">Yarn</a></li>
<li><a href="https://owasp.org/" rel="nofollow">The Open Web Application Security Project</a></li>
<li><a href="https://12factor.net/" rel="nofollow">12 Factor</a></li>
<li><a href="https://hyper.is/" rel="nofollow">Hyper</a></li>
</ul>

<p>Find out more about Stac and Parallax:</p>

<ul>
<li><a href="https://stac.works" rel="nofollow">Stac</a></li>
<li><a href="https://parall.ax" rel="nofollow">Parallax</a></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Today, Off Script hosts Josh and James discuss all things web application security. It’s something that is getting more and more important to get right. More cyber attacks. More ransomware attacks. They address good application hygiene and the common pitfalls they are seeing people fall for. Big data breaches can lead to losing customer trust so it’s so important to makes sure you’re running a tight ship with security. </p>

<p>Basic security maintenance is essential but what can companies and individuals be doing to make sure their web applications are secure during a time of high value bug bounties being offered to people for finding vulnerabilities?</p>

<ul>
<li>Bug bounties. The positives, negatives and relevancy to different sized agencies</li>
<li>The use of bots to find MongoDB vulnerabilities</li>
<li>Encrypted vaults</li>
<li>The Slack issue</li>
<li>How hard is it to put secure processes in place from the start?</li>
<li>Canary and environment variables</li>
<li>If you’re a security researcher, what do you do with responsible disclosure?</li>
<li>The fine line between helping the hackers and helping the community</li>
<li>What makes a good, secure app?</li>
<li>Package managers</li>
<li>Modern libraries making it obvious when you are doing a bad thing</li>
<li>Open pull requests</li>
<li>Get your house in order with OWASP</li>
<li>Frameworks and the early standards they set with password management and security hygiene</li>
<li>Importance of rotating keys</li>
<li>Human interfaces and the floors surrounding them</li>
<li>What can we learn from Twelve-Factor?</li>
<li>Github Workspaces and recreatable environments</li>
<li>The issues of convenience</li>
<li>Macs vs dev accessibility and Windows catching up</li>
<li>Github and Atom</li>
<li>Good, automated test suites</li>
<li>How to have a good view on what makes a good security test</li>
<li>Falling into the trap of feeling productive</li>
<li>Sitting down with the team to discuss testing value and priorities</li>
<li>The creativity of SQL injection</li>
<li>Reinventing the wheel</li>
<li>Dangers of writing an encryption tool and importance of getting an external security company</li>
</ul>

<p>Resources:</p>

<ul>
<li><a href="https://bounty.github.com/" rel="nofollow">GitHub Security Bug Bounty</a></li>
<li><a href="https://snyk.io/" rel="nofollow">snyk</a></li>
<li><a href="https://yarnpkg.com/" rel="nofollow">Yarn</a></li>
<li><a href="https://owasp.org/" rel="nofollow">The Open Web Application Security Project</a></li>
<li><a href="https://12factor.net/" rel="nofollow">12 Factor</a></li>
<li><a href="https://hyper.is/" rel="nofollow">Hyper</a></li>
</ul>

<p>Find out more about Stac and Parallax:</p>

<ul>
<li><a href="https://stac.works" rel="nofollow">Stac</a></li>
<li><a href="https://parall.ax" rel="nofollow">Parallax</a></li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
