Download the App!

show episodes
 
Each week a group of Pakistanis comes together to make sense of Pakistani issues and hope to fix them from their sofas. *Soch, Muhallay ki. Reach, National.* #Pakistan #Pakistani #Podcast #Urdu #News #Culture #Society #Politics #Entertainment #Religion #Islam #radio #Trench #Productions
 
See how sellers run their own online stores and share their successes, failures, and what happens behind the scenes. Podcast show dedicated to help you with all issues surrounding eCommerce - Design, Customer Service, SEO, Manufacturing, Drop-Shipping, Logistics, Customer Service, and more. One of the first podcasts about e-commerce, Build My Online Store is completely FREE as it is meant to help people get to the next level in their life and in their business creating a long term cash flow ...
 
Contrast Security provides the industry’s only DevOps-Native AppSec Platform using instrumentation to continuously analyze and protect software from within the application. This enables businesses to see more of the risks in their software and less development delays and AppSec complexity. The Contrast platform integrates seamlessly into development pipelines, enabling easier security bug and vulnerability fixes that significantly speed release cycles. The Contrast Inside AppSec Podcast feat ...
 
"That excellent book by Thomas Reid, the Inquiry into the Human Mind (first edition, 1764; 6th edition, 1810), as a negative proof of the Kantian truths, affords us a very thorough conviction of the inadequacy of the senses to produce the objective perception of things, and also of the non-empirical origin of the perception of space and time. Reid refutes Locke's doctrine that perception is a product of the senses, by a thorough and acute demonstration that the collective sensations of the s ...
 
Loading …
show series
 
From almost day one of development, Contrast has used the Contrast Application Security Platform to secure and protect TeamServer, the UI and analytics engine for the Contrast platform. In this podcast, David Hafley, the vice president of engineering whose team oversees the development of TeamServer, discusses features and integrations in the Contr…
 
Too often, DevOps and AppSec are spoken about in two different vernaculars. The reality is that they are intertwined at the hip and their individual successes are contingent on one another—whether faster business acceleration, improved efficiencies, or better risk management. In this Inside AppSec podcast, EVOTEK's IT Strategist Greg Sternberg disc…
 
We're finally here, the end of Season 2. And just like the last season finale, we've come together with this season's entire (almost) speaker line-up. Among some friendly banter, we covered the record-breaking torrential rain in Karachi that has devastated the city and its people. P.S Season 3 will go live in a few weeks I.A. Email us at thepodcast…
 
This week, we've landed back to our actual current reality, Pakistan. All praise to God. And our speakers are hands-on with our own set of issues this week: - Flag on a Dog and Pakistani Patriotism (11:26) - Saba Qamar & Bilal Saeed, TikTok of twirling in Wazir Khan Mosque (34:25) - Nergis Mavalvala, the MIT Dean with a Pakistani origin (56:20) P.S…
 
As cyber criminals have become more advanced in their use of attack techniques and the digital world expands at a record rate, the need for organizations to assess their risks and develop policies to manage those risks continues to grow. Applications are certainly on the front battle lines, with almost half of data breaches in the past year being t…
 
This Independence Day, we come to you from an alternate reality where Muslims had abandoned the idea of a separate independent state and have always been living in an unpartitioned India. Email us at thepodcastchowk@gmail.com with your comments, feedback, critique, topic recommendations, etc. You can also post your feedback and comments on our week…
 
Contrast Labs’ latest bimonthly research findings (“Application Security Intelligence Report”) looks at application vulnerability and attack trends against COVID-19 data—identifying potential areas of alignment. Attacks on SQL injection and broken access control vulnerabilities were up considerably. With SQL injection vulnerabilities found in more …
 
Digital transformation is driving a dramatic acceleration in the development of new applications and the evolution of existing ones. But the expanded application attack surface and demands for greater velocity in application development cycles ratchet up risk and impede innovation. Contrast’s “2020 Application Security Observability Report” provide…
 
This week we've covered topics relating to places of worship, their symbolism, and their significance to society. Hagia Sofia's conversion from a museum back to a mosque (7:07), and the building of a temple in Islamabad (42:02), we approach the subject from a non-apologetic stance. Email us at thepodcastchowk@gmail.com with your comments, feedback,…
 
In this week's episode, we get back into our groove and discuss the following news coming out of Pakistan: - Dismissal Justice Arshad Malik of the accountability court (10:27) - "Fake" Pakistani Pilots and drowning PIA (32:01) - Ban on PUBG the mobile videogame (1:00:35) Email us at thepodcastchowk@gmail.com with your comments, feedback, critique, …
 
Contrast Labs publishes research findings based on customer vulnerability and attack data in a bimonthly report. The March-April report pinpoints what percentage of applications contain vulnerabilities and how many vulnerabilities exist on average per application. It also identifies vulnerability attacks that spiked the most over the two-month time…
 
Legacy application security approaches simply cannot scale to the velocity demands of modern software development. As they lack vulnerability context because they run outside of the software, they slow development cycles, impede innovation, and incur substantial inefficiencies and cost. When applications are released into production, this same outs…
 
In this week's episode, we are joined by a professional family counselor from America, with whom we delve deep into a viral twitter thread once more. This time the speakers touch upon the many potential challenges that pose to Muslim families choosing to live in the West, or societies with rising degrees of 'westernization'. https://twitter.com/pap…
 
Application performance management anchored its foundation in instrumentation, empowering developers to detect and diagnose application performance problems while writing code to meet the business’s service-level requirements. The same is happening in the area of application security, where instrumentation unlocks automation, dramatically improves …
 
In this week's episode our speakers discuss two varying topics: - Shahid Afridi's alleged political prospects (8:45) - The potential challenges of Immigration for the younger and older Muslim generation. https://twitter.com/papishawi/status/1263660330246459392?s=08 (30:37) Email us at thepodcastchowk@gmail.com with your comments, feedback, critique…
 
Digital transformation forms a critical part of almost every organization's business strategy. DevOps and Agile are critical enablers as organizations seek to accelerate their business by enhancing existing applications and developing new ones. But DevOps and Agile—along with containers, microservices, and multiple clouds—introduce new complexities…
 
The U.S. Department of Energy’s Pacific Northwest National Laboratory reports that one-quarter of software vulnerabilities appear on social media sites—GitHub, Twitter, and Reddit—before they are logged in the National Vulnerability Database. Cybersecurity professionals aren’t the only ones to notice; cyber criminals are busy exploiting this gap. S…
 
Developers are embracing Python programming language in growing numbers. It is the most studied language among developers and is used for myriad applications. As a dynamic programming language (as opposed to Java and C that are static languages), variable type is not determined in the application until runtime. For application security to accuratel…
 
Eid Mubarak to all our listeners! We're bringing you our eid episode. Luckily we have some relevant Eid related content thanks to the usual Eid Moon sighting conflict with Mufti Muneeb & Molvi Fawad Chaudhry locking horns once again. We also have a conversation on how Eid should be celebrated when there's prevailing grief & sorrow in Pakistan and e…
 
Historically, application security was only in the peripheral purview of the CISO/CSO. But times are changing according to executive cybersecurity recruiter André Tehrani (partner at Recrewmint). In this podcast (part two of a two-part series), André discusses why his firm’s clients are placing application security at the top of the list of skillse…
 
This podcast—the first in a two-part series—features an interview with André Tehrani, a partner at Recrewmint, a firm focused singularly on cybersecurity recruiting services at the executive level. André explains how the role of the CISO/CSO has never been so difficult. C-suite executives and boards of directors are seeking CISOs/CSOs with not only…
 
As lockdown eases in Pakistan, we see multiple issues arise in the media. We have a discussion on some of the more pressing ones: - The Attack of the Shopping Aunties as lockdown eases (03:45) - Religious Processions in Violation of Lockdown Protocols (26:16) - Ertugrul TV series conquers the hearts and minds of Pakistanis (44:13) Email us at thepo…
 
Open-source software (OSS) is critical to software development by accelerating time to market while reducing operating costs. But like any software, OSS introduces layers of risk—both security and IP. Successfully managing OSS is increasingly tied to automating application security processes. Leveraging automation, organizations can track open-sour…
 
We live in a software-driven world where the market demands feature-rich applications delivered at breakneck speeds. Adoption of third-party open-source software (OSS) is a key enabler. More and more open-source frameworks and libraries are being tapped in applications. Use of open-source code by developers grew 40% this past year alone. But as oft…
 
Contrast Security has experienced tremendous growth over the past year, and company culture remains a critical priority. Alignment of unique business practices such as a hybrid workforce, use of OKRs to align individual metrics with companywide metrics, and a customer-centric focus have helped Contrast to scale its business and transform the AppSec…
 
A little late, but never gone. This week our speakers didn't lose any time delving into the following topics: - Denotification of Dr. Firdaus Ashiq Awan (03:44) - Impact of Covid19 on employment in Pakistan (32:09) - LUMS fee hike (47:44) Email us at thepodcastchowk@gmail.com with your comments, feedback, critique, topic recommendations, etc. You c…
 
There are many options when it comes to the application security (AppSec) market. Many traditional approaches are inefficient, ineffective, and lack the scale demanded by modern DevOps and Agile application development. Code halts, false positives, and even false negatives inflict many organizations, slowing development cycles and drowning DevOps a…
 
Organizations are turning to DevOps and Agile development to address the speed and agility requirements digital transformation demands. As the number of applications increase and their sophistication grows, so are the number of application programming interfaces (APIs) that connect to them. These offer an attractive target to cybercriminals, with e…
 
Solving the risks associated with perimeter defenses that rely on web application firewalls (WAFs) requires a transformational approach to application security (AppSec). In this podcast, the second in a two-part series on application runtime security, Contrast Security’s Head of Product Marketing for Contrast Protect Derek Rogerson and Director of …
 
There is widespread concurrence that the web application firewall (WAF) is insufficient when it comes to protecting web applications. In this podcast interview, the first in a two-part series on application runtime security, Contrast Security’s Head of Product Marketing for Contrast Protect Derek Rogerson discusses how a WAF runs on the perimeter a…
 
We start this episode by touching upon some feedback we received over our last episode, followed by a discussion on - The BJP MP Subramanian Swamy's Vice Interview & Islamophobia (07:50) - The ensuing masjid lockdown confusion & mismanagement in Pakistan (38:00) - Maulana Tariq Jameel's televised statement/dua & apology (01:05:00) Email us at thepo…
 
In this episode, we discuss identity crises and other struggles that plague the immigrant/overseas Pakistanis, particularly the 2nd and 3rd generations, who have moved abroad in search of greener pastures. P.S at 22:34, it's Lut (as), not Luqman (as) Email us at thepodcastchowk@gmail.com with your comments, feedback, critique, topic recommendations…
 
Contagion, the movie released back in 2011 has become the talk of the town, and so we decided to make it a talk of our chowk as well. In this episode, under some light banter, we bring the movie to life, even as we're living through some of it. Email us at thepodcastchowk@gmail.com with your comments, feedback, critique, topic recommendations, etc.…
 
Contrast Labs publishes research findings based on customer vulnerability- and attack-related data in a bimonthly report format. A broader and deeper understanding of trends around vulnerabilities and attacks enables security teams and developers to hone their application security defense strategies and tactics for optimal outcomes. The latest repo…
 
Old-school application security approaches such as static and dynamic testing fail. Dynamic application security testing (DAST) misses many vulnerabilities, leaving organizations at serious risk. Static application security testing (SAST) uses signature-based approaches that pinpoint huge volumes of false positives that incur substantial inefficien…
 
The latest draft update of new requirements from the National Institute of Standards and Technology (NIST) confronts the failures of traditional application security tools that use static and dynamic testing approaches. The new NIST standards include guidance on the adoption of instrumentation in the form of interactive application security testing…
 
Traditional application security approaches use brute line-by-line code scanning that halts operations and development and generates piles of false positives. And they don’t work: Development teams are unable to determine how much of their application attack surface has been assessed for vulnerabilities. An integrated capability within Contrast Ass…
 
In the second episode of the season, the remaining speakers return to Podcast Chowk to discuss the following issues: 1. Feedback from our listeners on Corona (07:06) 2. Wedding experience for one of our speaker's (11:17) 3. Aurat March and feminist movement in Pakistan (16:37) 4. MQM these days (50:25) Email us at thepodcastchowk@gmail.com with you…
 
It's finally here! Our final episode for the season! This time we go out with our biggest lineup yet. Half of them just returned from Pakistan while the others are set to go. So, we get back together one last time this season to discuss the following: 1. The street view in Pakistan from Karachi, Lahore & Islamabad (9:12) 2. The dilemma of Overseas …
 
This week the guys discuss the following issues that made news in Pakistan this week: 1. The series finale for hit drama serial 'Mere Paas Tum Ho' (1:55) 2. Probable censorship of the film 'Zindagi Tamasha' (8:58) 3. Imran Khan's statement on the effects of Hollywood/Bollywood on Pakistani Society (25:10) 4. Discussing a question on abortion/euthan…
 
This week we turned the wheels with some classic rants. We started off by giving shout outs to our listeners who reached out before we dabbled & dived in important issues that often fail to make headlines. 1. Government's role in Family planning drives (9:00) 2. The failure of the Pakistani Education System as compared to British (17:21) 3. The ent…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login