Supply Chain Security [Tech Ops]
cloud203020 Syys 2024

Supply Chain Security [Tech Ops]

In this episode, we dive deep into a recent and highly sophisticated SSH intrusion attack that was discovered in the Linux kernel. We'll discuss how the attackers were able to inject a backdoor into a critical compression library, leveraging social engineering tactics to become a trusted maintainer over several years. The attack was designed to bypass security checks and evade detection, even from advanced techniques like eBPF monitoring. We'll explore the technical details of how the backdoor was triggered, the potential impact on various Linux distributions, and the broader implications for software supply chain security. This incident highlights the challenges of maintaining trust in open-source projects and the need for robust security measures to protect critical infrastructure. Join us as we unpack this fascinating case and consider the lessons it holds for the future of secure software development.

Jaksot(500)

Using AI for Complex IT Problems

Using AI for Complex IT Problems

In this episode, we talk about how to use AI and agentic AI specifically to rethink log collection and analysis, and find and solve really difficult problems generally. There's a bit of a build up and...

18 Elo 202552min

AI Slop Ate My College Degree!

AI Slop Ate My College Degree!

Today we riff on vibe coding, and we talk about the human and economic impacts. Can this agentic coding paradigm the use of AI and how will it impact people just starting their careers or building rea...

9 Elo 202558min

Do Export Controls work for AI?

Do Export Controls work for AI?

NOTE: It appears that the Trump administration decided to allow nVidia chips... even so, this is a very interesting discussion. We discuss whether or not AI export controls work, but we take a really...

18 Heinä 202546min

Lab Toys vs Enterprise Products

Lab Toys vs Enterprise Products

DevOps Lunch and Learn focuses on home labbing versus enterprise use cases and why it is so tricky to satisfy the home user with enterprise products. This really is a dilemma because we love to see mo...

16 Touko 202536min

Container Driven Architecture

Container Driven Architecture

In this episode, we continue our dive into the changing architecture of IT infrastructure and look at how containers and container platforms are changing. We also look at the fundamental nature of wha...

2 Touko 202545min

Container Driven Architecture

Container Driven Architecture

In this episode, we dive deeper into the new architectural trends for infrastructure designers in this coming decade, which is a transition from virtualization platforms first like VMware into contain...

2 Touko 202545min

HA Troubleshooting [Tech Ops]

HA Troubleshooting [Tech Ops]

This episode of the TechOps series goes into high availability troubleshooting. Not just high availability, not just troubleshooting, but actually talking through what it takes to manage and maintain ...

25 Huhti 202555min

Is 2025 even harder than we expected?

Is 2025 even harder than we expected?

We review 2025 predictions today and dig into why I think this year is going to be both boring and terrifying for a lot of enterprise IT leaders. That, of course, spans Amazon, Reinvent storage, VMwar...

23 Huhti 20251h 4min