Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).
…
continue reading
Adopting Zero Trust Podcasts
Tech Tomorrow is your front-row seat to the conversations redefining the future. Each episode explores one big question about data, AI, or emerging tech, giving leaders clear, focused answers they can trust. If you're navigating complex innovation, from AI-augmented delivery to sustainability, this show helps you cut through the noise, connect cross-disciplinary trends, and lead with confidence in a rapidly evolving landscape. Previously known as Data Today, this podcast has examined how out ...
…
continue reading
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
1
Will the next biotech breakthrough be digital before it’s biological with Bibi Ephraim
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44AI is transforming biotechnology from the inside out. What was once a world of petri dishes and pipettes is now increasingly powered by algorithms, models, and digital twins. But as machine learning accelerates drug discovery and reshapes clinical trials, how far can we go before biology itself becomes the follower, not the leader? In this episode …
…
continue reading
1
Getting Your Software Supply Chain In Tune with SBOM Harmonization
23:14
23:14
Play later
Play later
Lists
Like
Liked
23:14Software bills of materials or SBOMs are critical to software security and supply chain risk management. Ideally, regardless of the SBOM tool, the output should be consistent for a given piece of software. But that is not always the case. The divergence of results can undermine confidence in software quality and security. In our latest podcast from…
…
continue reading
1
Cyber Warriors & Digital Shadows: Insights from Canada's Cybersecurity Leader | Sami Khoury
49:22
49:22
Play later
Play later
Lists
Like
Liked
49:22In this episode of The Defender’s Log, host David Redekop sits down with Sami Khoury, the Head of the Canadian Centre for Cyber Security, for an inside look at the battle to protect national infrastructure from unseen digital threats. From his beginnings as a research engineer in 1992 to leading one of Canada’s most critical cybersecurity agencies,…
…
continue reading
1
Is net zero even possible without open data with Gavin Starks
28:18
28:18
Play later
Play later
Lists
Like
Liked
28:18The UK’s 2025 Data Act marks a turning point in how data is shared and governed. Just as common standards in telecoms and banking unlocked innovation, trusted data could be the key to credible climate action. But with carbon reporting fragmented and confidence in the numbers low, can open data really help us reach net zero? In this episode of Tech …
…
continue reading
1
API Security: An Emerging Concern in Zero Trust Implementations
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41Application programing interfaces, more commonly known as APIs, are the engines behind the majority of internet traffic. The pervasive and public nature of APIs have increased the attack surface of the systems and applications they are used in. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconie…
…
continue reading
1
An Educator's Guide to DNS Threats with Josh Kuo
57:12
57:12
Play later
Play later
Lists
Like
Liked
57:12Is your company's most critical blind spot hiding in plain sight? While most security teams focus on firewalls and web traffic, attackers are increasingly using the internet's phonebook—the Domain Name System (DNS)—as a secret backdoor for malware delivery, data theft, and command and control. In this episode of The Defenders Log, host David Redeko…
…
continue reading
1
Is the global food crisis a problem that only tech can solve with Illtud Dunsford
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16According to the United Nations, the world’s population is projected to exceed 9.5 billion by 2050, placing unprecedented strain on our food systems. Climate change, land scarcity, and rising demand for protein mean that traditional agriculture alone may no longer be enough. Could cultivated meat and other food technologies provide the answer? In t…
…
continue reading
1
Delivering Next-Generation AI Capabilities
30:18
30:18
Play later
Play later
Lists
Like
Liked
30:18Artificial intelligence (AI) is a transformational technology, but it has limitations in challenging operational settings. Researchers in the AI Division of the Carnegie Mellon University Software Engineering Institute (SEI) work to deliver reliable and secure AI capabilities to warfighters in mission-critical environments. In our latest podcast, M…
…
continue reading
1
A Developer's Guide to Life: Passion, Legacy & The "Foggy Staircase" of a Tech Career | Will Earp
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55"Am I going to spend my life trying to get the thing that I need, or am I going to spend my life doing the thing that I want?" In this deeply insightful episode of The Defender's Log, host David Redekop sits down with Will Earp, a veteran developer whose career journey began with an Amiga 600 in 1998. They explore the profound philosophy that has g…
…
continue reading
1
The Benefits of Rust Adoption for Mission-and-Safety-Critical Systems
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38A recent Google survey found that many developers felt comfortable using the Rust programming language in two months or less. Yet barriers to Rust adoption remain, particularly in safety-critical systems, where features such as memory and processing power are in short supply and compliance with regulations is mandatory. In our latest podcast from t…
…
continue reading
1
Should we trust AI as a creative collaborator with Professor Anjana Susarla
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26By 2026, Europol estimates that more than 90% of online content could be AI-generated – from music and written work to imagery and beyond. But what does this shift mean for creativity, originality, and the role of human value in the process? In this episode of Tech Tomorrow, David Elliman speaks with Anjana Susarla, Professor of Responsible AI at t…
…
continue reading
Tech Tomorrow is your front-row seat to the conversations redefining the future. Each episode explores a big, thought-provoking question, from how we collaborate with machines to the possibilities intelligent systems could unlock in the future. Created for leaders steering innovation through complexity, the show cuts through the noise, connecting c…
…
continue reading
1
Threat Modeling: Protecting Our Nation's Complex Software-Intensive Systems
35:02
35:02
Play later
Play later
Lists
Like
Liked
35:02In response to Executive Order (EO) 14028, Improving the Nation's Cybersecurity, the National Institute of Standards and Technology (NIST) recommended 11 practices for software verification. Threat modeling is at the top of the list. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Natasha Shevchenko and Ale…
…
continue reading
1
Understanding Microsoft Zero Trust DNS with Aditi Patange
46:33
46:33
Play later
Play later
Lists
Like
Liked
46:33In this episode of the Defenders Log, we have Aditi Patange from Microsoft alongside our hosts, David Redekop and Francois from Adam Networks, for an in-depth discussion on Zero Trust DNS, a new enterprise security feature within Windows 11. Aditi shares her background in computer engineering and product management and how his work contributes to c…
…
continue reading
1
Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48In today's episode of the Defender's Log, we welcome special guest Tommy Jensen, an internet technologist with expertise in IPv6, Zero Trust, and standards. The episode covers Jensen's career journey from an AppleCare contractor to a pivotal role in advancing internet technologies. The discussion delves into the importance and challenges of migrati…
…
continue reading
1
Defending the DNS: How Quad9 Protects the Internet | John Todd, CTO - Quad9
52:30
52:30
Play later
Play later
Lists
Like
Liked
52:30In this episode of 'The Defender's Log,' host David engages in a comprehensive discussion with John Todd, an influential figure in the defense technology space and a key player at Quad9. The conversation covers John's career journey, starting from the early days of commercial internet services to his current role at Quad9. They delve into the impor…
…
continue reading
1
Understanding Container Reproducibility Challenges: Stopping the Next Solar Winds
25:10
25:10
Play later
Play later
Lists
Like
Liked
25:10Container images are increasingly being used as the main method for software deployment, so ensuring the reproducibility of container images is becoming a critical step in protecting the software supply chain. In practice, however, builds are often not reproducible due to elements of the build environment that rely on nondeterministic factors such …
…
continue reading
1
Cybersecurity Explained: Privacy, Threats, and the Future | Chester Wisniewski
36:11
36:11
Play later
Play later
Lists
Like
Liked
36:11In the inaugural episode of 'The Defender’s Log,' host David Redekop converses with cybersecurity veteran Chester Wisniewski to explore the dynamic field of cybersecurity. They discuss the differentiation between privacy and security, the evolution of hacking from the 1980s to the present, and pivotal moments that reshaped information security. Che…
…
continue reading
1
Mitigating Cyber Risk with Secure by Design
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29Software enables our way of life, but market forces have sidelined security concerns leaving systems vulnerable to attack. Fixing this problem will require the software industry to develop an initial standard for creating software that is secure by design. These are the findings of a recently released paper coauthored by Greg Touhill, director of t…
…
continue reading
1
The Magic in the Middle: Evolving Scaled Software Solutions for National Defense
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25A January 2025 Defense Innovation Board study on scaling nontraditional defense innovation stated, "We must act swiftly to ensure the DoD leads in global innovation and competition over AI and autonomous systems – and is a trendsetter for their responsible use in modern warfare." In this podcast from the Carnegie Mellon University Software Engineer…
…
continue reading
1
Making Process Respectable Again: Advancing DevSecOps in the DoD Mission Space
44:26
44:26
Play later
Play later
Lists
Like
Liked
44:26Warfighters in the Department of Defense (DoD) operate in high-stakes environments where security, efficiency, and speed are critical. In such environments DevSecOps has become crucial in the drive toward modernization and overall mission success. A recent study led by researchers at the Carnegie Mellon University Software Engineering Institute (SE…
…
continue reading
Deploying cloud-centric technologies such as Kubernetes in edge environments poses challenges, especially for mission-critical defense systems. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Patrick Earl, Doug Reynolds, and Jeffrey Hamed, all DevOps engineers in the SEI's Software Solutions Division, sit d…
…
continue reading
1
The Best and Brightest: 6 Years of Supporting the President's Cup Cybersecurity Competition
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40A strong cyber defense is vital to public- and private-sector activities in the United States. In 2019, in response to an executive order to strengthen America's cybersecurity workforce, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) partnered with the SEI to develop and run the President's Cup Cyberse…
…
continue reading
1
Updating Risk Assessment in the CERT Secure Coding Standard
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04Evaluating source code to ensure secure coding qualities costs time and effort and often involves static analysis. But those who are familiar with static analysis tools know that the alerts are not always reliable and produce false positives that must be detected and disregarded. This year, we plan on making some exciting updates to the SEI CERT C …
…
continue reading
1
How Critical Infrastructure Leaders Are Rethinking Cybersecurity
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32In this episode of Adopting Zero Trust, hosts Elliot Volkman and Neal Dennis discuss critical infrastructure security with expert guest Ian Branson, Vice President of Global Industrial Cybersecurity at Black and Veatch. The discussion centers around the philosophical and strategic approaches to handling incidents and breaches, especially in the ope…
…
continue reading
1
Delivering Next Generation Cyber Capabilities to the DoD Warfighter
27:16
27:16
Play later
Play later
Lists
Like
Liked
27:16In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Gregory Touhill, director of the SEI CERT Division, sits down with Matthew Butkovic, technical director of Cyber Risk and Resilience at CERT, to discuss ways in which CERT researchers and technologists are working to deliver rapid capability to warfighters in …
…
continue reading
1
Getting the Most Out of Your Insider Risk Data with IIDES
39:14
39:14
Play later
Play later
Lists
Like
Liked
39:14Insider incidents cause around 35 percent of data breaches, creating financial and security risks for organizations. In this podcast from the Carnegie Mellon University Software Engineering Institute, Austin Whisnant and Dan Costa discuss the Insider Incident Data Expression Standard (IIDES), a new schema for collecting and sharing data about insid…
…
continue reading
1
Shadows Within Shadows: How AI is Challenging IT Teams
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12In this episode of Adoption Zero Trust (AZT), host Neal Dennis and producer Elliot Volkman sit down with Bradon Rogers, Chief Customer Officer at Island, to discuss how AI is compounding the already existing problems tied to shadow IT. The conversation explores how modern enterprises handle the growing complexities of unregulated software use, the …
…
continue reading
1
Grace Lewis Outlines Vision for IEEE Computer Society Presidency
18:14
18:14
Play later
Play later
Lists
Like
Liked
18:14Grace Lewis, a principal researcher at the Carnegie Mellon University Software Engineering Institute (SEI) and lead of the SEI's Tactical and AI-Enabled Systems Initiative, was elected the 2026 president of the IEEE Computer Society (CS), the largest community of computer scientists and engineers, with more than 370,000 members around the world. In…
…
continue reading
1
Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50Catch this episode on YouTube, Apple, Spotify, or Amazon. You can read the show notes here. Live from ThreatLocker’s Zero Trust World (ZTW), cybersecurity heavyweights Dave Bittner, host of CyberWire Daily and Dr. Chase Cunningham AKA Dr. Zero Trust shared their unfiltered thoughts on the state of cybersecurity, AI, and government regulations. From…
…
continue reading
1
Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals
3:20
3:20
Play later
Play later
Lists
Like
Liked
3:20New intelligence: Silk Typhoon, formerly tracked as HAFNIUM, is a China-based threat actor most recently observed targeting IT supply chains in the US. Today, we released a new report in conjunction with the Department of Justice's action against twelve Chinese nationals that includes mercenary hackers, law enforcement officers, and employees of a …
…
continue reading
1
Improving Machine Learning Test and Evaluation with MLTE
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06Machine learning (ML) models commonly experience issues when integrated into production systems. In this podcast, researchers from the Carnegie Mellon University Software Engineering Institute and the U.S. Army AI Integration Center (AI2C) discuss Machine Learning Test and Evaluation (MLTE), a new tool that provides a process and infrastructure for…
…
continue reading
1
DOD Software Modernization: SEI Impact and Innovation
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12As software size, complexity, and interconnectedness has grown, software modernization within the Department of Defense (DoD) has become more important than ever. In this discussion moderated by Matthew Butkovic, technical director of risk and resilience in the SEI CERT Division, SEI director Paul Nielsen outlines the SEI's work with the DoD on sof…
…
continue reading