Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Open Source Security Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works. There’s a lot of good work happening that doesn’t get attention because there’s no marketing department behind it, they don’t have a developer relations team posting on LinkedIn every two hours. Let’s focus on those people and teams then learn what they do and how they do it. The goal is ...
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
The Dynamist, a podcast by the Foundation for American Innovation, brings together the most important thinkers and doers to discuss the future of technology, governance, and innovation. The Dynamist is hosted by Evan Swarztrauber, former Policy Advisor at the Federal Communications Commission. Subscribe now!
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Allison Sheridan's technology geek podcast with an EVER so slight Apple bias
…
continue reading
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
…
continue reading
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading

1
The NDS Show - An Intelligence Community Podcast covering Geospatial Intelligence, Open Source Intelligence OSINT, Human Intelligence HUMINT, Military & National Security
The NDS Show
Unlock a world of valuable insights and thought-provoking discussions related to the Special Forces, Military, and Intelligence Community (CIA, NSA, NGA, FBI, Military Intelligence). Things we discuss: GEOINT, OSINT, HUMINT, SIGINT, SOF, Special Forces, Military, Veterans Issues, Army, Navy, Marines, Air Force, Entrepreneurship, Geopolitics, News, Politics, Technology, Artificial Intelligence, Augmented Reality, Cloud Computing, Data Analytics, Government Contracting, Defense Contracting, Bu ...
…
continue reading
The New Stack Podcast is all about the developers, software engineers and operations people who build at-scale architectures that change the way we develop and deploy software. For more content from The New Stack, subscribe on YouTube at: https://www.youtube.com/c/TheNewStack
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Calling all .NET developers! Dive into the heart of modern .NET technology with us. We are the go-to podcast for all .NET developers worldwide; providing an audio toolbox for developers who use modern .NET. Our show, previously known as The .NET Core Podcast, is all about keeping you up-to-date and empowered in this ever-evolving field. Tune in for engaging interviews with industry leaders, as we discuss the topics every .NET developer should be well-versed in. From cross-platform wonders to ...
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
Signal Jam is a podcast about regaining and maintaining privacy in the face of pervasive corporate and government surveillance. Co-hosts, Jay and Michael, discuss practical steps that anyone can take toward achieving that outcome— no matter how 'tech-savvy' they may be.
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
The Open at Intel podcast is about all things open source, from software to security to artificial intelligence to Linux and beyond. Each episode brings you fresh perspectives with sophisticated, leading-edge, free-ranging conversations from some of the best minds in the open source community.
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Marcel Gagne and Evan Leibovitch riff on Linux, Open Source, computers, technology, privacy, the digital economy, movies, video games, the Internet, security, breakfast cereal, and anything else related to the modern, open world.
…
continue reading
Welcome to Opt Out, where I sit down with passionate people to learn why privacy matters to them, the tools and techniques they’ve found and leveraged, and where we encourage and inspire others towards personal privacy and data-sovereignty.
…
continue reading
Welcome to Open Comments hosted by The Open Group*, where we’ll discuss things openly with our guests from a variety of backgrounds and from different walks of life. Through this podcast, we hope to give you an inside look into a variety of topics with an equal mix of humor and candor. In this series so far, we have touched on the following topics: Healthcare, HR, Diversity + Access to Technology, Cybersecurity, and lots more. We hope you enjoy our show and look forward to bringing more topi ...
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
The FINOS Open Source in Finance Podcast celebrates open source projects and interesting topics at the cross section of financial services and open source. So far, our industry experts have discussed practical applications of and their real-world experiences with a range of open source projects including desktop interoperability, low code platforms, synthetic data, and data modeling. They’ve also discussed best practices for inner source, common myths about open source and why commercial com ...
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
Open source is different. How different would the world be if we used open source concepts more widely? This micro podcast looks at the open source philosophy and how open source can change the world. Each episode is just over two minutes long. Watch video versions on YouTube and Twitter.
…
continue reading
discussions on topics connected with software development; privacy, security, management, tools, techniques, skills, training, business, soft skills, health
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
Revenera experts are joined by industry leaders for discussions on all the latest talking points in the world of software.
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
crates.io trusted publishing with Tobias Bieniek
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39In this episode we discuss crates.io trusted publishing with Tobias Bieniek. We cover the steps crates.io is taking to enhance supply chain security through trusted publishing, a method that leverages short-lived tokens and GitHub actions to safeguard against unauthorized access. Tobias shares insights into the challenges of managing a large-scale …
…
continue reading

1
Security Onion - From Classroom To SOC, Open Source and Education - Matt Gracie
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32In this episode of the Security Repo Podcast, we’re joined by Matt Gracie, a seasoned blue team expert and senior engineer at Security Onion Solutions. Matt dives deep into the architecture and practical deployment of Security Onion, a powerful open-source enterprise security monitoring tool. He also shares insights from his role as a cybersecurity…
…
continue reading

1
Open Source Security: OSTIF's 10-Year Journey of Collaborative Audits
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30In this episode of "What's in the SOSS," Derek Zimmer and Amir Montezari from the Open Source Technology Improvement Fund (OSTIF) discuss their decade-long mission of providing security resources to open source projects. They focus on collaborative, maintainer-centric security audits that help projects improve their security posture through expert …
…
continue reading

1
SAP NetWeaver Under Siege: New Exploit Chains Threaten Global Enterprises
44:53
44:53
Play later
Play later
Lists
Like
Liked
44:53SAP NetWeaver, one of the world’s most critical enterprise platforms, is under active attack from both ransomware groups and state-backed hackers. A newly released exploit combines two devastating vulnerabilities—CVE-2025-31324 and CVE-2025-42999—to bypass authentication and execute malicious code with full administrative privileges. With CVSS scor…
…
continue reading

1
Microsoft's Control Over Open Source Grows
30:48
30:48
Play later
Play later
Lists
Like
Liked
30:48Episode 237: Microsoft will integrate GitHub more deeply as GitHub's CEO resigns, data brokers were caught hiding their opt-out pages, important updates from Debian, the Pinephone Pro, & Plex, and more. Welcome to the Surveillance Report - featuring Techlore & The New Oil to keep you updated on the newest security & privacy news. 🔎 EasyOptOuts is t…
…
continue reading

1
Ransomware Gangs Deploy Kernel-Level EDR Killers to Evade Detection
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Ransomware gangs are no longer just encrypting files and demanding payment—they are actively targeting the very defenses meant to stop them. Recent reports reveal a dramatic surge in the use of EDR killer tools, specialized malware designed to disable Endpoint Detection and Response (EDR) and antivirus systems at the kernel level. By silencing thes…
…
continue reading

1
3391: What Wikidata Reveals About the Good Side of the Internet
19:09
19:09
Play later
Play later
Lists
Like
Liked
19:09When most people think of Wikipedia, they picture an endless scroll of human-readable pages. But there’s another side to this ecosystem, one designed not just for people but also for machines. It’s called Wikidata, and if you haven’t heard of it, that’s exactly why this conversation matters. In this episode of Tech Talks Daily, I’m joined by Lydia …
…
continue reading

1
Chinese APTs Target Taiwan: UAT-7237’s SoundBill Loader and Gelsemium’s FireWood Backdoor
25:50
25:50
Play later
Play later
Lists
Like
Liked
25:50Taiwan continues to face an unprecedented wave of cyberattacks, with new intelligence exposing two distinct but sophisticated campaigns linked to Chinese threat actors. Together, they underscore Beijing’s increasingly aggressive cyber posture against Taiwan’s digital and critical infrastructure. The first campaign, attributed to UAT-7237, a subgrou…
…
continue reading
HR software giant Workday discloses a data breach. Researchers uncover a zero-day in Elastic’s EDR software. Ghost-tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to exploit stolen payment card data. Germany may be on a path to ban ad blockers. A security researcher documents multiple serious flaws in McDonald’s sy…
…
continue reading

1
Colt Cyberattack: Multi-Day Outages After WarLock Ransomware Exploited SharePoint Zero-Day
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58Colt Technology Services, a major UK-based telecommunications provider with operations in over 40 countries, has confirmed that the WarLock ransomware group is behind the cyberattack that struck its systems on August 12, 2025. The attack caused multi-day outages across Colt’s hosting, porting, Voice API, and customer support services, while sparing…
…
continue reading

1
Workday Breach Tied to Third-Party CRM Hack in ShinyHunters Campaign
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43Workday, one of the world’s leading providers of human resources and financial management software, has confirmed a data breach that exposed business contact information through a third-party CRM platform, not its core HR or financial systems. Discovered on August 6, 2025, the breach revealed names, email addresses, and phone numbers—data that, whi…
…
continue reading

1
DOJ Brings Down Zeppelin Ransomware Operator, Seizes Millions in Crypto
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35The U.S. Department of Justice has successfully dismantled a major operator behind the notorious Zeppelin ransomware, charging Russian national Ianis Aleksandrovich Antropenko with conspiracy to commit computer fraud, money laundering, and extortion. Antropenko, known online as “china.helper,” allegedly deployed Zeppelin ransomware in targeted camp…
…
continue reading

1
3390: How Veritone Is Making AI Work for Media, Government, and Beyond
33:49
33:49
Play later
Play later
Lists
Like
Liked
33:49What does it take to make AI actually work at enterprise scale? In this episode of Tech Talks Daily, I’m joined by Ryan Steelberg, CEO of Veritone, to unpack the very real challenges and opportunities that come with bringing artificial intelligence into complex industries like media, law enforcement, and government. Ryan has been building AI soluti…
…
continue reading

1
#733: Amazon Connect - So Many Cool New Capabilities For You to Use!
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05In this episode of the AWS Podcast, we explore the evolving world of contact centers and Amazon Connect. The discussion covers why contact centers remain critical to both business and public sector operations, and how they're transforming from traditional cost centers into valuable sources of business intelligence. Key highlights include Amazon Con…
…
continue reading

1
111. The Test Pyramid Is Dead: A New Era of Software Testing - with Bram Albers
45:55
45:55
Play later
Play later
Lists
Like
Liked
45:55In this Betatalks episode, Rick and Oscar talk with Bram Albers, Principal Quality Assurance at Betabit, about how software testing has evolved from an afterthought to a core part of development. They discuss how automation and AI improve efficiency but risk reducing critical thinking, making tester instincts and skepticism essential, and Bram warn…
…
continue reading

1
NC #1058 Apple Watch Cellular for a Child, PETLIBRO One RFID Feeder, Security Bits
1:17:59
1:17:59
Play later
Play later
Lists
Like
Liked
1:17:59Apple Watch Cellular for a Child - Not as Easy as You Would Hope What's Better Than an Automated Cat Feeder from PETLIBRO? Support the Show Security Bits — 17 August 2025 Transcript of NC_2025_08_17 Join the Conversation: [email protected] podfeet.com/slack Support the Show: Patreon Donation Apple Pay or Credit Card one-time donation PayPal one-t…
…
continue reading

1
3389: Plaza Finance and the Rise of Programmable Derivatives
27:40
27:40
Play later
Play later
Lists
Like
Liked
27:40Is the future of finance programmable? In this episode of Tech Talks Daily, I’m joined by Ryan Galvankar, founder of Plaza Finance, to explore how programmable derivatives and on-chain bonds are reshaping the way we think about risk, leverage, and asset management in crypto. Plaza Finance isn’t just another DeFi protocol. Since launching its core s…
…
continue reading
Licensed to the public under http://creativecommons.org/licenses/by/4.0about this event: https://programm.froscon.org/2025/events/3460.htmlBy Hinrikus Wolf, Lars Beckers
…
continue reading

1
Jugend hackt Zürich, Projektpräsentationen vom 15-17. August 2025 (jhch)
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27Präsentation der Projekte anlässich des «Jugend hackt» Events vom 15 bis 17 August 2025 im Hackerspace «Bitwäscherei» in Zürich.Beim Projet Pet2Print ging es darum, ein eigenes Filament aus PETFlaschen, die in den Ozeanen als Abfall herumschwimmen, zuproduzieren. Dafür haben Florin, Karl, Emil und Lev ein eigenes Gerätgebastelt, mit Kugellagern und…
…
continue reading

1
3388: The Case for Digital IDs in Recruitment, Renting, and Beyond
48:20
48:20
Play later
Play later
Lists
Like
Liked
48:20What if proving your right to work, rent, or even open a bank account didn’t require digging out your passport or waiting weeks for manual verification? In this episode of Tech Talks Daily, I’m joined by Hamraj Gulamali, Head of Legal and Compliance at Zinc, to talk about how digital identities are changing the way we think about employment, data o…
…
continue reading

1
Sind Softwareentwickler:innen die neuen Weber:innen? (froscon2025)
58:46
58:46
Play later
Play later
Lists
Like
Liked
58:46Vor noch vor 12 Monaten war es schwer, Softwareentwickler auf dem Markt zu gewinnen. Ein jahrzehntelanger Trend steigender Gehälter in einem wachsenden Markt wiegte alle in Sicherheit, dass dies so bleiben würde … Heute sind Softwareentwickler:innen leichter verfügbar als Handwerker:innen, die Preise sinken, Dienstleister kämpfen um ihre Existenz. …
…
continue reading

1
Vox Pupuli - Hinter jedem erfolgreichen Open Source Project steht eine lebhafte Community (froscon2025)
49:01
49:01
Play later
Play later
Lists
Like
Liked
49:01Was passiert wenn kritische Open Source Projekte nicht mehr gepflegt werden?Im November 2024 hat Perforce Inc mitgeteilt, ab sofort keine Open Source Pakete für Puppet mehr bereitzustellen.Von einem Tag auf den anderen wurden Git Repositories nicht mehr geupdated, Pull Requests wurden ignoriert.Vox Pupuli ist eine etablierte Community.In dem Vortra…
…
continue reading

1
Nix auf einem Server ist ganz schön viel! (froscon2025)
34:22
34:22
Play later
Play later
Lists
Like
Liked
34:22In dem Vortrag soll ein Überblick über Nix und NixOS mit Fokus auf Deployments von NixOS-Containern auf einem Server gegeben werden.Nix und NixOS sind extrem mächtige - und komplexe - Systeme. Gerade Container-Verwaltung und Deployment mit Nix kann sehr viele Vorteile haben. Dieser Vortrag hat das Ziel anschaulich einige Startpunkte für alle zu geb…
…
continue reading

1
Nachnutzbarkeit von Forschungsskripten (froscon2025)
39:54
39:54
Play later
Play later
Lists
Like
Liked
39:54Welche Art von Code wird im Forschungsprozess produziert und wie können wir ihn für spätere Nutzung aufbereiten? Wir sprechen darüber, wie wir Forschungsskripte langzeitarchivieren wollen, was Nachnutzbarkeit für Forschungscode aus der Psychologie bedeutet und geben einen Einblick in die Praxis.Mit der Open Science Bewegung halten auch neue Arten v…
…
continue reading

1
A Practical Introduction to using sq, Sequoia PGP's CLI (froscon2025)
52:55
52:55
Play later
Play later
Lists
Like
Liked
52:55sq is Sequoia PGP’s primary command line tool. In this talk, I'll briefly present sq's design philosophy and architecture, and then I'll demonstrate several different workflows.sq is Sequoia PGP’s primary command line tool.In this talk, I’ll present sq. I’ll start by discussing sq’s design philosophy. In particular, I’ll explain how sq aims to firs…
…
continue reading

1
Scale Your Monitoring Solution With the VictoriaMetrics Ecosystem (froscon2025)
55:44
55:44
Play later
Play later
Lists
Like
Liked
55:44When it comes down to scaling time series monitoring solutions things can get messy. That’s one of the reasons why VictoriaMetrics, a Silver member of the Cloud Native Computing Foundation (CNCF), started its journey some years ago. It is a simple, reliable and efficient set of Observability Solutions that's been adopted by many organizations. It's…
…
continue reading

1
Taking a Fresh Look at the Fediverse (froscon2025)
57:39
57:39
Play later
Play later
Lists
Like
Liked
57:39On the search for open and decentralized alternatives to commercial social media platforms many have given Mastodon and/or the Fediverse a try. But if you never made the jump or did not stay around for whatever reason you might be interested in what exciting new developments are happening in and around the Fediverse.In the past years changes in est…
…
continue reading

1
Die Demokratisierung digitaler Karten (froscon2025)
26:18
26:18
Play later
Play later
Lists
Like
Liked
26:18Digitales Mapping wurde lange Zeit von kommerziellen Anbietern dominiert, die durch Kosten, Komplexität und Bedenken hinsichtlich des Datenschutzes Barrieren geschaffen haben. In diesem Vortrag wird Protomaps vorgestellt, ein Open-Source-Projekt, das die Art und Weise, wie Webkarten bereitgestellt und genutzt werden, neu definiert.Durch die Verwend…
…
continue reading
In diesem Vortrag möchte ich insbesondere auch darauf eingehen, wie man seine Stärken herausfinden kann und welche Methoden helfen, den richtigen Job (auch als Führungskraft mit "nur" technischem Hintergrund) zu finden.In diesem Vortrag möchte ich meinen unerwarteten Weg eines technischen Experten zur Führungskraft beschreiben. Trotz anfänglicher Z…
…
continue reading
In 2003, we created a security research project, that led to a development of several routers, designed and manufactured in EU. I'll talk a little bit about what we do and how, but I would like to speak more about our original goal - the security research project and what we noticed.Licensed to the public under http://creativecommons.org/licenses/b…
…
continue reading

1
Large-Scale Logging Made Easy (froscon2025)
59:46
59:46
Play later
Play later
Lists
Like
Liked
59:46In this session, Aliaksandr presents his innovative approach to log management after studying the limitations of existing logging systems.Logging at scale is a common source of infrastructure expenses and frustration. While logging is something any organization does, there is still no silver bullet or just a simple and scalable solution without tra…
…
continue reading

1
Auf dem Weg zum universellen Kommunikations-Client (froscon2025)
29:47
29:47
Play later
Play later
Lists
Like
Liked
29:47Telefon, Video-Konferenz und Chat: unterschiedliche Medien brauch(t)en verschiedene Clients.Als simples, gut wartbares und desktopintegriertes Softphone gestartet, möchte das OSS-Projekt GOnnect die Bereiche SIP-Telefonie, Videokonferenzen und Chat seamless in einem Client vereinen. In diesem Vortrag kläre ich die Gründe, warum ein neues Softphone …
…
continue reading
AI Cockpit is a federal German research project, that explores possibilities to keep humans in control of complex AI systems. One of the results is an open source software system, that implements APIs and a user interface to enforce human oversight according to §14 AI Act.In this talk development team wants to introduce AI Cockpit software. Talk is…
…
continue reading

1
Open-Source-Software für Maschinenbau-Startups und KMUs (froscon2025)
59:40
59:40
Play later
Play later
Lists
Like
Liked
59:40Deutschland ist weltweit für seinen Maschinenbau bekannt. In letzter Zeit befindet sich dieser allerdings in einer schweren Krise. Um den Deutschen Maschinenbau wieder auf Vordermann zu bringen und erneit zur Weltspitze zu machen, wurde ein Open-Source-Toolkit zusammengestellt und validiert, mit welchem Maschinenbauer ihr Startup gründen können. Zu…
…
continue reading
Das ToyCollect Projekt ist ein Open-Source Software und (hauptsächlich) Open-Source Hardware Projekt mit einem Fokus auf kleine indoor Roboter mit 3D-gedrucktem modularen Gehäuse.Wir sind momentan dabei, die nächste Generation mit Stereo-Kamera, Bumper-Sensoren, Tiefenkamera, Lagesensoren und "Unter-der-Couch-Detektoren" fertigzustellen - siehe Log…
…
continue reading

1
Quelltext-Klage als Verbraucher (froscon2025)
50:48
50:48
Play later
Play later
Lists
Like
Liked
50:48Copyleft-Lizenzen, wie die GPL, schreiben vor, dass Verbraucher neben der Binary auch den vollständigen Quelltext erhalten. Wie kürzliche Gerichtsverfahren gezeigt haben, können auch Verbraucher auf die Bereitstellung dieses Quelltextes klagen. Daneben können auch Verbraucherverbände klagen; diese können gleich für alle Geräte eines Herstellers kla…
…
continue reading

1
Delegate authentication and a lot more to Keycloak with OpenID Connect (froscon2025)
55:42
55:42
Play later
Play later
Lists
Like
Liked
55:42Authenticating users can start simple with a username and a password for each user. But you will also need to handle forgotten passwords and user registration. You might also want to validate email addresses, add second factors and have users update their profile information as needed.A single-sign-on system like Keycloak can handle all that for yo…
…
continue reading

1
VersaTiles - finally maps for everyone (froscon2025)
38:34
38:34
Play later
Play later
Lists
Like
Liked
38:34VersaTiles is a powerful, free and open web map stack that runs on every major platform. Now, you can run your own map server in seconds!VersaTiles combines the best features of existing open-source projects into one modular system. We also offer free vector tiles based on OpenStreetMap and raster tiles featuring satellite and aerial imagery. Versa…
…
continue reading

1
AI-First Softwareentwicklung - aber Open Source (froscon2025)
1:03:13
1:03:13
Play later
Play later
Lists
Like
Liked
1:03:13Entwickler*innen können von KI-Tools profitieren – aber wie klappt das jenseits von Big Tech? Der Vortrag gibt eine Übersicht zu den spannendsten freien KI-Lösungen und deren Einsatz in der Softwareentwicklung.KI hat die Entwicklungspraxis bereits verändert. KI kann Code generieren und wird auch produktiv in der Entwicklung eingesetzt. Doch meist s…
…
continue reading

1
Anarchist’s Guide to Confidential Computing (froscon2025)
44:55
44:55
Play later
Play later
Lists
Like
Liked
44:55„Confidential Computing“ bezeichnet eine Reihe von hardwaregestützten Technologien, die angeblich vertrauliche Datenverarbeitung in der Cloud ermöglichen. In diesem Vortrag zeige ich, wie diese Mechanismen funktionieren, welchen Versprechen man trauen kann – und wo ihre Grenzen liegen.Confidential Computing verspricht Privatsphäre durch Hardware – …
…
continue reading

1
Develop Secure Software - The DevGuard Project (froscon2025)
59:23
59:23
Play later
Play later
Lists
Like
Liked
59:23Mit DevGuard stellen wir ein Open-Source-Projekt vor, das Sicherheit für Entwickler:innen zugänglich, pragmatisch und automatisierbar macht. Angesichts zunehmender Angriffe auf Software-Supply-Chains und wachsender regulatorischer Anforderungen (z. B. CRA) adressiert DevGuard zentrale Herausforderungen der sicheren Softwareentwicklung: komplexe Too…
…
continue reading
This week Dave and Gunnar talk about e-tattoos, AI agent blackmail, and AI memory dossiers! Cursor and Claude Code: PARA Auditor, Let Me AI That for You, Botany Battle. Abundance! “You won’t lose your job to a tractor, but to a horse who learns to drive a tractor” Star Wars - Return of the 80s Miami (Parody Music Video) These 5G Protection Sticker …
…
continue reading

1
Decentralising Freedom: Open Source for Sovereignty (froscon2025)
53:19
53:19
Play later
Play later
Lists
Like
Liked
53:19Open source is more than code: it's a movement that empowers communities to build resilient, sovereign digital infrastructure. In an era of geopolitical realignment, centralised, corporate-controlled platforms threaten our social, political, and economic freedoms. This keynote examines how open source principles and the Fediverse (using Mastodon as…
…
continue reading

1
Energiemanagement im Matter-Standard (froscon2025)
1:00:19
1:00:19
Play later
Play later
Lists
Like
Liked
1:00:19Der Matter-Standard, eine Initiative zur Vereinheitlichung der Smart-Home-Kommunikation, erweitert seine Funktionen um ein integriertes Energie-Management. Dieser Vortrag beleuchtet, wie Matter die Energieeffizienz in vernetzten Haushalten durch Standardisierung und Interoperabilität verbessert.Vortrag: Energie-Management im Matter-StandardDer Matt…
…
continue reading

1
The Small Device C Compiler for 8-bit firmware development (froscon2025)
57:24
57:24
Play later
Play later
Lists
Like
Liked
57:24The Small Device C Compiler (SDCC) is a free C compiler targeting 8-bit architectures, including MCS-51, STM8, Padauk, Rabbit, S08. It supports standard C up to current ISO C23. We discuss the current state of SDCC, its use in writing firmware, and plans for the near future.Many devices include small 8-bit processors using architectures not or not …
…
continue reading

1
Es Es Ka Em: Warum gute Leute nicht bei euch arbeiten wollen (froscon2025)
1:00:03
1:00:03
Play later
Play later
Lists
Like
Liked
1:00:03"Fachkräftemangel!" "Wir finden keine guten Leute!" "Wir würden ja total gerne mehr Frauen einstellen, es bewerben sich nur keine!" — wenn in deinem Unternehmen solche Sätze rumfliegen, dann macht es gewaltig was falsch.Seit mindestens 30 Jahren macht die Open Source Community — und Unternehmen, die sich an ihr orientieren — vor, wie man sich aufst…
…
continue reading

1
Festplattenverschlüsselung mithilfe vom TPM 2.0 (froscon2025)
55:24
55:24
Play later
Play later
Lists
Like
Liked
55:24Der Chip des Trusted Plattform Modules hat einige schöne Fähigkeiten, zum Beispiel kann er Schlüssel sicher verwalten.Dies kann man sich beim Thema Festplattenverschlüsselung zunutze machen.- Doch wie funktioniert das genau? Was sind die mysteriösen PCRs?- Worauf muss bei der Umsetzung geachet werden?- Wie unterscheiden sich hier die Distributionen…
…
continue reading