Security
Determine security ramifications to protect personal data and information
117 Discussions

Chips & Salsa Episode 17: Open Source Security Part 2

IPAS_Security
Employee
0 0 1,484

Hi everyone,

Today we are continuing our series on Open Source security in Chips & Salsa episode 17! In part 2 of the series, CRob and I talk to Tamas (Tom) Lengyel who is a Senior Security Researcher here at Intel. Tom is involved in helping to secure many open source projects both on behalf of Intel and on his own time. Hear from Tom directly about his work in the video and check out his bio below!

About our guest:

Tamas has received his PhD in Computer Science from the University of Connecticut where he built hypervisor-based malware-analysis and collection tools. He is the lead developer of KF/x, a hypervisor-based OS fuzzer developed for Intel's pen-test team that is now also open-source. In his free time he is maintainer of the Xen Project Hypervisor, LibVMI & the DRAKVUF binary analysis project and also volunteers as Chief Research Officer at The Honeynet Project, a leading international non-profit organization that coordinates the development of open-source tools to fight against malware. Tamas gave prior talks at conferences such as BlackHat, CCC and DEFCON.

About the Chips & Salsa video series:

Chips and Salsa is a regular video series with hosts Jerry Bryant and Christopher “CRob” Robinson.  The videos cover such topics as vulnerability disclosures, security incident response, security assurance practices, security technologies with thought-provoking interviews with subject matter experts from Intel and across the security technology spectrum.

Thanks for watching!

Jerry Bryant
Sr. Director of Security Communications and Incident Response
Intel Product Assurance and Security

About the Author
Intel Product Assurance and Security (IPAS) is designed to serve as a security center of excellence – a sort of mission control – that looks across all of Intel. Beyond addressing the security issues of today, we are looking longer-term at the evolving threat landscape and continuously improving product security in the years ahead.