PLAY PODCASTS
From Perimeter to Pipeline: Securing the OWASP Top 10 in the Cloud Era
Episode 323

From Perimeter to Pipeline: Securing the OWASP Top 10 in the Cloud Era

CISO Insights: Voices in Cybersecurity

November 13, 202513m 33s

Audio is streamed directly from the publisher (mcdn.podbean.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

The 2025 OWASP Top 10 reveals a fundamental shift in application security, showing how threats have transformed from simple code flaws like buffer overflows to exploiting the systemic complexity of cloud-native and microservices architectures. This newest list confirms the continued dominance of Broken Access Control (A01) and spotlights the critical surge of Security Misconfiguration (A02) to the number two spot, reflecting that infrastructure has become the primary attack surface. We examine why Software Supply Chain Failures (A03) became the new perimeter—despite limited presence in collected data—and discuss how integrating DevSecOps practices is the only way to meet modern development velocity.

  Sponsors:
https://cloudassess.vibehack.dev
https://vibehack.dev https://airiskassess.com https://compliance.airiskassess.com https://devsecops.vibehack.dev