Resources: - https://www.joshuakgoldberg.com/blog/how-i-apply-to-conferences
https://www.joshuakgoldberg.com/blog/how-i-apply-to-conferences-faqs
https://www.youtube.com/watch?v=mPPZ-NUnR-4&t=25743s&ab_channel=JSWORLDConference
Then in the news segment, DARPA unleashes an AI Cyber Challenge to find flaws, CISA asks for input on securing open source software and memory safety, what five years of vuln research shows for vuln management programs, siphoning security tokens from VS Code, and more!
Follow us on Mastodon: https://infosec.exchange/@AppSecWeekly
Follow us on Twitter: https://www.twitter.com/secweekly
Like us on Facebook: https://www.facebook.com/secweekly
Visit https://securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw-251
]]>Resources: - https://www.joshuakgoldberg.com/blog/how-i-apply-to-conferences
https://www.joshuakgoldberg.com/blog/how-i-apply-to-conferences-faqs
https://www.youtube.com/watch?v=mPPZ-NUnR-4&t=25743s&ab_channel=JSWORLDConference
Then in the news segment, DARPA unleashes an AI Cyber Challenge to find flaws, CISA asks for input on securing open source software and memory safety, what five years of vuln research shows for vuln management programs, siphoning security tokens from VS Code, and more!
Follow us on Mastodon: https://infosec.exchange/@AppSecWeekly
Follow us on Twitter: https://www.twitter.com/secweekly
Like us on Facebook: https://www.facebook.com/secweekly
Visit https://securityweekly.com/asw for all the latest episodes!
Show Notes: https://securityweekly.com/asw-251
]]>