A podcast that explores street musicians and their music, all recorded in the field. The name is a tip of the hat to the majority of instruments I find being played in the streets. They often rely on metal strings, or wind to play.
…
continue reading
Rust And Wind Podcasts
Exploring the road less traveled on faith, mystery and the supernatural.
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
1
Christmas Spiders, Mari Lwyd, and the Drekavac | Christmas Road Snack
22:34
22:34
Play later
Play later
Lists
Like
Liked
22:34Send us a text We hope you are enjoying the Road Snack episodes! In this festive episode, Mary and Haley explore various Christmas traditions, including the enchanting legend of tinsel, the ancient practice of wassailing with a horse skull, and the eerie tale of the Drekavac, a cryptid associated with unbaptized souls. Don't forget to hit that subs…
…
continue reading
Send us a text In this episode of Rebel Road, hosts Mary and Haley delve into the complex and often misunderstood topic of demons. They explore the biblical definitions, cultural contexts, and the distinctions between demons and fallen angels. The conversation covers the nature of possession, the historical significance of the Nephilim, and the var…
…
continue reading
1
Gryla and the Yule Family | Christmas Road Snack
19:30
19:30
Play later
Play later
Lists
Like
Liked
19:30Send us a text In this mini Road Snack episode, Haley and Mary discuss Gryla, the Christmas witch from Iceland, and her family, the Yule Cat and the Yule Lads. The discussion highlights the blend of pagan and Christian traditions that shape modern Christmas celebrations, while also emphasizing the dark and eerie nature of these holiday tales. Be su…
…
continue reading
Send us a text In this special Road Snack edition of Christmas creatures, Mary and Haley explore the legend of Baba Yaga, a fearsome witch from Slavic folklore. The conversation highlights the eerie aspects of her story, her magical hut, and the perils of finding Baba Yaga. Don't get lost in the woods this winter solstice! Be sure to hit that subsc…
…
continue reading
1
Orchestrating the Chaos: Protecting Wireless Networks from Cyber Attacks
37:07
37:07
Play later
Play later
Lists
Like
Liked
37:07From early 2022 through late 2024, a group of threat actors publicly known as APT28 exploited known vulnerabilities, such as CVE-2022-38028, to remotely and wirelessly access sensitive information from a targeted company network. This attack did not require any hardware to be placed in the vicinity of the targeted company's network as the attackers…
…
continue reading
Send us a text In this episode, Mary and Haley explore the origins of the Nephilim, the hybrid offspring of the Watchers and human women, and the subsequent consequences of their existence. What exactly were giants? They take a quick look into giants in the US, and share some old and modern tales of giants. Join them for a quick tour into the topic…
…
continue reading
1
Little Creatures | Christmas Road Snack Teaser
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Send us a text Welcome to Road Snacks! In these bite sized episodes, Mary and Haley explore the darker side of Christmas traditions, discussing various mythical creatures associated with the season. Road Snacks will be released every week the month of December for FREE! Our way of thanking you for listening! Be sure you hit that subscribe button so…
…
continue reading
Send us a text Join Haley and Mary as they discuss fear, from the biblical tale of Goliath to the horrors of war. They discuss nightmares, the science behind fear, and how it can be both a natural and supernatural phenomenon. Emphasizing the importance of recognizing and confronting fear, they touch on myths and legends surrounding fear throughout …
…
continue reading
1
From Data to Performance: Understanding and Improving Your AI Model
26:42
26:42
Play later
Play later
Lists
Like
Liked
26:42Modern data analytic methods and tools—including artificial intelligence (AI) and machine learning (ML) classifiers—are revolutionizing prediction capabilities and automation through their capacity to analyze and classify data. To produce such results, these methods depend on correlations. However, an overreliance on correlations can lead to predic…
…
continue reading
1
What Could Possibly Go Wrong? Safety Analysis for AI Systems
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14How can you ever know whether an LLM is safe to use? Even self-hosted LLM systems are vulnerable to adversarial prompts left on the internet and waiting to be found by system search engines. These attacks and others exploit the complexity of even seemingly secure AI systems. In our latest podcast from the Carnegie Mellon University Software Enginee…
…
continue reading
Send us a text In our first episode {yay!}, Mary and Haley, dive into the realms of the supernatural, discussing topics such as demonology, necromancy, and personal experiences with the uninvited. They explore the case of Stephen Zellner, who faced dire consequences after engaging with spirits, and emphasize the importance of caution when dealing w…
…
continue reading
1
Getting Your Software Supply Chain In Tune with SBOM Harmonization
23:14
23:14
Play later
Play later
Lists
Like
Liked
23:14Software bills of materials or SBOMs are critical to software security and supply chain risk management. Ideally, regardless of the SBOM tool, the output should be consistent for a given piece of software. But that is not always the case. The divergence of results can undermine confidence in software quality and security. In our latest podcast from…
…
continue reading
Send us a text Rebel Road is a bi-weekly podcast for anyone who loves digging into the dark and unexplained. Join hosts Mary and Haley for a wide range of the mysterious. From "alternative" theories, supernatural evil, cryptids, digging into obscure biblical texts and more. They bring the supernatural to life with vivid story telling, personal expe…
…
continue reading
1
API Security: An Emerging Concern in Zero Trust Implementations
17:41
17:41
Play later
Play later
Lists
Like
Liked
17:41Application programing interfaces, more commonly known as APIs, are the engines behind the majority of internet traffic. The pervasive and public nature of APIs have increased the attack surface of the systems and applications they are used in. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), McKinley Sconie…
…
continue reading
1
Delivering Next-Generation AI Capabilities
30:18
30:18
Play later
Play later
Lists
Like
Liked
30:18Artificial intelligence (AI) is a transformational technology, but it has limitations in challenging operational settings. Researchers in the AI Division of the Carnegie Mellon University Software Engineering Institute (SEI) work to deliver reliable and secure AI capabilities to warfighters in mission-critical environments. In our latest podcast, M…
…
continue reading
1
The Benefits of Rust Adoption for Mission-and-Safety-Critical Systems
19:38
19:38
Play later
Play later
Lists
Like
Liked
19:38A recent Google survey found that many developers felt comfortable using the Rust programming language in two months or less. Yet barriers to Rust adoption remain, particularly in safety-critical systems, where features such as memory and processing power are in short supply and compliance with regulations is mandatory. In our latest podcast from t…
…
continue reading
1
Threat Modeling: Protecting Our Nation's Complex Software-Intensive Systems
35:02
35:02
Play later
Play later
Lists
Like
Liked
35:02In response to Executive Order (EO) 14028, Improving the Nation's Cybersecurity, the National Institute of Standards and Technology (NIST) recommended 11 practices for software verification. Threat modeling is at the top of the list. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Natasha Shevchenko and Ale…
…
continue reading
1
Understanding Container Reproducibility Challenges: Stopping the Next Solar Winds
25:10
25:10
Play later
Play later
Lists
Like
Liked
25:10Container images are increasingly being used as the main method for software deployment, so ensuring the reproducibility of container images is becoming a critical step in protecting the software supply chain. In practice, however, builds are often not reproducible due to elements of the build environment that rely on nondeterministic factors such …
…
continue reading
1
Mitigating Cyber Risk with Secure by Design
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29Software enables our way of life, but market forces have sidelined security concerns leaving systems vulnerable to attack. Fixing this problem will require the software industry to develop an initial standard for creating software that is secure by design. These are the findings of a recently released paper coauthored by Greg Touhill, director of t…
…
continue reading
1
The Magic in the Middle: Evolving Scaled Software Solutions for National Defense
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25A January 2025 Defense Innovation Board study on scaling nontraditional defense innovation stated, "We must act swiftly to ensure the DoD leads in global innovation and competition over AI and autonomous systems – and is a trendsetter for their responsible use in modern warfare." In this podcast from the Carnegie Mellon University Software Engineer…
…
continue reading
1
Making Process Respectable Again: Advancing DevSecOps in the DoD Mission Space
44:26
44:26
Play later
Play later
Lists
Like
Liked
44:26Warfighters in the Department of Defense (DoD) operate in high-stakes environments where security, efficiency, and speed are critical. In such environments DevSecOps has become crucial in the drive toward modernization and overall mission success. A recent study led by researchers at the Carnegie Mellon University Software Engineering Institute (SE…
…
continue reading
Deploying cloud-centric technologies such as Kubernetes in edge environments poses challenges, especially for mission-critical defense systems. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Patrick Earl, Doug Reynolds, and Jeffrey Hamed, all DevOps engineers in the SEI's Software Solutions Division, sit d…
…
continue reading
1
The Best and Brightest: 6 Years of Supporting the President's Cup Cybersecurity Competition
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40A strong cyber defense is vital to public- and private-sector activities in the United States. In 2019, in response to an executive order to strengthen America's cybersecurity workforce, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) partnered with the SEI to develop and run the President's Cup Cyberse…
…
continue reading
1
Updating Risk Assessment in the CERT Secure Coding Standard
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04Evaluating source code to ensure secure coding qualities costs time and effort and often involves static analysis. But those who are familiar with static analysis tools know that the alerts are not always reliable and produce false positives that must be detected and disregarded. This year, we plan on making some exciting updates to the SEI CERT C …
…
continue reading
1
Delivering Next Generation Cyber Capabilities to the DoD Warfighter
27:16
27:16
Play later
Play later
Lists
Like
Liked
27:16In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Gregory Touhill, director of the SEI CERT Division, sits down with Matthew Butkovic, technical director of Cyber Risk and Resilience at CERT, to discuss ways in which CERT researchers and technologists are working to deliver rapid capability to warfighters in …
…
continue reading
1
Getting the Most Out of Your Insider Risk Data with IIDES
39:14
39:14
Play later
Play later
Lists
Like
Liked
39:14Insider incidents cause around 35 percent of data breaches, creating financial and security risks for organizations. In this podcast from the Carnegie Mellon University Software Engineering Institute, Austin Whisnant and Dan Costa discuss the Insider Incident Data Expression Standard (IIDES), a new schema for collecting and sharing data about insid…
…
continue reading
1
Grace Lewis Outlines Vision for IEEE Computer Society Presidency
18:14
18:14
Play later
Play later
Lists
Like
Liked
18:14Grace Lewis, a principal researcher at the Carnegie Mellon University Software Engineering Institute (SEI) and lead of the SEI's Tactical and AI-Enabled Systems Initiative, was elected the 2026 president of the IEEE Computer Society (CS), the largest community of computer scientists and engineers, with more than 370,000 members around the world. In…
…
continue reading
1
Improving Machine Learning Test and Evaluation with MLTE
29:06
29:06
Play later
Play later
Lists
Like
Liked
29:06Machine learning (ML) models commonly experience issues when integrated into production systems. In this podcast, researchers from the Carnegie Mellon University Software Engineering Institute and the U.S. Army AI Integration Center (AI2C) discuss Machine Learning Test and Evaluation (MLTE), a new tool that provides a process and infrastructure for…
…
continue reading
1
DOD Software Modernization: SEI Impact and Innovation
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12As software size, complexity, and interconnectedness has grown, software modernization within the Department of Defense (DoD) has become more important than ever. In this discussion moderated by Matthew Butkovic, technical director of risk and resilience in the SEI CERT Division, SEI director Paul Nielsen outlines the SEI's work with the DoD on sof…
…
continue reading
1
Securing Docker Containers: Techniques, Challenges, and Tools
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Containerization allows developers to run individual software applications in an isolated, controlled, repeatable way. With the increasing prevalence of cloud computing environments, containers are providing more and more of their underlying architecture. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Sasa…
…
continue reading