Rock the Prototype - Software development & Prototyping Titelbild

Rock the Prototype - Software development & Prototyping

Rock the Prototype - Software development & Prototyping

Von: Sascha Block - Rock the Prototype
Jetzt kostenlos hören, ohne Abo

Nur 0,99 € pro Monat für die ersten 3 Monate

Danach 9.95 € pro Monat. Bedingungen gelten.

Über diesen Titel

Rock the Prototype - Software Development & Prototyping is your podcast about exciting topics like software development, prototyping, software architecture, cloud, DevOps and much more. 

 We offer practical tips and insights for software developers and tech enthusiasts of all experience levels. Learn how to generate creative ideas, prototype innovative software and successfully implement software projects. 
 Rock the Prototype - Software Development & Prototyping: The Podcast for Practical Tips and Insights Subscribe to the Rock the Prototype Podcast now and let's rock the world of software development together! For more information, visit https://rock-the-prototype.com Wissenschaft
  • Episode 13 - Digital identities and identity access management
    Jan 1 2026
    👁 At a time when our interactions and transactions are increasingly shifting to the 📲 digital realm, understanding the invisible architectures that support our 🌐 online world is more important than ever. Digital identities and how they are managed form the backbone of our connected society, enabling us to navigate the digital space securely and efficiently. In this podcast episode, we start with the basics: ❇️ What exactly is a digital identity and why does it play such a crucial role in our online lives? ❇️ What does identity and access management mean and how does it contribute to the security and smooth functioning of digital services? We will also explore the differences between authentication and authorization and why these concepts are essential for protecting our digital identities. Join us on this journey to understand how digital identities affect our online lives and how IAM systems help secure and shape our digital existence. Support us: If you enjoyed our episode, please leave us a rating.💕 🙋‍♂️I'm Sascha Block, IT architect and your guide and moderator, and I'll give you an insight into what you can expect in the coming episodes. 👉**Subscribe to the Rock the Prototype podcast now**👈 so you don't miss a single episode. So, let's rock software development and prototyping together!🚀 Visit our **website** 👉 [https://rock-the-prototype.com](https://rock-the-prototype.com) to learn more about the podcast and find more exciting topics in our **blog** 👀[https://rock-the-prototype.com/blog/](https://rock-the-prototype.com/blog/) or in our **wiki**📌[https://rock-the-prototype.com/wiki/](https://rock-the-prototype.com/wiki/). 💕 We have lots more valuable content for you.🖖 We also welcome your feedback 💌 and suggestions 💬. Look forward to your next Rock the Prototype podcast episode! **RTP#13 – Digital Identities & Identity and Access Management (IAM): Security and Trust at the Heart of Digital Identity** Digital identities are the invisible backbone of our digital lives — from logging into email to using modern wallets for payments. In this episode of the Rock the Prototype Podcast, we explore what a *digital identity* is, why *Identity and Access Management (IAM)* is critical for secure digital services, and how authentication and authorization work together to protect users, organizations, and sensitive data. You’ll learn which building blocks shape digital identity systems today — including passwords, biometrics, multi-factor authentication, digital certificates, and online profiles — and why topics like data sovereignty and the “right to be forgotten” have become essential principles in identity management. We also widen the lens: secure digital identities don’t stop at national borders. Cross-border interoperability depends on shared trust models and international standards. That’s why Europe’s *EUDI Wallet* and the *Architecture Reference Framework* are so important right now, alongside regulations like *eIDAS* and cybersecurity requirements such as *NIS2*. We discuss how institutions like Germany’s *Federal Office for Information Security (BSI)* translate these supranational requirements into technical and operational security expectations. From there, we connect modern identity assurance to real-world examples: device-bound security and tokenization in wallet-based payments, and the much higher assurance levels required for government services, health data, and legally binding digital credentials. Privacy-preserving digital identity is another key part of the episode. We compare anonymity approaches like the *TOR network* with *Zero-Knowledge Proofs (ZKPs)* — explaining how ZKPs can prove identity validity without disclosing sensitive data. This ties directly to *Kerckhoffs’ principle*: security must hold even if everything about the system is public — except the secret key. Finally, we walk through core standards and protocols that power identity infrastructures...
    Mehr anzeigen Weniger anzeigen
    32 Min.
  • Episode 12 - SolarWinds Hack: The Invisible Cyber Theft
    Jun 16 2025
    Software Development in the Context of Cybersecurity & Protection Against Hackers and Cybercrime SolarWinds Hack: The Invisible Cyber Theft 🌐 Software development in the context of cybersecurity & protection against hackers and cybercrime 💡 Topics include: ✅ Advanced Persistent Threats (APT) ✅ Software vulnerabilities and deployment risks ✅ The Kerckhoffs Principle in modern cybersecurity ✅ Supply chain attacks as the new risk frontier ✅ How to build resilient and secure development structures ❇️ Welcome and a brief introduction to the topic. ❇️ SolarWinds Hack – A quick overview of the known facts: ❇️ Explanation of the events surrounding the SolarWinds Hack Timeline of key discoveries and public disclosures. Who is behind the SolarWinds Hack? ❇️ Discussion of the suspected attackers and their motives. Insights into the investigations and the current situation. How was the cyberattack discovered? ❇️ The story behind how the hack was uncovered. The role of IT security teams and whistleblowers. Details on the "Sunburst" backdoor: Technical analysis of the Sunburst backdoor. How the backdoor works and why it’s so dangerous. ❇️ Vulnerabilities in software: How do software vulnerabilities emerge, and how can they lead to incidents like these? ❇️ How secure are our systems and data really? A critical assessment of current security measures in companies and government agencies. Software vulnerabilities in the development process: Best practices for preventing such weaknesses. ❇️ Applying Kerckhoffs's Principle in modern cybersecurity: → See also: https://rock-the-prototype.com/en/cryptography/kerckhoff-principle/ The relevance of Kerckhoffs’s Principle for IT security. How this principle is applied today — and what it means for key secrecy. Maximum IT security and robust protection through transparency: ❇️ Arguments for more transparency in security architecture. - Examples of how transparency can help improve security. - Secure source code – Why deployment and secure data flows are the real battlegrounds of cybersecurity: - Why secure source code matters so much. - Discussion of deployment strategies and secure data flows. Support us: If you enjoyed this episode, please leave us a rating. 💕 👉 Subscribe now to the Rock the Prototype Podcast 👈 so you don’t miss an episode. Let’s rock software development & prototyping together! 🚀 Also visit our website 👉 https://rock-the-prototype.com to learn more about the podcast and explore other exciting topics in our blog 👀 https://rock-the-prototype.com/blog/ or in our wiki 📌 https://rock-the-prototype.com/wiki/ 💕 We have loads of valuable content for you. 🖖 We’d love to hear your feedback 💌 and suggestions 💬. Stay tuned for your next Rock the Prototype Podcast episode! Follow us on: ✅ YouTube ✅ LinkedIn
    Mehr anzeigen Weniger anzeigen
    32 Min.
  • Episode 11 - The dark side of data: Beyond the binary - Cybercrime Podcast
    Dec 29 2024
    👁 Dive into the hidden depths of the digital world with us. 🌐 From secret networks to the most sophisticated cyberattacks 💰 - discover a gripping story including a comprehensive fact analysis for background information. 👀 ❇️ IT security is not only explained here, but experienced. ❇️ Ready for a journey beyond the binary? ❇️ Today we are daring to conduct a very special experiment. Quite prototypical, so to speak! ✨ As we are always looking for innovative approaches at 'Rock the Prototype', today we are combining storytelling with the latest technology. ⭐️ Imagine a world where the boundaries between reality and bits and bytes are blurred, where cybercriminals are omnipresent and IT security is more of a priority than ever before. 🎧 In this Rock the Prototype podcast episode, we dive into an exciting cybercrime story, combining fact with fiction. But before we start, a little hint: Our story today is not only meant to entertain you, but also to inform you. 🎬 We want to use an innovative infotainment approach to bring you closer to the topic of cybercrime and IT security and raise awareness of IT security. 🤫 The title “The Dark Side of Data: Beyond the Binary” deliberately has a certain duality. It is a deliberate reference to the depth and complexity of IT security and cybercrime. So, buckle up and join us in this prototypical experiment! 🤗 👩‍💻 👨‍💻 Rock the Prototype Community: 👉 Connect with our Rock the Prototype Community via our Discord server and exchange ideas and questions with like-minded people. 👉 [**Discord**](https://bit.ly/46CUolJ) 👈 ❇️ In-depth understanding of tech: 👉 IT security: you will learn how cyber attacks work and which protective measures are effective. 🙋‍♂️Ich I'm Sascha Block, IT architect and your guide and moderator, giving you an insight into what to expect in the upcoming episodes. 👉**Subscribe to the Rock the Prototype Podcast**👈 now so you never miss an episode. So, let's rock software development & prototyping together! Also visit our **website** 👉 [https://rock-the-prototype.com](https://rock-the-prototype.com) to learn more about the podcast and read more exciting topics in our **blog**👀[https://rock-the-prototype.com/blog/](https://rock-the-prototype.com/blog/) or in our **wiki**📌[https://rock-the-prototype.com/wiki/](https://rock-the-prototype.com/wiki/). 💕 We have lots more valuable content for you.🖖 We also look forward to your feedback 💌 and your suggestions 💬. Look forward to your next Rock the Prototype podcast episode! **Follow us also on:** ✅ [**YouTube**](https://youtube.com/@Rock-the-Prototype) ✅ [**LinkedIn**](https://www.linkedin.com/in/sascha-block/) ✅ [**Instagram**](https://www.instagram.com/rock_the_prototype/)
    Mehr anzeigen Weniger anzeigen
    35 Min.
Noch keine Rezensionen vorhanden