Episode 207 – Weaponized attention

Josh and Kurt start this one by explaining how the Twitter hacker was just a dumb criminal (most criminals are dumb). We then discuss the new GPT-3 AI that can create text. How we create, and how social media is doing everything it can to weaponize our attention. It’s not a fight humanity is winning.Continue reading “Episode 207 – Weaponized attention”

Episode 206 – Confidential Virtual Machines; The future of cloud computing

Josh and Kurt talk about Google’s new confidential VMs. The AMD Secure Encrypted Virtualization is the technology that makes it all possible. What is SEV, how does it work, and why should you care? This technology is going to be the future of the cloud. Show Notes Google confidential VMs AMD SEV SEV vs SGXContinue reading “Episode 206 – Confidential Virtual Machines; The future of cloud computing”

Episode 205 – The State of Open Source Security with Alyssa Miller from Snyk

Josh and Kurt talk to Alyssa Miller from Snyk about the State of Open Source Security 2020 report. Alyssa was the report author and has some great insight into the current trends we’re seeing in open source security. Some of the challenges developers face. We discuss the difficulty static and composition analysis scanners face. It’sContinue reading “Episode 205 – The State of Open Source Security with Alyssa Miller from Snyk”

Episode 204 – What Would Apple Do?

Josh and Kurt talk about some recent security actions Apple has taken. Not all are good, but in general Apple is doing things to benefit their customers (their customers are not advertisers). We also discuss some of the challenges when your customers are advertisers. Show Notes Apple one year certificates Apple declines to implement 16Continue reading “Episode 204 – What Would Apple Do?”

Episode 203 – Humans, conferences, and security: let me think and get back to you in a bit

Josh and Kurt talk about human behavior. The conversation makes its way to conferences and the perpetual question of if a conference is useful or not. We come to the agreement the big shows aren’t what they used to be, but things like BSides are great experiences. Show Notes Security and Human Behaviour Josh’s blogContinue reading “Episode 203 – Humans, conferences, and security: let me think and get back to you in a bit”

Episode 200 – Talking Container Security with Liz Rice

Josh and Kurt talk to Liz Rice from Aqua Security about container security and her new book on the same topic. What does container security look like today? What are some things you can do now? What will container security look like in the future? Show Notes Container Security download Pictures of elephants Kubernetes SecurityContinue reading “Episode 200 – Talking Container Security with Liz Rice”

Episode 199 – Special cases are special: DNS, Websockets, and CSV

Josh and Kurt talk about a grab bag of topics. A DNS security flaw, port scanning your machine from a web browser, and CSV files running arbitrary code. All of these things end up being the result of corner cases. Letting a corner case be part of a default setup is always a mistake. YesContinue reading “Episode 199 – Special cases are special: DNS, Websockets, and CSV”

Episode 197 – Beer, security, and consistency; the newer, better, triad

Josh and Kurt talk about what beer and reproducible builds have in common. It’s a lot more than you think, and it mostly comes down to quality control. If you can’t reproduce what you do, you’re not a mature organization and you need maturity to have quality. Show Notes Reinheitsgebot Josh’s Blog Post Ken Thompson’s reflections onContinue reading “Episode 197 – Beer, security, and consistency; the newer, better, triad”