Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
DevSecOps Podcast Series

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Where LLMs, AI Agents, and MCP tools meet DevOps. How can we humans use non-deterministic, often hallucinating LLMs to automate our infrastructure and help us with the job of software lifecycle management? I’m Bret Fisher, and this is the Agentic DevOps podcast. After the invention of AI Agents and the MCP standard in late 2024, I started this podcast in early '25 with a narrow topic focus… to document and advise how AI Agents, MCP tools, and large language models can be used in the real wor ...
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
ePlus helps our clients imagine, implement, and achieve more from technology. Our people are the best in the business — and we’re proud to feature them in our podcasts. Our services are backed by thousands of successfully delivered engagements, elite certifications, and awards. And we’re pleased to share the talent and perspective of our staff as it relates to today’s emerging, transformative technologies. See how we can help you connect the dots between IT investments and business outcomes.
…
continue reading
Curious about DevOps? In this podcast series we dive deep into the DevOps culture and chat with friends from small startups and large enterprises about what DevOps looks like in their organizations. Join us weekly to hear about the problems they are solving, how their teams work together, and the tools they are using to get the job done. Subscribe to the show to get into a DevOps State of Mind. This podcast is brought to you by LogDNA, the log management tool for teams that embrace DevOps.
…
continue reading
"DevOps Chats" by Techstrong Group, the force behind industry-leading platforms like DevOps.com, Cloud Native Now, Security Boulevard, Techstrong.ai, DigitalCxO, and Techstrong.TV, is your premier destination for all things DevOps. Hosted by industry veterans Alan Shimel and Mitchell Ashley, this podcast series delves deep into the world of DevOps, bringing you the latest trends, innovative strategies, and insightful discussions that matter. Each episode of "DevOps Chat" is a journey through ...
…
continue reading

1
Achieving Balance: Agility, MBSE, and Architecture
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55Often, agile implementations are a struggle. Dedicated agile teams focus hard and deliver value on a regular cadence. But when results are tallied, the value teams produce may not fit neatly into the expectations of senior stakeholders. Why? In this webcast, Peter Capell addresses the importance of a practical vision to express outcomes, so that th…
…
continue reading

1
My Favorite AI Terminal, Prompt Injection, and More
29:24
29:24
Play later
Play later
Lists
Like
Liked
29:24In this episode, I walk though some of my favorite new AI tools and content. 🙌 My next course is coming soon! I've opened the waitlist for those wanting to go deep in GitHub Actions for DevOps and AI automation in 2025. I'm so thrilled to announce this course. The waitlist allows you to quickly sign up for some content updates, discounts, and more …
…
continue reading

1
Understanding Container Reproducibility Challenges: Stopping the Next Solar Winds
25:10
25:10
Play later
Play later
Lists
Like
Liked
25:10Container images are increasingly being used as the main method for software deployment, so ensuring the reproducibility of container images is becoming a critical step in protecting the software supply chain. In practice, however, builds are often not reproducible due to elements of the build environment that rely on nondeterministic factors such …
…
continue reading

1
AWS Agentic DevOps with the EKS MCP Server
1:00:21
1:00:21
Play later
Play later
Lists
Like
Liked
1:00:21Bret and Nirmal are joined by Rajdeep Saha from AWS to discuss AI agents and the MCP (Model Context Protocol) standard. In this episode, they explore how AI can manage infrastructure with ease and demonstrate creating Kubernetes clusters with a single prompt. 🙌 My next course is coming soon! I've opened the waitlist for those wanting to go deep in …
…
continue reading

1
Identifying AI Talent for the DoD Workforce
1:01:42
1:01:42
Play later
Play later
Lists
Like
Liked
1:01:42Finding and growing AI and Data talent is essential for mission success, but many skilled workers remain unseen because they lack traditional credentials. This session introduces practical strategies and prototype tools that help individuals demonstrate what they know while helping managers identify and evaluate emerging talent in these fields. Att…
…
continue reading

1
ePlus Security + F5 API Security Podcast Series - Episode 2
5:31
5:31
Play later
Play later
Lists
Like
Liked
5:31In this episode, ePlus’ David Tumlin and F5’s Chuck Herrin discuss how securing modern applications isn’t just about tools—it’s about people. Hear how ePlus and F5 are helping organizations break down silos and build secure, scalable systems—together.By David Tumlin, ePlus and Chuck Herrin, F5
…
continue reading

1
Agentic CI/CD with Solomon Hykes of Dagger
1:17:57
1:17:57
Play later
Play later
Lists
Like
Liked
1:17:57Bret and Nirmal discuss the intersection of AI agents and DevOps with Solomon Hykes, co-founder of Dagger and Docker. Solomon introduces Container Use, an open-source MCP server that gives coding agents isolated, containerized environments to work in, solving the critical problem of agents interfering with each other when running on the same system…
…
continue reading

1
Mitigating Cyber Risk with Secure by Design
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29Software enables our way of life, but market forces have sidelined security concerns leaving systems vulnerable to attack. Fixing this problem will require the software industry to develop an initial standard for creating software that is secure by design. These are the findings of a recently released paper coauthored by Greg Touhill, director of t…
…
continue reading

1
Model Your Way to Better Cybersecurity
1:02:54
1:02:54
Play later
Play later
Lists
Like
Liked
1:02:54Threat modeling is intended to help defend a system from attack. It tops the list of techniques recommended by the National Institute of Standards and Technology (NIST) to secure critical systems. In a world where people with malicious intent have deadlier tools at their disposal, defenders need to take advantage of Model-Based Systems Engineering …
…
continue reading

1
Running AI MCP Tools on Kubernetes with kagent
42:44
42:44
Play later
Play later
Lists
Like
Liked
42:44Bret and Nirmal explore AI agents in Kubernetes with Eitan Yarmush, Senior Architect at Solo.io. Eitan explains how AI agents work through three simple components (system prompts, LLMs, and tools), and demonstrates the kagent project, which provides a Kubernetes-native way to deploy and manage AI workflows. 🙌 My next course is coming soon! I've ope…
…
continue reading

1
Episode 1: The Evolution of API Security, Shift Left Security and DevSecOps Integration
16:54
16:54
Play later
Play later
Lists
Like
Liked
16:54ePlus Security + F5 API Security Podcast Series where ePlus’ David Tumlin and F5’s Chuck Herrin share why visibility is the foundation of modern security—and how together, ePlus & F5 are helping organizations manage the real challenges of API security in today’s hybrid, multi-cloud world.By David Tumlin, ePlus and Chuck Herrin, F5
…
continue reading
DevSecOps generates a lot of data valuable for better decision making. However, decision makers may not see all they need to in order to make best use of the data for continuous improvement. The SEI open source Polar tool unlocks the data, giving DevSecOps teams greater capability to automate, which in turn means they can innovate rapidly – without…
…
continue reading

1
The Magic in the Middle: Evolving Scaled Software Solutions for National Defense
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25A January 2025 Defense Innovation Board study on scaling nontraditional defense innovation stated, “We must act swiftly to ensure the DoD leads in global innovation and competition over AI and autonomous systems – and is a trendsetter for their responsible use in modern warfare." In this podcast from the Carnegie Mellon University Software Engineer…
…
continue reading

1
An Introduction to the MLOps Tool Evaluation Rubric
1:00:23
1:00:23
Play later
Play later
Lists
Like
Liked
1:00:23Organizations looking to build and adopt artificial intelligence (AI)–enabled systems face the challenge of identifying the right capabilities and tools to support Machine Learning Operations (MLOps) pipelines. Navigating the wide range of available tools can be especially difficult for organizations new to AI or those that have not yet deployed sy…
…
continue reading

1
Making Process Respectable Again: Advancing DevSecOps in the DoD Mission Space
44:26
44:26
Play later
Play later
Lists
Like
Liked
44:26Warfighters in the Department of Defense (DoD) operate in high-stakes environments where security, efficiency, and speed are critical. In such environments DevSecOps has become crucial in the drive toward modernization and overall mission success. A recent study led by researchers at the Carnegie Mellon University Software Engineering Institute (SE…
…
continue reading
Bret and Nirmal are at KubeCon London and record their ideas about how AI Agents are about to change DevOps, platform engineering, SRE, automation, troubleshooting, and more. 🙌 My next course is coming soon! I've opened the waitlist for those wanting to go deep in GitHub Actions for DevOps and AI automation in 2025. I'm so thrilled to announce this…
…
continue reading
Deploying cloud-centric technologies such as Kubernetes in edge environments poses challenges, especially for mission-critical defense systems. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Patrick Earl, Doug Reynolds, and Jeffrey Hamed, all DevOps engineers in the SEI's Software Solutions Division, sit d…
…
continue reading
By Bret Fisher
…
continue reading

1
The State of DevSecOps in the DoD: Where We Are, and What’s Next
58:42
58:42
Play later
Play later
Lists
Like
Liked
58:42DevSecOps practices foster collaboration among software development, security, and operations teams to build, test, and release software quickly and reliably. A high-stakes, high-security environment has challenged the implementation of these practices within the Department of Defense (DoD). The DoD Chief Information Officer (CIO) organization part…
…
continue reading

1
I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds
57:16
57:16
Play later
Play later
Lists
Like
Liked
57:16Did you know there are 500 million tweets per day? 3 billion monthly active Facebook users? 1 billion LinkedIn members? Are you one of them? In this webcast, Destiney Marie Plaza reveals how a hacker can use seemingly benign public information to customize an attack on a victim by showing a scenario-based attack and demo (using free and open-source…
…
continue reading

1
The Best and Brightest: 6 Years of Supporting the President’s Cup Cybersecurity Competition
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40A strong cyber defense is vital to public- and private-sector activities in the United States. In 2019, in response to an executive order to strengthen America’s cybersecurity workforce, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) partnered with the SEI to develop and run the President’s Cup Cyberse…
…
continue reading

1
A New Performance Zone for Software for National Security
1:02:23
1:02:23
Play later
Play later
Lists
Like
Liked
1:02:23Today, we have seen our national security organizations working to adopt modern software practices, particularly Agile methods and DevSecOps practices, efforts challenged by a mismatch of tempos between operational needs and development processes. The newly mandated Software Acquisition Pathway helps to align those tempos. However, to sustain a com…
…
continue reading

1
AI Native Dev: Shaping the Future of AI-First Software Development - DevOps Chats Episode 12
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55In this episode of DevOps Chats, Alan speaks with Patrick Debois, the man who coined the term DevOps to talk about his new passion AI NativeDev. Beyond giving it a name, Patrick has always been one of the leading lights of the community. After 12+ years in DevOps thought, Patrick’s enthusiasm was starting to wane. AI has reignited that and his crea…
…
continue reading
An organization’s cyber risk management practices must be rooted in organizational goals to be truly effective. In this webcast, Matt Butkovic, Greg Crabbe and Beth-Anne Bygum explore how best to align business and resilience objectives.By Matt Butkovic, Greg Crabbe and Beth-Anne Bygum
…
continue reading

1
Updating Risk Assessment in the CERT Secure Coding Standard
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04Evaluating source code to ensure secure coding qualities costs time and effort and often involves static analysis. But those who are familiar with static analysis tools know that the alerts are not always reliable and produce false positives that must be detected and disregarded. This year, we plan on making some exciting updates to the SEI CERT C …
…
continue reading

1
Delivering Next Generation Cyber Capabilities to the DoD Warfighter
27:16
27:16
Play later
Play later
Lists
Like
Liked
27:16In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Gregory Touhill, director of the SEI CERT Division, sits down with Matthew Butkovic, technical director of Cyber Risk and Resilience at CERT, to discuss ways in which CERT researchers and technologists are working to deliver rapid capability to warfighters in …
…
continue reading

1
Cyber Maturity Model Certification (CMMC): Protecting the Nation’s Defense Industrial Base
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02The Defense Industrial Base (DIB) is a core element of the national security ecosystem. This point of intersection between private industry and the Department of Defense is a perpetual target for the Nation’s adversaries. In this Intersect, Matthew Butkovic and John Haller explore the development, and implementation, of the Cyber Maturity Model Cer…
…
continue reading

1
Threat Hunting: What Should Keep All of Us Up at Night
57:09
57:09
Play later
Play later
Lists
Like
Liked
57:09When it comes to recognizing threats, cybersecurity professionals may become distracted by big promises or ignore some obvious inspections. New claims made by the latest and greatest new apps draw attention away from network situational awareness best practices—like a dog distracted when it spots a squirrel. We also may deviate from making routine …
…
continue reading

1
Getting the Most Out of Your Insider Risk Data with IIDES
39:14
39:14
Play later
Play later
Lists
Like
Liked
39:14Insider incidents cause around 35 percent of data breaches, creating financial and security risks for organizations. In this podcast from the Carnegie Mellon University Software Engineering Institute, Austin Whisnant and Dan Costa discuss the Insider Incident Data Expression Standard (IIDES), a new schema for collecting and sharing data about insid…
…
continue reading

1
Can a Cybersecurity Parametric Cost Model be Developed?
56:25
56:25
Play later
Play later
Lists
Like
Liked
56:25Can a cybersecurity parametric cost estimation model be developed? Every Department of Defense (DoD) program needs to account for, credibly estimate, budget/plan for, and assess the performance of its cybersecurity activities. Creating a cybersecurity parametric model would allow DoD programs to reliably estimate the effort and cost of cybersecurit…
…
continue reading

1
Grace Lewis Outlines Vision for IEEE Computer Society Presidency
18:14
18:14
Play later
Play later
Lists
Like
Liked
18:14Grace Lewis, a principal researcher at the Carnegie Mellon University Software Engineering Institute (SEI) and lead of the SEI’s Tactical and AI-Enabled Systems Initiative, was elected the 2026 president of the IEEE Computer Society (CS), the largest community of computer scientists and engineers, with more than 370,000 members around the world. In…
…
continue reading

1
Elements of Effective Communications for Cybersecurity Teams
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Communications, both in times of crisis and during normal operations, are essential to the overall success and sustainability of an incident response or security operations team. How you plan for and manage these communications and how they are received and actioned by your audience will influence your trustworthiness, reputation, and ultimately yo…
…
continue reading

1
Improving Machine Learning Test and Evaluation with MLTE
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06Machine learning (ML) models commonly experience issues when integrated into production systems. In this podcast, researchers from the Carnegie Mellon University Software Engineering Institute and the U.S. Army AI Integration Center (AI2C) discuss Machine Learning Test and Evaluation (MLTE), a new tool that provides a process and infrastructure for…
…
continue reading

1
DOD Software Modernization: SEI Impact and Innovation
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12As software size, complexity, and interconnectedness has grown, software modernization within the Department of Defense (DoD) has become more important than ever. In this discussion moderated by Matthew Butkovic, technical director of risk and resilience in the SEI CERT Division, SEI director Paul Nielsen outlines the SEI’s work with the DoD on sof…
…
continue reading

1
DevOps Thrives and Software Supply Chain is the SBOM
17:06
17:06
Play later
Play later
Lists
Like
Liked
17:06Mitch and Alan discuss what's required to take a holistic approach to software supply chain security and how DevOps has not only survived, but thrived as it's adapted over the years and helped for new XOps variations and platform engineering.By DevOps.com
…
continue reading

1
Platform Engineering Scales DevOps and the AI Dev Bubble
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16After a brief podcast hiatus, Mitch and Alan discuss why it isn't a DevOps versus platform engineering debate. Rather, platform engineering helps scale DevOps, among PE's many, many benefits. They discuss the launch of platformengineering.com and its new podcast. They also delve into the debate about AI's impact on software development.…
…
continue reading

1
Operational Resilience Fundamentals: Building Blocks of a Survivable Enterprise
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Surviving disruptive cyber events requires a specific form of planning. One must strike a balance between defending against threats (e.g., managing conditions) and effectively handling the effects of disruption (e.g., managing consequences). Employing a model (such as the CERT Resilience Management Model) provides a catalog of practices and a syste…
…
continue reading
In this episode of DevOps Chats, Alan Shimel and Mitch Ashley discuss the rapid integration of AI co-pilots in software tools, emphasizing the need for a unified AI interface to streamline user experience. They explore the evolving concept of DevSecOps, advocating for a holistic approach that includes both software development and underlying toolch…
…
continue reading