THE LINUX FOUNDATION PROJECTS
All Posts By

ferdosi

Keynote “Digital Sovereignty or Digital Dependency – Europe’s Tech Moment of Truth”

By News

They say “data is the new oil” and this highlights a critical vulnerability for Europe. Our reliance on non-European hyperscalers for data storage creates a significant dependency, raising serious questions about control, security, and resilience. What if these dominant nations restrict services, or how our data being used? Companies like Microsoft can not guarantee that European data won’t be used by others while it is stored outside of Europe.
Digital sovereignty means you have full control over your data, software, and infrastructure. Digital sovereignty isn’t just about knowing your dependencies; it’s about actively eliminating them. Björn Schiessle from NextCloud highlighted that Europe not only must act but, crucially, can act now. Many organizations remain stuck in theoretical debates, overlooking that solutions already exist. Arguments like “we need European hyperscalers first” often serve as excuses preventing change. Key pathways include developing European hyperscalers, utilizing existing European solutions, defining missing features, and making informed decisions. By consciously steering our decisions and investments towards the right solutions, digital sovereignty can transition from a mere aspiration to a practical reality.

Introduction to CRAIG – Your Cyber Resilience Act Community

By News

The EU Cyber Resilience Act (CRA) is a challenge and also an opportunity.  It is transforming cybersecurity from an optional extra into a mandatory market entry requirement. This presents a significant question for manufacturers across Europe. Dirk Leopold  during the Open chai and Friends event  presented a great solution of collaboration, that is the CRA Community. CRAIG is a community-driven Non-Profit Association designed to support the implementation of the CRA. Its mission is clear: “We bridge the gap between complex legal requirements and practical technical application, and we strengthen cyber resilience across European industry by making security-by-design, secure development practices, and risk assessment accessible to organizations with limited resources.”

CRAIG empowers organizations, particularly those with limited resources, to meet these new standards. Whether you’re an engineer, a researcher, or a corporation, CRAIG offers an open, collaborative platform where you can get inspired, share ideas and develop together with others. This platform acts as a central source of information, but also much more. CRAIG also organizes working groups for the most important topics to create guidance and collect best practices for small companies up to large multinationals. Through this Community you also have to chance to connect to peers in your region and participate local events.

Are you interested? – check the official website for more information: CRAIG | Your CRA Community

The Good, The Bad, and The Breached: A View into Supply Chain Security

By News

In the realm of cybersecurity, the theory of supply chain security often appears clean and straightforward. The reality is different. It’s a complex, multi-faceted challenge riddled with common yet dangerous mistakes that persist across organizations. This vital session, presented by Daniel Mihajlov from Robert Bosch GmbH, offered a practical look at the danger of neglecting software supply chain security. Understanding the software supply chain security regulations is no easy task. It involves a multitude of stakeholders, from developers and legal teams to incident response units, authorities, and third-party companies. This complexity demands a unified, comprehensive strategy, moving beyond mere reactive measures to embrace proactive security.

Mihajlov highlighted a critical issue: “Checkbox compliance.” This occurs when individual departments complete their own security checklists without anyone taking a holistic view of the entire system. While all the paperwork might be perfect, this siloed approach inevitably leaves some weak points, creating a false sense of security. The problem isn’t the compliance checks themselves, but how they’re conducted – often prioritizing documentation over actual security posture. This leaves organizations vulnerable despite their best efforts.

Another compelling example of a common vulnerability is the “ghost ship” – widely used applications relying on old, unmaintained open-source libraries for critical functions. Imagine a scenario where the original developer has moved on, no one monitors the project, and crucial security updates or patches are simply not happening. If a publicly known critical vulnerability emerges in such a component, the entire application sails into dangerous waters. A dependency without an active maintainer is, undeniably, one of the biggest problems in today’s software landscape.

The session reinforced these points with numerous use cases and real-world attack examples, mentioning also how the artificial intelligence based solutions used today to do more sophisticated attacks against companies. Lesson learned: even if your internal systems are robustly secure, your entire security posture is only as strong as your weakest link – including your suppliers’ systems. If you share data with a vendor whose systems are compromised, your data is also at risk.

Beyond the Code: Fostering Connection and Collaboration at the Women in Open Source Networking Event

By Featured

The energetic world of open source based not just on code, but on community, collaboration, and diverse perspectives. This was proved at a recent networking session designed specifically for women and allies in the open source ecosystem – an event that left attendees not only informed but deeply inspired. The session was organized as an open, moderated networking space, welcoming everyone who works with, contributes to, or is simply curious about Open Source. Its mission was to create environment for meaningful exchange, bridging technical, legal, business, and community perspectives.
Stepping into the event, I was experienced awesome energy in the place. It wasn’t just women interested in participating; it was a really diverse and welcoming group of people, and everyone seemed eager to chat even before the officially event started. People were already getting to know each other, swapping ideas, and just genuinely connecting. The format of the event encouraged dynamic interaction: two 30-minute discussion rounds were offered to the attendees. They had the freedom to choose themed tables that resonated most with their interests but aligned with broader topics of the Open Chain and Friends event. Participants could explore fresh perspectives, learn from each other, and build connections designed to last well beyond the evening. The diverse range of discussion themes included Communities, Compliance, Artificial Intelligence, Digital Sovereignty, Cybersecurity, Embedded and Open Hardware, Education and many others. Attendees quickly immersed themselves in discussions, sharing experiences and insights which led to dynamic and naturally flowing conversations.
It was fantastic to see so many different companies represented. This really helped us get diverse points of view and think about how we can all work together. The atmosphere was simply vibrant. By the end, the feedback was overwhelmingly positive. The enthusiasm was so high that discussions quickly turned to planning the next opportunity to meet, underscoring the success of building truly meaningful connections.

This event was a powerful reminder that while technology evolves rapidly, the human element – the desire to connect, learn, and collaborate – remains at the heart of the open source movement. A huge shout-out and thank you to the organizers and moderators – Adamantia Goulandris, Sarah Itt and Kurzmann Marcel – and special thank you for Women at Bosch for sponsoring this fantastic event!

KeyNote: The role of cybersecurity in supply chain and AI

By Featured

The cybersecurity topic stream at the first day of Open Chain and Friends event began with an impactful keynote from Dirk Targoni, spotlighting the critical connection between cybersecurity and open source. His practical session provided invaluable insights into navigating supply chain risks, emphasizing that effective remediation requires a holistic approach, not isolated solutions.

We gained clarity on essential factors: Asset Management (SBoM), Vulnerability Monitoring, Code and Binaries Checks, Pentesting, and robust Vulnerability and Incident Handling. A key takeaway was the interdependence of these elements – none are sufficient without the others. The session powerfully underscored that supply chain security has moved from the server room to the boardroom, driven by incidents where a single compromised dependency cascades rapidly.

Targoni also addressed the pervasive question, “Will AI take my job?” His reassuring answer: “AI is your assistant, can do the routine work for you”.

Secure AI Systems: Regulations, threats, defense mechanisms

By Featured

Following the foundational discussion on supply chain security, the cybersecurity session at Open Chain and Friends shifted focus to another rapidly evolving frontier: the critical importance of secure AI systems. Dr. Maike Massierer from Bosch took the stage, providing an insightful look into the topic. Her session highlighted the critical intersection of AI, cybersecurity, and regulation, especially within the automotive industry.

With AI increasingly powering automotive functions like road sign recognition and navigation, ensuring its security is paramount. Dr. Massierer demystified the EU AI Act, outlining its purpose: to ensure the safe and ethical use of AI across the European Union. Attendees learned about the serious implications of non-compliance and the vital importance of Article 15, which mandates AI systems to meet high standards of accuracy, robustness, and cybersecurity. Beyond regulation, the session offered practical insights into securing AI, with AI-specific Threat and Risk Analysis highlighting how crucial it is for addressing security needs effectively.

The Cyber Resilience Act (CRA) is coming – what developers and open source users need to do now

By Featured

The session provided crucial guidance on preparing for CRA compliance presented by Thomas Liedtke. A key insight clarified the CRA’s interaction with open source. Pure open-source development – code published on platforms like GitHub without commercial activity or monetization – generally falls outside the CRA’s scope. However, at that moment when open-source software becomes part of a commercial product (e.g., an open-source library in commercial software, or components in IoT devices), the entire commercial product must be CRA compliant. Companies must evaluate if they provide “products with digital elements” and, if so, implement controls to secure them throughout their lifecycle.

The session detailed essential compliance activities like cybersecurity concepts, risk management, managing open source dependencies and software supply chain risks. To achieve the appropriate security level of your product you have to follow a risk-based approach, know the elements of the secure market placement and take care about strong access management and data protection, not mentioning the importance of the resilience of your systems. Among the others robust vulnerability management was also highlighted, with specific mention of Article 13 (manufacturers’ obligations) and Article 14 (reporting tasks). This session underscored that for any organization using open source in commercial offerings, understanding and proactively addressing the CRA’s requirements is absolutely essential for future market access. And do not forget about the industry specific regulations for medicine, automotive or aviation if you work in these areas.

Stronger Together: Networking for Cybersecurity Impact

By Featured

In today’s digital landscape, the threat surface is ever-expanding. We face an increasing tide of sophisticated attacks and data breaches, often perpetrated by well-organized adversaries who operate with the efficiency of a company. This reality highlights a critical truth: isolation is no longer an option for defense. The solution is clear: networking instead of silos – said by Christian Billmann. Creating communities and exchange ideas are getting more and more important that is the reason why Cybersecurity Region Stuttgart Meetup was created. Regional and local collaborations have a real impact on cybersecurity defense strategies. This initiative is dedicated to bringing people together, fostering connections, and sharing knowledge. Anyone interested can join their community, easily found on LinkedIn.

Another great initiative is the Automotive Security Research Group (ASRG) which was presented by Dirk Targoni. ASRG was born from the recognition that across the automotive industry, professionals facing similar problems related to cybersecurity. The increasing dependence on external data sources means shared challenges, and the logical response is to work together to solve them. ASRG currently boasts a dedicated network of over 100 volunteers working on different projects and researches.

In an era where attackers pool their resources and knowledge, it’s more critical than ever for defenders to do the same. We are not competitors; we are stronger together.