انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
Kusari’s Michael Lieberman Talks GUAC, SLSA and Securing the Open Source Supply Chain
Manage episode 459716684 series 3564832
CRob is joined by Michael Lieberman, CTO and co-founder of Kusari, about the importance of supply chain security in the open source ecosystem. They discuss Michael's journey in open source, his contributions to projects like SLSA and GUAC and the future of supply chain security.
- 01:56 - Michael explains how he got into open source
- 04:10 - The challenges of being a startup within the open source ecosystem
- 05:38 - Michael digs into his participation with SLSA and GUAC
- 09:13 - How maintainers can address SBOMs with GUAC
- 10:56 - Michael’s predictions for supply chain security and dependency management
- 14:26 - Michael answers CRob’s rapid-fire questions
- 15:32 - Advice for those entering the cybersecurity or open source development spaces
- 17:50 - Michael’s call to action
Links:
24 حلقات
Manage episode 459716684 series 3564832
CRob is joined by Michael Lieberman, CTO and co-founder of Kusari, about the importance of supply chain security in the open source ecosystem. They discuss Michael's journey in open source, his contributions to projects like SLSA and GUAC and the future of supply chain security.
- 01:56 - Michael explains how he got into open source
- 04:10 - The challenges of being a startup within the open source ecosystem
- 05:38 - Michael digs into his participation with SLSA and GUAC
- 09:13 - How maintainers can address SBOMs with GUAC
- 10:56 - Michael’s predictions for supply chain security and dependency management
- 14:26 - Michael answers CRob’s rapid-fire questions
- 15:32 - Advice for those entering the cybersecurity or open source development spaces
- 17:50 - Michael’s call to action
Links:
24 حلقات
كل الحلقات
×
1 Kusari’s Michael Lieberman Talks GUAC, SLSA and Securing the Open Source Supply Chain 21:06

1 Sovereign Tech Agency’s Tara Tarakiyee and Funding Important Open Source Projects 16:47

1 Alpha-Omega’s Michael Winser and Catalyzing Sustainable Improvements in Open Source Security 27:15

1 Jack Cable of CISA and Zach Steindler of GitHub Dig Into Package Repository Security 23:44

1 Red Hat's Rodrigo Freire and the Impact of High-Profile Security Incidents 16:58

1 Canonical’s Stephanie Domas and Security Insight from a Self-Described “Tinkerer” 16:58

1 Intel’s Katherine Druckman and the Impact of Developer Relations 14:23

1 Dell's Sarah Evans and Lisa Bradley and Ensuring Secure Open Source Software at the Enterprise Level 16:24

1 CoSAI, OpenSSF and the Interesting Intersection of Secure AI and Open Source 22:47

1 GitHub’s Mike Hanley and Transforming the “Dept. of No” Into the "Dept. of Yes, And…” 22:43

1 CISA's Aeva Black and the Public Sector View of Open Source Security 12:13

1 Google’s Andrew Pollock and Addressing Open Source Vulnerabilities 12:16

1 Rust Foundation’s Bec Rumbul and Succeeding as a “Non-Techie” in a Tech-Heavy Industry 18:28

1 Sonatype’s Brian Fox and the Perplexing Phenomenon of Downloading Known Vulnerabilities 22:24
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.