Ottana, provincia di Nuoro: «Tragedia a Ottana, bimbo di due anni muore nel sonno». Lo riporta L’Unione Sarda.
Malo, provincia di Vicenza: «Malore fatale in casa: morto volto storico del volontariato». Lo riporta L’Eco Vicentino.
Tunisia: «Stroncato da un malore in Tunisia, inutile ogni soccorso». Lo riporta FrosinoneToday.
San Daniele, provincia di Cremona: «Malore improvviso: San Daniele piange». Lo riporta Cremonaoggi.
Sant’Angelo, provincia di Lodi: «Vigilante muore nel supermercato stroncato da un malore durante il lavoro». Lo riporta Il Cittadino di Lodi.
Rimini: «Calciatore e insegnante, Rimini sotto choc: stroncato da un malore a soli 37 anni». Lo riporta RiminiToday.
Iscriviti alla Newslettera di Renovatio 21
Roma: «Clochard morto in cassone a Roma, tra ipotesi malore per il freddo». Lo riporta l’agenzia ANSA.
Savigliano, provincia di Cuneo: «Malore fatale per una donna alla guida». Lo riporta Vita Diocesana Pinerolese.
Trieste: «Morto il migrante colto da malore». Lo riporta RaiNews.
Robbio, provincia di Pavia: «Malore in via Palestro a Robbio, morto il camionista». Lo riporta La Provincia Pavese.
Mercato San Severino, provincia di Salerno: «Ragazza si accascia al volante e muore a 21 anni: dramma nel salernitano». Lo riporta SalernoToday.
Varese: «Cadavere in casa. Indaga la Scientifica: ipotesi malore». Lo riporta malpensa23.
Armio, provincia di Varese: «Malore fatale in strada ad Armio, muore una donna di 66 anni». Lo riporta VareseNews.
Siena: «L’Università è in lutto. Studente di Economia, 24 anni, muore dopo un malore. Doveva dare un esame». Lo riporta La Nazione.
Pisa: «Malore fatale per una collaboratrice scolastica in una scuola dell’infanzia. La donna muore a 61 anni davanti ai colleghi». Lo riporta Orizzonte Scuola Notizie.
Torino: «Malore alla guida, auto contro un camion: muore una donna di 58 anni». Lo riporta TorinoCronaca.
Duino, provincia di Trieste: «La Bisiacaria piange: morta a 51 anni per un malore». Lo riporta Il Piccolo.
Cortina d’Ampezzo, provincia di Belluno: «Vigilante morto nel cantiere olimpico a Cortina, il malore e la telefonata ai colleghi per chiedere aiuto». Lo riporta il Corriere del Veneto.
Iscriviti al canale Telegram
Lecce: «Malore dopo l’uccisione del suo cane da parte di un amstaff: donna incinta perde il figlio». Lo riporta LeccePrima.
Porto Cesareo, provincia di Lecce: «Porto Cesareo in lutto, malore alla guida: muore il commerciante». Lo riporta il Quotidiano di Puglia.
Acquaviva Picena, provincia di Ascoli Piceno: «Giovane mamma stroncata da un malore a letto: aveva solo 30 anni». Lo riporta Oggi Treviso.
Collepasso, provincia di Lecce: «Malore fatale durante il calcetto, vani i soccorsi per un giovane padre di 39 anni». Lo riporta Corriere Salentino.
Treviso: «Malore improvviso, muore a 48 anni. Due mesi fa aveva perso la sorella». Lo riporta TrevisoToday.
Treviso: «Malore improvviso, morto il titolare delle onoranze funebri». Lo riporta TrevisoToday.
Mareno di Piave, provincia di Treviso: «Malore alla guida: camionista accosta e muore. 63 anni, trovato senza vita all’interno del suo mezzo pesante». Lo riporta Oggi Treviso.
Iscriviti alla Newslettera di Renovatio 21
Casale Monferrato, provincia di Alessandria: «Casale Monferrato, stroncato da un malore giocando a calcetto, aveva 64 anni». Lo riporta La Stampa.
Treviso: «Malore fatale, è morta la critica d’arte. A trovare esanime la 64enne è stato il marito». Lo riporta TrevisoToday.
Vaiano, provincia di Prato: «Prato, muore per un malore in ambulanza: chi è la vittima». Lo riporta Il Tirreno.
Ponte di Piave, provincia di Treviso: «Ucciso da un malore nella sala d’attesa del dentista, stava aspettando insieme agli altri pazienti il suo turno». Lo riporta Il Gazzettino.
Livigno, provincia di Sondria: «Malore fatale sulle piste: muore sciatore lecchese di 68 anni». Lo riporta La Provincia Unica Tv.
Magenta, città metropolitana di Milano: «Malore in piscina, gravissima una ragazzina di 17 anni». Lo riporta MilanoToday.
Anzano del Parco, provincia di Como: «Malore improvviso in palestra: uomo di 49 anni soccorso in codice rosso». Lo riporta QuiComo.
Sant’Eulalia di Borgo del Grappa, provincia di Treviso: «Malore alla guida, perde il controllo del furgone e si schianta contro un muro». Lo riporta TrevisoToday.
Osimo, provincia di Ancona: «Crolla per strada colpito da un malore: poliziotto lo salva con il massaggio cardiaco in attesa dei soccorsi». Lo riporta il Corriere Adriatico.
Terni: «Minorenne accusa malore in locale del centro storico». Lo riporta Umbria TV.
Modica, libero consorzio comunale di Ragusa: «Improvvisa scomparsa: malore nel suo locale». Lo riporta Il Domani Ibleo.
Aiuta Renovatio 21
Porto Sant’Elpidio, provincia di Fermo:«Malore choc al pranzo di famiglia. il medico corre a casa: “Era in arresto cardiaco”». Lo riporta il Corriere Adriatico.
Varese: «Malore in strada a Varese: uomo salvato grazie all’intervento dei passanti e dei soccorsi». Lo riporta La Provincia di Varese.
L’arcivescovo Carlo Maria Viganò ha commentato su X la questione del Mercosur, che sta provocando proteste in tutta Europa.
Un’élite eversiva si è impadronita dei governi di quasi tutti i Paesi occidentali. I suoi emissari nei governi considerano i propri cittadini come nemici da estinguere mediante pandemie, guerre, carestie e criminalità.
Sono decenni che i globalisti orgogliosamente rivendicano la paternità dei progetti di depopolamento, nel silenzio complice della stampa mainstream e di tutte le istituzioni civili e religiose. E se i crimini della farsa psicopandemica e le frodi dell’emergenza climatica sono ormai innegabili, appare ormai evidente che il comparto da eliminare è proprio quello dell’agroalimentare, oggi troppo parcellizzato e quindi poco controllabile a livello globale.
Il Mercosur è un trattato di libero scambio con Argentina, Brasile, Bolivia, Paraguay e Uruguay a seguito del quale l’Europa sarà invasa da alimenti prodotti da coltivazioni o allevamenti non sottoposti alle nostre ferree regole sanitarie. La sua approvazione costituisce un attacco all’agricoltura, agli allevamenti, alla pesca e alla salute dei cittadini europei, che avrà come risultato la distruzione del tessuto socioeconomico di intere Nazioni e la dipendenza alimentare dalle multinazionali del settore, tutte riferibili ai fondi di investimento BlackRock, Vanguard e StateStreet che stanno saccheggiando le terre agricole.
Un’élite eversiva si è impadronita dei governi di quasi tutti i Paesi occidentali. I suoi emissari nei governi considerano i propri cittadini come nemici da estinguere mediante pandemie, guerre, carestie e criminalità. Sono decenni che i globalisti orgogliosamente rivendicano la… pic.twitter.com/Xt64ega2ms
— Arcivescovo Carlo Maria Viganò (@CarloMVigano) January 10, 2026
Sostieni Renovatio 21
L’asservimento dei governanti agli interessi dell’élite globalista è ancor più evidente dinanzi alla pianificazione della sostituzione etnica, perseguita allo scopo di cancellare l’identità religiosa, culturale, linguistica ed economica degli Stati e poter meglio controllare le masse. Da Starmer a Macron, da Rutte a Sanchez, dalla von der Leyen alla Meloni, la sorveglianza totale è ormai in fase di realizzazione e diventerà irreversibile con l’introduzione della valuta digitale e l’obbligo dell’ID univoco per l’accesso ai servizi essenziali.
Esprimo quindi il mio pieno sostegno alle manifestazioni di protesta degli agricoltori e degli allevatori europei e britannici, in queste settimane fatti oggetto di una vera e propria persecuzione spietata e ingiustificata. Auspico che i cittadini diano pieno appoggio a queste categorie particolarmente colpite, anzitutto acquistando direttamente da loro ciò che producono, perché è grazie alla loro presenza che possiamo mangiare in modo sano ed evitare alimenti ultraprocessati o geneticamente modificati. Invito a boicottare le aziende della grande distribuzione che sostengono il Mercosur e penalizzano la produzione interna.
L’Unione Europea è un’associazione eversiva criminale: essa non può essere «cambiata dal di dentro», va semplicemente rasa al suolo.
Tucker Carlson ha intervistato il pensatore russo Sergej Karaganov. Il video è di importanza capitale per tutti i cittadini del pianeta, in particolare in Europa. Sarebbe il caso che soprattutto i nostri politici lo guardassero.
Renovatio 21 ha cominciato a parlare della dottrina Karaganov – considerato a Mosca analista di massimo livello, tanto che ad un evento degli scorsi mesi Putin non ha avuto paura di mostrarsi accanto a lui – anni fa, quando il conflitto era appena scoccato, ma era già chiarissimo dove poteva portare la follia occidentale.
Karaganov ribadisce a Carlson quanto già spiegato in passato: per la Russia non ha senso colpire gli USA – il rischio è grande, e la motivazione di fatto non c’è nemmeno – e nemmeno l’Ucraina, stimata come di fatto parte della sfera russa. L’unica opzione è colpire l’Europa, per ristabilire l’ordine ancora una volta: c’è quest’idea reiterata nell’intervento di Karaganov per cui il Vecchio Continente è la fonte del male della storia, che già in altre occasioni ha cercato di distruggere la Russia, senza riuscirvi.
Il disprezzo per l’Europa è massimo, e dettagliosamente illustrato – persino nelle sue pieghe teologiche e filosofiche, con il pericolo del mondo post-umano, transumano e transessuale che viene rigettato in toto dalla Russia.
Da notare come il Karaganov, finita la Guerra Fredda, era stato cooptato dal Council for Foreign Relations (CFR), il think tank dei Rockefeller che è la massima espressione dell’occidentalismo. La de-europizzazione della Russia, come da pensiero di Zbig Brzezinski che già mezzo secolo fa parlava di un processo di asiatizzazione di Mosca da innescare sottraendo l’Ucraina ha portato questo intellettuale da tutt’altra parte. Sì: l’Occidente ha perso la Russia, che pure si era agganciata, e lo ha fatto di proposito, spinto anche, come ha detto Carlson nel prologo, dalle brame degli oligarchi euroamericani.
Ci ritroviamo così con la classe intellettuale russa – che lo aveva fatto sia sotto gli zar che sotto Stalin – a spingere verso l’eurasiatismo, la Russia isolata per sempre dall’Europa (anche in modo, a dirla tutta, confusetto: ecco il Karaganov che ricorda il cristianesimo ortosso, per lui l’unico vero, ma anche poi l’Islam e pure il buddismo che allignano nel territorio della Federazione). E il russo ha pienamente ragione a ritenere che il pericolo di distruzione totale dell’Europa non è da esso percepito – i nostri governanti continuano a soffiare sul fuoco della guerra! – per la degradazione della classe dirigente nostrana, oramai divorziata dalla realtà in maniera tragica e mortifera.
E quindi: come già precedentemente dichiarato, Karaganov ipotizza missili atomici, magari pure ipersonici, sul territorio Europeo, su Gran Bretagna e soprattutto sulla Germania.
Quanto dice l’analista russo dovrebbe entrare negli incubi di ogni uomo europeo – soprattutto, dovrebbe arrivare nella mente di chi sta nella stanza dei bottoni, a Roma, Berlino, Parigi, Londra, Bruxelles. E invece, ci ritroviamo governati da questo gruppo di pazzi scatenati che stanno spingendo i nostri Paesi, e con essi tutta la nostra civiltà, nel baratro.
Essi costituiscono in questo momento il più grande pericolo per noi e per i nostri figli, essi sono i veri nemici dell’umanità e delle nostre famiglie.
Roberto Dal Bosco
Iscriviti alla Newslettera di Renovatio 21
Trascrizione dell’intervista di Tucker Carlson a Sergej Karaganov
Tucker Carlson: signor Karaganov, la ringraziamo molto per essere qui con noi. Come pensa che finirà questa guerra?
Sergej Karaganov: Questa guerra potrebbe e dovrebbe concludersi non solo quando la Russia otterrà la sconfitta totale dell’Europa, auspicabilmente senza eliminarla del tutto. Non stiamo combattendo contro l’Ucraina, né contro Zelens’kyj e simili. Stiamo combattendo di nuovo contro l’Europa, che è stata la fonte di tutti i mali nella storia dell’umanità durante due guerre mondiali.
L’Unione Europea ci ha invaso più volte. L’ultima volta, è stata aperta nel 1941, nel 1945, e il 95% dei Paesi europei è arrivato qui sotto le insegne di Hitler. Ora, incredibilmente, dopo tutte le loro sconfitte, non hanno imparato la lezione. Stanno ancora spingendo per una grande guerra.
Penso che intenda dire che la ragione è ovviamente il fallimento totale delle élite europee. Ma quando parliamo della fine di questa guerra, non si tratta, intendo, di fare come con la guerra in Ucraina. Siamo noi la fonte di questa guerra, e questa è l’Europa malvagia, che, tra l’altro, ha trascinato gli Stati Uniti in guerra più volte e che è stata la fonte delle cose peggiori nella storia dell’umanità, comprese, naturalmente, le guerre mondiali, il razzismo, il colonialismo e molte altre cose buone o cattive, inclusa quella attuale, che è stata la fonte principale dei valori postumani degli europei.
Hanno esportato. Hanno inquinato in parte gli Stati Uniti, quindi ora stiamo combattendo contro questo. Hanno cercato di inquinarli, e non sto parlando di tutta l’Europa, ci sono molte persone perbene e persino paesi buoni lì, ma la domanda è: l’Europa sta tornando a essere quella degli ultimi cinquecento anni, e questa è la fonte di tutti i mali nella storia dell’umanità.
Quindi, cosa significa sconfiggere l’Europa? La guerra non può finire finché la Russia non sconfigge l’Europa, hai detto. Cosa significa…
Per il momento, stiamo pensando a un accordo frammentario sul cessate il fuoco, che è stato offerto in buona fede dal presidente Trump. Di nuovo, finché le élite europee non saranno disposte a continuare lo scontro per salvarsi dalla vecchia copertura dei vecchi errori commessi. Quella guerra non si fermerà.
Quindi sono relativamente scettico riguardo alle possibilità a breve termine di un accordo frammentario. Tuttavia, ovviamente, se riusciamo a ottenere qualcosa lungo il cammino e la gente inizia a smettere di essere uccisa, beh, allora bisognerebbe sfruttare l’opportunità. Ma sono abbastanza sicuro che il loro problema sia molto più profondo. E non è l’Ucraina. Non è lo scenario. È che l’Europa sta di nuovo tornando al suo peggio. E questa è la fonte di ogni male nella storia del lamento.
Perché, secondo lei, da una prospettiva americana, è ovvio che i leader europei siano concentrati sulla Russia nei grandi Paesi, Germania, Francia, Gran Bretagna. La leadership di tutti e tre i Paesi è concentrata sulla Russia come minaccia. Perché, secondo lei?
No. È molto semplice. Sono uno dei fondatori dell’Istituto d’Europa, ed ero un europeista quarant’anni fa. Poi ho imparato meglio e sono diventato molto scettico. Sono dei fallimenti completi sotto tutti gli aspetti. Morali, politici, economici, eccetera.
L’Europa sta affondando. Inoltre, ora non è più in grado di sfruttare il mondo e di incassare la rendita che ha ottenuto grazie alla sua preponderanza militare negli ultimi cinquecento anni. E questo è stato fermato negli anni Sessanta e Settanta, ma è già entrata in una profonda crisi.
Ma a quel tempo, intendo, per una serie di ragioni, l’Unione Sovietica crollò. E loro credevano che la loro età dell’oro sarebbe continuata. Ma ora capiscono che quest’età dell’oro è finita e sono disperati. Capiscono che non potevano andarsene con i soldi degli altri. E cominciano a capire che non potevano andarsene con la protezione degli Stati Uniti. Sì. Perché gli Stati Uniti sono stanchi di loro e non ne hanno più bisogno.
Quindi c’è una disperazione totale in questo strato di élite europee globaliste liberali. E poi, tra l’altro, c’è anche un processo di anti-meritocrazia. Mai nella storia d’Europa abbiamo avuto un livello così basso di capacità intellettuali nella leadership della maggior parte dei paesi europei. Non di tutti, ma quasi.
Quindi l’Europa è sostanzialmente senza benzina. È senza energia. Sta morendo. E quindi lei sostiene che la loro leadership vede nella sconfitta della Russia l’unica via di ritorno.
La continuazione della guerra. All’inizio, hanno pensato alla possibilità di una sconfitta della Russia, il che era una sorta di fantastica illusione. Più di questo, ma ancora alcune persone, a causa della loro incapacità intellettuale ne parlano ancora.
Ma cos’è la sconfitta della Russia? Se la Russia si avvicinasse a una sconfitta, significherebbe che ora userebbe armi nucleari e l’Europa sarebbe fisicamente distrutta. Quindi è semplicemente impossibile anche solo pensarci.
Ma hanno parlato perché hanno bisogno di una guerra per giustificare la loro permanenza al potere, per giustificare la loro esistenza. E non si tratta nemmeno di sconfiggere la logica. Si tratta semplicemente di continuare a vivere con un’Unione Europea in declino, con un’economia in declino, con una posizione europea in declino nel mondo.
Tutti nel mondo ora ridono dell’Europa, che un tempo era, tra l’altro, uno dei centri nevralgici del potere mondiale. E ora è una barzelletta. E, naturalmente, non mi riferisco a tutta l’Europa. Sappiamo che ci sono europei perbene, europei intelligenti.
Sebbene nella mia classe, nella mia classe politica, di pensatori europei e di Europa in politica estera e difesa, eccetera, eccetera, siano rimasti solo uno o due uomini o persone. Li nominerò perché ciò li metterebbe a repentaglio alla luce del pubblico, ma nessun altro. Non ho più alcun interlocutore, quasi nessun interlocutore in Europa.
Sostieni Renovatio 21
Quando dice che tutti sanno che il governo russo, se messo alle strette, userebbe armi nucleari contro l’Europa, intendi dire questo, è questa la mia domanda, e pensi che gli europei lo capiscano?
Gli europei, prima di tutto, perché si sono degradati intellettualmente dopo la cosiddetta rivoluzione civile del 1968, che ha distrutto gran parte dell’istruzione europea. E a causa dell’antimeritocrazia del moderno sistema democratico europeo, non capiscono o non sono in grado di comprendere appieno ciò che sta accadendo.
E poi, stanno coltivando quello che io chiamo «parassitismo strategico». Credono che la guerra non arriverà mai nel loro territorio. Si sono dimenticati della guerra, e questo è terribile perché sono stati loro la fonte della maggior parte delle guerre nella storia dell’umanità.
Ma ora non hanno paura. Quindi uno dei compiti della Russia, oltre ad altri, è quello di farli rinsavire, auspicabilmente senza usare armi nucleari, solo con la minaccia del loro utilizzo, e io critico il mio governo per essere troppo prudente e troppo paziente con loro.
Ma prima o poi, se continueranno a sostenere questa guerra, sacrificando ancora milioni di ucraini e di altri, la perseveranza russa se ne andrà, e dovremo punirli severamente, si spera in senso limitato.
È interessante che tu affermi che i loro leader non temono più le armi nucleari. Si penserebbe che tutti avrebbero paura delle armi nucleari, data la loro capacità distruttiva. Perché qualcuno non dovrebbe temere un attacco nucleare?
Perché mai qualcuno dovrebbe non temere la minaccia di un attacco nucleare? Perché, diciamo così, crediamo che siano come noi, ma non sono come noi. Hanno subito un degrado totale della classe pensante e della classe dirigente.
Quando il cancelliere tedesco parla di ricreare un esercito di massa per diventare l’esercito più forte d’Europa, cosa significa? Significa che condanna il suo Paese all’eliminazione.
Ho parlato con gli europei per gran parte della mia vita adulta. Ho smesso di farlo nel 2013, quando ho partecipato a un incontro dei leader europei e ho detto che se continuate con questo sistema, ci sarà una grande guerra e milioni di ucraini moriranno. E nessuno osava guardarmi negli occhi. C’erano settanta o ottanta persone. La maggior parte, sapete.
Si sono degradati al punto da essere considerati pericolosi. Idioti o idioti morali. Sì. La maggior parte, non tutti, ma la maggior parte.
In un passaggio lei ha affermato: «Non temono più Dio, quindi non temono più la guerra». Qual è il collegamento tra queste due affermazioni?
Non è così. Hanno perso, beh, non tutti, di nuovo. Ci sono persone normali. L’Europa, intendo dire, l’Europa ha perso il suo nucleo, il suo nucleo morale, politico, spirituale.
E ora, come sapete, la maggior parte di loro ha perso la paura, la fiducia in Dio. Questo non significa che abbiano perso la normalità, la maggior parte dei loro tratti umani. L’Europa è sotto questa guida, o sta diventando antieuropea in termini di europeismo storico e persino anti-antiumano.
Hanno portato i nazisti, che erano disumani, eccetera. Ora hanno portato a noi, e voi siete stati contagiati, in misura minore, da qualcosa di assolutamente disumano: la perdita di rispetto per la famiglia, quell’amore tra uomini e donne, quel rispetto per gli anziani, quel patriarcato, eccetera.
Cos’è allora l’Europa? E, naturalmente, gli dei tossici. Cosa resta? È un appiglio morale. Tuttavia, ovviamente, non mi riferisco a tutti gli europei. Ci sono persone normali.
Tuttavia, ovviamente, non posso parlare con loro. Non sono in grado di parlare con loro perché, nella magia, è loro proibito parlare con noi. E se ci parlano, vengono chiamati e convocati alla polizia o ai servizi di sicurezza.
Quindi ho molti, probabilmente ancora molti amici in Europa, ma non ho alcun contatto con loro perché è loro vietato, perché sono élite, parlare con noi, perché sono élite che li stanno preparando alla guerra, almeno moralmente.
Sebbene almeno le stesse élite non riuscissero a comprendere che se la guerra, una vera grande guerra, venisse scatenata in Europa, e prima o poi scoppiasse una guerra in Ucraina, quella che stiamo combattendo con gli europei, come colleghi, non ci sarebbe più l’Europa.
Grazie a Dio abbiamo cambiato la nostra dottrina nucleare. E di recente, il nostro presidente si è detto molto cauto e molto politico, è un uomo molto cauto e molto educato, ma ha detto una cosa molto importante. Ha detto che se l’Europa continua così e se l’Europa entra in un vero conflitto diretto con l’Europa, nessuno in Europa potrà parlare.
Ma spero, prego, prego che lui o noi non dovremo prendere questa decisione. Ma come ho già detto, l’Europa è la fonte dei mali più grandi, e sta tornando ai suoi momenti peggiori.
Due volte in passato, più o meno nell’ultimo anno, gli ucraini hanno tentato, almeno due volte, di uccidere il vostro presidente, il presidente Putin. Questa è la mia interpretazione. Perché pensi che l’abbiano fatto? Qual è il ragionamento?
Beh, è molto semplice. Voglio dire, sono bellicosi. Alcuni credono che potrebbe risolvere il problema della Russia uccidendo un presidente. Il nostro presidente è… beh, ho un problema con il nostro presidente. È troppo cauto. Loro non sono troppo cauti, e lui mostra troppa perseveranza.
Lo critico indirettamente, o a volte anche direttamente, come nella nostra conversazione con lei. Ma loro semplicemente vogliono, ovviamente, non possono farlo. È semplicemente un folle odio verso persone che hanno perso la testa.
Beh, la questione, ovviamente, di come comportarsi con i leader dei paesi stranieri è una questione americana. Come sapete. Eppure stanno fomentando l’odio verso la Russia come matti.
Anche io sono uno storico, in parte. Devo dire che anche Hitler è la Germania. Il loro livello di propaganda anti-russa, la russofobia, era forse più debole o almeno pari a quello che sta accadendo in Europa.
Cosa succederebbe se il suo presidente venisse assassinato dagli ucraini, dall’Europa o dagli Stati Uniti? Quale sarebbe il prossimo passo?
Speriamo, speriamo che ciò non accada. Ma allora, ovviamente, significherebbe che puniremo, si spera, non gli Stati Uniti. Ma l’Europa verrà cancellata dalla mappa dell’umanità.
Dovrebbe essere allontanato dalla mappa geopolitica e geostrategica perché è un fastidio. Spero che non venga punito fisicamente. Anche se sto iniziando a dire che questi idioti non capiscono altro che dolore fisico, e questo non è più tardi.
Dovrei perseguire la lettera di escalation. E se non fermano questa guerra insensata e non ripristinano la stabilità dentro e intorno all’Ucraina, allora dovremmo iniziare ad attaccare l’Europa con armi convenzionali, e poi il passo successivo saranno ondate di attacchi nucleari.
Spero che non arriveremo a quel punto, perché usare armi nucleari richiederebbe almeno un anno. Beh, prima di tutto, ho chiesto al mio governo di intervenire prima. Ma il presidente Putin è molto religioso ed è cauto.
E abbiamo continuato a salire la scala dell’escalation, cambiando la nostra dottrina nucleare e abbassando la soglia nucleare, rafforzando il nostro potenziale nucleare in Europa e altrove, ma nella speranza di poterli fermare prima di varcare la soglia.
Come ho detto, penso che Putin creda che usare armi nucleari, e credo, tra l’altro, che sia un peccato, ma potrebbe anche essere un peccato necessario per salvare l’umanità.
Ecco perché ho chiesto un uso limitato delle armi nucleari contro l’Europa, perché altrimenti il mondo scivolerebbe verso una terza guerra mondiale, verso la quale gli europei ci stanno spingendo tutti. L’hanno già fatto due volte nella storia, risucchiando gli Stati Uniti.
Voi, un paio di volte, li avete salvati. Voi americani. Ora, una volta abbiamo sofferto, ma poi li abbiamo salvati di nuovo, ma ora sono tornati. E con il vecchio gioco, e dobbiamo punirli o aiutarli a cambiare idea.
Non è che non sto chiedendo un cambio di regime, ma se gli europei non divengono una nazione più orientata alla nazione, in una più responsabile, sono spacciati. E detesto questa idea perché culturalmente sono europeo.
Certo, ci stiamo muovendo verso la Siberia o verso est. Stiamo dicendo sinceramente che stiamo diventando una nazione eurasiatica o che stiamo tornando al nostro posto per diventare una nazione eurasiatica, ma la perdita dell’Europa sarebbe un po’ lì.
Iscriviti al canale Telegram
Prima di chiederlecosa pensa che la Russia dovrebbe fare rispetto al resto del mondo, diventare eurasiatica anziché europea, cosa che sembra stia facendo, se ci fossero attacchi nucleari dalla Russia all’Europa nei prossimi uno o due anni, come ha detto che potrebbero verificarsi, quali paesi includerebbero?
Beh, siamo online. Ho scritto più volte che se colpissimo Poznan, gli americani non risponderebbero mai. Gli americani non risponderebbero mai comunque. Ma se lo facessimo, e spero che i polacchi stiano diventando, tra l’altro, più ragionevoli. Capiscono che stanno giocando col fuoco. Stanno cercando di ritirarsi dalla prima linea di questo conflitto.
Ma la mia scelta ricadrebbe su Gran Bretagna e Germania.
Eliminerebbe la Gran Bretagna e la Germania con le armi nucleari…
Spero tanto che non accada. Sì. Ma la Germania dovrebbe essere la prima, perché la Germania è la fonte del peggio che ci sia nella storia europea. Ma spero ancora una volta, ho molti amici tedeschi. Spero che accada.
Credo che lei sia appena tornato da Pechino. Certamente, i legami tra Russia e Cina sono molto, molto più profondi di quanto non fossero quattro anni fa. Da una prospettiva americana, l’idea di un’alleanza permanente tra Russia e Cina sembra essere una minaccia per il nostro futuro. Quest’alleanza è permanente?
Beh, per il momento, per il prossimo futuro, è una fonte di grande forza sia per la Russia che per la Cina, e i nostri amici cinesi lo capiscono. Ora, però, cosa succederà tra dieci o quindici anni, non lo sappiamo. Quindi stiamo pianificando ogni tipo di futuro.
Ma la nostra soluzione migliore è raggiungere un mondo in cui quattro grandi potenze collaboreranno per definire e regole di comportamento nel mondo futuro. Queste quattro potenze sono Cina, Russia, Stati Uniti e India.
E questo tipo di configurazione significa anche che dovremo, e dovremmo farlo, bilanciare la preponderanza complessiva della Cina rispetto alla Russia. Ma in questo momento, la Cina è una risorsa fantastica. Non è una minaccia.
Per ogni evenienza, dovremmo creare questo sistema composto da almeno quattro paesi. Inoltre, stiamo costruendo quella che chiamiamo la Grande Eurasia. Si tratta di un sistema di relazioni in cui la Cina sarà bilanciata dalle principali potenze dell’Eurasia, tra cui India, Persia, Turchia, Russia e altre.
Quindi, ma i cinesi, intendo, abbiamo parlato sinceramente con loro della necessità di bilanciarli. È difficile per loro risolvere questo problema, ma stanno iniziando a capire che è nel loro interesse creare un sistema equilibrato all’interno dell’Eurasia.
Ma a livello mondiale gli Stati Uniti dovrebbero svolgere un ruolo chiave, perché senza di loro non riusciremo ad affrontare gli incredibili problemi che ci troveremo ad affrontare nei prossimi anni.
La Russia mette a repentaglio la propria anima abbandonando l’Occidente, dato che è un Paese ortodosso? La sua eredità culturale è…
Stiamo salvando la nostra anima. Certo, alcuni dei miei compatrioti non saranno d’accordo con me, ma ricordiamo a voi, a me e agli altri che la nostra anima proviene dall’est e dal sud. Abbiamo preso il cristianesimo dalla Palestina.
Le nostre chiese ortodosse sono il vero cristianesimo perché i cattolici se ne sono andati all’inizio del millennio precedente. Abbiamo collaborato con loro, ma, naturalmente, siamo cristiani, siamo fratelli.
Siamo un Paese fortemente islamico, con il venti percento della popolazione. Lo prenderemo anche dal sud. Poi abbiamo una forte popolazione buddista. Lo prenderemo anche dal Sud-Est. E anche l’ebraismo è una religione riconosciuta qui.
E il sistema politico che abbiamo costruito nel corso degli anni, lo abbiamo ereditato dal più grande impero di tutti, l’impero di Gengis Khan. Ma, naturalmente, molti russi ora non sarebbero d’accordo con me, ma è la pura verità.
Siamo un impero asiatico con una fortissima influenza culturale europea, che amiamo e adoriamo. Non ci passeremmo mai, ma non siamo l’Asia. Non siamo europei, grazie a Dio.
E ora stiamo iniziando a riconoscerlo, perché il nostro viaggio europeo è stato quello che Pietro il Grande aveva previsto, per certe ragioni, perché siamo arretrati in termini tecnologici. È finito. Avrebbe dovuto essere più di centocinquant’anni fa.
Ci salverà da molti problemi, tra cui guerre mondiali, comunismo, eccetera. Ora, però, stiamo germogliando, ma speriamo di mantenere nei nostri cuori e nelle nostre menti i tratti del patrimonio culturale europeo che condividiamo con voi.
Aiuta Renovatio 21
Dal suo punto di vista, che effetto hanno avuto le sanzioni occidentali sulla Russia? Crede che le sanzioni abbiano danneggiato la Russia o l’abbiano aiutata?
Oh, sì. Voglio dire, abbiamo invitato… ho chiesto un confronto con noi molto prima che smettessimo di fermarli nell’espansione della NATO, eccetera, molto prima che decidessimo. Ora, ovviamente, intendo, economicamente parlando, sono loro a soffrire.
Ma strategicamente, politicamente e culturalmente, sono stati una benedizione. Con l’aiuto, dobbiamo invitare il fuoco nemico da soli. Abbiamo eliminato i contatti con i compagni. Abbiamo buttato via senza alcuna repressione la quinta colonia.
Stiamo restituendo la nostra cultura russa, la nostra anima russa. Stiamo diventando russi. E l’unico problema con queste sanzioni e con questa guerra è che dobbiamo pagarne le conseguenze con la vita dei nostri soldati.
Ma a parte questo, sono stati benedetti, e non voglio che vengano portati via. Certo, qualcuno dovrebbe esserlo, quindi abbiamo una nave operativa e potremmo guadagnare qualche soldo in più.
Ma la Russia, che è minacciata, è di nuovo una nazione in guerra. Siamo una nazione di guerre. E quando abbiamo iniziato a essere attaccati, anche indirettamente e ora direttamente, allora ci siamo rivolti al meglio. Ed è per questo che il Paese ha vissuto una liberazione incredibile.
L’unico problema è che stiamo perdendo investimenti, e questo fenomeno deve essere fermato.
E questo mi porta alla mia ultima domanda, signor Karaganov: lei ha descritto questa come una guerra, una guerra di civiltà tra Russia ed Europa. Che ruolo giocano gli Stati Uniti, la nostra amministrazione, il nostro presidente, nel porvi fine? Cosa può fare il presidente Trump per porre fine alla guerra?
Beh, in altre parole, sono stati molto cruciali nell’inizio di questa guerra perché l’intero problema è iniziato all’inizio del 2000, quando l’amministrazione americana ha iniziato a fare di tutto per sostenere la questione europea perché aveva paura della possibilità di costruire un’alleanza continentale tra Russia e Germania.
Quindi, in un certo senso, anche gli americani sono stati la fonte del problema. Per quanto riguarda l’offerta dell’amministrazione Trump, non mi è piaciuta l’offerta avanzata dal signor Trump perché non risolve il vero problema.
E il vero problema è l’ostilità europea, l’aggressività europea. Ma per il momento, dovremmo sfruttare questa opportunità, se possibile. E poi, naturalmente, sappiamo tutti che il presidente Trump sta limitando i suoi affari interni.
E, inoltre, ora vediamo che le sue offerte sono vanificate da ogni sorta di sforzo interno da parte della sua corte e dei suoi alleati. Ma se potessimo provare per un po’ con la sua offerta, forse alla fine troveremmo la soluzione al problema. E questa soluzione al problema è, ovviamente, come ho detto, l’Europa.
Tuttavia, purtroppo non prevedo questa possibilità. Quindi, anche se fermiamo questa guerra, dovremmo essere pronti, quando riprenderà, a eliminarne la fonte. E questa è una prerogativa delle élite europee. E sono disposte ad alimentare ancora la guerra nel subcontinente europeo. Ma diamo una possibilità a Trump. Anche se non sono sicuro che lui o noi potremmo riuscirci, date le circostanze.
Sapete, la situazione interna negli Stati Uniti è difficile. E, tra l’altro, non potevamo fare affidamento con tutto il rispetto sul vostro presidente. Ha un Paese alle spalle, profondamente diviso. Ha un’opposizione enorme. E poi sta giocando a tutto campo.
Quindi non credo, spero che potremo trovare un accordo, ma stiamo osservando con molta attenzione il fatto che l’amministrazione presidenziale abbia rapito il leader di un grande Paese. Stiamo insistendo con molta attenzione sul fatto che i marines americani si comportino come pirati in alto mare, sequestrando petroliere, indossando bandiere russe, vessilli russi. Se continua così, dovremo tornare a imporre dazi doganali, ma vorremmo avere, non è un rapporto cordiale, un buon rapporto con gli Stati Uniti e con altri due grandi Paesi del mondo. Vedremo se riuscirà a mantenere la promessa. Credo che voglia mantenerla, ma se ne sarà in grado è una grande domanda.
Quindi incrociamo le dita. E diamoci la certezza assoluta. Speriamo che sia sincero, ma non ci fidiamo delle politiche americane. E in un certo senso, le sue proposte sembrano una trappola, ma una trappola, perché non succede nulla. Continuare la guerra. Non sto parlando di pace, pace, pace, pace. Riferendomi a chissà, altre persone in Europa che la stanno bloccando.
E sembra che questa guerra stia continuando e forse gli Stati Uniti, alla fine, non vorranno terminarla. Quindi dovremo tornare alla soluzione, che ho menzionato più volte. E cioè iniziare a punire i nostri nemici europei con la consapevolezza, si spera, che gli Stati Uniti lo faranno, e sapendo che si asterranno dal partecipare a una guerra nucleare in Europa.
Credo sia importante che i politici americani e i cittadini americani comprendano la prospettiva russa, e le sono grato per avercela offerta, signor Karaganov. Grazie mille per il suo tempo.
Grazie. È stato un piacere. Grazie anche da parte mia.
Next month, the annual Most Inspiring Women in Cyber Awards will take place at The BT Tower, London, celebrating some of the industry’s most inspirational – and oftentimes unsung – women.
Sponsored by Fidelity International, BT, Plexal and Bridewell, and proudly supported by industry-leading diversity groups WiTCH, WiCyS UK&I and Seidea, the 2026 event is set to be bigger than ever. To make sure everyone has had the chance to nominate, we’ve extended the nomination deadline until the 16th January 2026, 5pm GMT.
For now, it’s time to introduce our 2026 judges, who have the exceptionally hard task of picking this year’s top 20 and five ones to watch…
Yasemin Mustafa, Director of the Cyber Security Portfolio at BT
Adam Haylock, Head of Global Cyber and Information Security Department at Fidelity International
Rebecca Taylor, Co-Author of Co-Author of Securely Yours: An Agony Aunts’ Guide To Surviving Cyber, and Threat Intelligence Knowledge Manager and Researcher at Sophos
Adaora Uche, GRC Lead at THG (representing Seidea)
Joanne Elieli, Cyber Lead and Litigation Partner at Stephenson Harwood LLP
Diane Gilbert, Senior Lead for Programmes at Plexal
Yvonne Eskenzi, Co-Founder of Eskenzi PR and Founder of The Most Inspiring Women in Cyber Awards
Jennifer Cox, Director of Solutions Engineering, EMEA and APAC, at Tines (representing WiCyS UK&I)
Hannah Arnold, London Ambassador for WiTCH – Women in Tech & Cyber Hub
The Gurus spoke to some of our judges about the 2026 awards and what they’re looking for in a good application.
Adaora Uche, GRC Lead at THG
Why are initiatives like this so important?
Initiatives like this matter because visibility changes possibility. Cybersecurity is still an industry where many women don’t see themselves reflected in leadership, technical authority, or decision-making roles. By intentionally spotlighting women who are doing impactful work, we challenge outdated perceptions of who belongs in cyber and what success looks like.
Beyond recognition, these initiatives create role models, momentum, and community. They validate the work women are already doing – often quietly and behind the scenes, and help open doors for others who are earlier in their journeys. Representation is not just symbolic, it is a powerful driver for inclusion, retention, and long-term change in our industry.
Why should people nominate?
People should nominate because inspiration often goes unrecognised unless someone speaks up. So much impactful work in cybersecurity happens behind the scenes. Particularly in governance, risk, privacy, and security leadership, where success often looks like problems prevented, risks mitigated, or the right questions being asked early. This kind of impact does not always attract attention, but it is critical.
A nomination is more than an accolade; it is an act of recognition and encouragement. It tells someone that their work matters, that they are seen, and that their journey can inspire others. Nominating also helps broaden the narrative of cybersecurity by showcasing diverse paths, backgrounds, and contributions that might otherwise go unnoticed.
What makes an ‘inspiring woman’ in cyber in your eyes?
First and foremost, I believe every woman in cybersecurity is inspiring. Simply showing up each day to help make the digital world safer, often in complex, high-pressure environments, is truly heroic.
An inspiring woman in cyber creates impact while lifting others as she progresses. She may be a technical expert, a strategist, a leader, or an educator, but what sets her apart is purpose, resilience, and a commitment to making the space better than she found it. She does not just respond to challenges, she anticipates them, questions the status quo, and contributes to safer, more ethical, and more inclusive digital environments.
She does not need to dominate the room to lead. Her credibility comes from consistency, thoughtfulness, and sound judgement. It also stems from her unwavering commitment to building systems and teams that are secure, resilient, and future-ready. Importantly, she uses her voice, whether in boardrooms, classrooms, or communities to share knowledge, mentor others, and make cybersecurity more accessible and human.
Adam Haylock, Head of Global Cyber and Information Security Department at Fidelity International
Why are initiatives like this so important?
I often find myself in meetings counting the number of male versus female attendees. Too often, there are only one or two women in the room, surrounded by many more men.
In cyber, many men take for granted that they don’t have to overcome that initial sense of standing out before even contributing to the discussion or holding their ground. While we are making some progress in addressing the gender imbalance, initiatives like this are vital in keeping the spotlight on an issue that still matters deeply. They help encourage more women to put themselves forward, particularly where they may previously have hesitated, and to feel recognised and valued for the outstanding work they do, inspiring others along the way.
Why should people nominate?
Nominations reinforce the value that female talent brings to our field. Diversity of thought, approach and communication is critical in cyber, a discipline that is as much about culture and behaviour as it is about technology.
Recognising and celebrating female talent strengthens that value proposition, especially when nominations come from male colleagues who see first-hand, and rely on, the expertise and impact that women bring to our teams.
What makes an ‘inspiring woman’ in cyber in your eyes?
Being in the minority in any environment can create invisible barriers and perceptions that are difficult to overcome. For me, an inspiring woman in cyber – a male-dominated field – is someone willing to step outside her comfort zone, try new things, take risks, and learn from setbacks.
Standing out in a male-dominated environment requires real courage, and that courage is inspiring in itself. We need more visible role models like this to attract more women into cyber and to show that it is a field where they can thrive, feel valued, and build rewarding careers.
Rebecca Taylor, Co-Author of Securely Yours: An Agony Aunts’ Guide To Surviving Cyber, and Threat Intelligence Knowledge Manager and Researcher at Sophos
Why are initiatives like this so important?
Initiatives like the ‘Most Inspiring Women in Cyber Awards 2026’ are so important because they shine a light on women who are accomplishing amazing things in an industry that is still largely male-dominated. Recognising these achievements in an inclusive and safe way helps ensure women feel seen, valued, and celebrated for their expertise and impact.
Beyond individual recognition, these initiatives also create visible role models. Seeing women celebrated for their achievements inspires others to enter the field, stay in the industry, and aim higher. It helps challenge outdated stereotypes, builds confidence, and fosters a stronger sense of community and belonging.
Ultimately, celebrating women in cyber isn’t just about awards – It’s about changing culture. It encourages equity, boosts morale, and helps build a more diverse, inclusive, and resilient cybersecurity industry for everyone.
Why should people nominate?
People should nominate because recognition matters! Nominating is a powerful way to celebrate women who are accomplishing amazing things and making a real impact. Remember that a nomination (let alone a win!) can boost confidence, open doors to new opportunities, and remind someone that their work truly matters. Get those entries in!
What makes an ‘inspiring woman’ in cyber in your eyes?
In my eyes, an ‘inspiring woman in cyber’ is someone who brings others with them into the conversation. They lift people up, share knowledge, and create space for others to learn, grow, and feel they belong. They want to leave a positive footprint, not just through their work, but through the way they support and encourage those around them. They are a role model, someone who shows what’s possible and inspires others to follow their own path in cyber with confidence and purpose.
It isn’t about money, job titles, or seniority. It’s about impact. An inspiring woman is thriving in what they do, and you can see that they genuinely love their work. That passion is contagious and motivating to others.
Joanne Elieli, Cyber Lead and Litigation Partner at Stephenson Harwood LLP at Stephenson Harwood LLP
Why are initiatives like this so important?
Initiatives like this are instrumental in recognising and celebrating the achievements of women in cybersecurity, helping to raise their visibility and inspire others. These initiatives encourage diversity, challenge stereotypes, and can empower the women being recognised to stay and advance in the field. By providing networking opportunities and driving positive industry change, initiatives like this can also help to create a more inclusive and innovative cyber sector.
Why should people nominate?
Nominating women in the cyber industry is a meaningful way to recognise and celebrate their expertise, dedication, and achievements. Formal nominations help to bring the contributions of our exceptional women to light, ensuring they receive the appreciation they deserve. This visibility can inspire other women and girls to pursue careers in cybersecurity, which in turn fosters a more diverse and inclusive industry.
What makes an ‘inspiring woman’ in cyber in your eyes?
An inspiring woman in cyber, in my eyes, is someone who demonstrates exceptional skill and dedication to her work while also uplifting and supporting others in the industry. She is passionate about solving complex problems and is eager to learn and adapt in a rapidly changing industry. Beyond her technical abilities, she actively shares her knowledge, mentors others, and advocates for diversity and inclusion. Her resilience in overcoming challenges and her willingness to break new ground make her a role model for both current and future generations in cybersecurity.
Jennifer Cox, Director of Solutions Engineering, EMEA/APAC, at Tines
Why are initiatives like this so important?
Women’s representation in cybersecurity still has a lot of ground to cover, and initiatives like this shine a light on those who are making an impact both technically and culturally. Recognition not only celebrates achievement but also helps change perceptions; it shows the next generation that there’s space for them here, no matter their background or neurotype. When we platform diverse voices, we accelerate innovation and make our industry stronger, more inclusive, and more human.
Why should people nominate?
Nominating someone is a simple but powerful act of allyship and pride. Many brilliant women in cyber are so focused on lifting others up or doing the hard, often invisible work that they rarely stop to celebrate themselves. A nomination says, “I see you, I value what you’re doing, and you’re shaping this industry.” You never know who might need that encouragement to keep going or step into an even bigger role, and for other women just starting their cybersecurity careers visibility of these trailblazers and their capabilities is key.
What makes an ‘inspiring woman’ in cyber in your eyes?
For me, an inspiring woman in cyber is someone who leads with both competence and compassion. She’s technically grounded, but she also uses her voice and position to make space for others; especially those whose stories aren’t often heard. She’s authentic, curious, resilient, and not afraid to challenge the norm. Above all, she shows that success in cybersecurity isn’t about fitting a mould; it’s about rewriting it so more people can belong.
In Formula 1, milliseconds matter… and so does security. Keeper Security has helped Atlassian Williams F1 Team tighten its cyber defences, revealing how the iconic racing team is using KeeperPAM to protect its data, systems and global operations without taking its foot off the accelerator.
Announced on 13 January 2026, a new case study from Keeper Security details how Atlassian Williams F1 Team has overhauled its privileged access strategy using KeeperPAM, a unified, cloud-native Privileged Access Management (PAM) platform built on zero-trust and zero-knowledge principles. With terabytes of sensitive telemetry and performance data generated every race weekend, any breach, whether trackside or back at base, could be race-ending.
Unlike many organisations, Atlassian Williams F1 Team’s infrastructure isn’t parked in one place. It’s constantly on the move, travelling across more than 20 countries each season. From airports and paddocks to garages and headquarters, the team needed cybersecurity that could keep pace with a relentless global schedule without adding friction.
“We travel to more than 20 countries each season, and every week we’re in a new location,” said James Vowles, Team Principal, Atlassian Williams F1 Team. “Our infrastructure isn’t sitting safely in a single building – it’s traveling with us. That means we have to be secure wherever we are, from airports to garages to our HQ at Grove. With Keeper, we can build that fortress around our operations.”
KeeperPAM delivered that protection by putting zero trust at the heart of access control. Through role-based access, privileged session monitoring and automated provisioning, the platform allows Atlassian Williams F1 Team to enforce least privilege while keeping engineers and staff moving at racing speed.
The team has also streamlined operations by funnelling all privileged connections through a single platform, giving security teams better visibility and faster reaction times when something looks off.
“We now have a single platform where all of our connections go through,” said Harry Wilson, former Head of Information Security, Atlassian Williams F1 Team. “We can apply policies, monitor usage and generate alerts when something unexpected happens. Doing that on our server estate was critical to us.”
KeeperPAM brings together enterprise password management, secrets management, privileged session management, endpoint privilege management, secure remote access and dark web monitoring into one cloud-native platform. By replacing legacy tools with a single solution, Keeper Security says organisations gain real-time visibility, automated least-privilege enforcement and AI-driven threat detection, helping them spot threats before they cross the finish line.
For Atlassian Williams F1 Team, flexibility was just as important as control. Engineers occasionally need elevated access, but only when it’s genuinely required and never longer than necessary.
“There are times when employees need local admin rights on a case-by-case basis,” added Wilson. “With Keeper, we can grant that access in real time and remove it automatically, which gives us confidence that privileged access is always controlled and temporary.”
Keeper Security believes modern PAM needs to work quietly in the background, more like a finely tuned race engine than a heavy braking system.
“Modern PAM has to do more than secure credentials. It has to automate provisioning, rotate secrets and eliminate standing privileges – all without burdening IT teams,” said Craig Lurey, CTO and Co-founder, Keeper Security. “That’s why we designed KeeperPAM to replace complexity with automation, freeing organisations like Atlassian Williams F1 Team to focus on what they do best.”
By centralising all credentials within a zero-knowledge environment, Atlassian Williams F1 Team has eliminated plaintext exposure while automating the provisioning and deprovisioning of privileged access. The result is lower operational overhead for IT teams and fewer roadblocks for engineers pushing performance innovation.
With KeeperPAM in place, Atlassian Williams F1 Team can now operate securely on any device, on any network, anywhere in the world. In a sport where marginal gains make all the difference, cybersecurity has become another competitive edge, helping the team stay secure, agile and firmly in the race.
Renovatio 21 pubblica l’omelia dell’arcivescovo Carlo Maria Viganò
Invenerunt in Templo
Omelia nella Domenica tra l’Ottava dell’Epifania Sacra Famiglia di Gesù, Giuseppe e Maria
Et erat subditus illis.
Lc 2,51
Dopo la manifestazione ai pastori nella Notte Santa e la pubblica manifestazione ai Re Magi nel giorno dell’Epifania, la liturgia di questa Domenica ci porta nell’intimità della Sacra Famiglia. L’istituzione di questa festa è relativamente recente: fu Leone XIII nel 1893 a istituirla per la terza Domenica dopo l’Epifania, e Benedetto XV, nel 1921, a fissarla alla Domenica tra l’Ottava.
Non dimentichiamo che in quegli anni la Chiesa Cattolica e la società erano reduci dalle persecuzioni dei governi liberali e massonici dell’Ottocento e dagli orrori della Grande Guerra. L’attacco alla società cristiana si stava concretizzando anzitutto contro la famiglia, e in particolare contro la famiglia cattolica. D’altra parte, questo piano dissolutore era stato da tempo teorizzato nelle Logge, trovando realizzazione col passare del tempo. A nostri giorni, l’ideologia woke di matrice satanica, considera la famiglia tradizionale e patriarcale come un ostacolo alla instaurazione del Nuovo Ordine globalista, e per questo impone la cancellazione dell’intera civiltà greca, romana e cristiana.
La festa che celebriamo oggi costituisce dunque la provvidenziale risposta con la quale la Santa Chiesa difende senza timore la famiglia naturale, elevata all’ordine soprannaturale con il Sacramento del Matrimonio istituito da Nostro Signore. A questa cellula indispensabile della società – cui nessuna autorità terrena potrà mai sostituire alcun surrogato senza meritare i più severi castighi di Dio – la saggezza dei Romani Pontefici ha additato come modello la Sacra Famiglia di Gesù, Maria e Giuseppe: una famiglia che è santa in quanto composta non solo da Santi, ma dal Verbo di Dio fatto carne, dalla Semprevergine Madre di Dio e dal di Lei castissimo Sposo Giuseppe, della stirpe del Re Davide e Padre putativo di Nostro Signore.
Iscriviti alla Newslettera di Renovatio 21
Una famiglia specialissima ma normale: speciale per i suoi membri, normale perché anche per essi vediamo valere quella gerarchia che il mondo moderno tanto aborrisce: una gerarchia che è ontologicamente patriarcale proprio perché fondata sulla divina Paternità dell’Eterno Padre, del Quale ci ha costituiti eredi Nostro Signore Gesù Cristo. Come figli di Dio nell’ordine della Grazia, diventiamo anche figli della Regina Crucis, di Colei che sul Calvario il Signore morente ci ha dato quale Madre di ciascuno di noi e dell’intero corpo ecclesiale, onde La invochiamo Mater Ecclesiæ.
La Sacra Famiglia è imago Ecclesiæ: dove vi è un Padre comune che la governa, una Santa Madre provvida che educa i suoi figli, e una innumerevole prole di Cristo che vede la luce nelle acque del Battesimo ed è condotta verso i pascoli eterni. È modello di un ordine, un κόσμος divino perfetto e valevole per tutti i tempi e tutti i luoghi: quello della famiglia naturale fondata sull’unione di un uomo e una donna e avente come scopo precipuo la propagazione dell’umanità e l’educazione dei figli.
Una famiglia che alle Nozze di Cana il divin Maestro ha elevato a immagine dell’amore di Cristo per la Chiesa, e che l’Apostolo Paolo ha mirabilmente delineato nell’Epistola agli Efesini (Ef 5, 22-33). Una famiglia che è per così dire trinitaria, in quanto mistica cooperatrice dell’azione creatrice di Dio Padre, dell’azione redentrice del Figlio e di quella santificatrice dello Spirito Santo. L’amore che unisce lo sposo alla sposa nel comunicare la vita è un tenue raggio di quell’Amore divino che unisce il Padre al Figlio; un Amore così perfetto e infinito da essere Dio Egli stesso, lo Spirito Santo che procede dal Padre e dal Figlio, e che è Signore e dà la vita.
Una famiglia, infine, che è al proprio interno gerarchica perché essa stessa e i suoi membri sono a loro volta inscritti nell’ordine che pone la Maestà di Dio al di sopra di ogni creatura.
In una famiglia in cui gli sposi e i figli amano il Signore e seguono i Suoi Comandamenti, l’amore tra i coniugi e l’amore reciproco tra genitori e figli certamente implica ma in qualche modo supera l’obbedienza, rendendo vive e vissute le parole di San Paolo: Al di sopra di tutto poi vi sia la carità, che è il vincolo di perfezione. E la pace di Cristo regni nei vostri cuori, perché ad essa siete stati chiamati in un solo corpo (Col 3, 14-15).
Così, come obbediamo volentieri a Dio perché Lo sappiamo buono e misericordioso, allo stesso modo obbediamo ai genitori o chiediamo obbedienza ai nostri figli perché tra essi regna la carità, vincolo di perfezione. Al di sopra di tutto, dice San Paolo, vi sia la carità: ossia Dio, che è Carità (1Gv 4, 16). Rimanere nella carità è dunque rimanere in Dio: qui manet in caritate in Deo manet, et Deus in eo (ibid.).
Vi è anche una famiglia celeste, carissimi fedeli: la Santa Chiesa Cattolica, Apostolica e Romana. Una famiglia in cui abbiamo Dio quale Padre, Nostro Signore quale fratello, la Vergine Immacolata come nostra Madre. In questa famiglia sono raccolti i Cattolici, Corpo Mistico sottomesso a Gesù Cristo Re e Pontefice, suo Capo divino. In questa società perfetta, che ha per scopo la santificazione delle anime nell’interregno tra l’Ascensione di Nostro Signore e la Sua gloriosa Venuta alla fine dei tempi, l’obbedienza al Padre celeste viene prima dell’obbedienza al padre terreno.
È per questo che vediamo il dodicenne Gesù, durante un pellegrinaggio a Gerusalemme, allontanarSi dai Genitori e rimanere nel tempio ad ascoltare e interrogare i dottori della Legge. Egli ricorda alla Madonna e a San Giuseppe di avere una missione da compiere: Non sapevate che io devo occuparmi delle cose del Padre mio? (Lc 2, 49) Il Signore ricorda a noi, tanto come figli quanto come genitori, che lo scopo di una famiglia cattolica non si esaurisce nel propagare la specie ed educarla secondo la legge di natura, ma implica e impone la gravissima responsabilità di battezzare e istruire i figli nell’ unica vera Religione, usando la propria autorità di genitori per consentire loro di vivere virtuosamente e di evitare il peccato.
Implica e impone anche la capacità di comprendere quando il Signore chiama un’anima a servirLo nella vita sacerdotale o religiosa, dando ai genitori la possibilità di mutare in Grazie la loro umana sofferenza per il distacco da un proprio figlio che hanno amato e visto crescere, e che come Maria e Giuseppe ritroveranno nel tempio.
Sostieni Renovatio 21
I figli, se vorranno essere davvero obbedienti, dovranno comprendere che il modo più efficace per contrastare i principi infernali della Rivoluzione consiste nella difesa di quel patriarcato che si regge sul vero concetto di obbedienza, e non sulle sue deviazioni per eccesso – il servilismo – o per difetto – l’insubordinazione a qualsiasi autorità. Il Signore li ricompenserà per la loro santa obbedienza a ciò che legittimamente chiedono loro i genitori, e suggerirà loro come comportarsi virtuosamente qualora sia necessario disobbedire all’autorità paterna per non disobbedire a Dio.
Poniamoci sotto il patrocinio della Sacra Famiglia, e prendiamoci il tempo di recitare quotidianamente – se già non lo facciamo – quella cara preghiera a San Giuseppe composta da Papa Leone XIII, in cui troviamo compendiate le nostre speranze:
Proteggi, o provvido Custode della divina Famiglia, l’eletta prole di Gesù Cristo; allontana da noi, o Padre amantissimo, la peste di errori e di vizi che ammorba il mondo; assistici propizio dal cielo in questa lotta contro il potere delle tenebre, o nostro fortissimo protettore; e come un tempo scampasti alla morte la minacciata vita del Pargoletto Gesù, così ora difendi la santa Chiesa di Dio dalle ostili insidie e da ogni avversità; e stendi ognora sopra ciascuno di noi il tuo patrocinio, affinché a tuo esempio e mediante il tuo soccorso possiamo virtuosamente vivere, piamente morire, e conseguire l’eterna beatitudine in cielo.
E così sia.
+ Carlo Maria Viganò
Arcivescovo
Viterbo, 11 Gennaio MMXXVI Dominica infra Oct. Epiphaniæ Sanctæ Familiæ Jesu, Mariæ, Joseph
Renovatio 21 traduce questo articolo per gentile concessione diChildren’s Health Defense. Le opinioni degli articoli pubblicati non coincidono necessariamente con quelle di Renovatio 21.
Martedì Bayer ha intentato una causa federale, accusando Pfizer, Moderna e Johnson & Johnson di aver utilizzato illegalmente la tecnologia di ottimizzazione dell’mRNA – originariamente sviluppata da Monsanto per modificare geneticamente le colture – come piattaforma per i loro vaccini contro il COVID-19, ha riportato Reuters. Bayer ha acquisito Monsanto nel 2018.
Bayer ha intentato causa presso un tribunale federale contro i produttori di vaccini contro il COVID-19 Pfizer, Moderna e Johnson & Johnson (J&J).
Martedì il colosso chimico ha accusato le case farmaceutiche di aver utilizzato illegalmente la tecnologia di ottimizzazione dell’mRNA, originariamente sviluppata da Monsanto, come piattaforma per i loro vaccini contro il COVID-19, ha riportato Reuters.
Le cause legali sostengono che le tre aziende hanno utilizzato la tecnologia brevettata da Monsanto, vecchia di decenni, per rimuovere le «sequenze problematiche» dal codice genetico, al fine di migliorare la stabilità dell’mRNA e l’espressione proteica, ostacoli che i produttori di vaccini avevano precedentemente identificato come sfide chiave nello sviluppo dei vaccini.
Sostieni Renovatio 21
Sebbene la J&J abbia utilizzato un vettore virale, non la tecnologia mRNA, per il suo vaccino, la causa sostiene che la J&J si è affidata anche alle stesse tecniche brevettate di ingegneria genetica per stabilizzare e amplificare l’espressione proteica nei suoi vaccini.
«Una delle più grandi aziende agrochimiche al mondo, responsabile di danni ingenti causati dal suo erbicida altamente tossico glifosato, è ora in tribunale federale sostenendo che le piattaforme del mortale “vaccino” contro il COVID-19 sono state sviluppate utilizzando tecnologie OGM [organismi geneticamente modificati] rubate».
Negli atti processuali, Bayer ha dichiarato di non voler interferire con la produzione dei vaccini contro il COVID-19, né con altri vaccini a mRNA. Al contrario, intende ottenere una quota dei profitti derivanti dai prodotti farmaceutici più redditizi della storia.
Nella denuncia si afferma:
«Gli imputati hanno tratto notevoli profitti dalla vendita di vaccini illeciti in tutto il mondo. Il sistema dei brevetti fornisce un quadro importante e prevedibile per il progresso della conoscenza scientifica, consentendo alle aziende un periodo di tempo limitato per recuperare almeno una royalty ragionevole per l’uso non autorizzato delle loro invenzioni brevettate».
«I querelanti chiedono questo risarcimento di base concesso al titolare di un brevetto ai sensi della legge sui brevetti».
Pfizer e BioNTech hanno guadagnato oltre 3,3 miliardi di dollari dalle vendite globali del loro vaccinoComirnaty contro il COVID-19 solo nel 2024, mentre Moderna ha guadagnato 3,2 miliardi di dollari da Spikevax, ha riportato Reuters. I guadagni delle aziende nel 2025 derivanti dai vaccini rappresentano solo una frazione di quanto realizzato dalle case farmaceutiche al culmine della pandemia.
Bayer cerca una quota dei profitti passati e futuri del vaccino COVID
Le cause legali sostengono che la pandemia ha causato più di 7 milioni di morti in tutto il mondo e 1,2 milioni negli Stati Uniti e attribuiscono all’operazione Warp Speed il merito di aver salvato milioni di vite.
Tuttavia, sostengono, dietro questo «successo» ci sarebbe l’uso non autorizzato della tecnologia sviluppata da Monsanto negli anni ’80 e per la quale aveva depositato un brevetto nel 1989. L’ufficio brevetti e marchi degli Stati Uniti non ha rilasciato il brevetto fino al 2010.
Tutti e tre i casi si concentrano sulla tecnica del «brevetto ‘118» che ha permesso loro di modificare una sequenza genica strutturale riducendo le sequenze destabilizzanti e sostituendo codoni diversi.
I codoni sono sequenze nucleotidiche che contengono istruzioni genetiche. Vengono utilizzati per aumentare la produzione proteica e migliorarne la stabilità, un processo noto come «ottimizzazione dei codoni».
Bayer e Monsanto fanno risalire l’invenzione agli scienziati della Monsanto, il dott. David Fischhoff e il dott. Fred Perlak, che svilupparono la tecnologia per modificare geneticamente le colture in modo che fossero resistenti a parassiti e virus.
Secondo la denuncia, gli scienziati di Monsanto hanno scoperto che alcune sequenze ricorrenti nei geni potrebbero innescare instabilità e scarsa espressione. La creazione di geni in grado di codificare una proteina senza quelle sequenze ha aumentato drasticamente la produzione di proteine nelle cellule vegetali e animali.
Il processo da loro sviluppato a tale scopo «rappresenta un’importante scoperta che può apportare benefici ad applicazioni in altri settori oltre a quello agricolo», si legge nelle denunce, «compreso quello farmaceutico».
Tutte e tre le denunce sostengono che ciascun imputato ha utilizzato il metodo brevettato da Monsanto per rimuovere circa 100 «sequenze problematiche» dalle istruzioni genetiche della proteina spike del SARS-CoV-2, al fine di aumentarne la stabilità e l’espressione. Il processo è stato utilizzato per migliorare l’efficacia dei vaccini.
Bayer ha richiesto un processo con giuria e chiede di ricevere parte dei proventi già generati dai vaccini, insieme alle royalty sulle vendite future.
Iscriviti al canale Telegram
La Bayer ha subito un duro colpo finanziario per l’erbicida Roundup della Monsanto
Da quando ha acquisito Monsanto, Bayer ha subito ingenti perdite finanziarie in un’ondata di cause legali che miravano a ritenere Bayer responsabile del cancro causato dal glifosato, un ingrediente chiave dell’erbicida Roundup di Monsanto.
Le cause legali hanno costretto Monsanto a rimuovere il glifosato dal Roundup venduto ai consumatori, ma non dalla formulazione commerciale utilizzata dagli agricoltori.
Bayer ha anche chiesto alla Corte Suprema degli Stati Uniti di pronunciarsi su una causa che il colosso chimico ha perso in un tribunale di grado inferiore. Il caso chiede alla Corte di stabilire che, se l’Agenzia per la Protezione Ambientale degli Stati Uniti non richiede un’avvertenza di sicurezza sull’etichetta di un pesticida, gli stati non possono richiedere avvertenze simili e i consumatori non possono quindi citare in giudizio i produttori di pesticidi per non averli avvertiti di potenziali rischi per la salute.
Monsanto produce semi geneticamente modificati Roundup Ready, progettati per coltivare mais e soia in grado di sopravvivere alla spruzzatura di glifosato, introdotta per la prima volta dall’azienda nel 1996.
Renovatio 21 offre questa traduzione per dare una informazione a 360º. Ricordiamo che non tutto ciò che viene pubblicato sul sito di Renovatio 21 corrisponde alle nostre posizioni.
A cyber attack on shared IT systems used by several London councils has resulted in the theft of personal data relating to thousands of residents, raising renewed concerns about the resilience of local government cyber security and the risks posed by interconnected public-sector infrastructure.
Kensington and Chelsea Council confirmed that sensitive personal information was accessed during the incident, which also disrupted services across neighbouring boroughs. The attack prompted swift intervention from the National Cyber Security Centre (NCSC) and the Metropolitan Police, underlining the seriousness of the breach.
Cyber security leaders warn that the incident reflects a broader and accelerating threat to public-sector organisations. Darren Guccione, CEO and co-founder of Keeper Security, noted that this is the second significant cyber incident affecting a UK local authority in less than two months, highlighting how persistently councils are being targeted.
“Councils and other arms of government remain high-value targets for cybercrime because they hold extensive sensitive personal data and operate interconnected, often legacy, systems that are both attractive to attackers and difficult to defend at scale,” Guccione said. He added that the frequency of these attacks suggests adversaries are shifting away from opportunistic intrusion towards sustained and sophisticated campaigns designed to exploit systemic weaknesses and undermine public trust.
The technical characteristics of the attack have also raised alarm among experts. Graeme Stewart, head of public sector at Check Point, said the incident shows “all the signs of a serious intrusion”, citing multiple boroughs being taken offline and internal warnings instructing staff to avoid emails from partner councils.
“That’s classic behaviour when attackers get hold of credentials or move laterally through a shared environment,” Stewart said. “Once they’re inside one part of the network, they can hop through connected systems far faster than most councils can respond.”
Stewart added that the rapid shutdown of services suggests authorities feared escalation into encryption or large-scale data theft. “Councils hold incredibly sensitive material – social-care files, identity documents, housing records. If attackers got near that, the fallout wouldn’t stay local,” he warned.
The incident has also highlighted the risks created by shared and centralised IT platforms across local government. Dray Agha, senior manager of security operations at Huntress, described such environments as a “double-edged sword”.
“While shared systems are efficient, the breach of one council can instantly compromise its partners, crippling essential services for hundreds of thousands of residents,” Agha said. He stressed the need to move beyond purely cost-driven IT strategies and towards segmented, resilient architectures capable of containing attacks before they spread.
For residents affected by the breach, the immediate concern is how their personal information may be misused. Chris Hauk, consumer privacy advocate at Pixel Privacy, urged individuals to remain vigilant for phishing and fraud attempts, while calling on the council to provide tangible support.
“People that have had their data exposed should stay alert for phishing schemes and other scams,” Hauk said. He added that Kensington and Chelsea Council should offer free credit monitoring to affected residents, noting that government bodies frequently expect private-sector organisations to do the same following similar breaches.
Transparency will be critical in limiting long-term harm, according to Paul Bischoff, consumer privacy advocate at Comparitech. He called on the council to clarify what types of personal data were compromised as quickly as possible.
“Until then, victims cannot make informed choices about how to protect their personal information and finances,” Bischoff said. He noted that attackers have already published a proof pack containing sample stolen documents – a common tactic used by ransomware groups to substantiate their claims and apply pressure. “Based on our research into hundreds of ransomware attacks, the vast majority of these claims are legitimate,” he added.
At a policy level, Guccione pointed to the UK Government’s recently launched Cyber Action Plan, which includes more than £210 million in funding and the creation of a new Government Cyber Unit to improve coordination and resilience across public services.
“The plan is a positive development in recognising the cross-government nature of this challenge,” he said, but warned that central initiatives must be matched by action at the organisational level. He urged public-sector bodies to accelerate adoption of identity-centric security models, enforce stronger access controls, segment networks to limit lateral movement and implement continuous monitoring.
“Only by elevating cybersecurity from a technical afterthought to a core governance priority can public services reduce their exposure to increasingly persistent attacks and maintain citizens’ trust in the digital services they rely on,” Guccione said.
As investigations continue, the incident is expected to intensify scrutiny of cyber maturity across UK local authorities, many of which continue to deliver critical digital services under tight budgets and complex operational constraints.
Critical thinking and media literacy are now seen as essential skills for young people, yet many schools lack the resources to teach them, according to new research with teachers, commissioned for BBC Bitesize. Over half of teachers say they need more support to help pupils identify misinformation, as teens increasingly struggle to separate fact from fiction online, a challenge linked to rising anxiety levels.
To bridge this gap, BBC Bitesize is launching Solve the Story, a six-part media literacy series designed to equip students, teachers, and schools with practical tools to tackle misinformation and disinformation. Premiering in schools on 5 January 2026, the series forms part of the Bitesize Other Side of the Story initiative and will help teenagers question what they see online, verify sources, spot fakes, and understand how misleading narratives spread.
The roll-out comes amid mounting evidence that young people are struggling to manage the sheer scale and sophistication of online content. According to research commissioned by the BBC involving more than 400 teachers, critical thinking is now considered the single most important skill for young people, yet one in three teachers say it is difficult to teach, citing lack of time, resources and curriculum pressure.
More than half of the teachers who took part in the research said they need more support in helping pupils recognise misinformation, and that media literacy is not covered well enough in the current curriculum. Teachers also warn that students are already “outpacing adults” online, with the rate of digital change widening the skills gap in the classroom. The research also suggests that parents echoed this concern, as many felt their own digital skills were already outdated.
For young people, the effect of misinformation reaches far beyond the classroom as the impact is emotional as well as educational. New findings from this year’s Bitesize Teen Summit with Radio 5 Live, suggests that two thirds of teenagers worry about fake news and online misinformation, causing confusion and contributing to rising levels of stress and anxiety.
Patricia Hidalgo, Director of BBC Children’s and Education said: “In today’s digital landscape, media literacy isn’t a luxury, it’s a necessity. Solve The Story will help schools to equip young people with the critical thinking tools they need to navigate online content confidently, verify what they see, and protect their mental well‑being. This series is a vital next step towards empowering students and supporting educators in tackling misinformation, as we take Other Side of the Story into classrooms.”
Available to schools and on the BBC Bitesize website, Solve the Story uses a six-part mystery series in which characters must apply media literacy skills to uncover the truth, by analysing sources, questioning assumptions, identifying deepfakes, challenging viral claims and spotting bias. Each episode is paired with a “how-to” guide offering clear, practical steps for teachers and resources for classroom use.
Hundreds of schools up and down the country have already signed up to take part in the January launch, signalling strong demand for classroom-ready tools to help pupils navigate online misinformation. The first episode will be shown in schools on 6 January, with new episodes released weekly until the finale event in February.
Solve the Story is the first content series created for us in schools from the Bitesize Other Side of the Story, that was launched in 2021 to help students navigate the online world and be more critical of the information they consume. Bitesize Other Side of the Story provides articles, videos, quizzes and other resources and workshops in secondary schools that to help students be more curious about the news and information they see and share online. It also equips them with the tools to be create content responsibly, stay safe online and avoid scams, be more aware of different types of media, think more critically and become more positive digital citizens.
The BBC commissioner for Solve The Story is Andrew Swanson.
“CRIMINALS USE THAT KIND OF MISINFORMATION TO LURE VULNERABLE KIDS IN BY SHOWING THEM A GLAMOROUS LIFESTYLE”
Amy, an English teacher at a secondary school in Manchester, sees first-hand how quickly misinformation online shapes what her students believe. One of the most alarming examples is how many genuinely think glamorous “prison freestyle” videos on social media are accurate depictions of real life.
“They really believe that’s what prison is like,” she says. “The videos make it look easy or exciting. Criminals use that kind of misinformation to lure vulnerable kids in by showing them a glamorous lifestyle and telling them crime can get them there. That’s what scares me the most.”
But the prison clips are just one part of a much bigger issue. Amy says many of her pupils are convinced they’re “too smart” to be tricked by anything online.
“They’ll laugh at obviously fake AI videos and say, ‘that’s so AI’, but underneath that is a belief that they can’t be fooled. If I tell them something isn’t real, they argue back. They think teachers don’t understand technology, and they automatically trust what they see online more than what we tell them.”
She has seen conspiracy theories spill directly into schoolwork.
“We’ve had essays referencing ‘the matrix’ and huge conspiracy theories, because they’ve come from influencers like Andrew Tate. Those opinions really appeal to them because they’re presented as ‘facts’. It’s frightening how quickly those ideas embed.”
Challenging this isn’t always straightforward.
“Teenagers don’t want to believe anything that contradicts what they’ve seen on TikTok or YouTube. Sometimes they push back so hard that it becomes something we pick up with safeguarding, simply because it needs a wider team around it. Mentors and form tutors help us challenge the misinformation as a team.”
Social pressures add another layer.
“Their friendship groups feel like they span the whole internet, so the biggest fear is embarrassment. Anything taken out of context can spread quickly, and at our school the fear of parents seeing them do something they shouldn’t is huge. The consequences feel enormous to them.”
Amy says traditional critical-thinking lessons aren’t enough on their own.
“We teach those skills in English, but once they’re at home, school doesn’t exist. They need practical tools that match the world they’re actually living in.”
That’s why she believes Solve the Story could make a real difference.
“They love short-form content, and this format suits their attention span. If teachers show it to them, it will help them stop and question things instead of just accepting whatever they scroll past. They won’t look for it themselves, so teacher buy-in is essential, but once it’s in front of them, it will click.”
Amy sees media literacy as part of her duty of care.
“Some understand the problem, so they can’t push back on what their children are watching. It falls to us to teach them how to protect themselves. They need these skills more than ever.”
We’re on the edge of something interesting in the industry right now, and it’s the transformation of the modern SOC.
We Know the Problem
Everyone knows that security operations centres are faced with too much, too hard, and too fast – not to mention too confusing. We know the stats: thanks to the cyber talent crunch, limited resources, and a ton of new attacks (thanks, bots and AI), 40% of alerts get ignored. Even worse, 61% of security teams admit to ignoring alerts that later proved to be critical incidents.
We’ve Dipped Our Toe in the Solution
The simple answer is “figure out how to get less alerts.” Check. Reducing noise is key. But once you do, is the problem solved?
No, but you’re on the right track. The next step is where the transformation really takes place, and where the industry is looking to go next. We’ve talked noise reduction, but now, what we need when we’ve only got a few (ish) alerts is to know is which one of those is worth our time? If we can only get to five a day, which ones should we be going after? And what determines what comes next on our roster?
Let’s Go All the Way
The answer is risk. You need to prioritise those remaining few (hundred) alerts by risk, which is a multifaceted project, then streamline remediations based on which ones present the biggest, most immediate, or most impactful threat.
Reducing noise is a good start, but it’s only that. Here’s where we jump off, and how to build a risk-first alert pipeline that analysts trust. And that will truly have the power to transform the SOC.
First, Let’s Talk Noise Reduction
Before we jump to the conclusion, let’s orient ourselves and look at where we’ve come from.
Nobody Can Function with Alert Fatigue
Faced with an average of 83 different tools from 29 different vendors, SOCs are forced to wade through deluges of data to find the rare, true positive needle in a haystack.
It doesn’t come easy, and SOCs waste most of their time looking. That’s why it’s so important to, before anything else can get better, cut the noise. Prophet Security, an AI SOC Platform company, does a great job of explaining the process of reducing alert fatigue, but then adds this insightful conclusion: “Do not chase volume alone. Reducing alert count without measuring risk impact creates blind spots.”
Cutting Down Alerts? It’s a Good Start
And this is the jumping off point. Having fewer alerts is, well, good. But those still have to be actioned on and someone has to decide which comes first. Typically, SOCs make that decision based on severity scores. It’s the way the industry does things, it’s the way we’ve always done things.
But these days, security no longer exists in a vacuum and “how big a deal” a certain exposure is really doesn’t matter if it isn’t a big deal to the business. Today, all security priorities are intrinsically tied to business objectives – it’s about time! – which means that the alerts that represent the biggest overall business risk are the ones that need to be taken care of first.
So, how do you do that?
Determining Risk to the Business: The Real Metric
We’ve carried the ball halfway down the court, and now it’s time to sink it in. To really help SOCs out, any sort of automated SOC tool needs to do more than cut down on noise. It needs to tell you what to do with the alerts that are left, and tie those decisions transparently to:
Asset criticality. Is this a moderate severity vuln on a database holding cardholder information? That’s huge. Or is it a critical vulnerability on a stale on-premises database that holds no secrets? Not as big of a deal.
How likely is this to be exploited? Are there currently strong security controls surrounding this asset, blocking any potential attacks? We can wait on the fix, then. Are there zero policies in place, meaning all an attacker has to do is compromise this one weakness and they’re in? Put that higher on the list.
Risk to the business. If this vulnerable system goes down, what’s the worst that can happen? Is it a SCADA system or an API connecting highly regulated data? Priority one. Is it a retired server that’s been languishing in the digital corner? You get the point.
Looking at these other angles shows why simple severity scores won’t cut it. They say nothing of the context around the exposure; what it’s putting at risk, how real that risk might be, the impact if that risk becomes a real threat or gets exploited.
All these things need to be taken into account by your automated SOC tool if it’s going to do more than give you more puzzles to solve. SOCs have enough on their plates; these types of answers should come standard.
So, what’s the technology that can get it done?
A Modern, Risk-First Alert Pipeline
When looking for the right AI SOC platform, it needs to be one that will do this sort of math for you, not take out a bunch of alerts, hand you the rest, and say “good luck.”
That’s why you want one with a modern, risk-first alert pipeline. This sounds like a bunch of security-ish buzzwords strung together with hyphens, but it’s really where the magic takes place.
Can AI Help? Yes.
But first, does AI help? In 2025, you don’t have to ask. Yes, artificial intelligence helps in this whole process. Like with most technologies, applying AI, generative AI, machine learning, agentic AI, natural language processing, and everything AI can move the needle significantly; but only when used in the right way.
Building Out Alerts by True Risk
Here’s what a risk-first alert pipeline looks like in action:
Upstream Filtering: AI agents, especially agentic AI agents, ingest alerts and analyse them (early in the pipeline, or at the source). They filter out false positives here, leaving less mess to work with downstream.
User Behaviour: Helps filter out false positives by comparing normal baselines to existing identity and session activity.
Contextual Enrichment: Using only the alerts that aren’t marked duplicates or false positives, autonomous AI agents get to work. They gather and correlate data from all relevant sources (SIEMs, cloud logs, identity platforms, EDR) to build the beefed-up attack story and deliver SOCs alerts they can use. Right away.
Contextual Reasoning: You can’t chase dynamic threats with static rules. Agile, agentic AI agents “think” on the spot (using LLMs and domain-specific data) to make conclusions about the evidence, ask investigative questions, and come up with next steps.
Blended Scoring: The ultimate, prioritised list should be one where multiple factors have been taken into account: severity (yes), context (SIEMs, EDR, etc.), behavioural analytics (does surrounding system behaviour deviate from the norm?), and confidence scoring (how “right” the AI thinks its reasoning is, so SOCs know what they’re working with). All AI-based decisions should be transparent and auditable to boost trust; no “black box” scoring.
The result is that you get your alerts not only thinned out, but organised by order of importance to the business, not an arbitrary security scoring chart. Don’t misunderstand; severity needs to be factored in, too. It just can’t be the only factor.
The Benefit of a Risk-First Alert Model
With a risk-first alert model, SOCs can place their limited resources where it counts, instead of chasing down alerts that may not have been the best use of company time.
This means that security teams look really good when presenting to boards at the end of the year, and that non-security board members can immediately grasp why SOCs did what they did, how that positively impacted the business, and where their money was going.
As Santa starts his travels, experts are warning that his arrival could bring with it a range of cyber risks, from scams to insecure gadgets.
Whilst Santa prefers to deliver via chimney, most cybercriminals are looking for backdoors. In some cases, hackers prefer to deliver malicious communications via email. Worryingly, in 2025, scams are not just more common, they’re often harder to spot. Earlier this month, researchers from the team at Check Point detected 33,502 Christmas-themed phishing emails in the first two weeks of December, along with more than 10,000 fake advertisements being created daily on social media channels. Many mimic festive promotions, while others push fake Walmart or Home Depot deals, fraudulent charity appeals, and urgent delivery notices.
Why is this time of year so popular for cybercriminals? Ian Porteous, Regional Director, Security Engineering, UK & Ireland at Check Point Software, notes that “Cybercriminals love Christmas just as much as shoppers do, but for all the wrong reasons. This time of year, people are more exposed due to the sheer volume of digital interactions – shopping online, sending e-cards, and grabbing festive deals. That makes it the perfect opportunity for scammers.”
Which other types of attacks should consumers look out for?
Javvad Malik, Lead CISO Advisor at KnowBe4, highlighted a range of common festive scams that consumers should be alert to during the Christmas period. He warned that these include “fake courier messages – like texts from Royal Mail, DPD, Evri etc”, often claiming “we tried and failed to deliver” or asking recipients to “pay a small fee to release it”. Malik also pointed to deals that are too good to be true, such as “ridiculous savings, 90% off named brands”, as well as gift card scams and urgent favour requests, typically appearing as “a WhatsApp or email from your boss or family member usually”. Other tactics include charity scams involving “fake charities trying to pull at heartstrings during the season of giving”, fraudulent shopping emails claiming “your payment failed” or that “your Black Friday order couldn’t be processed”, and holiday job or side hustle offers that require victims to “pay an upfront fee for training or admin”, which in some cases can result in individuals unknowingly becoming money mules.
Many of us will hope to unwrap a new gadget tomorrow morning, but Anne Cutler, cybersecurity expert at Keeper Security, is warning that these gifts can come with hidden risks if left unsecured. “As smart, AI-enabled gadgets become some of the most popular gifts this holiday season, families are unknowingly expanding their digital attack surface,” she said. “From connected toys and wearables to voice assistants and home cameras, many of these devices are effectively small computers with microphones, sensors and constant internet access. To make matters worse, they are usually sold with minimal security settings as the default.”
Cutler warned that “the most common mistake families make is trusting default passwords and factory settings”, something cybercriminals actively exploit by scanning for unsecured devices. She added that while these products can appear harmless, “from behavioural tracking to hidden software vulnerabilities, these modern devices can seem harmless, but in actuality they can pose genuine threats to the privacy and security of families”.
Parents are being encouraged to review privacy and safety settings before children begin using new devices, including disabling unnecessary access to cameras or microphones and limiting data sharing, particularly where interactions may be used for “model improvement”. Experts also caution that AI-enabled toys introduce additional risks because they can behave unpredictably, with concerns ranging from “hallucinations or unsafe responses” to data leakage and breach-related cyber attacks, where stolen recordings, images or videos could be used for phishing, voice impersonation or deepfake content.
Cutler concluded: “Connected devices are now a permanent part of family life, and they should be treated with the same care as any other internet-facing system. By staying informed and vigilant, families can enjoy the holiday season with confidence, while balancing the fun of new tech with a secure and privacy-conscious digital home.”
“Digital security at Christmas starts with prevention,” adds Ian Porteous from Check Point. “Staying alert and cautious online can make all the difference – protecting your personal information and ensuring a stress-free festive season.”
Javvad Malik from KnowBe4, urges consumers to ask the following questions before taking action:
A Consortium of Companies and Non Profit Organizations Collaborating to Create an Open Source Software Stack to Advance a Plurality of Interoperable Wallets
DUBLIN—September 13, 2022—The Linux Foundation, a global nonprofit organization enabling innovation through open source, today announced the intention to form the OpenWallet Foundation (OWF), a new collaborative effort to develop open source software to support interoperability for a wide range of wallet use cases. The initiative already benefits from strong support including leading companies across technology, public sector, and industry vertical segments, and standardization organizations.
The mission of the OWF is to develop a secure, multi-purpose open source engine anyone can use to build interoperable wallets. The OWF aims to set best practices for digital wallet technology through collaboration on open source code for use as a starting point for anyone who strives to build interoperable, secure, and privacy-protecting wallets.
The OWF does not intend to publish a wallet itself, nor offer credentials or create any new standards. The community will focus on building an open source software engine that other organizations and companies can leverage to develop their own digital wallets. The wallets will support a wide variety of use cases from identity to payments to digital keys and aim to achieve feature parity with the best available wallets.
Daniel Goldscheider, who started the initiative, said, “With the OpenWallet Foundation we push for a plurality of wallets based on a common core. I couldn’t be happier with the support this initiative has received already and the home it found at the Linux Foundation.”
Linux Foundation Executive Director Jim Zemllin said, “We are convinced that digital wallets will play a critical role for digital societies. Open software is the key to interoperability and security. We are delighted to host the OpenWallet Foundation and excited for its potential.”
OpenWallet Foundation will be featured in a keynote presentation at Open Source Summit Europe on 14 September 2022 at 9:00 AM IST (GMT +1) and a panel at 12:10 PM IST (GMT +1). In order to participate virtually and/or watch the sessions on demand, you can register here.
Pramod Varma, Chief Architect Aadhaar & India Stack, said, “Verifiable credentials are becoming an essential digital empowerment tool for billions of people and small entities. India has been at the forefront of it and is going all out to convert all physical certificates into digitally verifiable credentials via the very successful Digilocker system. I am very excited about the OWF effort to create an interoperable and open source credential wallet engine to supercharge the credentialing infrastructure globally.”
“Universal digital wallet infrastructure will create the ability to carry tokenized identity, money, and objects from place to place in the digital world. Massive business model change is coming, and the winning digital business will be the one that earns trust to directly access the real data in our wallets to create much better digital experiences,” said David Treat, Global Metaverse Continuum Business Group & Blockchain lead, Accenture. “We are excited to be part of the launch and development of an open-source basis for digital wallet infrastructure to help ensure consistency, interoperability, and portability with privacy, security, and inclusiveness at the core by design.”
Drummond Reed, Director of Trust Services at Avast, a brand of NortonLifeLock, said, “We’re on a mission to protect digital freedom for everyone. Digital freedom starts with the services used by the individual and the ability to reclaim their personal information and reestablish trust in digital exchanges. Great end point services start with the core of digital identity wallet technology. We are proud to be a founding supporter of the OpenWallet Foundation because collaboration, interoperability, and open ecosystems are essential to the trusted digital future that we envision.”
“The mobile wallet industry has seen significant advances in the last decade, changing the way people manage and spend their money, and the tasks that these wallets can perform have rapidly expanded. Mobile wallets are turning into digital IDs and a place to store documents whereby the security requirements are further enhanced,” said Taka Kawasaki CoFounder of Authlete Inc. “We understand the importance of standards that ensure interoperability as a member of the OpenID Foundation and in the same way we are excited to work with the Linux Foundation to develop a robust implementation to ensure the highest levels in security.”
“Providing secure identity and validated credential services are key for enabling a high assurance health care service. The OpenWallet Foundation could contribute a key role in promoting the deployment of highly effective secure digital health care systems that benefits the industry,” said Robert Samuel, Executive Director of Technology Research & Innovation, CVS Health.
“Daon provides the digital identity verification/proofing and authentication technology that enables digital trust at scale and on a global basis”, said Conor White, President – Americas at Daon, “Our experience with VeriFLY demonstrated the future importance of digital wallets for consumers and we look forward to supporting the OpenWallet Foundation.”
“We are building and issuing wallets for decentralized identity applications for several years now. Momentum and interest for this area has grown tremendously, far beyond our own community. It is now more important than ever that a unified wallet core embracing open standards is created, with the ambition to become the global standard. The best industry players are pulling together under the OpenWallet Foundation. esatus AG is proud to be among them as experience, expertise, and technology contributor,” said Dr. Andre Kudra, CIO, esatus AG
Kaliya Young, Founder & Principal, Identity Woman in Business, said, “As our lives become more and more digital, it is critical to have strong and interoperable digital wallets that can properly safeguard our digital properties, whether it is our identities, data, or money. We are very excited to see the emergence of the OpenWallet Foundation, particularly its mission to bring key stakeholders together to create a core wallet engine (instead of another wallet) that can empower the actual wallet providers to build better products at lower cost. We look forward to supporting this initiative by leveraging our community resources and knowledge/expertise to develop a truly collaborative movement.”
Masa Mashita, Senior Vice President, Strategic Innovations, JCB Co., Ltd. said, “Wallets for the identity management as well as the payment will be a key function for the future user interface. The concept of OpenWallet will be beneficial for the interoperability among multiple industries and jurisdictions.”
“Secure and open wallets will allow individuals the world over to store, combine and use their credentials in new ways – allowing them to seamlessly assert their identity, manage payments, access services, etc., and empower them with control of their data. This brings together many of our efforts in India around identity, payments, credentials, data empowerment, health, etc. in an open manner, and will empower billions of people around the world,” said Sanjay Jain, Chairman of the Technology Committee of MOSIP.
“The Open Identity Exchange (OIX) welcomes and supports the creation of the OpenWallet Foundation. The creation of open source components that will allow wallet providers to work to standards and trust framework policies in a consistent way is entirely complementary to our own work on open and interoperable Digital Identities. OIX’s Global Interoperability working group is already defining a ‘trust framework policy characteristics methodology,’ as part of our contribution to GAIN. This will allow any trust framework to systematically describe itself to an open wallet, so that a ‘smart wallet’ can seamlessly adapt to the rules of a new framework within which the user wants to assert credentials,” said Nick Mothershaw, Chief Identity Strategist, OIX.
“Okta’s vision is to enable anyone to safely use any technology”, says Randy Nasson, Director of Product Management at Okta. “Digital wallets are emerging as go-to applications for conducting financial transactions, providing identity and vital data, and storing medical information such as vaccination status. Wallets will expand to include other credentials, including professional and academic certifications, membership status, and more. Digital credentials, including their issuance, storage in wallets, and presentation, will impact the way humans authenticate and authorize themselves with digital systems in the coming decade. Okta is excited about the efforts of the OpenWallet Foundation and the Linux Foundation to provide standards-based, open wallet technology for developers and organizations around the world.”
“The OpenID Foundation welcomes the formation of the OpenWallet Foundation and its efforts to create an open-source implementation of open and interoperable technical standards, certification and best practices.” – Nat Sakimura, Chairman, OpenID Foundation.
“We believe the future of online trust and privacy starts with a system for individuals to take control over their digital identity, and interoperability will create broad accessibility,” says Rakesh Thaker, Chief Development Officer at Ping Identity. “We intend to actively participate and contribute to creating common specifications for secure, robust credential wallets to empower people with control over when and with whom they share their personal data.”
Wallet technologies that are open and interoperable are a key factor in enabling citizens to protect their privacy in the digital world. At polypoly – an initiative backed by the first pan-European cooperative for data – we absolutely believe that privacy is a human right! We are already working on open source wallets and are excited to collaborate with others and to contribute to the OpenWallet Foundation,” said Lars Eilebrecht, CISO, polypoly.
“Digital credentials and the wallets that manage them form the trust foundation of a digital society. With the future set to be characterised by a plurality of wallets and underlying standards, broad interoperability is key to delivering seamless digital interactions for citizens. Procivis is proud to support the efforts of the OpenWallet Foundation to build a secure, interoperable, and open wallet engine which enables every individual to retain sovereignty over their digital identities,” Daniel Gasteiger, Chief Executive Officer, Procivis AG.
“It is essential to cross the boundaries between humans, enterprises, and systems to create value in a fully connected world. There is an urgent need for a truly portable, interoperable identity & credentialing backbone for all digital-first processes in government, business, peer-to-peer, smart city systems, and the Metaverse. The OpenWallet Foundation will establish high-quality wallet components that can be assembled into SW solutions unlocking a new universe of next-level digitization, security, and compliance,” said Dr. Carsten Stöcker, CEO Spherity & Chairman of the Supervisory Board IDunion SCE.
“Transmute has long promoted open source standards as the foundation for building evolved solutions that challenge the status quo. Transmute believes any organization should be empowered to create a digital wallet that can securely manage identifiers, credentials, currencies, and payments while complying with regulatory requirements regarding trusted applications and devices. Transmute supports a future of technology that will reflect exactly what OpenWallet Foundation wants to achieve: one that breaks with convention to foster innovation in a secure, interoperable way, benefitting competitive companies, consumers, and developers alike,” said Orie Steele, Co-Founder and CTO of Transmute.
“The Trust Over IP (ToIP) Foundation is proud to support the momentum of an industry-wide open-source engine for digital wallets. We believe this can be a key building block in our mission to establish an open standard trust layer for the Internet. We look forward to our Design Principles and Reference Architecture benefitting this endeavor and collaborating closely with this new Linux Foundation project,” said Judith Fleenor, Director of Strategic Engagement, Trust Over IP Foundation.
For more information about the project and how to participate in this work, please visit: openwallet.foundation.
About the Linux Foundation
Founded in 2000, the Linux Foundation and its projects are supported by more than 3,000 members. The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure including Linux, Kubernetes, Node.js, ONAP, Hyperledger, RISC-V, PyTorch, and more. The Linux Foundation’s methodology focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org.
###
The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our trademark usage page: https://www.linuxfoundation.org/trademark-usage. Linux is a registered trademark of Linus Torvalds.
Media Contact:
Dan Whiting for the Linux Foundation +1 202-531-9091 dwhiting@linuxfoundation.org
PyTorch Foundation to foster an ecosystem of vendor-neutral projects alongside founding members AMD, AWS, Google Cloud, Meta, Microsoft Azure, and NVIDIA
DUBLIN – September 12, 2022 – The Linux Foundation, a global nonprofit organization enabling innovation through open source, today announced PyTorch is moving to the Linux Foundation from Meta where it will live under the newly-formed PyTorch Foundation. Since its release in 2016, over 2400 contributors and 18,0000 organizations have adopted the PyTorch machine learning framework for use in academic research and production environments. The Linux Foundation will work with project maintainers, its developer community, and initial founding members of PyTorch to support the ecosystem at its new home.
Projects like PyTorch—that have the potential to become a foundational platform for critical technology—benefit from a neutral home. As part of the Linux Foundation, PyTorch and its community will benefit from many programs and support infrastructure like training and certification programs, research, and local to global events. Working inside and alongside the Linux Foundation, PyTorch will have access to the LFX collaboration portal—enabling mentorships and helping the PyTorch community identify future leaders, find potential hires, and observe shared project dynamics.
“Growth around AI/ML and Deep Learning has been nothing short of extraordinary—and the community embrace of PyTorch has led to it becoming one of the five-fastest growing open source software projects in the world,” said Jim Zemlin, executive director for the Linux Foundation. “Bringing PyTorch to the Linux Foundation where its global community will continue to thrive is a true honor. We are grateful to the team at Meta—where PyTorch was incubated and grown into a massive ecosystem—for trusting the Linux Foundation with this crucial effort.”
“Some AI news: we’re moving PyTorch, the open source AI framework led by Meta researchers, to become a project governed under the Linux Foundation. PyTorch has become one of the leading AI platforms with more than 150,000 projects on GitHub built on the framework. The new PyTorch Foundation board will include many of the AI leaders who’ve helped get the community where it is today, including Meta and our partners at AMD, Amazon, Google, Microsoft, and NVIDIA. I’m excited to keep building the PyTorch community and advancing AI research,” said Mark Zuckerberg, Founder & CEO, Meta.
The Linux Foundation has named Dr. Ibrahim Haddad, its Vice President of Strategic Programs, as the Executive Director of the PyTorch Foundation. The PyTorch Foundation will support a strong member ecosystem with a diverse governing board including founding members: AMD, Amazon Web Services (AWS), Google Cloud, Meta, Microsoft Azure and NVIDIA. The project will promote continued advancement of the PyTorch ecosystem through its thriving maintainer and contributor communities. The PyTorch Foundation will ensure the transparency and governance required of such critical open source projects, while also continuing to support its unprecedented growth.
Member Quotes
AMD
“Open software is critical to advancing HPC, AI and ML research, and we’re ready to bring our experience with open software platforms and innovation to the PyTorch Foundation,” said Brad McCredie, corporate vice president, Data Center and Accelerated Processing, AMD. “AMD Instinct accelerators and ROCm software power important HPC and ML sites around the world, from exascale supercomputers at research labs to major cloud deployments showcasing the convergence of HPC and AI/ML. Together with other foundation members, we will support the acceleration of science and research that can make a dramatic impact on the world.”
Amazon Web Services
“AWS is committed to democratizing data science and machine learning, and PyTorch is a foundational open source tool that furthers that goal,” said Brian Granger, senior principal technologist at AWS. “The creation of the PyTorch Foundation is a significant step forward for the PyTorch community. Working alongside The Linux Foundation and other foundation members, we will continue to help build and grow PyTorch to deliver more value to our customers and the PyTorch community at large.”
Google Cloud
“At Google Cloud we’re committed to meeting our customers where they are in their digital transformation journey and that means ensuring they have the power of choice,” said Andrew Moore, vice president and general manager of Google Cloud AI and industry solutions. “We’re participating in the PyTorch Foundation to further demonstrate our commitment of choice in ML development. We look forward to working closely on its mission to drive adoption of AI tooling by building an ecosystem of open source projects with PyTorch along with our continued investment in JAX and Tensorflow.”
Microsoft Azure
“We’re honored to participate in the PyTorch Foundation and partner with industry leaders to make open source innovation with PyTorch accessible to everyone,” Eric Boyd, CVP, AI Platform, Microsoft, said. “Over the years, Microsoft has invested heavily to create an optimized environment for our customers to create, train and deploy their PyTorch workloads on Azure. Microsoft products and services run on trust, and we’re committed to continuing to deliver innovation that fosters a healthy open source ecosystem that developers love to use. We look forward to helping the global AI community evolve, expand and thrive by providing technical direction based on our latest AI technologies and research.”
NVIDIA
“PyTorch was developed from the beginning as an open source framework with first-class support on NVIDIA Accelerated Computing”, said Ian Buck, General Manager and Vice President of Accelerated Computing at NVIDIA. “NVIDIA is excited to be an originating member of the PyTorch Foundation to encourage community adoption and to ensure using PyTorch on the NVIDIA AI platform delivers excellent performance with the best experience possible.”
Additional Resources:
Visit pytorch.org to learn more about the project and the PyTorch Foundation
Founded in 2000, the Linux Foundation and its projects are supported by more than 3,000 members. The Linux Foundation is the world’s leading home for collaboration on open source software, hardware, standards, and data. Linux Foundation projects are critical to the world’s infrastructure including Linux, Kubernetes, Node.js, ONAP, Hyperledger, RISC-V, PyTorch, and more. The Linux Foundation’s methodology focuses on leveraging best practices and addressing the needs of contributors, users, and solution providers to create sustainable models for open collaboration. For more information, please visit us at linuxfoundation.org.
###
The Linux Foundation has registered trademarks and uses trademarks. For a list of trademarks of The Linux Foundation, please see our trademark usage page: https://www.linuxfoundation.org/trademark-usage. Linux is a registered trademark of Linus Torvalds.
Because of my position as Executive Producer and host of The Untold Stories of Open Source, I frequently get asked, “What podcasts do you listen to when you’re not producing your own.” Interesting question. However, my personal preference, This American Life, is more about how they create their shows, how they use sound and music to supplement the narration, and just in general, how Ira Glass does what he does. Only podcast geeks would be interested in that, so I reached out to my friends in the tech industry to ask them what THEY listen to.
The most surprising thing I learned was people professing to not listen to podcasts. “I don’t listen to podcasts, but if I had to choose one…”, kept popping up. The second thing was people in the industry need a break and use podcasts to escape from the mayhem of their day. I like the way Jennifer says it best, “Since much of my role is getting developers on board with security actions, I gravitate toward more psychology based podcasts – Adam Grant’s is amazing (it’s called WorkLife).”
Mike Jones and Mike LeBlanc built the H4unt3d Hacker podcast and group from a really grass roots point of view. The idea was spawned over a glass of bourbon on the top of a mountain. The group consists of members from around the globe and from various walks of life, religions, backgrounds and is all inclusive. They pride themselves in giving back and helping people understand the cybersecurity industry and navigate through the various challenges one faces when they decide cybersecurity is where they belong.
“I think he strikes a great balance between newbie/expert, current events and all purpose security and it has a nice vibe” – Alan Shimel, CEO, Founder, TechStrong Group
Published weekly, the Risky Business podcast features news and in-depth commentary from security industry luminaries. Hosted by award-winning journalist Patrick Gray, Risky Business has become a must-listen digest for information security professionals. We are also known to publish blog posts from time to time.
“My single listen-every-week-when-it-comes out is not that revolutionary: the classic Risky Biz security podcast. As a defender, I learn from the offense perspective, and they also aren’t shy about touching on the policy side.” – Allan Friedman, Cybersecurity and Infrastructure Security Agency
Hosted by Mike Shema, Matt Alderman, and John Kinsella
If you’re looking to understand DevOps, application security, or cloud security, then Application Security Weekly is your show! Mike, Matt, and John decrypt application development – exploring how to inject security into the organization’s Software Development Lifecycle (SDLC); learn the tools, techniques, and processes necessary to move at the speed of DevOps, and cover the latest application security news.
“Easily my favorite hosts and content. Professional production, big personality host, and deeply technical co-host. Combined with great topics and guests.” – Larry Maccherone, Dev[Sec]Ops Transformation Architect, Contrast Security
The Azure DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well.
“I am pretty focused on Microsoft Azure these days so on my list is Azure DevOps” – Bob Aiello CM Best Practices Founder, CTO, and Principal Consultant
Hosted by Community of Chaos Engineering Practitioners
We are a community of chaos engineering practitioners. Chaos Engineering is the discipline of experimenting on a system in order to build confidence in the system’s capability to withstand turbulent conditions in production.
“This is so good, it’s hardly even fair to compare it to other podcasts!” – Casey Rosenthal, CEO, Co-founder, Verica
The Daily Beans is a women-owned and operated progressive news podcast for your morning commute brought to you by the webby award-winning hosts of Mueller, She Wrote. Get your social justice and political news with just the right amount of snark.
“The Daily Beans covers political news without hype. The host is a lawyer and restricts her coverage to what can actually happen while other outlets are hyping every possibility under the sun including possibilities that get good ratings but will never happen. She mostly covers the former president’s criminal cases.” – Tom Limoncelli, Manager, Stack Overflow
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. Now a weekly show, we talk to experts from throughout the software engineering world about the full range of topics that matter to professional developers. All SE Radio episodes feature original content; we don’t record conferences or talks given in other venues.
“The one that I love to keep tabs on is called Software Engineering Radio, published by the IEEE computer society. It is absolutely a haberdashery of new ideas, processes, lessons learned. It also ranges from very practical action oriented advice the whole way over to philosophical discussions that are necessary for us to drive innovation forward. Professionals from all different domains contribute. It’s not a platform for sales and marketing pitches!” – Tracy Bannon, Senior Principal/ Software Architect & DevOps Advisor, MITRE
Join thousands of other listeners to hear from the current leaders, experts, vendors, and instructors in the IT and Cybersecurity fields regarding DevSecOps, InfoSec, Ransomware attacks, the diversity and the retention of talent, and more. Gain the confidence, consistency, and courage to succees at work and in life.
“Relaxed chat, full of good info, and they got right to the point. Would recommend.” – Wendy Nather, Head of Advisory CISOs, CISCO
Open Source Underdogs is the podcast for entrepreneurs about open source software. In each episode, we chat with a founder or leader to explore how they are building thriving businesses around open source software. Our goal is to demystify how entrepreneurs can stay true to their open source objectives while also building sustainable, profitable businesses that fuel innovation and ensure longevity.
“Mike Schwartz’s podcast is my favourite. Really good insights from founders.” – Amanda Brock, CEO, OpenUK
Ten Percent Happier publishes a variety of podcasts that offer relatable wisdom designed to help you meet the challenges and opportunities in your daily life.
“I listen to Ten Percent Happier as my go-to podcast. It helps me with mindfulness practice, provides a perspective on real-life situations, and makes me a kinder person. That is one of the most important traits we all need these days.” – Arun Gupta, Vice President and General Manager for Open Ecosystem, Intel
Sam Harris is the author of five New York Times best sellers. His books include The End of Faith, Letter to a Christian Nation, The Moral Landscape, Free Will, Lying, Waking Up, and Islam and the Future of Tolerance (with Maajid Nawaz). The End of Faith won the 2005 PEN Award for Nonfiction. His writing and public lectures cover a wide range of topics—neuroscience, moral philosophy, religion, meditation practice, human violence, rationality—but generally focus on how a growing understanding of ourselves and the world is changing our sense of how we should live.
“Sam dives deep on topics rooted in our culture, business, and minds. The conversations are very approachable and rational. With some episodes reaching an hour or more, Sam gives topics enough space to cover the necessary angles.” – Derek Weeks, CMO, The Linux Foundation
Darknet Diaries produces audio stories specifically intended to capture, preserve, and explain the culture around hacking and cyber security in order to educate and entertain both technical and non-technical audiences.
This is a podcast about hackers, breaches, shadow government activity, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network.
“Darknet Diaries would be my recommendation. Provided insights into the world of hacking, data breaches and cyber crime. And Jack Rhysider is a good storyteller ” – Edwin Kwan, Head of Application Security and Advisory, Tyro Payments
Under the Skin asks: what’s beneath the surface – of the people we admire, of the ideas that define our times, of the history we are told. Speaking with guests from the world of academia, popular culture and the arts, they’ll teach us to see the ulterior truth behind or constructed reality. And have a laugh.
“He interviews influential people from all different backgrounds and covers everything from academia to tech to culture to spiritual issues” – Ashleigh Auld, Global Director Partner Marketing, Linnwood
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also included interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
“I’d recommend the CyberWire daily podcast has got most relevant InfoSec news items and stories industry pros care about. XX” – Ax Sharma, Security Researcher, Tech Reporter, Sonatype
7 Minute Security is a weekly audio podcast (once in a while with video!) released on Wednesdays and covering topics such Penetration testing, Blue teaming, and Building a career in security.
In 2013 I took on a new adventure to focus 100% on information security. There’s a ton to learn, so I wanted to write it all down in a blog format and share with others. However, I’m a family man too, and didn’t want this project to offset the work/family balance.
So I thought a podcast might fill in the gaps for stuff I can’t – or don’t have time to – write out in full form. I always loved the idea of a podcast, but the good ones are usually in a longer format, and I knew I didn’t have time for that either. I was inspired by the format of the 10 Minute Podcast and figured if it can work for comedy, maybe it can work for information security!
Thus, the 7 Minute Security blog and its child podcast was born.
“7 Minute Security Podcast – because Brian makes the best jingles!” – Björn Kimminich, Product Group Lead Architecture Governance, Kuehne + Nagel (AG & Co.) KG
Explores ideas that help to produce Better Software Faster: Continuous Delivery, DevOps, TDD and Software Engineering.
Hosted by Dave Farley – a software developer who has done pioneering work in DevOps, CD, CI, BDD, TDD and Software Engineering. Dave has challenged conventional thinking and led teams to build world class software.
Dave is co-author of the award wining book – “Continuous Delivery”, and a popular conference speaker on Software Engineering. He built one of the world’s fastest financial exchanges, is a pioneer of BDD, an author of the Reactive Manifesto, and winner of the Duke award for open source software – the LMAX Disruptor.
“Dave Farley’s videos are a treasure trove of knowledge that took me and others years to uncover when we were starting out. His focus on engineering and business outcomes rather than processes and frameworks is a breath of fresh air. If you only have time for one source of information, use his. – Bryan Finster, Value Stream Architect, Defense Unicorns
A fast and fluid weekly thirty minute show where Scott tears into the taxonomy of the tech business with unfiltered, data-driven insights, bold predictions, and thoughtful advice.
“Very current very modern. Business and tech oriented. Talks about markets and economics and people and tech.” – Caroline Wong, Chief Strategy Officer, Cobalt
We have a security tabletop game that Josh created some time ago. Rather than play a boring security tabletop exercise, what if had things like dice and fun? Take a look at the Dungeons and Data tabletop game
“It has been something I’ve been listening to a lot lately with all of the focus on Software Supply Chain Security and Open Source Security. The hosts have very deep software and security backgrounds but keep the show light-hearted and engaging as well. ” – Chris Hughes, CISO, Co-Founder Aquia Inc
Hosted by Kara Swisher and Professor Scott Galloway
Every Tuesday and Friday, tech journalist Kara Swisher and NYU Professor Scott Galloway offer sharp, unfiltered insights into the biggest stories in tech, business, and politics. They make bold predictions, pick winners and losers, and bicker and banter like no one else. After all, with great power comes great scrutiny. From New York Magazine and the Vox Media Podcast Network.
“As a rule, I don’t listen to tech podcasts much at all, since I write about tech almost all day. I check out podcasts about theater or culture — about as far away from my day job as I can get. However, I follow a ‘man-about-town’ guy named George Hahn on social media, who’s a lot of fun. Last year, he mentioned he’d be a guest host of the ‘Pivot’ podcast with Kara Swisher and Scott Galloway, so I checked out Pivot. It’s about tech but it’s also about culture, politics, business, you name it. So that’s become the podcast I dip into when I want to hear a bit about tech, but in a cocktail-party/talk show kind of way.” – Christine Kent, Communications Strategist, Christine Kent Communications
Conversations with experts about the important ideas changing how organizations compete and win. In The Idealcast, multiple award-winning CTO, researcher and bestselling author Gene Kim hosts technology and business leaders to explore the dangerous, shifting digital landscape. Listeners will hear insights and gain solutions to help their enterprises thrive in an evolving business world.
“I like this because it has a good balance of technical and culture/leadership content.” – Courtney Kissler, CTO, Zulily
Hosted by Dave Kennedy and Various Team Contributors
Our team records a regular podcast covering the latest security news and stories in an entertaining and informational discussion. Hear what our experts are thinking and talking about.
“I LOVE LOVE LOVE the TrustedSec Security Podcast. Dave Kennedy’s team puts on a very nice and often deeply technical conversation every two weeks. The talk about timely topics from today’s headlines as well as jumping into purple team hackery which is a real treat to listen in and learn from.” – CRob Robinson, Director of Security Communications Intel Product Assurance and Security, Intel
Ramblings about W. Edwards Deming in the digital transformation era. The general idea of the podcast is derived from Dr. Demming’s seminal work described in his New Economics book – System of Profound Knowledge ( SoPK ). We’ll try and get a mix of interviews from IT, Healthcare, and Manufacturing with the goal of aligning these ideas with Digital Transformation possibilities. Everything related to Dr. Deming’s ideas is on the table (e.g., Goldratt, C.I. Lewis, Ohno, Shingo, Lean, Agile, and DevOps).
“I don’t listen to podcasts much these days (found that consuming books via audible was more useful… but I guess it all depends on how emerging the topics are you are interested in). I only mention this as I am thin I recommendations. I’d go with John Willis’s Profound or Gene Kim’s Idealcast. Some overlap in (world class) guests but different interview approaches and perspectives.” – Damon Edwards, Sr. Director, Product PagerDuty
Stay up-to-date and deepen your cybersecurity acumen with Security Now. On this long-running podcast, cybersecurity authority Steve Gibson and technology expert Leo Laporte bring their extensive and historical knowledge to explore digital security topics in depth. Each week, they take complex issues and break them down for clarity and big-picture understanding. And they do it all in an approachable, conversational style infused with their unique sense of humor. Listen and subscribe, and stay on top of the constantly changing world of Internet security. Security Now records every Tuesday afternoon and hits your podcatcher later that evening.
“The shows cover a wide range of security topics, from the basics of technologies such as DNSSec & Bitcoin, to in depth, tech analysis of the latest hacks hitting the news, The main host, Steve Gibson, is great at breaking down tech subjects over an audio . It’s running at over 800 episodes now, regular as clockwork every week, so you can rely on it. Funnily Steve Gibson has often reminded me of you – able to assess what’s going on with a subject, calmly find the important points, and describe them to the rest of us in way that’s engaging and relatable.medium – in a way you can follow and be interested in during your commute or flight.” – Gary Robinson, Chief Security Officer, Ulseka
Today, The Jordan Harbinger Show has over 15 million downloads per month and features a wide array of guests like Kobe Bryant, Moby, Dennis Rodman, Tip “T.I.” Harris, Tony Hawk, Cesar Millan, Simon Sinek, Eric Schmidt, and Neil deGrasse Tyson, to name a few. Jordan continues to teach his skills, for free, at 6-Minute Networking. In addition to hosting The Jordan Harbinger Show, Jordan is a consultant for law enforcement, military, and security companies and is a member of the New York State Bar Association and the Northern California Chapter of the Society of Professional Journalists.
“Excellent podcasts where he interviews people from literally every walk of life, how they have become successful, why they have failed (if they have) as well as great personal development coaching ideas.” – Jeff DeVerter, CTO, Products and Services, RackSpace
Adam hosts WorkLife, a chart-topping TED original podcast. His TED talks on languishing, original thinkers, and givers and takers have been viewed more than 30 million times. His speaking and consulting clients include Google, the NBA, Bridgewater, and the Gates Foundation. He writes on work and psychology for the New York Times, has served on the Defense Innovation Board at the Pentagon, has been honored as a Young Global Leader by the World Economic Forum, and has appeared on Billions.
“I don’t listen to many technical podcasts. I like Caroline Wongs and have listened to it a number of times (Humans of InfoSec) but since much of my role is getting developers on board with security actions, I gravitate toward more psychology based podcasts – Adam Grant’s is amazing (it’s called WorkLife).” – Jennifer Czaplewski, Senior Director, Cyber Security, Target
“You know lately I have been listening to WorkLife with Adam Grant. Not a tech podcast but a management one.” – Paula Thrasher, Senior Director Infrastructure, PagerDuty
Hosted by Core Team Members: Betsy Beyer, MP English, Salim Virji, Viv
The Google Prodcast Team has gone through quite a few iterations and hiatuses over the years, and many people have had a hand in its existence. For the longest time, a handful of SREs produced the Prodcast for the listening pleasure of the other engineers here at Google.
We wanted to make something that would be of interest to folks across organizations and technical implementations. In his last act as part of the Prodcast, JTR put us in touch with Jennifer Petoff, Director of SRE Education, in order to have the support of the SRE organization behind us.
“The SRE Prodcast is Google’s podcast about Site Reliability Engineering and production software. In Season 1, we discuss concepts from the SRE Book with experts at Google.” – Jennifer Petoff, Director, Program Management, Cloud Technical Education Google
Every weekday, Kai Ryssdal and Kimberly Adams break down the news in tech, the economy and culture. How do companies make money from disinformation? How can we tackle student debt? Why do 401(k)s exist? What will it take to keep working moms from leaving the workforce? Together, we dig into complex topics to help make today make sense
“I literally learn 3 new things about topics i never would have tried to learn about.” – Kadi Grigg, Enablement Specialist, Sonatype
Conversations for the Curious is an award-winning weekly podcast hosted by Russ Roberts of Shalem College in Jerusalem and Stanford’s Hoover Institution. The eclectic guest list includes authors, doctors, psychologists, historians, philosophers, economists, and more. Learn how the health care system really works, the serenity that comes from humility, the challenge of interpreting data, how potato chips are made, what it’s like to run an upscale Manhattan restaurant, what caused the 2008 financial crisis, the nature of consciousness, and more.
“The only podcast I listen to is actually EconTalk, which has nothing to do with tech!” – Kelly Shortridge, Senior Principal, Product Technology, Fastly
The Future of Work With Jacob Morgan is a unique show that explores how the world of
work is changing, and what we need to do in order to thrive. Each week several episodes are
released which range from long-form interviews with the world’s top business leaders and
authors to shorter form episodes which provide a strategy or tip that listeners can apply to
become more successful.
The show is hosted by 4x best-selling author, speaker and futurist Jacob Morgan and the
goal is to give listeners the inspiration, the tools, and the resources they need to succeed
and grow at work and in life.
Episodes are not scripted which makes for fun, authentic, engaging, and educational
episodes filled with insights and practical advice.
“It is hard for me to keep up with podcasts. The one I listen to regularly is “Leading The Future of Work” by Jacob Morgan. I know it is not technical, but I think it is extremely important for technical people to understand what the business thinks and is concerned about.” – Keyaan Williams, Managing Director, CLASS-LLC
Deception, influence, and social engineering in the world of cyber crime.
Join Dave Bittner and Joe Carrigan each week as they look behind the social engineering scams, phishing schemes, and criminal exploits that are making headlines and taking a heavy toll on organizations around the world.
“In case we needed any reminders that humanity is a scary place.” – Matt Howard, SVP and CMO, Virtu
Hosted by Ashish Rajan, Shilpi Bhattacharjee, and Various Contributors
Cloud Security Podcast is a WEEKLY Video and Audio Podcast that brings in-depth cloud security knowledge to you from the best and brightest cloud security experts and leaders in the industry each week over our LIVE STREAMs.
We are the FIRST podcast that carved the niche for Cloud Security in late 2019. As of 2021, the large cloud service providers (Azure, Google Cloud, etc.) have all followed suit and started their own cloud security podcasts. While we recommend you listen to their podcasts as well, we’re the ONLY VENDOR NEUTRAL podcast in the space and will preserve our neutrality indefinitely.
“I really love Ashish’s cloud security podcast, listened to it for a while now. He gets really good people on it and it’s a nice laid back listen, too.” – Simon Maple, Field CTO, Snyk
Hosted by Glenn Wilson, Steve Giguere, Jessica Cregg
In depth conversations with influencers blurring the lines between Dev, Sec, and Ops!
We speak with professionals working in cyber security, software engineering and operations to talks about a number of DevSecOps topics. We discuss how organisations factor security into their product delivery cycles without compromising the value of doing DevOps and Agile.
“One of my favourite meetups in London ‘DevSecOps London Gathering’ has a podcast where they invite their speakers https://dsolg.com/#podcast” – Stefania Chaplin, Solutions Architect UK&I, GitLab
Longtime sportswriters Tony Kornheiser and Mike Wilbon debate and discuss the hottest topics, issues and events in the world of sports in a provocative and fast-paced format.
Similar in format to Gene Siskel and Roger Ebert‘s At the Movies,[2][3]PTI is known for its humorous and often loud tone, as well as the “rundown” graphic which lists the topics yet to be discussed on the right-hand side of the screen. The show’s popularity has led to the creation of similar shows on ESPN and similar segments on other series, and the rundown graphic has since been implemented on the morning editions of SportsCenter, among many imitators.[4] – Wikipedia
“I’m interested in sports, and Tony and Mike are well-informed, amusing, and opinionated. It also doesn’t hurt any that I’ve known them since they were at The Washington Post and I was freelancing there. What you see on television, or hear on their podcast, is exactly how they are in real life. This sincerity of personality is a big reason why they’ve become so successful.” – Steven Vaughan-Nichols, Technology and business journalist and analyst. Red Ventures
This post originally appeared on LF Networking’s blog. The author, Heather Kirksey, is VP Community & Ecosystem. ONE Summit is the Linux Foundation Networking event that focuses on the networking and automation ecosystem that is transforming public and private sector innovation across 5G network edge, and cloud native solutions. Our family of open source projects address every layer of infrastructure needs from the user edge to the cloud/core. Attend ONE Summit to get the scoop on hot topics for 2022!
Today LF Networking announced our schedule for ONE Summit, and I have to say that I’m extraordinarily excited. I’m excited because it means we’re growing closer to returning to meeting in-person, but more importantly I was blown away by the quality of our speaking submissions. Before I talk more about the schedule itself, I want to say that this quality is all down to you: You sent us a large number of thoughtful, interesting, and innovative ideas; You did the work that underpins the ideas; You did the work to write them up and submit them. The insight, lived experience, and future-looking thought processes humbled me with its breadth and depth. You reminded me why I love this ecosystem and the creativity within open source. We’ve all been through a tough couple of years, but we’re still here innovating, deploying, and doing work that improves the world. A huge shout out to everyone across every company, community, and project that made the job of choosing the final roster just so difficult.
Now onto the content itself. As you’ve probably heard, we’ve got 5 tracks: Industry 4.0, Security and Privacy, The New Networking Stack, Operationalizing Deployment, and Emerging Technologies and Business Models:
“Industry 4.0” looks at the confluence of edge and networking technologies that enable technology to uniquely improve our interactions with the physical world, whether that’s agriculture, manufacturing, robotics, or our homes. We’ve got a great line-up focused both on use cases and the technologies that enable them.
“Security and Privacy” are the most important issues with which we as global citizens and we as an ecosystem struggle. Far from being an afterthought, security is front and center as we look at zero-trust and vulnerability management, and which technologies and policies best serve enterprises and consumers.
Technology is always front and center for open source groups and our “New Networking Stack” track dives deep into the technologies and components we will all use as we build the infrastructure of the future. In this track we have a number of experts sharing their best practices, as well as ideas for forward-looking usages.
In our “Operationalizing Deployment” track, we learn from the lived experience of those taking ideas and turning them into workable reality. We ask questions like, How do you bridge cultural divides? How do you introduce and truly leverage DevOps? How do you integrate compliance and reference architectures? How do you not only deploy but bring in Operations? How do you automate and how to you use tools to accomplish digital transformation in our ecosystem(s)?
Not just content focusing only on today’s challenges and success, we look ahead with “Emerging Technologies and Business Models.” Intent, Metaverse, MASE, Scaling today’s innovation to be tomorrow’s operations, new takes on APIs – these are the concepts that will shape us in the next 5-10 years; we talk about how we start approaching and understanding them?
Every talk that made it into this program has unique and valuable insight, and I’m so proud to be part of the communities that proposed them. I’m also honored to have worked with one of the best Programming Committees in open source events ever. These folks took so much time and care to provide both quantitative and qualitative input that helped shape this agenda. Please be sure to thank them for their time because they worked hard to take the heart of this event to the next level. If you want to be in the room and in the hallway with these great speakers, there is only ONE place to be. Early bird registration ends soon, so don’t miss out and register now!
And please don’t forget to sponsor. Creating a space for all this content does cost money, and we can’t do it without our wonderful sponsors. If you’re still on the fence, please consider how amazing these sessions are and the attendee conservations they will spark. We may not be the biggest conference out there, but we are the most focused on decision makers and end users and the supply chains that enable them. You won’t find a more engaged and thoughtful audience anywhere else.
Is your organization consuming open source software, or is it starting to contribute to open source projects? If so, perhaps it’s time for you to start an OSPO: an open source program office.
In a new Linux Foundation Research report, A Deep Dive into Open Source Program Offices, published in partnership with the TODO Group, authored by Dr. Ibrahim Haddad, Ph.D, showcases the many forms of OSPOs, their maturity models, responsibilities, and challenges they face in open source enterprise adoption, and also their staffing requirements are discussed in detail.
“The past two decades have accelerated open source software adoption and increased involvement in contributing to existing projects and creating new projects. Software is where a lot of value lies and the vast majority of software developed is open source software providing access to billions of dollars worth of external R&D. If your organization relies on open source software for products or services and does not have a formalized OSPO yet to manage all aspects of working with open source, please consider this report a call to establish your OPSO and drive for leadership in the open source areas that are critical to your products and services.” – Ibrahim Haddad, Ph.D., General Manager, LF AI & Data Foundation
An OSPO can help you manage and track your company’s use of open source software and assist you when interacting with other stakeholders. It can also serve as a clearinghouse for information about open source software and its usage throughout your organization.
Your OSPO is the central nervous system for an organization’s open source strategy and provides governance, oversight, and support for all things related to open source.
OSPOs create and maintain an inventory of your open source software (OSS) assets and track and manage any associated risks. The OSPO also guides how to best use open source software within the organization and can help coordinate external contributions to open source projects.
To be effective, the OSPO needs to have a deep understanding of the business and the technical aspects of open source software. It also needs to work with all levels of the organization, from executives to engineers.
An OSPO is designed to:
Be the center of competency for an organization’s open source operations and structure,
Place a strategy and set of policies on top of an organization’s open source efforts.
This can include creating policies for code use, distribution, selection, auditing, and other areas; training developers; ensuring legal compliance, and promoting and building community engagement to benefit the organization strategically.
An organization’s OSPO can take many different forms, but typically it is a centralized team that reports to the company’s executive level. The size of the team will depend on the size and needs of the organization, and how it is adopted also will undergo different stages of maturity.
When starting, an OSPO might just be a single individual or a very small team. As the organization’s use of open source software grows, the OSPO can expand to include more people with different specialties. For example, there might be separate teams for compliance, legal, and community engagement.
This won’t be the last we have to say about the OSPO in 2022. There are further insights in development, including a qualitative study on the OSPO’s business value across different sectors, and the TODO group’s publication of the 2022 OSPO Survey results will take place during OSPOCon in just a few weeks.
“There is no board template to build an OSPO. Its creation and growth can vary depending on the organization’s size, culture, industry, or even its milestones.
That’s why I keep seeing more and more open source leaders finding critical value in building connections with other professionals in the industry. OSPOCon is an excellent networking and learning space where those working (or willing to work) in open source program offices that rely on open source technologies come together to learn and share best practices, experiences, and tools to overcome challenges they face.” Ana Jiménez, OSPO Program Manager at TODO Group
Join us there and be sure to read the report today to gain key insights into forming and running an OSPO in your organization.
June 2022 saw the publication of Addressing Cybersecurity Challenges in Open Source Software, a joint research initiative launched by the Open Source Security Foundation in collaboration with Linux Foundation Research and Snyk. The research dives into security concerns in the open source ecosystem. If you haven’t read it, this article will give you the report’s who, what, and why, summarizing its key takeaways so that it can be relevant to you or your organization.
Who is the report for?
This report is for everyone whose work touches open source software. Whether you’re a user of open source, an OSS developer, or part of an OSS-related institution or foundation, you can benefit from a better understanding of the state of security in the ecosystem.
Open source consumers and users: It’s very likely that you rely on open source software as dependencies if you develop software. And if you do, one important consideration is the security of the software supply chain. Security incidents such as log4shell have shown how open source supply chain security touches nearly every industry. Even industries and organizations that have traditionally not focused on open source software now realize the importance of ensuring their OSS dependencies are secure. Understanding the state of OSS security can help you to manage your dependencies intelligently, choose them wisely, and keep them up to date.
Open source developers and maintainers: People and organizations that develop or maintain open source software need to ensure they use best practices and policies for security. For example, it can be valuable for large organizations to have open source security policies. Moreover, many OSS developers also use other open source software as dependencies, making understanding the OSS security landscape even more valuable. Developers have a unique role to play in leading the creation of high-quality code and the respective governance frameworks and best practices around it.
Institutions: Institutions such as open source foundations, funders, and policymaking groups can benefit from this report by understanding and implementing the key findings of the research and their respective roles in improving the current state of the OSS ecosystem. Funding and support can only go to the right areas if priorities are informed by the problems the community is facing now, which the research assists in identifying.
What are the major takeaways?
The data from this report was collected by conducting a worldwide survey of:
Individuals who contribute to, use, or administer OSS;
Maintainers, core contributors, and occasional contributors to OSS;
Developers of proprietary software who use OSS; and
Individuals with a strong focus on software supply chain security
The survey also included data collected from several major package ecosystems by using Snyk Open Source, a static code analysis (SCA) tool free to use for individuals and open source maintainers.
Here are the major takeaways and recommendations from the report:
Too many organizations are not prepared to address OSS security needs: At least 34% of organizations did not have an OSS security policy in place, suggesting these organizations may not be prepared to address OSS security needs.
Small organizations must prioritize developing an OSS security policy: Small organizations are significantly less likely to have an OSS security policy. Such organizations should prioritize developing this policy and having a CISO and OSPO (Open Source Program Office).
Using additional security tools is a leading way to improve OSS security: Security tooling is available for open source security across the software development lifecycle. Moreover, organizations with an OSS security policy have a higher frequency of security tool use than those without an OSS security policy.
Collaborate with vendors to create more intelligent security tools: Organizations consider that one of the most important ways to improve OSS security across the supply chain is adding greater intelligence to existing software security tools, making it easier to integrate OSS security into existing workflows and build systems.
Implementing best practices for secure software development is the other leading way to improve OSS security: Understanding best practices for secure software development, through courses such as the OpenSSF’s Secure Software Development Fundamentals Courses, has been identified repeatedly as a leading way to improve OSS supply chain security.
Use automation to reduce your attack surface: Infrastructure as Code (IaC) tools and scanners allow automating CI/CD activities to eliminate threat vectors around manual deployments.
Consumers of open source software should give back to the communities that support them: The use of open source software has often been a one-way street where users see significant benefits with minimal cost or investment. For larger open source projects to meet user expectations, organizations must give back and close the loop by financially supporting OSS projects they use.
Why is this important now?
Open source software is a boon: its collaborative and open nature has allowed society to benefit from various innovative, reliable, and free software tools. However, these benefits only last when users contribute back to open source software and when users and developers exercise due diligence around security. While the most successful open source projects have gotten such support, other projects have not – even as open source use has continued to be more ubiquitous.
Thus, it is more important than ever to be aware of the problems and issues everyone faces in the OSS ecosystem. Some organizations and open source maintainers have strong policies and procedures for handling these issues. But, as this report shows, other organizations are just facing these issues now.
Finally, we’ve seen the risks of not maintaining proper security practices around OSS dependencies. Failure to update open source dependencies has led to costs as high as $425 million. Given these risks, a little investment in strong security practices and awareness around open source – as outlined in the report’s recommendations – can go a long way.
We suggest you read the report – then see how you or your organization can take the next step to keep yourself secure!