Podcast Episodes

Back to Search
Assessing Cybersecurity Training

Simulation environments allow people to practice skills such as setting up and defending networks. If we can record informative traces of activity in…

6 years, 9 months ago

Short Long
View Episode
DevOps in Highly Regulated Environments

Highly regulated environments (HREs), such as finance and healthcare, are mandated by policies for various reasons, most often general security and p…

6 years, 9 months ago

Short Long
View Episode
The Role of the Software Factory in Acquisition and Sustainment
The Role of the Software Factory in Acquisition and Sustainment

Dr. Paul Nielsen discusses his involvement on a Defense Science Board Task Force that concluded that the software factory should be a key player in t…

6 years, 10 months ago

Short Long
View Episode
Defending Your Organization Against Business Email Compromise

Operation Wire Wire, a coordinated law enforcement effort by the U.S. Department of Justice, U.S. Department of Homeland Security, U.S. Department of…

6 years, 10 months ago

Short Long
View Episode
Managing Technical Debt: A Focus on Automation, Design, and Architecture

Technical debt communicates the tradeoff between the short-term benefits of rapid delivery and the long-term value of developing a software system th…

7 years ago

Short Long
View Episode
Leading in the Age of Artificial Intelligence

Tom Longstaff, who in 2018 was hired as the SEI's chief technology officer, discusses the challenges of leading a technical organization in the age o…

7 years, 1 month ago

Short Long
View Episode
Applying Best Practices in Network Traffic Analysis

In today's operational climate, threats and attacks against network infrastructures have become far too common. Researchers in the SEI's CERT Divisio…

7 years, 1 month ago

Short Long
View Episode
10 Types of Application Security Testing Tools and How to Use Them

Bugs and weaknesses in software are common: 84 percent of system breaches exploit vulnerabilities at the application layer. The prevalence of softwar…

7 years, 1 month ago

Short Long
View Episode
Using Test Suites for Static Analysis Alert Classifiers

Static analysis tools used to identify potential vulnerabilities in source code produce a large number of alerts with high false-positive rates that …

7 years, 1 month ago

Short Long
View Episode
Blockchain at CMU and Beyond

Beyond its financial hype, researchers are exploring and understanding the promise of Blockchain technologies. In this SEI Podcast, Eliezer Kanal and…

7 years, 1 month ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us