Subscribe by email, free
Your daily briefing for podcasting and on-demand

Software Engineering Institute (SEI) Podcast Series - deep links to episodes

Updated UTC · this page updates every two hours

These are magic links to individual episodes for Software Engineering Institute (SEI) Podcast Series, provided to help you share episode links for this podcast that work on any device.

These links work on everything: they open the episode on Apple Podcasts on an iOS device like an iPhone; will open the episode on the Google Podcasts player on an Android device; and will open a web player on any other device. Right-click a link to copy the link address.

Just want to link to the podcast? Use this magic link: Listen to Software Engineering Institute (SEI) Podcast Series

Aug 5 2022:Trust and AI Systems
Direct links:
Jul 28 2022:A Dive into Deepfakes
Direct links:
Jul 13 2022:Challenges and Metrics in Digital Engineering
Direct links:
Jul 5 2022:The 4 Phases of the Zero Trust Journey
Direct links:
Jun 21 2022:DevSecOps for AI Engineering
Direct links:
Jun 2 2022: Undiscovered Vulnerabilities: Not Just for Critical Software
Direct links:
May 16 2022:Explainable AI Explained
Direct links:
Apr 5 2022:Model-Based Systems Engineering Meets DevSecOps
Direct links:
Mar 22 2022:Incorporating Supply-Chain Risk and DevSecOps into a Cybersecurity Strategy
Direct links:
Mar 9 2022:Software and Systems Collaboration in the Era of Smart Systems
Direct links:
Feb 22 2022:Securing the Supply Chain for the Defense Industrial Base
Direct links:
Feb 22 2022:Securing the Supply Chain for the Defense Industrial Base (link not available)
Apple Podcasts (not available) |
Feb 8 2022:Building on Ghidra: Tools for Automating Reverse Engineering and Malware Analysis
Direct links:
Jan 20 2022:Envisioning the Future of Software Engineering
Direct links:
Jan 11 2022:Implementing the DoD's Ethical AI Principles
Direct links:
Dec 3 2021:Walking Fast Into the Future: Evolvable Technical Reference Frameworks for Mixed-Criticality Systems
Direct links:
Nov 18 2021:Software Engineering for Machine Learning: Characterizing and Understanding Mismatch in ML Systems
Direct links:
Nov 11 2021:A Discussion on Automation with Watts Humphrey Award Winner Rajendra Prasad
Direct links:
Nov 3 2021:Enabling Transition From Sustainment to Engineering Within the DoD
Direct links:
Oct 25 2021:The Silver Thread of Cyber in the Global Supply Chain
Direct links:
Oct 15 2021:Measuring DevSecOps: The Way Forward
Direct links:
Sep 23 2021:Bias in AI: Impact, Challenges, and Opportunities
Direct links:
Sep 17 2021:My Story in Computing with Rachel Dzombak
Direct links:
Sep 9 2021:Agile Strategic Planning: Concepts and Methods for Success
Direct links:
Aug 24 2021:Applying Scientific Methods in Cybersecurity
Direct links:
Aug 13 2021:Zero Trust Adoption: Benefits, Applications, and Resources
Direct links:
Aug 6 2021:Uncertainty Quantification in Machine Learning: Measuring Confidence in Predictions 
Direct links:
Jul 29 2021:11 Rules for Ensuring a Security Model with AADL and Bell–LaPadula 

Direct links:
Jul 23 2021:Benefits and Challenges of Model-Based Systems Engineering
Direct links:
Jul 16 2021:Fostering Diversity in Software Engineering
Direct links:
Jun 24 2021:Can DevSecOps Make Developers Happier?
Direct links:
Jun 22 2021:Is Your Organization Ready for AI?
Direct links:
Jun 11 2021:My Story in Computing with Marisa Midler
Direct links:
Jun 4 2021:Managing Vulnerabilities in Machine Learning and Artificial Intelligence Systems
Direct links:
May 20 2021:AI Workforce Development
Direct links:
May 13 2021:Moving from DevOps to DevSecOps
Direct links:
Apr 29 2021:My Story in Computing with David Zubrow
Direct links:
Apr 23 2021:Mission-Based Prioritization: A New Method for Prioritizing Agile Backlogs
Direct links:
Apr 9 2021:My Story in Computing with Carol Smith
Direct links:
Mar 16 2021:Digital Engineering and DevSecOps
Direct links:
Mar 9 2021:A 10-Step Framework for Managing Risk
Direct links:
Feb 23 2021:7 Steps to Engineer Security into Ongoing and Future Container Adoption Efforts
Direct links:
Feb 16 2021:Ransomware: Evolution, Rise, and Response
Direct links:
Jan 21 2021:VINCE: A Software Vulnerability Coordination Platform
Direct links:
Jan 6 2021:Work From Home: Threats, Vulnerabilities, and Strategies for Protecting Your Network

Direct links:
Dec 8 2020:An Introduction to CMMC Assessment Guides
Direct links:
Dec 7 2020:The CMMC Level 3 Assessment Guide: A Closer Look
Direct links:
Dec 7 2020:The CMMC Level 1 Assessment Guide: A Closer Look
Direct links:
Nov 24 2020:Achieving Continuous Authority to Operate (ATO)
Direct links:
Nov 9 2020:Challenging the Myth of the 10x Programmer
Direct links:
Oct 27 2020:A Stakeholder-Specific Approach to Vulnerability Management
Direct links:
Oct 13 2020:Optimizing Process Maturity in CMMC Level 5
Direct links:
Oct 7 2020:Reviewing and Measuring Activities for Effectiveness in CMMC Level 4
Direct links:
Sep 30 2020:Situational Awareness for Cybersecurity: Beyond the Network
Direct links:
Sep 17 2020:Quantum Computing: The Quantum Advantage
Direct links:
Sep 2 2020:CMMC Scoring 101
Direct links:
Aug 17 2020:Developing an Effective CMMC Policy
Direct links:
Aug 10 2020:The Future of Cyber: Educating the Cybersecurity Workforce
Direct links:
Jul 30 2020:Documenting Process for CMMC
Direct links:
Jul 20 2020:Agile Cybersecurity
Direct links:
Jul 1 2020:CMMC Levels 1-3: Going Beyond NIST SP-171
Direct links:
Jun 15 2020:The Future of Cyber: Secure Coding
Direct links:
May 28 2020:Challenges to Implementing DevOps in Highly Regulated Environments
Direct links:
May 7 2020:The Future of Cyber: Cybercrime
Direct links:
Apr 28 2020:An Ethical AI Framework
Direct links:
Apr 13 2020:My Story in Computing: Madison Quinn Oliver
Direct links:
Mar 26 2020:The CERT Guide to Coordinated Vulnerability Disclosure
Direct links:
Mar 11 2020:Women in Software and Cybersecurity: Dr. April Galyardt
Direct links:
Feb 26 2020:The Future of Cyber: Security and Privacy
Direct links:
Feb 14 2020:The Future of Cyber: Security and Resilience
Direct links:
Feb 7 2020:Reverse Engineering Object-Oriented Code with Ghidra and New Pharos Tools
Direct links:
Jan 29 2020:Women in Software and Cybersecurity: Dr. Carol Woody
Direct links:
Dec 17 2019:Benchmarking Organizational Incident Management Practices
Direct links:
Dec 11 2019:Machine Learning in Cybersecurity: 7 Questions for Decision Makers
Direct links:
Nov 26 2019:Women in Software and Cybersecurity: Kristi Roth
Direct links:
Nov 12 2019:Human Factors in Software Engineering
Direct links:
Oct 15 2019:Women in Software and Cybersecurity: Anita Carleton
Direct links:
Oct 4 2019:Improving the Common Vulnerability Scoring System
Direct links:
Oct 1 2019:Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities
Direct links:
Sep 24 2019:Selecting Metrics for Software Assurance
Direct links:
Sep 18 2019:AI in Humanitarian Assistance and Disaster Response
Direct links:
Aug 30 2019:The AADL Error Library: 4 Families of Systems Errors
Direct links:
Aug 22 2019:Women in Software and Cybersecurity: Suzanne Miller
Direct links:
Jul 29 2019:Privacy in the Blockchain Era
Direct links:
Jul 25 2019:Cyber Intelligence: Best Practices and Biggest Challenges
Direct links:
Jul 12 2019:Assessing Cybersecurity Training
Direct links:
Jun 27 2019:DevOps in Highly Regulated Environments
Direct links:
Jun 20 2019:Women in Software and Cybersecurity: Dr. Ipek Ozkaya
Direct links:
Jun 11 2019:The Role of the Software Factory in Acquisition and Sustainment
Direct links:
May 30 2019:Defending Your Organization Against Business Email Compromise
Direct links:
May 21 2019:My Story in Computing with Dr. Eliezer Kanal
Direct links:
Apr 19 2019:Women in Software and Cybersecurity: Eileen Wrubel
Direct links:
Mar 21 2019:Managing Technical Debt: A Focus on Automation, Design, and Architecture
Direct links:
Mar 14 2019:Women in Software and Cybersecurity: Grace Lewis
Direct links:
Mar 1 2019:Women in Software and Cybersecurity: Bobbie Stempfley
Direct links:
Mar 1 2019:Women in Software and Cybersecurity: Dr. Lorrie Cranor
Direct links:
Mar 1 2019:Leading in the Age of Artificial Intelligence
Direct links:
Feb 27 2019:Applying Best Practices in Network Traffic Analysis
Direct links:
Feb 25 2019:10 Types of Application Security Testing Tools and How to Use Them
Direct links:
Feb 18 2019:Using Test Suites for Static Analysis Alert Classifiers
Direct links:
Feb 18 2019:Blockchain at CMU and Beyond
Direct links:
Feb 15 2019:Leading in the Age of Artificial Intelligence
Direct links:
Nov 28 2018:Deep Learning in Depth: The Future of Deep Learning
Direct links:
Nov 27 2018:Deep Learning in Depth: Adversarial Machine Learning
Direct links:
Nov 15 2018:System Architecture Virtual Integration: ROI on Early Discovery of Defects
Direct links:
Nov 7 2018:Deep Learning in Depth: The Importance of Diverse Perspectives
Direct links:
Nov 4 2018:A Technical Strategy for Cybersecurity
Direct links:
Oct 26 2018:Best Practices for Security in Cloud Computing
Direct links:
Oct 22 2018:Risks, Threats, and Vulnerabilities in Moving to the Cloud
Direct links:
Oct 12 2018:Deep Learning in Depth: IARPA's Functional Map of the World Challenge
Direct links:
Oct 5 2018:Deep Learning in Depth: Deep Learning versus Machine Learning
Direct links:
Sep 14 2018:How to Be a Network Traffic Analyst
Direct links:
Aug 28 2018:Workplace Violence and Insider Threat
Direct links:
Aug 2 2018:Why Does Software Cost So Much?
Direct links:
Jul 26 2018:Cybersecurity Engineering & Software Assurance: Opportunities & Risks
Direct links:
Jul 10 2018:Software Sustainment and Product Lines
Direct links:
Jun 25 2018:Best Practices in Cyber Intelligence
Direct links:
Jun 7 2018:Deep Learning in Depth: The Good, the Bad, and the Future
Direct links:
May 24 2018:The Evolving Role of the Chief Risk Officer
Direct links:
May 10 2018:Obsidian: A Safer Blockchain Programming Language
Direct links:
Apr 19 2018:Agile DevOps
Direct links:
Apr 5 2018:Kicking Butt in Computer Science: Women in Computing at Carnegie Mellon University
Direct links:
Mar 15 2018:Is Software Spoiling Us? Technical Innovations in the Department of Defense
Direct links:
Feb 8 2018:Is Software Spoiling Us? Innovations in Daily Life from Software
Direct links:
Feb 1 2018:How Risk Management Fits into Agile & DevOps in Government
Direct links:
Dec 28 2017:5 Best Practices for Preventing and Responding to Insider Threat
Direct links:
Dec 12 2017:Pharos Binary Static Analysis: An Update
Direct links:
Nov 30 2017:Positive Incentives for Reducing Insider Threat
Direct links:
Nov 16 2017:Mission-Practical Biometrics
Direct links:
Oct 24 2017:At Risk Emerging Technology Domains
Direct links:
Oct 12 2017:DNS Blocking to Disrupt Malware
Direct links:
Sep 21 2017:Best Practices: Network Border Protection
Direct links:
Sep 7 2017:Verifying Software Assurance with IBM’s Watson
Direct links:
Aug 31 2017:The CERT Software Assurance Framework
Direct links:
Aug 3 2017:Scaling Agile Methods
Direct links:
Jul 14 2017:Ransomware: Best Practices for Prevention and Response
Direct links:
Jun 29 2017:Integrating Security in DevOps
Direct links:
Jun 15 2017:SEI Fellows Series: Peter Feiler
Direct links:
May 25 2017:NTP Best Practices
Direct links:
May 18 2017:Establishing Trust in Disconnected Environments
Direct links:
Apr 20 2017:Distributed Artificial Intelligence in Space
Direct links:
Mar 27 2017:Verifying Distributed Adaptive Real-Time Systems
Direct links:
Mar 23 2017:10 At-Risk Emerging Technologies
Direct links:
Feb 27 2017:Technical Debt as a Core Software Engineering Practice
Direct links:
Feb 23 2017:DNS Best Practices
Direct links:
Jan 26 2017:Three Roles and Three Failure Patterns of Software Architects
Direct links:
Jan 12 2017:Security Modeling Tools
Direct links:
Dec 19 2016:Best Practices for Preventing and Responding to Distributed Denial of Service (DDoS) Attacks
Direct links:
Dec 8 2016:Cyber Security Engineering for Software and Systems Assurance
Direct links:
Nov 30 2016:Moving Target Defense
Direct links:
Nov 10 2016:Improving Cybersecurity Through Cyber Intelligence
Direct links:
Oct 27 2016:A Requirement Specification Language for AADL
Direct links:
Oct 19 2016:Becoming a CISO: Formal and Informal Requirements
Direct links:
Oct 13 2016:Predicting Quality Assurance with Software Metrics and Security Methods
Direct links:
Sep 29 2016:Network Flow and Beyond
Direct links:
Sep 15 2016:A Community College Curriculum for Secure Software Development
Direct links:
Aug 25 2016:Security and the Internet of Things
Direct links:
Aug 10 2016:The SEI Fellow Series: Nancy Mead
Direct links:
Jul 28 2016:An Open Source Tool for Fault Tree Analysis
Direct links:
Jul 18 2016:Global Value Chain – An Expanded View of the ICT Supply Chain
Direct links:
Jun 21 2016:Intelligence Preparation for Operational Resilience
Direct links:
May 26 2016:Evolving Air Force Intelligence with Agile Techniques
Direct links:
May 12 2016:Threat Modeling and the Internet of Things
Direct links:
Apr 14 2016:Open Systems Architectures: When & Where to Be Closed
Direct links:
Mar 18 2016:Effective Reduction of Avoidable Complexity in Embedded Systems
Direct links:
Mar 18 2016:Toward Efficient and Effective Software Sustainment
Direct links:
Mar 8 2016:Quality Attribute Refinement and Allocation
Direct links:
Feb 19 2016:Is Java More Secure Than C?
Direct links:
Feb 4 2016:Identifying the Architectural Roots of Vulnerabilities
Direct links:
Feb 3 2016:Build Security In Maturity Model (BSIMM) – Practices from Seventy Eight Organizations
Direct links:
Jan 12 2016:An Interview with Grady Booch
Direct links: