@nerdingoutwithviktor - 361 本の動画
チャンネル登録者数 645人
Welcome to Nerding Out With Viktor where tech innovation meets entrepreneurial insight. Hosted by Viktor, a proud nerd and seasoned entrepreneur, this podcas...
Yocto, SPDX, and SBOMs: Embedded Software Supply Chain Security
Yocto SBOM Generation: Solving for Unknown Unknowns in Component Analysis
Building Yocto from Scratch: A Technical Overview of Bootstrapping and Cross Compilation
Leveraging SPDX for Static Library Detection and CVE Management in Yocto Projects
Inside the Yocto Project’s Evolving Tooling: SBOMs, SPDX 3.0, and Secure Embedded Systems
The Hat You Need After Your Startup Gets Acquired
How Microsoft Opened a 2,000-Person Office in Suzhou
From 7 Days to 17 Seconds
How Instacart Hired at Warp Speed
From Forum Guy to Engineering Manager
The Gmail Search Test Every App Fails
The Best Email Client Is the Default One
Why Podcast Editing Isn’t Fully Automated Yet
Growing 40%? Don't Hire 40% More People
AI Is Coming for Paper Forms
From 0 to 80% Knowledge in Seconds
Startup Founder Lessons on Scaling Teams, Systems, and Culture with Kevin Henrikson
The Water Cooler Talk is Dead—Now What?
The Hidden Cost of Abstraction: When Tech Becomes a Black Box
Remote Work Isn’t Just Flexibility..It’s Structure Too
Typo = Breach: The Real Threat of Package Squatting
Germany’s Unexpected Win: How Bureaucracy Delivered Top Talent
Gradual Enforcement: A Smarter Way to Secure the SDLC
How Google Scales Dev Productivity Through Standardization
Consistency Is a Security Strategy: Naming in CI/CD
Portable Pipelines: Bringing CI/CD Back to the Developer
Decoupling's Double-Edged Sword
AI’s Black Box Problem: Who’s Really in Control?
Reimagining CI/CD and Engineering Culture at Scale with Vlad A. Ionescu
Trust Without Presence: Building Remote Teams That Actually Work
Elevator Hacking: Uncovering Physical Access Vulnerabilities
Custom Payload Enumeration Tool: Technical Insights
Insecured Reader Access: Wiegand Protocol Vulnerabilities Exposed
Kubernetes and Cloud Convergence: Challenges and Limitations
European Digital Sovereignty: Building In-House IT Infrastructure to Mitigate Vulnerabilities
From Bureaucracy to Creativity: Driving Innovation Through Direct Funding
OpenStack: A Comprehensive Infrastructure as Code Solution for Enterprises
The Value of Open Source: Investing Time for Long-Term Benefits
The Rise of Cloud Interdependency: Azure's Growing Dominance in Enterprise Productivity
Kubernetes: The De Facto Stack for Cloud-Agnostic Deployments
Does Europe Need an Airbus Moment for Cloud Sovereignty?
Cross-Border Data Governance: Challenges for Digital Laws
Cloud Cost Optimization Challenges with Public Cloud Providers
Cloud Storage Backdoors and Regulatory Aspects
Europe's Battle for Tech Sovereignty: Why OpenStack Matters with Johan Christenson
Bypassing Perimeter Security: A Threat Actor's Perspective
Social Engineering Exploitation through Rapport Building
Social Engineering Tactics in Access Control Systems
Avoiding Security Risks in Access Control Systems: A Technical Analysis
Social Engineering Vulnerabilities in Access Control Systems
Enhancing Physical Security through Staff Awareness
Alternative Access Methods for Physical Security Systems
Door Sensor Jamming via Optical Proximity Detection (OPD) Evasion using Air Duster Sprays
What to Expect from CRA Compliant Software: SBOMs, SPDX, and Beyond
Creative Bugging Techniques: Exploring Novel Threat Vectors
IoT Business Models: Why Clear ROI is Key to Success
Physical Pen Testing Secrets: Covert Building Infiltration Explained
IoT Devices: The High Cost of Ignoring OTA Updates
The Future of IoT: From Label to Default Feature
CRA's Impact on IoT Security: Understanding SBOMs
Balena Use Cases: Industrial IoT, Gateways, and HCI Demystified
Balena's Efficient OTA Updates: A Technical Deep Dive
Managing Large-Scale IoT Fleets with Balena OS
EU Cyber Resilience Act: A Breakthrough for IoT Security
Balena for Fleet IoT Device Management: A Technical Deep Dive
SBOMs: The Future of Software Transparency and Compliance
The Clock is Ticking: Are You Prepared for the Connected Products Deadline?
Balena, IoT Security, and the Future of Connected Devices
Chainguard's Secret Sauce: Automated Dependency Rebuilds
Dustin Kirkland on Chainguard's Open Source DNA and Customer-First Focus
Dustin Kirkland on License Scanning and Continuous Compliance
Chainguard: A Secure Software Supply Chain, Not Just a Linux Distro
Dustin Kirkland on Chainguard's Customer-Driven Business Model
No More Free Credit Reports: Companies Must Protect Your Data
Minimal Python Image: Compact, Secure, and Scanned
Open Source: From Revolution to Mainstream
Rolling Releases vs. Traditional Upgrades: A Stability Trade-Off
Dustin Kirkland Explains Chainguard’s "Undistro" Rolling Release Model
SBOM: The Nutrition Facts for Your Software
Dustin Kirkland on Chainguard, Zero-CVE Containers, and Supply Chain Security
Exposed .git Directory: A Recipe for Disaster
Hackers Target Old Windows Versions First
The 'Elephant' Exploit: Cracking Paxton Access Systems
Kali Linux: Power at Your Fingertips
How a Simple Confirmation Email Became a Phishing Tool
Metasploit as a Launchpad for Lateral Movement
Metasploit Modules: Exploits, Auxiliaries, and Payloads
Classic SQL Injection: The Oldest Trick in the Book
Safety, AI, and Global Compliance: Forces Driving Change
Why Old Windows Versions Are a Hacker's Playground
How SPDX Began: Solving Licensing Challenges in Open Source
How Much Do Security Certifications Really Matter?
Taking Over Client-Side Controls with Burp Suite
SPDX and Critical Infrastructure: Adapting for Safety Standards
Why Automated Pen Testing Tools Fall Short
Pentesting 101: Hacking Legally with Warren Houghton
Fixing Licensing Chaos: How NPM Adopted License Expressions
Regulations and Open Source: Tracing Software Origins
Is SPDX 3 a Schema or a Format? Exploring Its True Purpose
Build-Time SBOMs vs. Scans: Accuracy in Software Compliance
Startup Founder Lessons on Scaling Teams, Systems, and Culture with Kevin Henrikson
9654 回視聴 - 3 週間前
Inside the Yocto Project’s Evolving Tooling: SBOMs, SPDX 3.0, and Secure Embedded Systems
4524 回視聴 - 9 日前
Open Hardware Security & Coreboot: BIOS Risks Explained w/ Matt DeVillier & David Hendricks
2329 回視聴 - 1 年前
Past, Present, and Future of Computing with Bryan Cantrill, CTO of Oxide Computer Company
902 回視聴 - 10 か月前
Exploring the Depths of Linux and Open Source Innovation with Mark Shuttleworth
769 回視聴 - 11 か月前
Demystifying eBPF with Liz Rice: A Deep Dive into Kernel Programming and Security
650 回視聴 - 11 か月前
Transforming Tech with Eben Upton: Exploring Raspberry Pi’s Global Impact from Education to Industry
552 回視聴 - 11 か月前