Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

DevSecOps Podcast Series

show episodes
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
  continue reading
 
Artwork
 
Where LLMs, AI Agents, and MCP tools meet DevOps. How can we humans use non-deterministic, often hallucinating LLMs to automate our infrastructure and help us with the job of software lifecycle management? I’m Bret Fisher, and this is the Agentic DevOps podcast. After the invention of AI Agents and the MCP standard in late 2024, I started this podcast in early '25 with a narrow topic focus… to document and advise how AI Agents, MCP tools, and large language models can be used in the real wor ...
  continue reading
 
I'm Scott W Houghton, 36, DevSecOps architect and multi-cloud expert (AWS/Azure/GCP) in Tampa, Florida. Navy vet, self-taught programmer since 11, flawed Christian finding my way back. For tech professionals, conservatives, veterans, and small business owners who refuse to compromise. EPISODE SERIES: TECH DEEP DIVE (Tuesdays) Enterprise technical content for DevOps engineers and cloud architects. Real implementation from 20+ years experience. FAITH & FREEDOM (Thursdays) Current events throug ...
  continue reading
 
Artwork
 
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we're proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we're pleased to share the talent and perspective of our staff as it relates to today's emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
  continue reading
 
Artwork

1
DevOps State of Mind

LogDNA x StudioPod Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Curious about DevOps? In this podcast series we dive deep into the DevOps culture and chat with friends from small startups and large enterprises about what DevOps looks like in their organizations. Join us weekly to hear about the problems they are solving, how their teams work together, and the tools they are using to get the job done. Subscribe to the show to get into a DevOps State of Mind. This podcast is brought to you by LogDNA, the log management tool for teams that embrace DevOps.
  continue reading
 
Artwork

1
DevOps Chat

DevOps.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
  continue reading
 
Loading …
show series
 
Send us a text October 14th, 2025: President Trump posthumously awards Charlie Kirk the Presidential Medal of Freedom. September 25th: State Department quietly revokes 47 visas for non-citizens who celebrated Kirk's assassination. Justice without revenge - that's the Christian balance we all need to understand. Five weeks after starting this podcas…
  continue reading
 
The SEI contributed its expertise to the development of the Software Acquisition Pathway (SWP), which the Department of Defense (DoD) issued in 2020 as DoD Instruction 5000.87. Since the SWP's issuance, SEI researchers have collaborated with DoD program teams and policy owners to effectively implement the pathway in different program contexts, iden…
  continue reading
 
Send us a text Episode 9: When the Cloud Goes Dark - Observability After the AWS Outage Yesterday's AWS outage cost hundreds of billions and took down Snapchat, Coinbase, Ring, even Amazon's own retail site. 15+ hours of chaos exposed a critical truth: most organizations are doing observability completely wrong. THE RECEIPTS: - October 20, 2025, 3:…
  continue reading
 
Send us a text Platform Engineering isn't just another buzzword—it's the evolution that makes DevOps, DevSecOps, and SRE practices actually scale across entire organizations. In this episode, Scott shares a real story from a scrum call where a simple code formatting mistake became the catalyst for building automated systems that eliminate toil fore…
  continue reading
 
Experts agree that quantum computing will likely become powerful enough to break modern-day encryption within the next 10–15 years on "Q Day." Once encryption is defeated, the computing world will never be the same. Organizations need to identify the correct courses of action to take today so that the sudden onset of quantum computing does not thre…
  continue reading
 
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
  continue reading
 
Episode 4: Security as Code In this episode of the ePlus Security + F5 API Security Podcast, David Tumlin and Chuck Herrin dive into the future of "security as code," where automation, AI, and DevSecOps converge to protect dynamic, ephemeral environments. From real-time threat validation to AI-assisted policy tuning, this is a must-listen for anyon…
  continue reading
 
Send us a text Apple vs. the Sabbath: When "Inclusion" Excludes Faith | Faith & Freedom #7 The EEOC just filed a federal lawsuit that exposes Big Tech's double standard: diversity for everything except genuine religious conviction. THE CASE (WITH RECEIPTS): On September 30, 2025, the Equal Employment Opportunity Commission filed a federal lawsuit a…
  continue reading
 
Send us a text Real enterprise multi-cloud architecture from 20+ years in the trenches. AWS, Azure, GCP - when to use each, how to bridge them, and why most organizations fail at multi-cloud. THE RECEIPTS (Sources & Facts): Scott's credentials: Google Cloud PSO, AWS ProServe, consulting with McKinsey, PWC, Deloitte on Fortune 500 transformations AW…
  continue reading
 
Send us a text Seven thousand students worshipping Jesus at USF while a UT professor mocks prayer for the President. Three hundred baptisms versus profanity in the classroom. This is the battle for Tampa's soul. After watching Raleigh fall to liberal migration for 12 years, I moved to the Free State of Florida to help build what America can become.…
  continue reading
 
Finding and fixing weaknesses and vulnerabilities in source code has been an ongoing challenge. There is a lot of excitement about the ability of large language models (LLMs, e.g., GenAI) to produce and evaluate programs. One question related to this ability is: Do these systems help in practice? We ran experiments with various LLMs to see if they …
  continue reading
 
Send us a text Google admits Biden administration pressured YouTube to censor content that didn't violate policies. In this explosive Faith & Freedom episode, we unpack Google's September 23rd confession to Congress, the shadowbanning of conservative voices, and what the Oracle-led TikTok restructuring means for free speech in tech. Plus, my person…
  continue reading
 
Send us a text Former Navy Engineman Scott W Houghton transforms a real pirate attack on the USS Ashland into the most memorable Kubernetes lesson you'll ever hear. Drawing from his experience during the April 10, 2010 engagement in the Gulf of Aden, Scott parallels naval operations with container orchestration, making complex DevSecOps concepts cr…
  continue reading
 
Send us a text Scott interrupts his regular production schedule to address concerning comments about targeting Muslims following Florida's Operation One Way Ticket. Drawing from his Navy service alongside Muslim allies and presenting hard data on radical Islamic terrorism, he makes the crucial distinction between peaceful Muslims practicing their f…
  continue reading
 
Send us a text 🚨 SPECIAL FLORIDA EDITION: From the Free State comes a powerful examination of law, order, and liberty. This week's Central Florida operation detained 354 illegal immigrants in just 4 days, while Florida builds "Alligator Alcatraz" and expands ICE partnerships by 577% since January. Scott Houghton broadcasts from Tampa with hard fact…
  continue reading
 
Send us a text Scott breaks down Large Language Models (LLMs) in plain English – super-powered autocomplete that's changing everything. Compare Claude Opus 4.1, ChatGPT 5, Grok 4, Gemini, and Microsoft Copilot from someone who uses them all professionally. Learn why "AI won't replace people, but people using AI will replace those who don't" applies…
  continue reading
 
Bret and Nirmal are joined by Laura Tacho, CTO at DX and long-time friend of the show, to discuss AI usage and success in teams adopting AI and Agents to generate code and perform tasks. 🙌 My next course is coming soon! I've opened the waitlist for those wanting to go deep in GitHub Actions for DevOps and AI automation in 2025. I'm so thrilled to a…
  continue reading
 
Send us a text Tech Deep Dive: DevSecOps and Discipline - Show Notes Where security principles meet spiritual discipline - because the same practices that protect our systems can protect our souls. Scott Houghton (20+ years in tech, contractor for Google Cloud PSO, AWS ProServe, Fortune 500s) breaks down how DevSecOps isn't just about securing infr…
  continue reading
 
Send us a text Faith, Freedom & Tech Episode 3: The Charlie Kirk Effect - Show Notes Episode 3: The Charlie Kirk Effect - Gen Z's Return to Traditional Values September 25, 2025 Two weeks after Charlie Kirk's assassination at Utah Valley University, we're witnessing a global youth revolution. From 100,000+ protesters in London chanting "We are Char…
  continue reading
 
Send us a text After 20+ years of hiding his faith and conservative values in tech, Scott Houghton is done being silent. In this raw, unfiltered premiere episode of Faith, Freedom & Tech, Scott shares: Why watching Charlie Kirk die for his beliefs changed everything The real cost of being a Christian in Silicon Valley How he went from hacking schoo…
  continue reading
 
Episode 3: Increased Adoption of AI and Machine Learning In this episode, ePlus' David Tumlin and F5's Chuck Herrin break down how the AI boom is reshaping API security—and why skipping visibility is a risk you can't afford. Learn about the blind spots you'll face if you forgo API security and don't have your API ecosystems under control.…
  continue reading
 
Often, agile implementations are a struggle. Dedicated agile teams focus hard and deliver value on a regular cadence. But when results are tallied, the value teams produce may not fit neatly into the expectations of senior stakeholders. Why? In this webcast, Peter Capell addresses the importance of a practical vision to express outcomes, so that th…
  continue reading
 
In this episode, I walk though some of my favorite new AI tools and content. 🙌 My next course is coming soon! I've opened the waitlist for those wanting to go deep in GitHub Actions for DevOps and AI automation in 2025. I'm so thrilled to announce this course. The waitlist allows you to quickly sign up for some content updates, discounts, and more …
  continue reading
 
Bret and Nirmal are joined by Rajdeep Saha from AWS to discuss AI agents and the MCP (Model Context Protocol) standard. In this episode, they explore how AI can manage infrastructure with ease and demonstrate creating Kubernetes clusters with a single prompt. 🙌 My next course is coming soon! I've opened the waitlist for those wanting to go deep in …
  continue reading
 
Finding and growing AI and Data talent is essential for mission success, but many skilled workers remain unseen because they lack traditional credentials. This session introduces practical strategies and prototype tools that help individuals demonstrate what they know while helping managers identify and evaluate emerging talent in these fields. Att…
  continue reading
 
Bret and Nirmal discuss the intersection of AI agents and DevOps with Solomon Hykes, co-founder of Dagger and Docker. Solomon introduces Container Use, an open-source MCP server that gives coding agents isolated, containerized environments to work in, solving the critical problem of agents interfering with each other when running on the same system…
  continue reading
 
Threat modeling is intended to help defend a system from attack. It tops the list of techniques recommended by the National Institute of Standards and Technology (NIST) to secure critical systems. In a world where people with malicious intent have deadlier tools at their disposal, defenders need to take advantage of Model-Based Systems Engineering …
  continue reading
 
Bret and Nirmal explore AI agents in Kubernetes with Eitan Yarmush, Senior Architect at Solo.io. Eitan explains how AI agents work through three simple components (system prompts, LLMs, and tools), and demonstrates the kagent project, which provides a Kubernetes-native way to deploy and manage AI workflows. 🙌 My next course is coming soon! I've ope…
  continue reading
 
ePlus Security + F5 API Security Podcast Series where ePlus' David Tumlin and F5's Chuck Herrin share why visibility is the foundation of modern security—and how together, ePlus & F5 are helping organizations manage the real challenges of API security in today's hybrid, multi-cloud world.By David Tumlin, ePlus and Chuck Herrin, F5
  continue reading
 
DevSecOps generates a lot of data valuable for better decision making. However, decision makers may not see all they need to in order to make best use of the data for continuous improvement. The SEI open source Polar tool unlocks the data, giving DevSecOps teams greater capability to automate, which in turn means they can innovate rapidly – without…
  continue reading
 
Not everyone passes on the first try—but failure doesn’t define your journey. In this episode, we guide you through a structured plan for recovery if you don’t pass the CISSP exam. We cover how to interpret your exam feedback, identify weak domains, revise your study strategy, and rebuild confidence. You’ll also learn how to maintain momentum and a…
  continue reading
 
Earning your CISSP opens new doors—but where you go next depends on your goals. In this episode, we explore the post-CISSP landscape, including leadership roles like CISO, and technical specializations like cloud security and digital forensics. We also review advanced certifications such as CCSP, CISM, CRISC, and the CISSP concentrations in archite…
  continue reading
 
The CISSP exam uses Computerized Adaptive Testing (CAT), which means question difficulty and test length vary based on your performance. In this episode, we demystify the CAT format, explain how scoring works, and share strategies to manage your time across the exam. You’ll learn when to move quickly, when to slow down, and how to pace yourself und…
  continue reading
 
CISSP exam questions often hinge on a single word that changes everything. In this episode, we examine how to interpret qualifiers like “best,” “first,” “most appropriate,” and “least likely.” We explain what each prompt is asking you to consider—whether it’s prioritization, sequencing, or judgment—and how to choose the answer that aligns with ISC2…
  continue reading
 
CISSP exam questions are known for being complex, layered, and sometimes intentionally confusing. In this episode, we teach you how to break questions apart to find the real point being tested. You'll learn how to identify the scenario, isolate the question stem, and evaluate answer choices using elimination strategies. We also discuss common distr…
  continue reading
 
With so much material to retain, memory tools are a CISSP candidate’s secret weapon. In this episode, we provide proven mnemonics, visual associations, and acronym expansions to help you remember everything from the OSI model and CIA triad to the phases of incident response and risk treatment options. You’ll also learn strategies for reducing cogni…
  continue reading
 
Some CISSP topics consistently challenge even experienced professionals. In this episode, we break down ten of the most difficult concepts on the exam—ranging from cryptographic key lifecycle and security models to risk calculations and legal frameworks. We clarify the nuances, provide examples, and share memory aids to help you master these areas.…
  continue reading
 
DevSecOps is not just a toolset—it’s a culture that integrates security into every phase of the software development lifecycle. In this episode, we explore how DevSecOps breaks down silos between development, operations, and security teams. Topics include automated security testing, continuous compliance checks, secure coding training, and real-tim…
  continue reading
 
APIs enable system integration but can expose your infrastructure to serious vulnerabilities if not secured properly. This episode focuses on how to design and manage secure APIs. We cover authentication methods (API keys, OAuth), input validation, rate limiting, logging, and error handling. You’ll also learn about common API security issues like b…
  continue reading
 
Mobile apps introduce unique risks due to their widespread use, diverse platforms, and limited control over user devices. In this episode, we explore mobile app security concerns, including insecure storage, weak authentication, exposed APIs, and code tampering. We also introduce reverse engineering concepts—how attackers decompile apps to uncover …
  continue reading
 
Not all applications should be allowed to run in your environment. This episode explores application control mechanisms like whitelisting and sandboxing. You'll learn how whitelisting enforces control by allowing only approved executables, and how sandboxing isolates applications to prevent them from affecting system integrity. We also discuss impl…
  continue reading
 
Version control systems track changes to code—but they also need to be protected themselves. This episode explores how tools like Git help enforce code integrity, collaboration, and traceability across development teams. We cover commit histories, branching strategies, and how to detect unauthorized or malicious changes. You’ll learn about tagging,…
  continue reading
 
Secure development doesn't stop at writing code—it includes how that code is built, tested, and deployed. In this episode, we explore configuration management and continuous integration/continuous delivery (CI/CD) pipelines. We discuss how insecure configurations, exposed secrets, and unmonitored automation can lead to compromise. Topics include in…
  continue reading
 
Source code repositories are central to modern software development—and to software security. This episode covers the security considerations for using platforms like GitHub, GitLab, Bitbucket, and internal repositories. We examine access control policies, branching strategies, commit tracking, and how to detect malicious code changes. You’ll learn…
  continue reading
 
Security testing helps ensure software behaves as intended under hostile conditions. In this episode, we explore different application security testing methodologies, including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST). We explain how each method work…
  continue reading
 
Many devastating cyberattacks originate from well-known coding flaws. This episode examines classic vulnerabilities including buffer overflows, SQL injection, and other input-related attacks. We explain how these issues arise, what they allow attackers to do, and how to defend against them using secure coding, bounds checking, input validation, and…
  continue reading
 
The OWASP Top 10 is a widely recognized list of the most critical security risks to web applications. In this episode, we walk through each entry—from injection and broken authentication to cross-site scripting, insecure deserialization, and insufficient logging. You'll learn how these vulnerabilities occur, the business impact they can have, and t…
  continue reading
 
User input is one of the most common vectors for exploitation in modern applications. In this episode, we focus on two critical programming techniques: input validation and output encoding. We explain how to validate input to ensure it meets expected formats and prevents attacks like SQL injection and cross-site scripting (XSS). We also explore how…
  continue reading
 
Secure applications start with secure design. In this episode, we explore how to incorporate security into architecture and code from the very beginning. Topics include threat modeling, input validation, secure defaults, and fail-safe mechanisms. We also cover secure coding practices that prevent common vulnerabilities such as injection, buffer ove…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play