417 episodes

A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.

Open Source Security Podcast Josh Bressers & Kurt Seifried

    • Technology
    • 4.7 • 38 Ratings

A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.

    Linux Kernel security with Greg K-H

    Linux Kernel security with Greg K-H

    Josh and Kurt talk to GregKH about Linux Kernel security. We most focus on the topic of vulnerabilities in the Linux Kernel, and what being a CNA will mean for the future of Linux Kernel security vulnerabilities. The future of Linux Kernel security vulnerabilities is going to be very interesting.
    Show Notes Greg K-H Linux Kernel is a CNA Machine learning and stable kernels Bug reporting for Linux

    • 42 min
    Thomas Depierre on open source in Europe

    Thomas Depierre on open source in Europe

    Josh and Kurt talk to Thomas Depierre about some of the European efforts to secure software. We touch on the CRA, MDA, FOSDEM, and more. As expected Thomas drops a huge amount of knowledge on what's happening in open source. We close the show with a lot of ideas around how to move the needle for open source. It's not easy, but it is possible.
    Show Notes Thomas Depierre I am not a supplier Open Source In The European Legislative Landscape devroom Cyber Resilience Act The 2023 Tidelift state of the open source maintainer report

    • 42 min
    Reducing attack surface for less security

    Reducing attack surface for less security

    Josh and Kurt talk about a blog post explaining how to create a very very small container image. Generally in the world of security less is more, but it's possible to remove too much. A lot of today's security tooling relies on certain things to exist in a container image, if we remove them we could actually result in worse security than leaving it in. It's a weird topic, but probably pretty important.
    Show Notes How I reduced the size of my very first published docker image by 40% - A lesson in dockerizing shell scripts Hacker News Discussion Episode 293 – Scoring OpenSSF Security Scoring

    • 31 min
    The exploited ecosystem of open source

    The exploited ecosystem of open source

    Josh and Kurt talk about open source projects proving builds, and things nobody wants to pay for in open source. It's easy to have unrealistic expectations for open source projects, but we have the open source capitalism demands.
    Show Notes Open Source Doesn't Require Providing Builds The things nobody wants to pay for Audacity privacy policy update has caused an outcry The History of X11

    • 32 min
    PyTorch and NPM get attacked, but it's OK

    PyTorch and NPM get attacked, but it's OK

    Josh and Kurt talk about an attack against PyTorch and NPM. The PyTorch attack shows the difficulty of trying to operate a large open source project. The NPM problem is one of the difficulty in trying to backdoor open source. A lot of people are watching and it only takes one person to notice a problem and we all benefit.
    Show Notes Peanut Butter the dog plays Gyromite The Wizard movie PyTorch supply chain attack npm Package Found Delivering Sophisticated RAT Deceptive Deprecation: The Truth About npm Deprecated Packages Changing a lightbulb Spelunking the Bitcoin Blockchain with Josh Bressers | CypherCon 4.0 Operation Triangulation - What You Get When Attack iPhones of Researchers 9th Annual State of the Software Supply Chain

    • 35 min
    Blame the users for bad passwords!

    Blame the users for bad passwords!

    Josh and Kurt talk about the 23andMe compromise and how they are blaming the users. It's obviously the the fault of the users, but there's still a lot of things to discuss on this one. Every company has to care about cybersecurity now, even if they don't want to.
    Show Notes Security leaders weigh in on 23andme hack Don't need a gun when you have a Donk - Crocodile Dundee 2 Hackers can infect network-connected wrenches to install ransomware My disappointment is immeasurable, and my day is ruined

    • 33 min

Customer Reviews

4.7 out of 5
38 Ratings

38 Ratings

adamajreynolds ,

Excellent

I listen every week - it’s great to hear from others in my field.

cspeckrun ,

Most frustrating show I continue listening to

Like a meeting with no agenda it can be informative and entertaining and you’re never quite sure if you should attend again but usually you do.

unbleachedbit ,

The banter is spot on

as of September 2023 be negative reviews may be from non-techs or squishy persons in general. I understand the humor, and every episode that I have listened to so far which is only half a dozen the hosts understand and get what they are talking about. having over 20 years both professionally and not in the information technology field I find myself quite amused at their observations, and more often than not not in agreement more than once an episode. If the hosts, however, ever come across this comment, if you guys would enable Apple podcasts, so that I could toss a few dollars your way I would be more than happy to do so.

Top Podcasts In Technology

Jason Calacanis
Lex Fridman
Cool Zone Media
BBC Radio 4
The New York Times
Ben Gilbert and David Rosenthal

You Might Also Like

Graham Cluley & Carole Theriault
Jupiter Broadcasting
Late Night Linux
Jupiter Broadcasting
Recorded Future News
VICE