I share my experiences with DevSecOps, Linux systems, remote work culture, and the technical challenges of building secure, scalable products.

Hey! I'm a tech entrepreneur who loves diving deep into complex systems
From building YippieMove's email migration engine to scaling Screenly's digital signage platform, I've tackled fascinating technical challenges. Join me as I share insights from my journey through my blog and podcast.

Latest Podcast Episodes
Dustin Kirkland on Chainguard, Zero-CVE Containers, and Supply Chain Security
In this episode, I sat down with Dustin Kirkland to discuss the critical topic of supply chain security and the innovative work being done at Chainguard. We delved into the concept of zero-CVE containers, exploring how this approach is revolutionizing container security. Dustin shared insights on modern supply chain threats, the importance of software bill of materials (SBOM), and practical strategies for maintaining secure container environments. The conversation covered both the technical challenges and solutions in today's rapidly evolving security landscape.
Pentesting 101: Hacking Legally with Warren Houghton
In my conversation with Warren Houghton, he showed exactly how a penetration test unfolds: starting with scoping and permission paperwork, then moving into reconnaissance and tooling. He demonstrated how a tester uses Kali Linux alongside Nmap for port scanning, Metasploit for exploiting vulnerabilities, and Burp Suite for intercepting and manipulating web traffic. He also highlighted the risks of overlooked exposures—like a public .git directory or outdated WordPress plugins—and stressed how secure configurations and network segmentation can prevent lateral movement. Throughout, he emphasized the constant need for learning and vigilance against ever-evolving threats.
A deep dive into the SBOM format SPDX
In my conversation with Kate Stewart and Gary O'Neall, we explore the evolution and impact of SPDX in software transparency. From its origins in license compliance to its current role in security and vulnerability tracking, we unpack how this open standard is shaping modern software development practices. The discussion reveals fascinating insights into SBOM generation challenges and how SPDX 3.0 is being designed to meet the demands of today's CI/CD environments.
Latest Blog Posts
Yocto, RockPi and SBOMs: Building Modern Embedded Linux Images
Feb 21. 2025
How I Use Home Assistant in 2025
Jan 22. 2025
Using Google Forms for Waitlists and Launches
Jan 14. 2025
Nerding Out with Viktor is now available as audio-only, a.k.a Turning my video podcast into an audio podcast
Jun 27. 2024
Launching a Video Podcast in 2024: My Journey and Lessons Learned
Jun 20. 2024
Secure your Tailscale infra further with Mutual TLS (mTLS)
May 29. 2024