These links work on everything: they open the episode on Apple Podcasts on an iOS device like an iPhone; will open the episode on the Google Podcasts player on an Android device; and will open a web player on any other device. Right-click a link to copy the link address.
Aug 5 2022: Trust and AI Systems Direct links:
Jul 28 2022: A Dive into Deepfakes Direct links:
Jul 13 2022: Challenges and Metrics in Digital Engineering Direct links:
Jul 5 2022: The 4 Phases of the Zero Trust Journey Direct links:
Jun 21 2022: DevSecOps for AI Engineering Direct links:
Jun 2 2022: Undiscovered Vulnerabilities: Not Just for Critical Software Direct links:
May 16 2022: Explainable AI Explained Direct links:
Apr 5 2022: Model-Based Systems Engineering Meets DevSecOpsDirect links:
Mar 22 2022: Incorporating Supply-Chain Risk and DevSecOps into a Cybersecurity Strategy Direct links:
Mar 9 2022: Software and Systems Collaboration in the Era of Smart Systems Direct links:
Feb 22 2022: Securing the Supply Chain for the Defense Industrial BaseDirect links:
Feb 22 2022: Securing the Supply Chain for the Defense Industrial Base (link not available) Apple Podcasts (not available) |
Feb 8 2022: Building on Ghidra: Tools for Automating Reverse Engineering and Malware AnalysisDirect links:
Jan 20 2022: Envisioning the Future of Software Engineering Direct links:
Jan 11 2022: Implementing the DoD's Ethical AI Principles Direct links:
Dec 3 2021: Walking Fast Into the Future: Evolvable Technical Reference Frameworks for Mixed-Criticality SystemsDirect links:
Nov 18 2021: Software Engineering for Machine Learning: Characterizing and Understanding Mismatch in ML SystemsDirect links:
Nov 11 2021: A Discussion on Automation with Watts Humphrey Award Winner Rajendra PrasadDirect links:
Nov 3 2021: Enabling Transition From Sustainment to Engineering Within the DoDDirect links:
Oct 25 2021: The Silver Thread of Cyber in the Global Supply ChainDirect links:
Oct 15 2021: Measuring DevSecOps: The Way ForwardDirect links:
Sep 23 2021: Bias in AI: Impact, Challenges, and Opportunities Direct links:
Sep 17 2021: My Story in Computing with Rachel DzombakDirect links:
Sep 9 2021: Agile Strategic Planning: Concepts and Methods for SuccessDirect links:
Aug 24 2021: Applying Scientific Methods in Cybersecurity Direct links:
Aug 13 2021: Zero Trust Adoption: Benefits, Applications, and ResourcesDirect links:
Aug 6 2021: Uncertainty Quantification in Machine Learning: Measuring Confidence in Predictions Direct links:
Jul 29 2021: 11 Rules for Ensuring a Security Model with AADL and Bell–LaPadula
Direct links:
Jul 23 2021: Benefits and Challenges of Model-Based Systems EngineeringDirect links:
Jul 16 2021: Fostering Diversity in Software Engineering Direct links:
Jun 24 2021: Can DevSecOps Make Developers Happier?Direct links:
Jun 22 2021: Is Your Organization Ready for AI? Direct links:
Jun 11 2021: My Story in Computing with Marisa Midler Direct links:
Jun 4 2021: Managing Vulnerabilities in Machine Learning and Artificial Intelligence SystemsDirect links:
May 20 2021: AI Workforce Development Direct links:
May 13 2021: Moving from DevOps to DevSecOps Direct links:
Apr 29 2021: My Story in Computing with David ZubrowDirect links:
Apr 23 2021: Mission-Based Prioritization: A New Method for Prioritizing Agile Backlogs Direct links:
Apr 9 2021: My Story in Computing with Carol SmithDirect links:
Mar 16 2021: Digital Engineering and DevSecOps Direct links:
Mar 9 2021: A 10-Step Framework for Managing Risk Direct links:
Feb 23 2021: 7 Steps to Engineer Security into Ongoing and Future Container Adoption Efforts Direct links:
Feb 16 2021: Ransomware: Evolution, Rise, and Response Direct links:
Jan 21 2021: VINCE: A Software Vulnerability Coordination PlatformDirect links:
Jan 6 2021: Work From Home: Threats, Vulnerabilities, and Strategies for Protecting Your Network
Direct links:
Dec 8 2020: An Introduction to CMMC Assessment GuidesDirect links:
Dec 7 2020: The CMMC Level 3 Assessment Guide: A Closer LookDirect links:
Dec 7 2020: The CMMC Level 1 Assessment Guide: A Closer LookDirect links:
Nov 24 2020: Achieving Continuous Authority to Operate (ATO)Direct links:
Nov 9 2020: Challenging the Myth of the 10x Programmer Direct links:
Oct 27 2020: A Stakeholder-Specific Approach to Vulnerability Management Direct links:
Oct 13 2020: Optimizing Process Maturity in CMMC Level 5Direct links:
Oct 7 2020: Reviewing and Measuring Activities for Effectiveness in CMMC Level 4Direct links:
Sep 30 2020: Situational Awareness for Cybersecurity: Beyond the NetworkDirect links:
Sep 17 2020: Quantum Computing: The Quantum Advantage Direct links:
Sep 2 2020: CMMC Scoring 101Direct links:
Aug 17 2020: Developing an Effective CMMC PolicyDirect links:
Aug 10 2020: The Future of Cyber: Educating the Cybersecurity WorkforceDirect links:
Jul 30 2020: Documenting Process for CMMCDirect links:
Jul 20 2020: Agile Cybersecurity Direct links:
Jul 1 2020: CMMC Levels 1-3: Going Beyond NIST SP-171Direct links:
Jun 15 2020: The Future of Cyber: Secure Coding Direct links:
May 28 2020: Challenges to Implementing DevOps in Highly Regulated EnvironmentsDirect links:
May 7 2020: The Future of Cyber: CybercrimeDirect links:
Apr 28 2020: An Ethical AI FrameworkDirect links:
Apr 13 2020: My Story in Computing: Madison Quinn Oliver Direct links:
Mar 26 2020: The CERT Guide to Coordinated Vulnerability DisclosureDirect links:
Mar 11 2020: Women in Software and Cybersecurity: Dr. April GalyardtDirect links:
Feb 26 2020: The Future of Cyber: Security and PrivacyDirect links:
Feb 14 2020: The Future of Cyber: Security and ResilienceDirect links:
Feb 7 2020: Reverse Engineering Object-Oriented Code with Ghidra and New Pharos ToolsDirect links:
Jan 29 2020: Women in Software and Cybersecurity: Dr. Carol Woody Direct links:
Dec 17 2019: Benchmarking Organizational Incident Management PracticesDirect links:
Dec 11 2019: Machine Learning in Cybersecurity: 7 Questions for Decision MakersDirect links:
Nov 26 2019: Women in Software and Cybersecurity: Kristi Roth Direct links:
Nov 12 2019: Human Factors in Software EngineeringDirect links:
Oct 15 2019: Women in Software and Cybersecurity: Anita CarletonDirect links:
Oct 4 2019: Improving the Common Vulnerability Scoring SystemDirect links:
Oct 1 2019: Why Software Architects Must Be Involved in the Earliest Systems Engineering ActivitiesDirect links:
Sep 24 2019: Selecting Metrics for Software Assurance Direct links:
Sep 18 2019: AI in Humanitarian Assistance and Disaster ResponseDirect links:
Aug 30 2019: The AADL Error Library: 4 Families of Systems ErrorsDirect links:
Aug 22 2019: Women in Software and Cybersecurity: Suzanne MillerDirect links:
Jul 29 2019: Privacy in the Blockchain EraDirect links:
Jul 25 2019: Cyber Intelligence: Best Practices and Biggest ChallengesDirect links:
Jul 12 2019: Assessing Cybersecurity Training Direct links:
Jun 27 2019: DevOps in Highly Regulated EnvironmentsDirect links:
Jun 20 2019: Women in Software and Cybersecurity: Dr. Ipek Ozkaya Direct links:
Jun 11 2019: The Role of the Software Factory in Acquisition and SustainmentDirect links:
May 30 2019: Defending Your Organization Against Business Email CompromiseDirect links:
May 21 2019: My Story in Computing with Dr. Eliezer Kanal Direct links:
Apr 19 2019: Women in Software and Cybersecurity: Eileen Wrubel Direct links:
Mar 21 2019: Managing Technical Debt: A Focus on Automation, Design, and ArchitectureDirect links:
Mar 14 2019: Women in Software and Cybersecurity: Grace Lewis Direct links:
Mar 1 2019: Women in Software and Cybersecurity: Bobbie StempfleyDirect links:
Mar 1 2019: Women in Software and Cybersecurity: Dr. Lorrie CranorDirect links:
Mar 1 2019: Leading in the Age of Artificial IntelligenceDirect links:
Feb 27 2019: Applying Best Practices in Network Traffic AnalysisDirect links:
Feb 25 2019: 10 Types of Application Security Testing Tools and How to Use ThemDirect links:
Feb 18 2019: Using Test Suites for Static Analysis Alert ClassifiersDirect links:
Feb 18 2019: Blockchain at CMU and BeyondDirect links:
Feb 15 2019: Leading in the Age of Artificial IntelligenceDirect links:
Nov 28 2018: Deep Learning in Depth: The Future of Deep LearningDirect links:
Nov 27 2018: Deep Learning in Depth: Adversarial Machine LearningDirect links:
Nov 15 2018: System Architecture Virtual Integration: ROI on Early Discovery of DefectsDirect links:
Nov 7 2018: Deep Learning in Depth: The Importance of Diverse PerspectivesDirect links:
Nov 4 2018: A Technical Strategy for CybersecurityDirect links:
Oct 26 2018: Best Practices for Security in Cloud ComputingDirect links:
Oct 22 2018: Risks, Threats, and Vulnerabilities in Moving to the CloudDirect links:
Oct 12 2018: Deep Learning in Depth: IARPA's Functional Map of the World ChallengeDirect links:
Oct 5 2018: Deep Learning in Depth: Deep Learning versus Machine LearningDirect links:
Sep 14 2018: How to Be a Network Traffic AnalystDirect links:
Aug 28 2018: Workplace Violence and Insider ThreatDirect links:
Aug 2 2018: Why Does Software Cost So Much?Direct links:
Jul 26 2018: Cybersecurity Engineering & Software Assurance: Opportunities & RisksDirect links:
Jul 10 2018: Software Sustainment and Product LinesDirect links:
Jun 25 2018: Best Practices in Cyber IntelligenceDirect links:
Jun 7 2018: Deep Learning in Depth: The Good, the Bad, and the FutureDirect links:
May 24 2018: The Evolving Role of the Chief Risk OfficerDirect links:
May 10 2018: Obsidian: A Safer Blockchain Programming LanguageDirect links:
Apr 19 2018: Agile DevOpsDirect links:
Apr 5 2018: Kicking Butt in Computer Science: Women in Computing at Carnegie Mellon UniversityDirect links:
Mar 15 2018: Is Software Spoiling Us? Technical Innovations in the Department of DefenseDirect links:
Feb 8 2018: Is Software Spoiling Us? Innovations in Daily Life from SoftwareDirect links:
Feb 1 2018: How Risk Management Fits into Agile & DevOps in GovernmentDirect links:
Dec 28 2017: 5 Best Practices for Preventing and Responding to Insider ThreatDirect links:
Dec 12 2017: Pharos Binary Static Analysis: An UpdateDirect links:
Nov 30 2017: Positive Incentives for Reducing Insider ThreatDirect links:
Nov 16 2017: Mission-Practical BiometricsDirect links:
Oct 24 2017: At Risk Emerging Technology DomainsDirect links:
Oct 12 2017: DNS Blocking to Disrupt MalwareDirect links:
Sep 21 2017: Best Practices: Network Border ProtectionDirect links:
Sep 7 2017: Verifying Software Assurance with IBM’s WatsonDirect links:
Aug 31 2017: The CERT Software Assurance FrameworkDirect links:
Aug 3 2017: Scaling Agile MethodsDirect links:
Jul 14 2017: Ransomware: Best Practices for Prevention and ResponseDirect links:
Jun 29 2017: Integrating Security in DevOpsDirect links:
Jun 15 2017: SEI Fellows Series: Peter FeilerDirect links:
May 25 2017: NTP Best PracticesDirect links:
May 18 2017: Establishing Trust in Disconnected EnvironmentsDirect links:
Apr 20 2017: Distributed Artificial Intelligence in SpaceDirect links:
Mar 27 2017: Verifying Distributed Adaptive Real-Time SystemsDirect links:
Mar 23 2017: 10 At-Risk Emerging TechnologiesDirect links:
Feb 27 2017: Technical Debt as a Core Software Engineering PracticeDirect links:
Feb 23 2017: DNS Best PracticesDirect links:
Jan 26 2017: Three Roles and Three Failure Patterns of Software ArchitectsDirect links:
Jan 12 2017: Security Modeling ToolsDirect links:
Dec 19 2016: Best Practices for Preventing and Responding to Distributed Denial of Service (DDoS) AttacksDirect links:
Dec 8 2016: Cyber Security Engineering for Software and Systems AssuranceDirect links:
Nov 30 2016: Moving Target DefenseDirect links:
Nov 10 2016: Improving Cybersecurity Through Cyber IntelligenceDirect links:
Oct 27 2016: A Requirement Specification Language for AADLDirect links:
Oct 19 2016: Becoming a CISO: Formal and Informal RequirementsDirect links:
Oct 13 2016: Predicting Quality Assurance with Software Metrics and Security MethodsDirect links:
Sep 29 2016: Network Flow and BeyondDirect links:
Sep 15 2016: A Community College Curriculum for Secure Software DevelopmentDirect links:
Aug 25 2016: Security and the Internet of ThingsDirect links:
Aug 10 2016: The SEI Fellow Series: Nancy MeadDirect links:
Jul 28 2016: An Open Source Tool for Fault Tree AnalysisDirect links:
Jul 18 2016: Global Value Chain – An Expanded View of the ICT Supply ChainDirect links:
Jun 21 2016: Intelligence Preparation for Operational ResilienceDirect links:
May 26 2016: Evolving Air Force Intelligence with Agile TechniquesDirect links:
May 12 2016: Threat Modeling and the Internet of ThingsDirect links:
Apr 14 2016: Open Systems Architectures: When & Where to Be ClosedDirect links:
Mar 18 2016: Effective Reduction of Avoidable Complexity in Embedded SystemsDirect links:
Mar 18 2016: Toward Efficient and Effective Software SustainmentDirect links:
Mar 8 2016: Quality Attribute Refinement and AllocationDirect links:
Feb 19 2016: Is Java More Secure Than C?Direct links:
Feb 4 2016: Identifying the Architectural Roots of VulnerabilitiesDirect links:
Feb 3 2016: Build Security In Maturity Model (BSIMM) – Practices from Seventy Eight OrganizationsDirect links:
Jan 12 2016: An Interview with Grady BoochDirect links: