Episode #290: Edwin Kwan: Bluetooth Authentication Bypass Vulnerability in Apple and Linux; Marcel Brown: This Day in Tech History; Trac Bannon: OWASP BOM Maturity Model: Is It Valuable?; Katy Craig: OWASP BOM Maturity Model: A Benefit for Consumers; Ol
Listen now
Description
Free, ungated access to all 290+ episodes of โ€œItโ€™s 5:05!โ€ on your favorite podcast platforms: https://bit.ly/505-updates. Youโ€™re welcome to ๐—ฟ๐—ฒ๐—ฝ๐—ผ๐˜€๐˜ if your followers will find this of value. The stories weโ€™re covering today. Marcel Brown: December 8th, 1975. Paul Terrell opens the Byte Shop in Mountain View, California, one of the first retail computer stores in the world. Paul Terrell and the Byte Shop are most famously known for ordering the first 50 computers from Steve Jobs and Steve Wozniak's fledgling Apple Computer Company in 1976. Edwin Kwan: A Bluetooth authentication bypass vulnerability has been discovered to be impacting Apple, Android, and some Linux devices. The bug allows attackers to connect to devices and inject keystrokes to execute arbitrary commands. Trac Bannon: OWASP has just introduced the Software Bill of Materials Maturity Model. In general, I'm not a fan of maturity models. They're often inflexible, arbitrary, and don't consider context. That said, there is merit in providing guidance given the slow rate of adoption and even the lack of understanding by the software industry. Katy Craig: Today we're diving into a game-changer for consumer software transparency: the launch of the BOM Maturity Model by the OWASP Foundation. Simply put, this model is a big win for consumers who want to know more about the software that we use daily. Olimpiu Pop: Software Bills of Materials, SBOMs, are those labels that we need to stick on our delivered software packages. How should it happen? For now, at least in the Java ecosystem, there is no way of delivering the label together with the package. Shannon Lietz: We're all talking about Bill of Materials these days. It's an important concept for all of us, for a lot of reasons, in particular software buyers. Anyone who's out there who's buying something from a supplier should be interested in what is in that actual product.
More Episodes
It's April 5th, 2024, and time for your weekly cybersecurity and open-source news updates. We have news updates from Trac Bannon in Camp Hill, Pennsylvania, Julie Chatman in Washington, DC, Katy Craig in San Diego, California, Edwin Kwan in Sydney, Australia, and Olimpiu Pop in Transylvania,...
Published 04/05/24
It's March 29th, 2024 and time for Point of View Friday, where we cover a single topic from multiple perspectives. Today's point of discussion is around low-code/no-code solutions and their implications. Today we have perspectives from Julie Chatman in Washington, DC, Katy Craig in San Diego,...
Published 03/29/24