Your submission was sent successfully! Close

Introducing the Ubuntu security podcast

The Ubuntu Security Podcast is a weekly podcast covering all the latest news and developments from the Ubuntu Security team. Each week the team discuss the various security updates that have been published across the Ubuntu releases, describing the technical details of both the security vulnerabilities as well as the fixes involved. Due to the expansive nature of the software packages provided by Ubuntu, each episode usually covers a diverse range of security issues, from buffer overflows, use-after-free’s and cache side-channel attacks; to cross-site scripting and cross-site request forgery. Whilst describing the various vulnerabilities, their impact is also covered, ranging from the low (denial of service, information disclosure etc) to the higher end of the spectrum (remote code execution, privilege escalation etc). Detailed show notes are also published along with each episode, referencing the particular CVEs discussed as well as their details.

Each week the team also discuss a topical Ubuntu and/or general Linux security item of interest. Past episodes have discussed new speculative execution attacks, responsible disclosure practices, Ubuntu security hardening guides and more. The team also welcome your feedback and suggestions for ideas on security topics to discuss, and look forward to answering your questions in future episodes. Special mention of current vacancies within the Ubuntu security team are also announced when open positions are available.

The Ubuntu Security Podcast is available via iTunes, Spotify, Google Podcasts, or RSS. Subscribe via your favourite podcast application and each week you will receive the latest Ubuntu security news as soon as it is published. Happy listening!

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Select topics you're
interested in

In submitting this form, I confirm that I have read and agree to Canonical's Privacy Notice and Privacy Policy.

Related posts

Confidential computing in public clouds: isolation and remote attestation explained

In the first part of this blog series, we discussed the run-time (in)security challenge, which can leave your code and data vulnerable to attacks by both the...

What is confidential computing? A high-level explanation for CISOs

Privacy enhancing technologies and confidential computing are two of my favorite topics to talk about! So much so that I am writing this blog post on a sunny...

Meet Canonical at IoT Tech Expo

Santa Clara, USA October 5-6 2022 IoT Tech Expo is almost here! With 250+ speakers, 5,000+ attendees and dozens of sessions dedicated to IoT in the enterprise...