Podcast Episodes

Back to Search
Goal-Line Defense: A Tool to Discover and Mitigate UEFI Vulnerabilities
Goal-Line Defense: A Tool to Discover and Mitigate UEFI Vulnerabilities

As recently as December 2025, the Carnegie Mellon University Software Engineering Institute (SEI's) CERT Coordination Center (CERT/CC) documented a U…

12 hours ago

Short Long
View Episode
Leadership, Legacy, and the Power of Mentors: Insights from Dr. Paul Nielsen
Leadership, Legacy, and the Power of Mentors: Insights from Dr. Paul Nielsen

Episode 435

In February 2026, Paul Nielsen announced that he will transition out of his role as director and chief executive officer of the Software Engineering …

1 week, 2 days ago

Short Long
View Episode
With a Little Help from Our Civilian Friends: Cybersecurity Reserve Is Both Feasible and Advisable

Cybersecurity staffing shortages are a major concern in the government given the increasingly sophisticated cyber attacks on the nation's critical in…

3 weeks, 5 days ago

Short Long
View Episode
Maturing AI Adoption: From Chaos to Consistency

While Stanford University found that AI investments, optimism, and accessibility are rising, a recent MIT report suggests that 95 percent of organiz…

1 month, 1 week ago

Short Long
View Episode
Temporal Memory Safety in C and C++: An AI-Enhanced Pointer Ownership Model

In October 2025, CyberPress reported a critical security vulnerability in the Redis Server, an open-source in-memory database that allowed authentica…

2 months ago

Short Long
View Episode
AI for the Warfighter: Acquisition Challenges and Guidance

On November 7, the Department of War released an acquisition transformation strategy that seeks to remove bureaucratic hurdles and streamline acquisi…

2 months, 2 weeks ago

Short Long
View Episode
Visibility Through the Clouds with Network Flow Logs

Organizations, including the U.S. military, are increasingly adopting cloud deployments for their flexibility and cost savings. The shared security m…

3 months ago

Short Long
View Episode
Orchestrating the Chaos: Protecting Wireless Networks from Cyber Attacks

From early 2022 through late 2024, a group of threat actors publicly known as APT28 exploited known vulnerabilities, such as CVE-2022-38028, to remo…

4 months, 1 week ago

Short Long
View Episode
From Data to Performance: Understanding and Improving Your AI Model

Modern data analytic methods and tools—including artificial intelligence (AI) and machine learning (ML) classifiers—are revolutionizing prediction…

5 months ago

Short Long
View Episode
What Could Possibly Go Wrong? Safety Analysis for AI Systems

How can you ever know whether an LLM is safe to use? Even self-hosted LLM systems are vulnerable to adversarial prompts left on the internet and wai…

5 months, 2 weeks ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us