Open Source Security cover art

All Episodes

Open Source Security — 528 episodes

#
Title
1

Open source is critical infrastructure with Kat Cosgrove

2

How to actually test a disaster plan with David Bernstein

3

Open Source Pledge with Vlad-Stefan Harbuz

4

Building a plan for disaster with David Bernstein

5

Open Source Malware with Paul McCarty

6

Package management challenges with Andrew Nesbitt

7

Open Source Security at scale with Michael Winser

8

2026 State of the Software Supply Chain with Brian Fox

9

MCP and Agent security with Luke Hinds

10

The State of OpenSSL for pyca/cryptography with Alex Gaynor and Paul Kehrer

11

Rust coreutils with Sylvestre Ledru

12

Goose and the Agentic AI Foundation with Brad Axen

13

The Global Vulnerability Intelligence Platform with Olle E. Johansson

14

Digital Sovereignty and Nextcloud with Frank Karlitschek

15

The Art of Crisis Management with David Bernstein

16

WTF is a passkey with William Brown

17

All about Suricata with Victor Julien

18

Iocaine poisons bots with Gergely Nagy

19

Anubis with Xe Iaso

20

Rustls with Dirkjan and Joe

21

Daniel Thompson answers: Does the CRA apply to Santa?

22

Linux Foundation Europe with Gabriele Columbro

23

Updating open source dependencies with Jamie Tanna

24

TARmageddon with Alex Zenla

25

Python Security with Seth Larson

26

Linux Vendor Firmware Service with Richard Hughes

27

NPM supply chain attacks with Charlie Eriksen

28

Detecting XZ in Debian with Otto Kekäläinen

29

Eclipse Foundation SBOMs with Mikael Barbero

30

Actually finding vulnerabilities using AI with Joshua Rogers

31

Sustaining Package Repositories with Brian Fox

32

Arch Linux Security with Foxboron and Anthraxx

33

OpenSSL with Hana Andersen and Anton Arapov

34

The Python Software Foundation with Deb Nicholson

35

Using Mercator to map assets with Didier Barzin

36

Talos Linux security with Andrey Smirnov

37

Discussing the Open Source, Open Threats? paper with Behzad and Ali

38

crates.io trusted publishing with Tobias Bieniek

39

CVE update with Patrick Garrity

40

GCVE with Cédric Bonhomme and Alexandre Dulaunoy

41

EU Regulations will change everything with Daniel Thompson

42

Open source microprocessors with Jan Pleskac

43

Package URLs with Philippe Ombredanne

44

Hobbyist Maintainers with Thomas DePierre

45

STIG automation with Aaron Lippold

46

Ecosyste.ms with Andrew Nesbitt

47

Curl vs AI with Daniel Stenberg

48

Repository signing with Kairo De Araujo

49

Securing GitHub Actions with William Woodruff

50

Embedded Security with Paul Asadoorian

51

tj-actions with Endor Lab's Dimitri Stiliadis

52

Syft, Grype, and Grant with Alan Pope

53

CVE for EOL with Aaron Frost

54

cargo-semver-checks with Predrag Gruevski

55

Distributed CI and Git with Lars Wirzenius

56

FIDO authentication with William Brown

57

CRA with Luis Villa

58

Open Source Malware with Brian Fox

59

Open Source Foundations with Kelley Misata of Suricata

60

Forking Open Source Projects with Sheogorath

61

Patching EOL Open Source with Aaron Frost

62

Why do we keep ignoring CI security with François Proulx

63

Modern day authentication with Marc Boorshtein

64

Open Source Maintenance with Gary Kramlich

65

Safety vs Security with Thomas Depierre

66

The Future of Open Source Security

67

Episode 461 - The new NIST password guidance

68

Episode 460 - Santa's Supply Chain Security

69

Episode 459 - CWE Top 25 List

70

Episode 458 - FBI endorses E2E encryption

71

Episode 457 - The D-Link D-bacle

72

Episode 456 - What if XZ happened to a company? The openness of open source

73

Episode 455 - Wordpress plugin security

74

Episode 454 - The state of open source with Brian Fox from Sonatype and Donald Fischer from Tidelift

75

Episode 453 - Software Liability

76

Episode 452 - All about Meshtastic

77

Episode 451 - Python security with Seth Larson

78

Episode 450 - What's Wrong With WordPress

79

Episode 449 - The CUPSpocalypse

80

Episode 448 - What's wrong with CISA?

81

Episode 447 - The Tidelift 2024 open source maintainer report

82

Episode 446 - Researchers took over .MOBI TLD

83

Episode 445 - EPSS with Jay Jacobs

84

Episode 444 - Open Source and End of Life

85

Episode 443 - The Supply Chain Security Crisis

86

Episode 442 - The foundation of society, TLS certificates are a mess

87

Episode 441 - Is CWE useful?

88

Episode 440 - "What is open source" talk Josh gave

89

Episode 439 - Where are all the youth in open source?

90

Episode 438 - CISA's bad OSS advice vs the Whitehouse good advice

91

Episode 437 - CocoPods and proper funding for open source

92

Episode 436 - OpenSSH and node-ip - it's all exponential growth

93

Episode 435 - polyfill.io - open source is too big to fix

94

Episode 434 - Unreported vulnerabilities and everyone is getting hacked

95

Episode 433 - Should OpenSSH block misbehaving clients?

96

Episode 432 - Flipper Zero with Alex Kulagin

97

Episode 431 - Redirecting HTTP to HTTPS

98

Episode 430 - Frozen kernel security

99

Episode 429 - The autonomy of open source developers

100

Episode 428 - GitHub artifact attestation

101

Episode 427 - Will run0 replace sudo?

102

Episode 426 - Automatically exploiting CVEs with AI

103

Episode 425 - Video game cheaters, also pretendo

104

Episode 424 - The Notepad++ Parasite Website

105

Episode 423 - FCC cybersecurity label for consumer devices

106

XZ Bonus Spectacular Episode

107

Episode 422 - Do you have a security.txt file?

108

Episode 421 - CISA's new SSDF attestation form

109

Episode 420 - What's going on at NVD

110

Episode 419 - Malicious GitHub repositories

111

Episode 418 - Being right all the time is hard

112

Episode 417 - Linux Kernel security with Greg K-H

113

Episode 416 - Thomas Depierre on open source in Europe

114

Episode 415 - Reducing attack surface for less security

115

Episode 414 - The exploited ecosystem of open source

116

Episode 413 - PyTorch and NPM get attacked, but it's OK

117

Episode 412 - Blame the users for bad passwords!

118

Episode 411 - The security tools that started it all

119

Episode 410 - Package identifiers are really hard

120

Episode 409 - You wouldn't hack a train?

121

Episode 408 - Does Kubernetes need long term support?

122

Episode 407 - Should Santa use AI?

123

Episode 406 - The security of radio

124

Episode 405 - Modding games isn't cheating and security isn't fair

125

Episode 403 - Does the government banning apps work?

126

Episode 402 - The EU's eIDAS regulation is a terrible idea

127

Episode 401 - Security skills shortage - We've tried nothing and the same thing keeps happening

128

Episode 400 - When can the government hack a victim?

129

Episode 399 - Curl, Security, and Daniel Stenberg

130

Episode 398 - Is only 11% of open source maintained?

131

Episode 397 - The curl and glibc vulnerabilities

132

Episode 396 - CLAs are bad, Mkay?

133

Episode 395 - Uncertainty, trust, and security

134

Episode 394 - The lie anyone can contribute to open source

135

Episode 393 - Can you secure something you don't own?

136

Episode 392 - Curl and the calamity of CVE

137

Episode 391 - The Wordpress 100 year disaster recovery problem

138

Episode 390 - Rust shipping binaries doesn't matter

139

Episode 389 - What would HashiCorp do?

140

Episode 388 - Video game vulnerabilities

141

Episode 387 - Enterprise open source is different

142

Episode 386 - We are watching web 2.0 burn

143

Episode 385 - Is open source an insider threat?

144

Episode 384 - What's next for open source?

145

Episode 383 - Is open source dying?

146

Episode 382 - Red Hat, you were the chosen one!

147

Episode 381 - WTF Reddit, APIs and risk

148

Episode 380 - A new Sovereign Tech Fund program and the BBC on destroying hard drives

149

Episode 379 - Will open source save the world, again?

150

Episode 378 - Naming things is harder than security

151

Episode 377 - The world is changing too fast for humans to understand

152

Episode 376 - Open Source Summit, who built your open source, and AI

153

Episode 375 - The market forces of left-pad, Episode 77 remaster part 2

154

Episode 374 - The event we called left-pad, Episode 77 remaster part 1

155

Episode 373 – HHGG security, Episode 42 remaster part 2

156

Episode 372 - HHGG security, Episode 42 remaster part 1

157

Episode 371 - pip install is the tool we deserve but not the tool we need

158

Episode 370 - Open Source is bigger than you can imagine

159

Episode 369 - OpenAI broke ChatGPT then tried to blame open source

160

Episode 368 - The Sovereign Tech Fund with Fiona Krakenbürger

161

Episode 367 - Open source will never be the same

162

Episode 366 - Software liability is coming

163

Episode 365 - "I am not your supplier" with Thomas Depierre

164

Episode 364 - Using SBOMs is hard

165

Episode 363 - Joylynn Kirui from Microsoft on DevSecOps

166

Episode 362 - A lesson in Rust from Carol Nichols

167

Episode 361 - GitHub got pwnt, but it wasn't very exciting

168

Episode 360 - Memory safety and the NSA

169

Episode 359 - The NOTAM outage and other legacy technology

170

Episode 358 - Furby vs Alexa

171

Episode 357 - Is open source being overexploited?

172

Episode 356 - LastPass ducked up, now what?

173

Episode 355 - Security Boxing Day

174

Episode 354 - Jerry Bell tells us why Mastodon is awesome and MFA is hard

175

Episode 353 - Jill Moné-Corallo on GitHub's bug bounty program

176

Episode 352 - Stylometry removes anonymity

177

Episode 351 - Is security or usability a law of the universe?

178

Episode 350 - Spam, Email, Content Moderation, and Infrastructure Oh My

179

Episode 349 - The cyber is coming from inside the house - the UK is scanning itself

180

Episode 348 - OpenSSL is the new lead paint

181

Episode 347 - Airtags in luggage and weasel security - two peas in a suitcase

182

Episode 346 - Security and working from home have terrible things in common

183

Episode 345 - Cheap hacking devices turn security upside down

184

Episode 344 - Python tarfile - 2022 is nothing like 2007

185

Episode 343 - Stop trying to fix the open source software supply chain

186

Episode 342 - Programming languages are the new operating system

187

Episode 341 - Time till open source alternative

188

Episode 340 - Let's chat about Let's Encrypt with Josh Aas

189

Episode 339 - Is a network problem a security vulnerability

190

Episode 338 - The government didn't make vulnerabilities illegal. Yet.

191

Episode 337 - Security patches are getting worse - Dustin Childs from ZDI tells us why

192

Episode 336 - We don't have data, we have security biases

193

Episode 335 - Bull*&$% security ideas

194

Episode 334 - Leap seconds break everything

195

Episode 333 - Open Source is unfair

196

Episode 332 - PyPI: 2FA or not 2FA, that is the question

197

Episode 331 - GPG, but nothing makes sense

198

Episode 330 - The sliding scale of risk: seeing the forest for the trees

199

Episode 329 - Signing (What is it good for)

200

Episode 328 - The Security of Jobs or Job Security

201

Episode 327 - The security of alert fatigue

202

Episode 326 - Big fat containers

203

Episode 325 - Is one open source maintainer enough?

204

Episode 324 - WTF is up with WFH

205

Episode 323 - The fake 7-Zip vulnerability and SBOM

206

Episode 322 - Adam Shostack on the security of Star Wars

207

Episode 321 - Relativistic Security: Project Zero on 0day

208

Episode 320 - Security Twitter is not the real world

209

Episode 319 - Patch Tuesday with a capital T

210

Episode 318 - Social engineering and why zlib got a 2018 CVE ID

211

Episode 317 - The lack of compromise in security

212

Episode 316 - You have to use open source

213

Episode 315 - Who even makes all these terrible decisions?

214

Episode 314 - The Linux Dirty Pipe vulnerability

215

Episode 313 - Insecurity at scale

216

Episode 312 - The Legend of the SBOM

217

Episode 311 - Did you scan the QR code?

218

Episode 310 - Hayley Tsukayama from the EFF talks about privacy

219

Episode 309 - The bright future of open source security

220

Episode 308 - Welcome to the jungle - How to talk about open source security

221

Episode 307 - Got vulnerabilities? Introducing GSD

222

Episode 306 - Open source isn't broken, it's an experience

223

Episode 305 - Norton, Ethereum, NFT, and Apes

224

Episode 304 - Will we ever fix all the vulnerabilities?

225

Episode 303 - Log4j Christmas Spectacular!

226

Episode 302 - Log4j is a mess

227

Episode 301 - You're holding it wrong: the importance of unlearning

228

Episode 300 - Apple vs NSO: What can copyright do for you?

229

Episode 299 - Experts From A World That No Longer Exists

230

Episode 298 - David A Wheeler discusses the OpenSSF

231

Episode 297 - 25 years of smashing stacks, fun, and profit

232

Episode 296 - Is Trojan Source a vulnerability?

233

Episode 295 - Open source security isn't free

234

Episode 294 - Chris Wysopal on the state of security education

235

Episode 293 - Scoring OpenSSF Security Scoring

236

Episode 292 - Apache RCE and Twitch epic pwn

237

Episode 291 - Everyone sucks at vulnerability disclosure

238

Episode 290 - The security of the Matrix

239

Episode 289 - Who left this 0day on the floor?

240

Episode 288 - Linux Kernel compiler warnings considered dangerous

241

Episode 287 - Is GitHub's Copilot the new Clippy?

242

Episode 286 - Open source supply chain with Google's Dan Lorenc

243

Episode 285 - Open source owes you nothing!

244

Episode 284 - What happens when we DRM power tools?

245

Episode 283 - When vulnerability disclosure becomes dangerous

246

Episode 282 - The security of Rust: who left all this awesome in here?

247

Episode 281 - If you spy on journalists, you're the bad guys

248

Episode 280 - The perils of Single Sign On

249

Episode 279 - The audacity of Audacity: When open source goes rogue

250

Episode 278 - Could SELinux have stopped SolarWinds?

251

Episode 277 - Privacy and activism with Chris Weiland

252

Episode 276 - Security, behavior, and the environment

253

Episode 275 - What in the @#$% is going on with ransomware?

254

Episode 274 - Mr. Amazon's Neighborhood

255

Episode 273 - Can we stop the coming artificial unintelligence deluge?

256

Episode 272 - The Biden Cybersecurity Executive Order

257

Episode 271 - Pipeline security: There is no problem humans can't make worse

258

Episode 270 - Hello dark patterns my old friend

259

Episode 269 - Do not experiment on the Linux Kernel

260

Episode 268 - Can we trust any 3rd parties?

261

Episode 267 - Does 0day still mean 0day?

262

Episode 266 - The future of security scanning with Debricked

263

Episode 265 - The lies closed source can tell, open source can't

264

Episode 264 - DevSecOps with GitLab's Mark Loveless

265

Episode 263 - GitHub pulls exploits, LinuxFoundation sign all the things

266

Episode 262 - A discussion with Loris and Pop from Sysdig

267

Episode 261 - DWF is back! Welcome to community powered CVE

268

Episode 260 - Dave Jevans tells us what CipherTrace is up to

269

Episode 259 - What even is open source anymore?

270

Episode 258 - Stop using C

271

Episode 257 - The sudo and libgcrypt vulnerabilities

272

Episode 256 - 9 bits of podcast, 8 bits of computing

273

Episode 255 - What if security wasn't joyless?

274

Episode 254 - Right to Repair Security

275

Episode 253 - Defenders only need to be right once

276

Episode 252 - Is open source dangerous? Open source won, who cares, shut up!

277

Episode 251 - Communication is hard, security communication is more hard

278

Episode 250 - Door 25: Why do we do the things we do? Question everything

279

Episode 249 - Door 24: Information wants to be free

280

Episode 248 - Door 23: How to report 1000 security flaws

281

Episode 247 - Door 22: How to report one security flaw

282

Episode 246 - Door 21: Bug bounties

283

Episode 245 - Door 20: Is SMS 2FA better than no 2FA?

284

Episode 244 - Door 19: TLS certificate trust

285

Episode 243 - Door 18: Don't roll your own crypto or auth

286

Episode 242 - Door 17: Vulnerability response

287

Episode 241 - Door 16: 16 bits of change

288

Episode 240 - Door 15: Supplier compliance

289

Episode 239 - Door 14: Backdoors

290

Episode 238 - Door 13: Unlucky or survivor bias?

291

Episode 237 - Door 12: Video game hacking

292

Episode 236 - Door 11: Should you get on a 737?

293

Episode 235 - Door 10: Deciding what information matters

294

Episode 234 - Door 09: public key cryptography

295

Episode 233 - Door 08: man 8 security

296

Episode 232 - Door 07: 7 is the best prime, 2 is the dumbest

297

Episode 231 - Door 06: 6 wifi risks ... that don't actually matter

298

Episode 230 - Door 05: 5 reasons you need 24/7 robot monitoring

299

Episode 229 - Door 04: EFF's Cover Your Tracks

300

Episode 228 - Door 03: Do all vulnerabilities matter equally?

301

Episode 227 - Door 02: Marketing department or selection bias?

302

Episode 226 - Door 01: Advent calendars

303

Episode 225 - Who is responsible if IoT burns down your house?

304

Episode 224 - Are old Android devices dangerous?

305

Episode 223 - Full disclosure won, deal with it

306

Episode 222 - HashiCorp Boundary with Jeff Mitchell

307

Episode 221 - Security, magic, and FaceID

308

Episode 220 - Securing network time and IoT

309

Episode 219 - Chat with Larry Cashdollar

310

Episode 218 - The past was a terrible place

311

Episode 217 - How to tell your story with Travis Murdock

312

Episode 216 - Security didn't find life on Venus

313

Episode 215 - Real security is boring

314

Episode 213 - Security Signals: What are you telling the world

315

Episode 212 - Grab Bag: The Security We Deserve Edition

316

Episode 211 - The only thing harder than signing files is managing users

317

Episode 210 - Cult of Information Security

318

Episode 209 - Secure Boot isn't Secure

319

Episode 208 - Passwords are pollution

320

Episode 207 - Weaponized attention

321

Episode 206 - Confidential Virtual Machines; The future of cloud computing

322

Episode 205 - The State of Open Source Security with Alyssa Miller from Snyk

323

Episode 204 - What Would Apple Do?

324

Episode 203 - Humans, conferences, and security: let me think and get back to you in a bit

325

Episode 202 - The convergence of application security

326

Episode 201 - We broke CVSSv3, now how do we fix it?

327

Episode 200 - Talking Container Security with Liz Rice

328

Episode 199 - Special cases are special: DNS, Websockets, and CSV

329

Episode 198 - Good advice or bad advice? Hang up, look up, and call back

330

Episode 197 - Beer, security, and consistency; the newer, better, triad

331

Episode 196 - Pounding square solutions into round holes: forced updates from Ubuntu

332

Episode 195 - Is BGP actually insecure?

333

Episode 194 - Working from home security: resistance is futile

334

Episode 193 - Security lessons from space: Apollo 13 edition

335

Episode 192 - Work without progress - what Infosec can learn from treadmills

336

Episode 191 - Security scanners are all terrible

337

Episode 190 - Building a talent "ecosystem"

338

Episode 189 - Video game hackers - speedrunning

339

Episode 188 - Depressing news sucks, we're talking about cheating in video games

340

Episode 187 - Wireguard vs IPsec: the OK Boomer of security

341

Episode 186 - Endpoint security with Tony Meehan

342

Episode 185 - Is it even possible to fix open source security?

343

Episode 184 - It's DNS. It's always DNS

344

Episode 183 - The great working from home experiment

345

Episode 182 - Does open source owe us anything?

346

Episode 181 - The security of SIM swapping

347

Episode 180 - A Tale of Two Vulnerabilities

348

Episode 179 - Google Project Zero and the 90 day clock

349

Episode 178 - Are CVEs important and will ransomware put you out of business?

350

Episode 177 - Fake or real? The security of counterfeit goods

351

Episode 176 - The 'predictions are stupid' prediction episode

352

Episode 175 - Defenders will always be one step behind

353

Episode 174 - GitHub turns security up to 11; A discussion with Rob Schultheis

354

Episode 173 - Ho Ho Homeland Security

355

Episode 172 - The security of planned obsolescence

356

Episode 171 - Measuring cybersecurity with Kathryn Waldron

357

Episode 170 - Until that quantum computer is cracking RSA keys, go sit back down!

358

Episode 169 - What happens when leadership doesn't care about security?

359

Episode 168 - The draconian draconians of DRM

360

Episode 167 - Security is terrible because digital literacy is terrible

361

Episode 166 - Every day should be cybersecurity awareness month!

362

Episode 165 - Grab Bag of Microsoft Security News

363

Episode 164 - DNS over HTTPS: Probably not the end of the world

364

Episode 163 - Death to Python 2

365

Episode 162 - SBOM with Allan Friedman

366

Episode 161 - Human nature and ad powered open source

367

Episode 160 - Disclosing security issues is insanely complicated: Part 2

368

Episode 159 - Disclosing security issues is insanely complicated: Part 1

369

Episode 158 - The mess that we call credit agencies in the US

370

Episode 157 - Backdoors and snake oil in our cryptography

371

Episode 156 - What if we MitM a whole country?

372

Episode 155 - Stealing cars and ransomware

373

Episode 154 - Chat with the authors of the book "The Fifth Domain"

374

Episode 153 - The unexpected security of AI, photographs, and VPN

375

Episode 152 - Tavis breaks the world ... again

376

Episode 151 - The DARPA Cyber Grand Challenge with David Brumley

377

Episode 150 - Our ad funded dystopian present

378

Episode 149 - Chat with Michael Coates about data security

379

Episode 148 - You just got pwnt, what now?

380

Episode 147 - Scams and operations as part of the supply chain

381

Episode 146 - What the @#$% happened to Microsoft?

382

Episode 145 - What do security and fire have in common?

383

Episode 144 - The security of money, which one is best?

384

Episode 143 - Security lessons from the phone book

385

Episode 142 - Hypothetical security: what if you find a USB flash drive?

386

Episode 141 - Timezones are hard, security is harder

387

Episode 140 - Good enough security is a pretty high bar

388

Episode 139 - Secure voting, firefox send, and toxic comments on the internet

389

Episode 138 - Information wants to be free

390

Episode 137.5 - Holy cow Beto was in the cDc, this is awesome!

391

Episode 137 - When the IoT attacks!

392

Episode 136 - How people feel is more important than being right

393

Episode 135 - Passwords, AI, and cloud strategy

394

Episode 134 - What's up with the container runc security flaw?

395

Episode 133 - Smart locks and the government hacking devices

396

Episode 132 - Bird Scooter: 0, Cory Doctorow: 1

397

Episode 131 - Windows micropatches, Google's privacy fine, and Mastercard fixes trial abuse

398

Episode 130 - Chat with Snyk co-founder Danny Grander

399

Episode 129 - The EU bug bounty program

400

Episode 128 - Australia's encryption backdoor bill

401

2018 Christmas Special - Is Santa GDPR compliant?

402

Episode 127 - Walled gardens, appstores, and more

403

Episode 126 - The not so dire future of supply chain security

404

Episode 125 - Open Source, supply chains, npm, and you

405

Episode 124 - Cloudflare's service workers and the economics of security

406

Episode 123 - Talking about Kubernetes and container security with Liz Rice

407

Episode 122 - What will Apple's T2 chip mean for the rest of us?

408

Episode 121 - All about the security of voting

409

Episode 120 - Bloomberg and hardware backdoors - it's already happening

410

Episode 119 - The Google+ and Facebook incidents, it's not your data anymore

411

Episode 118 - Cloudflare's IPFS and onion service

412

Episode 117 - Will security follow Linus' lead on being nice?

413

Episode 116 - The future of the CISO with Michael Piacente

414

Episode 115 - Discussion with Brian Hajost from SteelCloud

415

Episode 114 - Review of "Click Here to Kill Everybody"

416

Episode 113 - Actual real security advice

417

Episode 112 - Google's Titan Key and the latest Struts issue

418

Episode 111 - The TLS 1.3 and DNS episode

419

Episode 110 - Review of Black Hat, Defcon, and the effect of security policies

420

Episode 109 - OSCon and actionable advice

421

Episode 108 - Bluetooth, phishing, airgaps, and eating soup off the floor

422

Episode 107 - The year of the Linux Desktop and other hardware stories

423

Episode 106 - Data isn't oil, it's nuclear waste

424

Episode 105 - More backdoors in open source

425

Episode 104 - The Gentoo security incident

426

Episode 103 - The Seven Properties of Highly Secure Devices

427

Episode 102 - Michael Feiertag from tCell

428

Episode 101 - Our unregulated future is here to stay

429

Episode 100 - You're bad at buying security, we can help!

430

Episode 99 - Consumer security is too broken to fix, and it doesn't matter

431

Episode 98 - When IT decisions kill people

432

Episode 97 - Automation: Humans are slow and dumb

433

Episode 96 - Are legal backdoors a good idea?

434

Episode 95 - Twitter passwords and npm backdoors

435

Episode 94 - DNSSEC, BGP, and reality

436

Episode 93 - Security flaws in beep and patch, how did we get here?

437

Episode 92 - Chat with Rami Saas the CEO of WhiteSource

438

Episode 91 - Security lessons from a 7 year old

439

Episode 90 - Humans and misinformation

440

Episode 89 - Short selling AMD security flaws

441

Episode 88 - Chat with Chris Rosen from IBM about Container Security

442

Episode 87 - Chat with Let's Encrypt co-founder Josh Aas

443

Episode 86 - What happens when 23 thousand certificates leak?

444

Episode 85 - NPM ate my files

445

Episode 84 - Have I been pwned?

446

Episode 83 - XKCD + CVE = XKCVE

447

Episode 82 - RSA, TLS, Chrome HTTP, and PCI

448

Episode 81 - Autosploit, bug bounties, and the future of security

449

Episode 80 - GPS tracking and jamming

450

Episode 79 - Skyfall: please don't yell 'fire'

451

Episode 78 - Risk lessons from Hawaii

452

Episode 77 - npm and the supply chain

453

Episode 76 - Meltdown aftermath

454

Episode 75 - Security Planner review

455

Episode 74 - Facial recognition and physical security

456

Episode 73 - Security from Santa

457

Episode 72 - Bitcoin: It's over 9000

458

Episode 71 - GitHub's Security Scanner

459

Episode 70 - The security of Intel ME

460

Episode 69 - Actionable security advice

461

Episode 68 - Ruining the Internet

462

Episode 67 - Cyber won

463

Episode 66 - Objects in mirror are less terrible than they appear

464

Episode 65 - Will aliens overthrow us before AI?

465

Episode 64 - Networks and Dnsmasq and IoT oh my

466

Episode 63 - Shoot, Shovel, and Bury

467

Episode 62 - All about the Equifax hack

468

Episode 61 - Market driven security

469

Episode 60 - The official blockchain episode

470

Episode 59 - The VPN Episode

471

Episode 58 - Backwards compatibility to the point of insanity

472

Episode 57 - We may never see amazing security research ever again

473

Episode 56 - Devil's Advocate and other fuzzy topics

474

Episode 55 - Good Docs Ruin My Story

475

Episode 54 - Turning Into An Old Person

476

Episode 53 - A Plane Isn't Like A Car

477

Episode 52 - You Could Have Done It Right, But You Didn't

478

Episode 51 - All About CVE

479

Episode 50 - This Is A Security Podcast After All

480

Episode 49 - Testing Software Is Impossible

481

Episode 48 - Machine Learning: Not Actually Magic

482

Episode 47 - WannaCry: Everything Is Basically Broken

483

Episode 46 - Turns Out I'm Not A Bad Guy

484

Episode 45 - Trust Is More Important Now Than The Truth

485

Episode 44 - Bug Bounties Vs Pen Testing

486

Episode 43 - We Are Totally Immature

487

Episode 42 - Hitchhiker's Guide To Security

488

Episode 41 - All Your Money Are Belong To Us

489

Episode 40 - Let's Fork Bitcoin, Again

490

Episode 39 - Flash On Your Dishwasher

491

Episode 38 - We Ruin Everything

492

Episode 37 - Your Bathtub Is More Dangerous Than A Shark

493

Episode 36 - A Good Enough Podcast

494

Episode 35 - Crazy Cosmic Accident

495

Episode 34 - Bathing In Ebola Virus

496

Episode 33 - Everybody Who Went To The Circus Is In The Circus (RSA 2017)

497

Episode 32 - Gambling As A Service

498

Episode 31 - XML Is Never The Solution

499

Episode 30 - I'm Not An Expert But I've Been Yelled At By Experts

500

Episode 29 - The Security Of Rogue One

501

Episode 28 - RSA Conference 2017

502

Episode 27 - Prove To Me You Are Human

503

Episode 26 - Tell Your Sister, Stallman Was Right

504

Episode 25 - The Future Is Now

505

Episode 24 - The 2016 Prediction Edition

506

Episode 23 - We Can't Patch People

507

Episode 22 - IoT Wild West

508

Episode 21 - CVE 10K Extravaganza

509

Episode 20 - The Death Of PGP

510

Episode 19 - A Field Full Of Razor Blades And Monsters

511

Episode 18 - The Security Of Santa

512

Episode 17 - Cyphercon Interview With Korgo

513

Episode 16 - Cat And Mouse

514

Episode 15 - Cyber Black Monday

515

Episode 14 - David A Wheeler: CII Badges

516

Episode 13 - CVE: The Metric System Of Security

517

Episode 12 - Security Trebuchet

518

Episode 11 - The Poison Candy Episode

519

Episode 10 - The Super Botnet That Nobody Can Stop

520

Episode 9 - Are Bug Bounties Measuring The Wrong Things

521

Episode 8 - The Primality Of Prime Numbers

522

Episode 7 - More Powerful Than Root

523

Episode 6 - Foundational Knowledge Of Security

524

Episode 5 - OpenSSL: The Library We Deserve

525

Episode 4 - Dead Squirrel In A Box

526

Episode - 3 The Lockpicking Sewing Circle

527

Episode 2 - Instills The Proper Amount Of Fear

528

Episode 1 - Rich History Of Security Flaws