Nerding Out With Viktor

@nerdingoutwithviktor - 361 本の動画

チャンネル登録者数 645人

Welcome to Nerding Out With Viktor where tech innovation meets entrepreneurial insight. Hosted by Viktor, a proud nerd and seasoned entrepreneur, this podcas...

最近の動画

Yocto, SPDX, and SBOMs: Embedded Software Supply Chain Security 0:51

Yocto, SPDX, and SBOMs: Embedded Software Supply Chain Security

Yocto SBOM Generation: Solving for Unknown Unknowns in Component Analysis 0:50

Yocto SBOM Generation: Solving for Unknown Unknowns in Component Analysis

Building Yocto from Scratch: A Technical Overview of Bootstrapping and Cross Compilation 0:57

Building Yocto from Scratch: A Technical Overview of Bootstrapping and Cross Compilation

Leveraging SPDX for Static Library Detection and CVE Management in Yocto Projects 0:53

Leveraging SPDX for Static Library Detection and CVE Management in Yocto Projects

Inside the Yocto Project’s Evolving Tooling: SBOMs, SPDX 3.0, and Secure Embedded Systems 50:38

Inside the Yocto Project’s Evolving Tooling: SBOMs, SPDX 3.0, and Secure Embedded Systems

The Hat You Need After Your Startup Gets Acquired 0:51

The Hat You Need After Your Startup Gets Acquired

How Microsoft Opened a 2,000-Person Office in Suzhou 0:56

How Microsoft Opened a 2,000-Person Office in Suzhou

From 7 Days to 17 Seconds 0:55

From 7 Days to 17 Seconds

How Instacart Hired at Warp Speed 1:00

How Instacart Hired at Warp Speed

From Forum Guy to Engineering Manager 0:45

From Forum Guy to Engineering Manager

The Gmail Search Test Every App Fails 0:45

The Gmail Search Test Every App Fails

The Best Email Client Is the Default One 0:45

The Best Email Client Is the Default One

Why Podcast Editing Isn’t Fully Automated Yet 0:50

Why Podcast Editing Isn’t Fully Automated Yet

Growing 40%? Don't Hire 40% More People 1:00

Growing 40%? Don't Hire 40% More People

AI Is Coming for Paper Forms 0:53

AI Is Coming for Paper Forms

From 0 to 80% Knowledge in Seconds 1:00

From 0 to 80% Knowledge in Seconds

Startup Founder Lessons on Scaling Teams, Systems, and Culture with Kevin Henrikson 1:16:10

Startup Founder Lessons on Scaling Teams, Systems, and Culture with Kevin Henrikson

The Water Cooler Talk is Dead—Now What? 0:58

The Water Cooler Talk is Dead—Now What?

The Hidden Cost of Abstraction: When Tech Becomes a Black Box 0:53

The Hidden Cost of Abstraction: When Tech Becomes a Black Box

Remote Work Isn’t Just Flexibility..It’s Structure Too 0:46

Remote Work Isn’t Just Flexibility..It’s Structure Too

Typo = Breach: The Real Threat of Package Squatting 0:50

Typo = Breach: The Real Threat of Package Squatting

Germany’s Unexpected Win: How Bureaucracy Delivered Top Talent 0:54

Germany’s Unexpected Win: How Bureaucracy Delivered Top Talent

Gradual Enforcement: A Smarter Way to Secure the SDLC 0:59

Gradual Enforcement: A Smarter Way to Secure the SDLC

How Google Scales Dev Productivity Through Standardization 0:56

How Google Scales Dev Productivity Through Standardization

Consistency Is a Security Strategy: Naming in CI/CD 0:57

Consistency Is a Security Strategy: Naming in CI/CD

Portable Pipelines: Bringing CI/CD Back to the Developer 0:59

Portable Pipelines: Bringing CI/CD Back to the Developer

Decoupling's Double-Edged Sword 0:49

Decoupling's Double-Edged Sword

AI’s Black Box Problem: Who’s Really in Control? 0:52

AI’s Black Box Problem: Who’s Really in Control?

Reimagining CI/CD and Engineering Culture at Scale with Vlad A. Ionescu 1:10:07

Reimagining CI/CD and Engineering Culture at Scale with Vlad A. Ionescu

Trust Without Presence: Building Remote Teams That Actually Work 0:41

Trust Without Presence: Building Remote Teams That Actually Work

Elevator Hacking: Uncovering Physical Access Vulnerabilities 0:45

Elevator Hacking: Uncovering Physical Access Vulnerabilities

Custom Payload Enumeration Tool: Technical Insights 0:47

Custom Payload Enumeration Tool: Technical Insights

Insecured Reader Access: Wiegand Protocol Vulnerabilities Exposed 0:57

Insecured Reader Access: Wiegand Protocol Vulnerabilities Exposed

Kubernetes and Cloud Convergence: Challenges and Limitations 0:53

Kubernetes and Cloud Convergence: Challenges and Limitations

European Digital Sovereignty: Building In-House IT Infrastructure to Mitigate Vulnerabilities 0:59

European Digital Sovereignty: Building In-House IT Infrastructure to Mitigate Vulnerabilities

From Bureaucracy to Creativity: Driving Innovation Through Direct Funding 0:44

From Bureaucracy to Creativity: Driving Innovation Through Direct Funding

OpenStack: A Comprehensive Infrastructure as Code Solution for Enterprises 0:47

OpenStack: A Comprehensive Infrastructure as Code Solution for Enterprises

The Value of Open Source: Investing Time for Long-Term Benefits 0:51

The Value of Open Source: Investing Time for Long-Term Benefits

The Rise of Cloud Interdependency: Azure's Growing Dominance in Enterprise Productivity 0:46

The Rise of Cloud Interdependency: Azure's Growing Dominance in Enterprise Productivity

Kubernetes: The De Facto Stack for Cloud-Agnostic Deployments 0:50

Kubernetes: The De Facto Stack for Cloud-Agnostic Deployments

Does Europe Need an Airbus Moment for Cloud Sovereignty? 0:47

Does Europe Need an Airbus Moment for Cloud Sovereignty?

Cross-Border Data Governance: Challenges for Digital Laws 0:56

Cross-Border Data Governance: Challenges for Digital Laws

Cloud Cost Optimization Challenges with Public Cloud Providers 0:55

Cloud Cost Optimization Challenges with Public Cloud Providers

Cloud Storage Backdoors and Regulatory Aspects 0:49

Cloud Storage Backdoors and Regulatory Aspects

Europe's Battle for Tech Sovereignty: Why OpenStack Matters with Johan Christenson 1:12:11

Europe's Battle for Tech Sovereignty: Why OpenStack Matters with Johan Christenson

Bypassing Perimeter Security: A Threat Actor's Perspective 0:48

Bypassing Perimeter Security: A Threat Actor's Perspective

Social Engineering Exploitation through Rapport Building 0:37

Social Engineering Exploitation through Rapport Building

Social Engineering Tactics in Access Control Systems 0:57

Social Engineering Tactics in Access Control Systems

Avoiding Security Risks in Access Control Systems: A Technical Analysis 0:49

Avoiding Security Risks in Access Control Systems: A Technical Analysis

Social Engineering Vulnerabilities in Access Control Systems 0:53

Social Engineering Vulnerabilities in Access Control Systems

Enhancing Physical Security through Staff Awareness 0:52

Enhancing Physical Security through Staff Awareness

Alternative Access Methods for Physical Security Systems 0:49

Alternative Access Methods for Physical Security Systems

Door Sensor Jamming via Optical Proximity Detection (OPD) Evasion using Air Duster Sprays 0:56

Door Sensor Jamming via Optical Proximity Detection (OPD) Evasion using Air Duster Sprays

What to Expect from CRA Compliant Software: SBOMs, SPDX, and Beyond 0:40

What to Expect from CRA Compliant Software: SBOMs, SPDX, and Beyond

Creative Bugging Techniques: Exploring Novel Threat Vectors 0:54

Creative Bugging Techniques: Exploring Novel Threat Vectors

IoT Business Models: Why Clear ROI is Key to Success 0:59

IoT Business Models: Why Clear ROI is Key to Success

Physical Pen Testing Secrets: Covert Building Infiltration Explained 1:09:20

Physical Pen Testing Secrets: Covert Building Infiltration Explained

IoT Devices: The High Cost of Ignoring OTA Updates 0:43

IoT Devices: The High Cost of Ignoring OTA Updates

The Future of IoT: From Label to Default Feature 0:52

The Future of IoT: From Label to Default Feature

CRA's Impact on IoT Security: Understanding SBOMs 0:40

CRA's Impact on IoT Security: Understanding SBOMs

Balena Use Cases: Industrial IoT, Gateways, and HCI Demystified 0:43

Balena Use Cases: Industrial IoT, Gateways, and HCI Demystified

Balena's Efficient OTA Updates: A Technical Deep Dive 0:46

Balena's Efficient OTA Updates: A Technical Deep Dive

Managing Large-Scale IoT Fleets with Balena OS 0:50

Managing Large-Scale IoT Fleets with Balena OS

EU Cyber Resilience Act: A Breakthrough for IoT Security 0:49

EU Cyber Resilience Act: A Breakthrough for IoT Security

Balena for Fleet IoT Device Management: A Technical Deep Dive 0:41

Balena for Fleet IoT Device Management: A Technical Deep Dive

SBOMs: The Future of Software Transparency and Compliance 0:46

SBOMs: The Future of Software Transparency and Compliance

The Clock is Ticking: Are You Prepared for the Connected Products Deadline? 0:49

The Clock is Ticking: Are You Prepared for the Connected Products Deadline?

Balena, IoT Security, and the Future of Connected Devices 1:06:15

Balena, IoT Security, and the Future of Connected Devices

Chainguard's Secret Sauce: Automated Dependency Rebuilds 1:00

Chainguard's Secret Sauce: Automated Dependency Rebuilds

Dustin Kirkland on Chainguard's Open Source DNA and Customer-First Focus 0:54

Dustin Kirkland on Chainguard's Open Source DNA and Customer-First Focus

Dustin Kirkland on License Scanning and Continuous Compliance 0:51

Dustin Kirkland on License Scanning and Continuous Compliance

Chainguard: A Secure Software Supply Chain, Not Just a Linux Distro 1:00

Chainguard: A Secure Software Supply Chain, Not Just a Linux Distro

Dustin Kirkland on Chainguard's Customer-Driven Business Model 0:52

Dustin Kirkland on Chainguard's Customer-Driven Business Model

No More Free Credit Reports: Companies Must Protect Your Data 0:57

No More Free Credit Reports: Companies Must Protect Your Data

Minimal Python Image: Compact, Secure, and Scanned 0:58

Minimal Python Image: Compact, Secure, and Scanned

Open Source: From Revolution to Mainstream 0:47

Open Source: From Revolution to Mainstream

Rolling Releases vs. Traditional Upgrades: A Stability Trade-Off 1:00

Rolling Releases vs. Traditional Upgrades: A Stability Trade-Off

Dustin Kirkland Explains Chainguard’s "Undistro" Rolling Release Model 0:50

Dustin Kirkland Explains Chainguard’s "Undistro" Rolling Release Model

SBOM: The Nutrition Facts for Your Software 0:49

SBOM: The Nutrition Facts for Your Software

Dustin Kirkland on Chainguard, Zero-CVE Containers, and Supply Chain Security 59:16

Dustin Kirkland on Chainguard, Zero-CVE Containers, and Supply Chain Security

Exposed .git Directory: A Recipe for Disaster 0:52

Exposed .git Directory: A Recipe for Disaster

Hackers Target Old Windows Versions First 0:50

Hackers Target Old Windows Versions First

The 'Elephant' Exploit: Cracking Paxton Access Systems 0:49

The 'Elephant' Exploit: Cracking Paxton Access Systems

Kali Linux: Power at Your Fingertips 0:39

Kali Linux: Power at Your Fingertips

How a Simple Confirmation Email Became a Phishing Tool 0:45

How a Simple Confirmation Email Became a Phishing Tool

Metasploit as a Launchpad for Lateral Movement 0:50

Metasploit as a Launchpad for Lateral Movement

Metasploit Modules: Exploits, Auxiliaries, and Payloads 0:59

Metasploit Modules: Exploits, Auxiliaries, and Payloads

Classic SQL Injection: The Oldest Trick in the Book 0:52

Classic SQL Injection: The Oldest Trick in the Book

Safety, AI, and Global Compliance: Forces Driving Change 0:44

Safety, AI, and Global Compliance: Forces Driving Change

Why Old Windows Versions Are a Hacker's Playground 0:45

Why Old Windows Versions Are a Hacker's Playground

How SPDX Began: Solving Licensing Challenges in Open Source 0:44

How SPDX Began: Solving Licensing Challenges in Open Source

How Much Do Security Certifications Really Matter? 0:54

How Much Do Security Certifications Really Matter?

Taking Over Client-Side Controls with Burp Suite 0:57

Taking Over Client-Side Controls with Burp Suite

SPDX and Critical Infrastructure: Adapting for Safety Standards 0:53

SPDX and Critical Infrastructure: Adapting for Safety Standards

Why Automated Pen Testing Tools Fall Short 0:46

Why Automated Pen Testing Tools Fall Short

Pentesting 101: Hacking Legally with Warren Houghton 1:01:26

Pentesting 101: Hacking Legally with Warren Houghton

Fixing Licensing Chaos: How NPM Adopted License Expressions 1:00

Fixing Licensing Chaos: How NPM Adopted License Expressions

Regulations and Open Source: Tracing Software Origins 0:58

Regulations and Open Source: Tracing Software Origins

Is SPDX 3 a Schema or a Format? Exploring Its True Purpose 0:52

Is SPDX 3 a Schema or a Format? Exploring Its True Purpose

Build-Time SBOMs vs. Scans: Accuracy in Software Compliance 0:59

Build-Time SBOMs vs. Scans: Accuracy in Software Compliance

人気の動画

Startup Founder Lessons on Scaling Teams, Systems, and Culture with Kevin Henrikson 1:16:10

Startup Founder Lessons on Scaling Teams, Systems, and Culture with Kevin Henrikson

9654 回視聴 - 3 週間前

Nix and NixOS Development Environment with Jon Seager of Canonical 57:05

Nix and NixOS Development Environment with Jon Seager of Canonical

8383 回視聴 - 1 年前

Inside the Yocto Project’s Evolving Tooling: SBOMs, SPDX 3.0, and Secure Embedded Systems 50:38

Inside the Yocto Project’s Evolving Tooling: SBOMs, SPDX 3.0, and Secure Embedded Systems

4524 回視聴 - 9 日前

Open Hardware Security & Coreboot: BIOS Risks Explained w/ Matt DeVillier & David Hendricks 1:11:56

Open Hardware Security & Coreboot: BIOS Risks Explained w/ Matt DeVillier & David Hendricks

2329 回視聴 - 1 年前

SBOM talk @Ubuntu Engineering Sprint 35:26

SBOM talk @Ubuntu Engineering Sprint

2040 回視聴 - 5 か月前

All things ZFS and FreeBSD with Allan Jude 1:18:18

All things ZFS and FreeBSD with Allan Jude

1926 回視聴 - 5 か月前

Past, Present, and Future of Computing with Bryan Cantrill, CTO of Oxide Computer Company 1:23:30

Past, Present, and Future of Computing with Bryan Cantrill, CTO of Oxide Computer Company

902 回視聴 - 10 か月前

Exploring the Depths of Linux and Open Source Innovation with Mark Shuttleworth 1:04:12

Exploring the Depths of Linux and Open Source Innovation with Mark Shuttleworth

769 回視聴 - 11 か月前

Demystifying eBPF with Liz Rice: A Deep Dive into Kernel Programming and Security 51:28

Demystifying eBPF with Liz Rice: A Deep Dive into Kernel Programming and Security

650 回視聴 - 11 か月前

Transforming Tech with Eben Upton: Exploring Raspberry Pi’s Global Impact from Education to Industry 1:21:40

Transforming Tech with Eben Upton: Exploring Raspberry Pi’s Global Impact from Education to Industry

552 回視聴 - 11 か月前

RFID Hacking with Iceman: Exploring the Intricacies RFID Security 1:07:04

RFID Hacking with Iceman: Exploring the Intricacies RFID Security

468 回視聴 - 7 か月前

How Internet Access in Education Is Changing the World (with Chris Fabian) 1:10:59

How Internet Access in Education Is Changing the World (with Chris Fabian)

375 回視聴 - 1 年前