The Security Table

XZ and the Trouble with Covert Identities in Open Source


Listen Later

Matt, Izar, and Chris delve into the complexities of open source security. They explore the topics of trust, vulnerabilities, and the potential infiltration by malicious actors. They emphasize the importance of proactive security measures, the challenges faced by maintainers, and propose solutions like improved funding models and behavior analysis for enhancing security within the open source ecosystem.

FOLLOW OUR SOCIAL MEDIA:

➜Twitter: @SecTablePodcast
➜LinkedIn: The Security Table Podcast
➜YouTube: The Security Table YouTube Channel

Thanks for Listening!

...more
View all episodesView all episodes
Download on the App Store

The Security TableBy Izar Tarandach, Matt Coles, and Chris Romeo

  • 5
  • 5
  • 5
  • 5
  • 5

5

2 ratings


More shows like The Security Table

View all
Security Now (Audio) by TWiT

Security Now (Audio)

1,976 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

626 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

7,879 Listeners

Blueprint: Build the Best in Cyber Defense by SANS Institute

Blueprint: Build the Best in Cyber Defense

131 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

127 Listeners