Sponsored Keynote: Breaking Up with Long-lived Secrets: Secure Automation in the Mode... Billy Lynch

Presenters Billy Lynch Source OpenSource SecurityCon NA 2025 Long Live Secrets? Let’s Talk Short-Lived Credentials for a More Secure Software Supply Chain! 🚀 Hey tech enthusiasts! Ever felt like managing secrets in your software supply chain is a bit like juggling chainsaws? You want to keep things secure, but sometimes the established practices feel… well, a little less than ideal. That’s exactly the sentiment Billy Lynch, a Software Engineer at Chainbound, shared at a recent tech conference, and it’s a topic that deserves our attention. ...

November 24, 2025 · 4 min

You Can Sign It, But Can You Trust It? Securing the Compilation Process - Yaxuan(Alice) Wen

Presenters Yaxuan(Alice) Wen Source OpenSource SecurityCon NA 2025 Securing the Build: How to Protect Your Software’s Foundation 🛠️ Hey tech enthusiasts! Ever stopped to think about what happens before your favorite software hits your desktop or phone? The journey from source code to a polished application is a complex one, and a critical, yet often overlooked, stage is compilation. Today, we’re diving deep into why this stage is a prime target for attackers and how we can fortify it, thanks to some groundbreaking research presented at a recent tech conference. ...

November 24, 2025 · 6 min

How Secure Is Academic Open Source? Insights From the UC OSPO Network - Juanita Gomez

Presenters Juanita Gomez Source OpenSource SecurityCon NA 2025 Unveiling the Security Secrets of Academic Open Source 🛡️: A Deep Dive into UC System Projects Ever wondered about the security of the open source projects born from our academic institutions? Juanita, a PhD candidate at UC Santa Cruz and a dedicated Python community member, recently pulled back the curtain on the open source landscape within the University of California (UC) system. Her groundbreaking research reveals a picture that’s both fascinating and, frankly, a little concerning when it comes to security best practices. Let’s dive into what she discovered! 🚀 ...

November 24, 2025 · 6 min

Lightning Talk: Where Should Source Attestations Live? Exploring Storage Strategies - Billy Lynch

Presenters Billy Lynch Source OpenSource SecurityCon NA 2025 Where Do Your Source Attestations Live? Navigating the Labyrinth of Metadata 🗺️ Hey tech enthusiasts! Ever felt like you’re drowning in a sea of metadata, wondering where exactly to stash those crucial source attestations? You’re not alone! At a recent lightning talk, Billy Lynch from Chain Guard dove deep into this very question, exploring strategies for storing and discovering these vital pieces of information. Let’s break down the key takeaways and ponder the future of source attestation storage. 💡 ...

November 24, 2025 · 5 min

Multi-messenger Security: Adaptive Kubernetes SOC... Constanze Roedig, Ben Hirschberg & Dom Delnano

Presenters Constanze Roedig Ben Hirschberg Dom Delnano Source OpenSource SecurityCon NA 2025 Beyond the Buzzwords: Unveiling an Adaptive eBPF Security Powerhouse for Real-World Threats 🚀 In the ever-evolving landscape of cybersecurity, staying ahead of sophisticated threats often feels like chasing a phantom. Traditional security operations centers (SOCs), while essential, can often buckle under the weight of performance overhead, overwhelming data volumes, and the persistent challenge of truly fast and accurate detection. But what if there was a way to fuse the power of observability with the precision of security, creating an adaptive defense system that learns and evolves with the threats it faces? ...

November 24, 2025 · 6 min