News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Security Solutions Podcasts
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Welcome to Retirement Solutions – The Podcast, with Tyson Thacker and Ryan Thacker, where precision meets purpose. This B.O.S.S. podcast is committed to “Building the Optimal System of Security.” Learn how you could craft the ideal retirement blueprint that surpasses mere wealth accumulation. Explore the nuances of retirement planning with expert insights, as Tyson and Ryan navigate the ever-evolving landscape of investments, insurance solutions, and financial planning for retirees and pre-r ...
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Listen with Alan Armstrong and Sam Foot as we talk about all things Microsoft Azure! We are both technical consultants working with Azure day in, day out. Alan focuses on Identity and Security automation while Sam is a .NET developer deploying PaaS and SaaS solutions on Azure. Each episode we have a topic we cover and we highlight some key news that we are interested in. No fluff, sales or products here, just two technical people having a light hearted chat.
…
continue reading
Secured is the podcast for software security enthusiasts. Host Cole Cornford sits down with Australia's top software security experts to uncover their unconventional career paths and the challenges they faced along the way. Listen in as they share their insights on the diverse approaches to AppSec, company by company, and how each organisation's security needs are distinct and require personalised solutions. Gain insider access to the masterminds behind some of Australia's most successful So ...
…
continue reading
AI is revolutionizing cybersecurity—both as a weapon for attackers and a shield for defenders. The AI Security Edge dives deep into the evolving cyber battlefield, where AI-driven threats challenge traditional defenses, and cutting-edge AI solutions offer new ways to fight back. Hosted by cybersecurity expert Caroline Wong, this podcast explores real-world case studies, expert insights, and practical strategies for building cyber resilience in an AI-powered world. Whether you’re a security l ...
…
continue reading
Chatham House is an independent policy instute, based in London. We have been a source of independent analysis, trusted dialogue and influential ideas for one hundred years. Today, at the beginning of our second century, we continue to offer solutions to global challenges and actively seek to empower the next generation to change their world.
…
continue reading
Simply ICS Cybhttps://dashboard.transistor.fm/shows/simply-ics-cyber/episodeser podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. ...
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Beginner friendly if listened to in order! For anyone interested in an educational podcast about philosophy where you don't need to be a graduate-level philosopher to understand it. In chronological order, the thinkers and ideas that forged the world we live in are broken down and explained.
…
continue reading
Ken Tumolo and his son Nick Tumolo join you on the Tumolo Financial Radio to offer solutions and strategies for your retirement needs. With decades of financial experience, Ken and Nick offer tax recommendations, Social Security maximization, wealth management, retirement income planning and much more.
…
continue reading
Take a listen to the #LighthouseITPodcast every other week as we discuss both cybersecurity and digital marketing news! It's time to stop dreaming IT. Let's start doing IT. #GetLITS
…
continue reading
Latest internet technology, trends, and solutions
…
continue reading
The IQT Podcast explores and offers insight about rapidly evolving technology trends and their impact and contributions to national security. Subscribe to hear from IQT and other thought leaders across a variety of tech domains, including AI and machine learning, biotechnology, autonomous systems, and more. IQT identifies, adapts, and delivers technology solutions from commercial startups to support the national security missions of the U.S. and its allies. Learn more at www.iqt.org.
…
continue reading
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
…
continue reading
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
…
continue reading
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
The Defence Horizon Journal Podcasts are part of the blog on security and defence-related topics. For more information visit www.tdhj.org
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Gregg MacInnis, Owner and President of Gmac Family Financial, joins you on Countdown to Retirement to offer up innovative financial strategies, solutions, security, and overall financial health. Listen as Gregg talks about his passion to serve his community and break down financial planning for your retirement.
…
continue reading
CloudNext is your go-to source for cloud innovation and leaders' insight. Your way to stay up-to-date with the latest trends and innovations critical to Cloud, Security, and DevOps success. Pick the brains of C-level executives of renowned companies in tech, sharing their stories of innovation and personal growth. Explore their transformative insights as they fuse personal narratives with strategic advice, revealing how to achieve technological solutions for the challenges & pain points in t ...
…
continue reading
As organizations accelerate their adoption of generative AI and intelligent agents to transform how they build and manage solutions, IT professionals and developers are expanding their expertise to design, deploy, and govern AI-powered systems—leveraging Microsoft Copilot Studio and Azure AI Foundry to integrate collaboration tools, enforce enterprise-grade compliance, and support both low-code and pro-code development. With built-in security frameworks, governance controls, and seamless int ...
…
continue reading
How the nation’s fiscal and economic challenges, and possible solutions, impact current and future generations.
…
continue reading
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we’re proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we’re pleased to share the talent and perspective of our staff as it relates to today’s emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
…
continue reading
Defending the Edge is a bi-weekly cyber security podcast bringing you the updates that matter most to you in the cyber security domain. Join the Cyber Threat Intelligence team at DefendEdge as they keep you informed on current cyber threats, hostile actors, solutions, interview experts in the field, and take deep-dives into historical cyber security topics and learn how they impact us today. From threat analysis to best practices and solutions, we are here to help you defend the edge of your ...
…
continue reading

1
The AI Security Edge - RISE and CARE: The Antidotes to "AI All The Things" | Ep 6
21:52
21:52
Play later
Play later
Lists
Like
Liked
21:52It seems like each and every board on the planet is demanding that their executive teams "AI all the things," at least when it comes to high tech. In episode 6 of The AI Security Edge, Caroline Wong and Rock Lambros discuss the governance frameworks that Rock developed to combat the chaos of an approach with no real strategy. RISE: Research, Implem…
…
continue reading

1
#733: Amazon Connect - So Many Cool New Capabilities For You to Use!
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05In this episode of the AWS Podcast, we explore the evolving world of contact centers and Amazon Connect. The discussion covers why contact centers remain critical to both business and public sector operations, and how they're transforming from traditional cost centers into valuable sources of business intelligence. Key highlights include Amazon Con…
…
continue reading
In this episode, Matt Hillary, CISO at Drata, explains how their AI-native trust management platform addresses these challenges by automating evidence collection from integrated systems and reducing manual effort by over 90%. Joining him are Mike Lockhart, CISO at EagleView, and Johna Till Johnson, CEO at Nemertes. We talk about how Drata’s platfor…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
Maximizing AWS Lambda Performance: A Complete Optimization Guide
9:15
9:15
Play later
Play later
Lists
Like
Liked
9:15Maximizing AWS Lambda Performance: A Complete Optimization Guide https://knowledge.businesscompassllc.com/maximizing-aws-lambda-performance-a-complete-optimization-guide/ Struggling with slow AWS Lambda functions? This podcast helps developers and cloud architects turn sluggish serverless applications into high-performing solutions. We’ll walk thro…
…
continue reading

1
Creating EKS-Optimized Amazon Linux 2023 AMIs for Kubernetes Workloads
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18Creating EKS-Optimized Amazon Linux 2023 AMIs for Kubernetes Workloads https://knowledge.businesscompassllc.com/creating-eks-optimized-amazon-linux-2023-amis-for-kubernetes-workloads/ Looking to optimize your Kubernetes environment on AWS? This podcast helps DevOps engineers and cloud architects build custom EKS-optimized Amazon Linux 2023 AMIs for…
…
continue reading

1
AWS Database Services for Every Workload: A Complete Overview
13:26
13:26
Play later
Play later
Lists
Like
Liked
13:26AWS Database Services for Every Workload: A Complete Overview https://knowledge.businesscompassllc.com/aws-database-services-for-every-workload-a-complete-overview/ Looking for the right AWS database service for your project? This podcast helps developers, database administrators, and IT decision-makers navigate AWS’s extensive database offerings. …
…
continue reading

1
AWS Model Deployment Best Practices for Scalable AI Solutions
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10AWS Model Deployment Best Practices for Scalable AI Solutions https://knowledge.businesscompassllc.com/aws-model-deployment-best-practices-for-scalable-ai-solutions/ Deploying machine learning models on AWS requires careful planning to ensure performance at scale. This podcast helps data scientists, ML engineers, and DevOps teams implement AWS best…
…
continue reading

1
Data Analysis and Story Telling Made Easy: S3, AWS Glue, Athena, Quicksight and QuickSight Q
32:34
32:34
Play later
Play later
Lists
Like
Liked
32:34Data Analysis and Story Telling Made Easy: S3, AWS Glue, Athena, Quicksight and QuickSight Q https://knowledge.businesscompassllc.com/data-analysis-and-story-telling-made-easy-s3-aws-glue-athena-quicksight-and-quicksight-q/ Looking to unlock insights from your data without complex infrastructure? AWS offers a complete toolkit for data analysts, bus…
…
continue reading

1
AWS EC2 Disaster Recovery: Restoring from an AMI Backup
6:15
6:15
Play later
Play later
Lists
Like
Liked
6:15AWS EC2 Disaster Recovery: Restoring from an AMI Backup https://knowledge.businesscompassllc.com/aws-ec2-disaster-recovery-restoring-from-an-ami-backup/ When your AWS EC2 instances crash, knowing how to restore from AMI backups can save your business from extended downtime. This podcast helps IT administrators and DevOps engineers quickly recover E…
…
continue reading

1
DynamoDB Pagination Explained: How to Build Scalable Data Retrieval in AWS
4:32
4:32
Play later
Play later
Lists
Like
Liked
4:32DynamoDB Pagination Explained: How to Build Scalable Data Retrieval in AWS https://knowledge.businesscompassllc.com/dynamodb-pagination-explained-how-to-build-scalable-data-retrieval-in-aws/ Need to retrieve large datasets from DynamoDB without crashing your application or breaking the bank? This podcast is for AWS developers and solution architect…
…
continue reading

1
GreptimeDB Serverless: A Game-Changer for IoT, Monitoring, and Analytics
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36GreptimeDB Serverless: A Game-Changer for IoT, Monitoring, and Analytics https://knowledge.businesscompassllc.com/greptimedb-serverless-a-game-changer-for-iot-monitoring-and-analytics/ GreptimeDB Serverless helps developers, data engineers, and IT professionals manage time-series data without infrastructure headaches. This new database solution spe…
…
continue reading

1
AWS Architecture Essentials: What Every Cloud Developer Needs to Know
10:14
10:14
Play later
Play later
Lists
Like
Liked
10:14AWS Architecture Essentials: What Every Cloud Developer Needs to Know https://knowledge.businesscompassllc.com/aws-architecture-essentials-what-every-cloud-developer-needs-to-know/ New to AWS or looking to level up your cloud skills? This podcast breaks down the essential AWS architecture concepts that cloud developers need to master. We’ll explore…
…
continue reading

1
AWS Batch Made Simple: Run, Scale, and Optimize Your Batch Jobs in the Cloud
6:51
6:51
Play later
Play later
Lists
Like
Liked
6:51AWS Batch Made Simple: Run, Scale, and Optimize Your Batch Jobs in the Cloud https://knowledge.businesscompassllc.com/aws-batch-made-simple-run-scale-and-optimize-your-batch-jobs-in-the-cloud/ Need to run complex workloads without managing infrastructure? AWS Batch helps developers, data scientists, and IT teams automate and scale compute-intensive…
…
continue reading

1
Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor
1:05:39
1:05:39
Play later
Play later
Lists
Like
Liked
1:05:39Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor ~ Watch Now ~ In this episode of DailyCyber, I’m joined by Craig M. Taylor, Co-Founder & CISO at CyberHoot, who has spent nearly three decades building and leading security programs for organizations of all sizes. Craig believes cybersecurity awareness should be short, engaging, …
…
continue reading
Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://programm.froscon.org/2025/events/3460.htmlBy Hinrikus Wolf, Lars Beckers
…
continue reading

1
Jugend hackt Zürich, Projektpräsentationen vom 15-17. August 2025 (jhch)
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27Präsentation der Projekte anlässich des «Jugend hackt» Events vom 15 bis 17 August 2025 im Hackerspace «Bitwäscherei» in Zürich.Beim Projet Pet2Print ging es darum, ein eigenes Filament aus PETFlaschen, die in den Ozeanen als Abfall herumschwimmen, zuproduzieren. Dafür haben Florin, Karl, Emil und Lev ein eigenes Gerätgebastelt, mit Kugellagern und…
…
continue reading

1
Scale Your Monitoring Solution With the VictoriaMetrics Ecosystem (froscon2025)
55:44
55:44
Play later
Play later
Lists
Like
Liked
55:44When it comes down to scaling time series monitoring solutions things can get messy. That’s one of the reasons why VictoriaMetrics, a Silver member of the Cloud Native Computing Foundation (CNCF), started its journey some years ago. It is a simple, reliable and efficient set of Observability Solutions that's been adopted by many organizations. It's…
…
continue reading

1
Vox Pupuli - Hinter jedem erfolgreichen Open Source Project steht eine lebhafte Community (froscon2025)
49:01
49:01
Play later
Play later
Lists
Like
Liked
49:01Was passiert wenn kritische Open Source Projekte nicht mehr gepflegt werden?Im November 2024 hat Perforce Inc mitgeteilt, ab sofort keine Open Source Pakete für Puppet mehr bereitzustellen.Von einem Tag auf den anderen wurden Git Repositories nicht mehr geupdated, Pull Requests wurden ignoriert.Vox Pupuli ist eine etablierte Community.In dem Vortra…
…
continue reading

1
A Practical Introduction to using sq, Sequoia PGP's CLI (froscon2025)
52:55
52:55
Play later
Play later
Lists
Like
Liked
52:55sq is Sequoia PGP’s primary command line tool. In this talk, I'll briefly present sq's design philosophy and architecture, and then I'll demonstrate several different workflows.sq is Sequoia PGP’s primary command line tool.In this talk, I’ll present sq. I’ll start by discussing sq’s design philosophy. In particular, I’ll explain how sq aims to firs…
…
continue reading

1
Nachnutzbarkeit von Forschungsskripten (froscon2025)
39:54
39:54
Play later
Play later
Lists
Like
Liked
39:54Welche Art von Code wird im Forschungsprozess produziert und wie können wir ihn für spätere Nutzung aufbereiten? Wir sprechen darüber, wie wir Forschungsskripte langzeitarchivieren wollen, was Nachnutzbarkeit für Forschungscode aus der Psychologie bedeutet und geben einen Einblick in die Praxis.Mit der Open Science Bewegung halten auch neue Arten v…
…
continue reading

1
Taking a Fresh Look at the Fediverse (froscon2025)
57:39
57:39
Play later
Play later
Lists
Like
Liked
57:39On the search for open and decentralized alternatives to commercial social media platforms many have given Mastodon and/or the Fediverse a try. But if you never made the jump or did not stay around for whatever reason you might be interested in what exciting new developments are happening in and around the Fediverse.In the past years changes in est…
…
continue reading

1
Nix auf einem Server ist ganz schön viel! (froscon2025)
34:22
34:22
Play later
Play later
Lists
Like
Liked
34:22In dem Vortrag soll ein Überblick über Nix und NixOS mit Fokus auf Deployments von NixOS-Containern auf einem Server gegeben werden.Nix und NixOS sind extrem mächtige - und komplexe - Systeme. Gerade Container-Verwaltung und Deployment mit Nix kann sehr viele Vorteile haben. Dieser Vortrag hat das Ziel anschaulich einige Startpunkte für alle zu geb…
…
continue reading

1
Sind Softwareentwickler:innen die neuen Weber:innen? (froscon2025)
58:46
58:46
Play later
Play later
Lists
Like
Liked
58:46Vor noch vor 12 Monaten war es schwer, Softwareentwickler auf dem Markt zu gewinnen. Ein jahrzehntelanger Trend steigender Gehälter in einem wachsenden Markt wiegte alle in Sicherheit, dass dies so bleiben würde … Heute sind Softwareentwickler:innen leichter verfügbar als Handwerker:innen, die Preise sinken, Dienstleister kämpfen um ihre Existenz. …
…
continue reading

1
Open-Source-Software für Maschinenbau-Startups und KMUs (froscon2025)
59:40
59:40
Play later
Play later
Lists
Like
Liked
59:40Deutschland ist weltweit für seinen Maschinenbau bekannt. In letzter Zeit befindet sich dieser allerdings in einer schweren Krise. Um den Deutschen Maschinenbau wieder auf Vordermann zu bringen und erneit zur Weltspitze zu machen, wurde ein Open-Source-Toolkit zusammengestellt und validiert, mit welchem Maschinenbauer ihr Startup gründen können. Zu…
…
continue reading
In 2003, we created a security research project, that led to a development of several routers, designed and manufactured in EU. I'll talk a little bit about what we do and how, but I would like to speak more about our original goal - the security research project and what we noticed.Licensed to the public under http://creativecommons.org/licenses/b…
…
continue reading

1
Auf dem Weg zum universellen Kommunikations-Client (froscon2025)
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47Telefon, Video-Konferenz und Chat: unterschiedliche Medien brauch(t)en verschiedene Clients.Als simples, gut wartbares und desktopintegriertes Softphone gestartet, möchte das OSS-Projekt GOnnect die Bereiche SIP-Telefonie, Videokonferenzen und Chat seamless in einem Client vereinen. In diesem Vortrag kläre ich die Gründe, warum ein neues Softphone …
…
continue reading

1
Die Demokratisierung digitaler Karten (froscon2025)
26:18
26:18
Play later
Play later
Lists
Like
Liked
26:18Digitales Mapping wurde lange Zeit von kommerziellen Anbietern dominiert, die durch Kosten, Komplexität und Bedenken hinsichtlich des Datenschutzes Barrieren geschaffen haben. In diesem Vortrag wird Protomaps vorgestellt, ein Open-Source-Projekt, das die Art und Weise, wie Webkarten bereitgestellt und genutzt werden, neu definiert.Durch die Verwend…
…
continue reading
In diesem Vortrag möchte ich insbesondere auch darauf eingehen, wie man seine Stärken herausfinden kann und welche Methoden helfen, den richtigen Job (auch als Führungskraft mit "nur" technischem Hintergrund) zu finden.In diesem Vortrag möchte ich meinen unerwarteten Weg eines technischen Experten zur Führungskraft beschreiben. Trotz anfänglicher Z…
…
continue reading
AI Cockpit is a federal German research project, that explores possibilities to keep humans in control of complex AI systems. One of the results is an open source software system, that implements APIs and a user interface to enforce human oversight according to §14 AI Act.In this talk development team wants to introduce AI Cockpit software. Talk is…
…
continue reading

1
Large-Scale Logging Made Easy (froscon2025)
59:46
59:46
Play later
Play later
Lists
Like
Liked
59:46In this session, Aliaksandr presents his innovative approach to log management after studying the limitations of existing logging systems.Logging at scale is a common source of infrastructure expenses and frustration. While logging is something any organization does, there is still no silver bullet or just a simple and scalable solution without tra…
…
continue reading

1
VersaTiles - finally maps for everyone (froscon2025)
38:34
38:34
Play later
Play later
Lists
Like
Liked
38:34VersaTiles is a powerful, free and open web map stack that runs on every major platform. Now, you can run your own map server in seconds!VersaTiles combines the best features of existing open-source projects into one modular system. We also offer free vector tiles based on OpenStreetMap and raster tiles featuring satellite and aerial imagery. Versa…
…
continue reading

1
Quelltext-Klage als Verbraucher (froscon2025)
50:48
50:48
Play later
Play later
Lists
Like
Liked
50:48Copyleft-Lizenzen, wie die GPL, schreiben vor, dass Verbraucher neben der Binary auch den vollständigen Quelltext erhalten. Wie kürzliche Gerichtsverfahren gezeigt haben, können auch Verbraucher auf die Bereitstellung dieses Quelltextes klagen. Daneben können auch Verbraucherverbände klagen; diese können gleich für alle Geräte eines Herstellers kla…
…
continue reading

1
Develop Secure Software - The DevGuard Project (froscon2025)
59:23
59:23
Play later
Play later
Lists
Like
Liked
59:23Mit DevGuard stellen wir ein Open-Source-Projekt vor, das Sicherheit für Entwickler:innen zugänglich, pragmatisch und automatisierbar macht. Angesichts zunehmender Angriffe auf Software-Supply-Chains und wachsender regulatorischer Anforderungen (z. B. CRA) adressiert DevGuard zentrale Herausforderungen der sicheren Softwareentwicklung: komplexe Too…
…
continue reading

1
Delegate authentication and a lot more to Keycloak with OpenID Connect (froscon2025)
55:42
55:42
Play later
Play later
Lists
Like
Liked
55:42Authenticating users can start simple with a username and a password for each user. But you will also need to handle forgotten passwords and user registration. You might also want to validate email addresses, add second factors and have users update their profile information as needed.A single-sign-on system like Keycloak can handle all that for yo…
…
continue reading

1
AI-First Softwareentwicklung - aber Open Source (froscon2025)
1:03:13
1:03:13
Play later
Play later
Lists
Like
Liked
1:03:13Entwickler*innen können von KI-Tools profitieren – aber wie klappt das jenseits von Big Tech? Der Vortrag gibt eine Übersicht zu den spannendsten freien KI-Lösungen und deren Einsatz in der Softwareentwicklung.KI hat die Entwicklungspraxis bereits verändert. KI kann Code generieren und wird auch produktiv in der Entwicklung eingesetzt. Doch meist s…
…
continue reading

1
Anarchist’s Guide to Confidential Computing (froscon2025)
44:55
44:55
Play later
Play later
Lists
Like
Liked
44:55„Confidential Computing“ bezeichnet eine Reihe von hardwaregestützten Technologien, die angeblich vertrauliche Datenverarbeitung in der Cloud ermöglichen. In diesem Vortrag zeige ich, wie diese Mechanismen funktionieren, welchen Versprechen man trauen kann – und wo ihre Grenzen liegen.Confidential Computing verspricht Privatsphäre durch Hardware – …
…
continue reading
Das ToyCollect Projekt ist ein Open-Source Software und (hauptsächlich) Open-Source Hardware Projekt mit einem Fokus auf kleine indoor Roboter mit 3D-gedrucktem modularen Gehäuse.Wir sind momentan dabei, die nächste Generation mit Stereo-Kamera, Bumper-Sensoren, Tiefenkamera, Lagesensoren und "Unter-der-Couch-Detektoren" fertigzustellen - siehe Log…
…
continue reading

1
Decentralising Freedom: Open Source for Sovereignty (froscon2025)
53:19
53:19
Play later
Play later
Lists
Like
Liked
53:19Open source is more than code: it's a movement that empowers communities to build resilient, sovereign digital infrastructure. In an era of geopolitical realignment, centralised, corporate-controlled platforms threaten our social, political, and economic freedoms. This keynote examines how open source principles and the Fediverse (using Mastodon as…
…
continue reading

1
Festplattenverschlüsselung mithilfe vom TPM 2.0 (froscon2025)
55:24
55:24
Play later
Play later
Lists
Like
Liked
55:24Der Chip des Trusted Plattform Modules hat einige schöne Fähigkeiten, zum Beispiel kann er Schlüssel sicher verwalten.Dies kann man sich beim Thema Festplattenverschlüsselung zunutze machen.- Doch wie funktioniert das genau? Was sind die mysteriösen PCRs?- Worauf muss bei der Umsetzung geachet werden?- Wie unterscheiden sich hier die Distributionen…
…
continue reading

1
Es Es Ka Em: Warum gute Leute nicht bei euch arbeiten wollen (froscon2025)
1:00:03
1:00:03
Play later
Play later
Lists
Like
Liked
1:00:03"Fachkräftemangel!" "Wir finden keine guten Leute!" "Wir würden ja total gerne mehr Frauen einstellen, es bewerben sich nur keine!" — wenn in deinem Unternehmen solche Sätze rumfliegen, dann macht es gewaltig was falsch.Seit mindestens 30 Jahren macht die Open Source Community — und Unternehmen, die sich an ihr orientieren — vor, wie man sich aufst…
…
continue reading
Free Libre Open Source Software (FLOSS) hat sich mittlerweile einen Stammplatz im deutschen Hochschulwesen erobert und ist ist als fester Ausbildungsbestandteil aus den Modulplänen nicht mehr wegzudenken. So sollte man/frau/div jedenfalls meinen.Leider sieht die Realität anders aus. Viel zu oft werden die Schwerpunkte immer noch auf proprietäre Sof…
…
continue reading

1
The Small Device C Compiler for 8-bit firmware development (froscon2025)
57:24
57:24
Play later
Play later
Lists
Like
Liked
57:24The Small Device C Compiler (SDCC) is a free C compiler targeting 8-bit architectures, including MCS-51, STM8, Padauk, Rabbit, S08. It supports standard C up to current ISO C23. We discuss the current state of SDCC, its use in writing firmware, and plans for the near future.Many devices include small 8-bit processors using architectures not or not …
…
continue reading

1
Pflichtupload Staats-Cloud: E-Rechnung Stufen 2, 3 und 4 (froscon2025)
53:20
53:20
Play later
Play later
Lists
Like
Liked
53:20Die europäische "Vat In the Digital Age" (ViDA) Richtlinie, Anlass für das Wachstumschancengesetz (WCG), sieht vor, dass alle B2B-Rechnungen, grenzüberschreitend oder innerdeutsch (WCG), in "Echtzeit" (10 Tage) in ein zentrales staatliches Umsatzsteuer-Meldesystem hochgeladen werden. Dieser Vortrag beschreibt die erfolgte und drei kommenden Phasen …
…
continue reading

1
Energiemanagement im Matter-Standard (froscon2025)
1:00:19
1:00:19
Play later
Play later
Lists
Like
Liked
1:00:19Der Matter-Standard, eine Initiative zur Vereinheitlichung der Smart-Home-Kommunikation, erweitert seine Funktionen um ein integriertes Energie-Management. Dieser Vortrag beleuchtet, wie Matter die Energieeffizienz in vernetzten Haushalten durch Standardisierung und Interoperabilität verbessert.Vortrag: Energie-Management im Matter-StandardDer Matt…
…
continue reading