<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>OpenSource SecurityCon 2026 on TLDRecap ⏮️</title>
    <link>https://development.tldrecap.tech/sources/opensource-securitycon-2026/</link>
    <description>Recent content in OpenSource SecurityCon 2026 on TLDRecap ⏮️</description>
    <image>
      <title>TLDRecap ⏮️</title>
      <url>https://development.tldrecap.tech/images/tldrecap_logo.jpg</url>
      <link>https://development.tldrecap.tech/images/tldrecap_logo.jpg</link>
    </image>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Tue, 24 Mar 2026 00:19:11 -0700</lastBuildDate>
    <atom:link href="https://development.tldrecap.tech/sources/opensource-securitycon-2026/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Lightning Talk: Your Most Privileged User Isn&#39;t Human: The Agent Security Blinds... Atulpriya Sharma</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/ai-agent-security/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:11 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/ai-agent-security/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/atulpriya-sharma&#34;&gt;Atulpriya Sharma&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;your-most-privileged-user-isnt-human-securing-ai-agents-in-production-&#34;&gt;Your Most Privileged User Isn&amp;rsquo;t Human: Securing AI Agents in Production 🤖💡&lt;/h1&gt;
&lt;p&gt;Ever wonder who&amp;rsquo;s the most powerful entity in your system today? It&amp;rsquo;s probably
not a human. It&amp;rsquo;s your AI agent. And while these autonomous digital workers are
revolutionizing how we operate, they&amp;rsquo;re also creating &lt;em&gt;gaps&lt;/em&gt; in our security
postures that we &lt;em&gt;urgently&lt;/em&gt; need to address.&lt;/p&gt;
&lt;p&gt;Atulpriya Sharma, a Senior Developer Advocate at Improving (formerly
InfraCloud), CNCF Ambassador, and co-chair of KubeCon India 2025, recently shed
light on this critical challenge. He compellingly argued that our existing
security paradigms, built for humans, are simply &lt;em&gt;not ready&lt;/em&gt; for the unique
nature of AI agents.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Quantum Proofing Sigstore: A Tale of Three Approaches - Kevin Conner &amp; Firas Ghanmi, Red Hat</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/quantum-proofing-sigstore-post-quantum-cryptography/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:11 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/quantum-proofing-sigstore-post-quantum-cryptography/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/kevin-conner&#34;&gt;Kevin Conner&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/firas-ghanmi&#34;&gt;Firas Ghanmi&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;quantum-proofing-sigstore-three-bold-approaches-to-secure-our-software-supply-chain-&#34;&gt;Quantum-Proofing Sigstore: Three Bold Approaches to Secure Our Software Supply Chain 🚀&lt;/h1&gt;
&lt;p&gt;The digital world runs on trust, and in the realm of software, that trust
increasingly relies on robust supply chain security. Sigstore stands as a
critical pillar, ensuring the integrity and authenticity of software artifacts.
But what happens when the very foundations of our cryptographic security are
threatened? Enter &lt;em&gt;quantum computing&lt;/em&gt; – a game-changer that could render today&amp;rsquo;s
most secure algorithms obsolete.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Simplifying Global Compliance for CNCF Projects With the OpenSSF OSPS Baseline - Madalin Neag</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/open-source-compliance-baseline/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:11 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/open-source-compliance-baseline/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/madalin-neag&#34;&gt;Madalin Neag&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;navigating-the-global-compliance-maze-how-openssf-ospos-baseline-simplifies-security-for-open-source-&#34;&gt;Navigating the Global Compliance Maze: How OpenSSF OSPO&amp;rsquo;s Baseline Simplifies Security for Open Source 🌐🛡️&lt;/h1&gt;
&lt;p&gt;The world of open source software is a vibrant, collaborative engine powering
critical infrastructure across the globe. From finance and healthcare to
transportation and energy, open source projects are the unsung heroes. But as
these projects grow in importance, so does the scrutiny they face, particularly
regarding security and compliance. Madalin Neag, an EU Policy Advisor at
OpenSSF, sheds light on the increasingly complex regulatory landscape and
introduces a powerful solution: the OpenSSF OSPO&amp;rsquo;s Baseline.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Upstream Collaboration for the Win (of the CRA)! - Georg Kunz &amp; Jan Melen</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/cyber-resilience-act-upstream-collaboration/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:11 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/cyber-resilience-act-upstream-collaboration/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/georg-kunz&#34;&gt;Georg Kunz&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/jan-melen&#34;&gt;Jan Melen&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;navigating-the-cyber-resilience-act-cra-why-upstream-collaboration-is-your-secret-weapon-&#34;&gt;Navigating the Cyber Resilience Act (CRA): Why Upstream Collaboration is Your Secret Weapon 🛡️🤝&lt;/h1&gt;
&lt;p&gt;The digital world is evolving at lightning speed, and with it, the complexities
of securing our software supply chains. Enter the Cyber Resilience Act (CRA), a
formidable new regulation poised to reshape how software manufacturers operate.
But what if this challenge isn&amp;rsquo;t just a hurdle, but a golden opportunity?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Zero Privilege Architecture - 3 Years Onward - Thijs Ebbers &amp; Tadeo Sanchez, ING</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/zero-privilege-architecture-ing/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:11 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/zero-privilege-architecture-ing/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/thijs-ebbers&#34;&gt;Thijs Ebbers&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/tadeo-sanchez&#34;&gt;Tadeo Sanchez&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;-beyond-zero-trust-how-ing-achieves-zero-breaches-with-zero-privilege-architecture&#34;&gt;🛡️ Beyond Zero Trust: How ING Achieves Zero Breaches with Zero Privilege Architecture&lt;/h1&gt;
&lt;p&gt;Imagine a world where production environments run autonomously, human error is
designed out of the system, and security breaches simply don&amp;rsquo;t happen. For the
team at &lt;strong&gt;ING&lt;/strong&gt;, this isn&amp;rsquo;t a pipe dream—it is their daily reality.&lt;/p&gt;
&lt;p&gt;In a recent deep dive, &lt;strong&gt;Thijs Ebbers&lt;/strong&gt; (Architect) and &lt;strong&gt;Tadeo Sanchez&lt;/strong&gt; (Lead
Engineer) shared the secrets behind their container hosting platform’s success.
The numbers speak for themselves: &lt;strong&gt;zero security breaches&lt;/strong&gt; and &lt;strong&gt;100%
uptime&lt;/strong&gt;. 🚀&lt;/p&gt;</description>
    </item>
    <item>
      <title>From Mild To Wild: How Hot Can Your SLSA Be? - Andrew McNamara &amp; Adolfo García Veytia</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/software-supply-chain-policy-engines/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:09 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/software-supply-chain-policy-engines/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/andrew-mcnamara&#34;&gt;Andrew McNamara&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/adolfo-garc%C3%ADa-veytia&#34;&gt;Adolfo García Veytia&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h2 id=&#34;level-up-your-software-supply-chain-policy-engines-for-attestations-and-provenance-&#34;&gt;Level Up Your Software Supply Chain: Policy Engines for Attestations and Provenance 🚀&lt;/h2&gt;
&lt;p&gt;Hey tech enthusiasts! 👋 Ever feel like generating software attestations and
provenance is the easy part, but &lt;em&gt;actually using&lt;/em&gt; that valuable data feels like
a black box? You&amp;rsquo;re not alone! Andrew McNamara from Red Hat and Adolfo García
Veytia (aka &amp;ldquo;puerco&amp;rdquo;) from the Kubernetes release engineering team are here to
demystify this crucial step. They&amp;rsquo;re showcasing how policy engines can transform
your attestations and provenance into actionable, automated decisions for a more
secure software supply chain.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lightning Talk: A Supply Chain Security View of OpenSearch - Ram Iyengar, Linux Foundation</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/opensearch-security-improvements/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:09 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/opensearch-security-improvements/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/ram-iyengar&#34;&gt;Ram Iyengar&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;strengthening-open-source-security-a-look-at-opensearchs-journey-&#34;&gt;Strengthening Open Source Security: A Look at OpenSearch&amp;rsquo;s Journey 🚀&lt;/h1&gt;
&lt;p&gt;Hey tech enthusiasts! 👋 It&amp;rsquo;s your favorite blogger here, diving deep into the
crucial world of open source security. Today, we&amp;rsquo;re dissecting the efforts of a
prominent project, &lt;strong&gt;OpenSearch&lt;/strong&gt;, and exploring how we can all contribute to a
more secure digital ecosystem.&lt;/p&gt;
&lt;h2 id=&#34;the-finger-in-the-dike-analogy-a-developers-reality-&#34;&gt;The &amp;ldquo;Finger in the Dike&amp;rdquo; Analogy: A Developer&amp;rsquo;s Reality 🤏&lt;/h2&gt;
&lt;p&gt;We&amp;rsquo;ve all heard the classic tale of the little boy with his finger in the dike,
preventing a flood. In the open source world, many developers find themselves in
a similar, albeit digital, predicament. They&amp;rsquo;re often the first line of defense,
patching vulnerabilities and ensuring the stability of projects while juggling
feature development and community demands. This constant &amp;ldquo;plugging the holes&amp;rdquo;
can be exhausting and, frankly, unsustainable.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open Source SecurityCon | Sponsored Keynote: From Packets to Pods: Lessons from 25... Gerald Combs</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/open-source-community-building-tips/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:09 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/open-source-community-building-tips/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/gerald-combs&#34;&gt;Gerald Combs&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;the-magic-of-open-source-building-communities-that-matter-&#34;&gt;The Magic of Open Source: Building Communities That Matter ✨&lt;/h1&gt;
&lt;p&gt;Hey tech enthusiasts! 👋 Ever wondered what makes open-source projects like
Wireshark and Falco tick? Gerald Combs, the brilliant mind behind Wireshark and
a key contributor to Falco, recently shared some incredible insights into
nurturing these vital communities. It&amp;rsquo;s not just about code; it&amp;rsquo;s about
&lt;em&gt;people&lt;/em&gt;, &lt;em&gt;purpose&lt;/em&gt;, and &lt;em&gt;progress&lt;/em&gt;. Let&amp;rsquo;s dive into what makes these projects,
and by extension, the systems they power, so robust and reliable.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Panel: It’s Not If, It’s When - Practical Preparation for the Next Software Supply Chain Attack</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/supply-chain-security-strategies-sbom/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:09 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/supply-chain-security-strategies-sbom/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/hannah-foxwell&#34;&gt;Hannah Foxwell&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/justin-cormack&#34;&gt;Justin Cormack&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/sal-kimmich&#34;&gt;Sal Kimmich&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/erika-heidi&#34;&gt;Erika Heidi&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/josh-bressers&#34;&gt;Josh Bressers&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;navigating-the-storm-practical-strategies-for-modern-supply-chain-security-&#34;&gt;Navigating the Storm: Practical Strategies for Modern Supply Chain Security 🛡️&lt;/h1&gt;
&lt;p&gt;The digital landscape is a battlefield, and the supply chain is the new
frontier. From the chilling lyrics of a song about relentless attacks to the
serious discussions of industry leaders, one thing is clear: the threat to our
software supply chains is real, it&amp;rsquo;s evolving, and we need practical strategies
to defend ourselves. This panel brought together some brilliant minds to tackle
this critical issue, and here&amp;rsquo;s a breakdown of their insights.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Tarmageddon: One Bug, Four Forks, and a Disclosure Scavenger Hunt - Marina Moore &amp; Alex Zenla, Edera</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/open-source-tar-bug-tokyo-security/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:09 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/open-source-tar-bug-tokyo-security/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/marina-moore&#34;&gt;Marina Moore&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/alex-zenla&#34;&gt;Alex Zenla&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;the-unseen-dangers-in-open-source-a-deep-dive-into-a-critical-tar-bug-&#34;&gt;The Unseen Dangers in Open Source: A Deep Dive into a Critical Tar Bug 🐛💻&lt;/h1&gt;
&lt;p&gt;Hey tech enthusiasts! 👋 Ever wonder what lurks beneath the surface of the
open-source software you use every day? Today, we&amp;rsquo;re diving deep into a
fascinating, albeit slightly terrifying, bug that Marina Moore (Head of Research
at Ada) and Alex Zenla (CTO of Ada) stumbled upon. This isn&amp;rsquo;t just about a
single bug; it&amp;rsquo;s a journey into the intricate world of software supply chain
security, the complexities of open-source ecosystems, and the often-overlooked
responsibilities of project maintainers. 🚀&lt;/p&gt;</description>
    </item>
    <item>
      <title>Thinking About Source Code Security in New Ways - Yongjae Chung &amp; Justin Cappos, New York University</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/git-tough-source-code-security/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:09 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/git-tough-source-code-security/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/yongjae-chung&#34;&gt;Yongjae Chung&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/justin-cappos&#34;&gt;Justin Cappos&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;-beyond-the-green-checkmark-securing-source-code-with-git-tough&#34;&gt;🛡️ Beyond the Green Checkmark: Securing Source Code with git-tough&lt;/h1&gt;
&lt;p&gt;Source code serves as the foundation of our digital world, yet it remains an
&lt;strong&gt;ideal target&lt;/strong&gt; for attackers. We often trust the platforms where we host our
code, but what happens when that trust is misplaced? At a recent tech talk,
&lt;strong&gt;Justin Cappos&lt;/strong&gt; (creator of TUF and in-toto) and &lt;strong&gt;Yongjae Chung&lt;/strong&gt; (Master’s
student and contributor) introduced &lt;strong&gt;git-tough&lt;/strong&gt;, an incubating project under
the &lt;strong&gt;OpenSSF&lt;/strong&gt; designed to bring industrial-grade security directly into your
Git workflow.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Trust, Tampering, and Transparency: What History Can Teach Us About Open Source... Lisa Tagliaferri</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/open-source-security-history-/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:09 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/open-source-security-history-/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/lisa-tagliaferri&#34;&gt;Lisa Tagliaferri&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;from-chained-libraries-to-sigstore-what-500-years-of-history-teaches-us-about-open-source-security-&#34;&gt;From Chained Libraries to Sigstore: What 500 Years of History Teaches Us About Open Source Security 🚀&lt;/h1&gt;
&lt;p&gt;History and technology often feel like two parallel lines that never meet.
However, &lt;strong&gt;Lisa Tagliaferri&lt;/strong&gt;, a medieval and Renaissance historian turned
open-source security expert, argues that the two are deeply intertwined. In a
recent talk, Lisa shared how the ways we protected information in the 15th
century mirror the ways we secure our software supply chains today.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lightning Talk: A Case Study in Cross-Ecosystem Security Response - Lori Lorusso, Rust Foundation</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/rust-ecosystem-phishing-defense/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:08 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/rust-ecosystem-phishing-defense/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/lori-lorusso&#34;&gt;Lori Lorusso&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/rust-foundation&#34;&gt;Rust Foundation&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;-strength-in-numbers-how-cross-ecosystem-collaboration-saved-rust-from-a-fishing-attack&#34;&gt;🦀 Strength in Numbers: How Cross-Ecosystem Collaboration Saved Rust from a Fishing Attack&lt;/h1&gt;
&lt;p&gt;In the world of open-source, we often talk about code, compilers, and
performance. But what happens when the biggest threat isn&amp;rsquo;t a bug in the
software, but a trap for the humans behind it? &lt;strong&gt;Lori Lorusso&lt;/strong&gt;, Director of
Outreach for the &lt;strong&gt;Rust Foundation&lt;/strong&gt;, recently shared a compelling case study on
how a &amp;ldquo;super team&amp;rdquo; of foundations joined forces to thwart a sophisticated
phishing campaign.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Secure Your MCP Servers With OAuth, JWT, SPIFFE and More - Lin Sun, Solo.io &amp; Yi Yang, IBM</title>
      <link>https://development.tldrecap.tech/posts/2026/opensource-securitycon/secure-ai-mcp-server-security/</link>
      <pubDate>Tue, 24 Mar 2026 00:19:08 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/opensource-securitycon/secure-ai-mcp-server-security/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/lin-sun&#34;&gt;Lin Sun&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/solo.io&#34;&gt;Solo.io&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/yi-yang&#34;&gt;Yi Yang&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/ibm&#34;&gt;IBM&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/opensource-securitycon-2026&#34;&gt;OpenSource SecurityCon 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;-secure-your-ai-mastering-mcp-server-security-with-oauth-jwt-and-spiffe&#34;&gt;🔐 Secure Your AI: Mastering MCP Server Security with OAuth, JWT, and Spiffe&lt;/h1&gt;
&lt;p&gt;Welcome to Amsterdam! 🇳🇱 At the recent conference, &lt;strong&gt;Lin Sun&lt;/strong&gt; (Head of Open
Source at &lt;strong&gt;Solo.io&lt;/strong&gt;) and &lt;strong&gt;Yi Yang&lt;/strong&gt; (&lt;strong&gt;IBM&lt;/strong&gt;) took the stage to tackle one of
the most pressing challenges in the burgeoning world of AI agents: &lt;strong&gt;How do we
move Model Context Protocol (MCP) servers from local experiments to secure,
production-ready Kubernetes deployments?&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
