Podcast Episodes
Back to SearchGetting Your Software Supply Chain In Tune with SBOM Harmonization
Software bills of materials or SBOMs are critical to software security and supply chain risk management. Ideally, regardless of the SBOM tool, the ou…
5 months, 3 weeks ago
API Security: An Emerging Concern in Zero Trust Implementations
Application programing interfaces, more commonly known as APIs, are the engines behind the majority of internet traffic. The pervasive and public nat…
6 months, 1 week ago
Delivering Next-Generation AI Capabilities
Artificial intelligence (AI) is a transformational technology, but it has limitations in challenging operational settings. Researchers in the AI Divi…
6 months, 2 weeks ago
The Benefits of Rust Adoption for Mission-and-Safety-Critical Systems
A recent Google survey found that many developers felt comfortable using the Rust programming language in two months or less. Yet barriers to Rust ad…
6 months, 4 weeks ago
Threat Modeling: Protecting Our Nation's Complex Software-Intensive Systems
In response to Executive Order (EO) 14028, Improving the Nation's Cybersecurity, the National Institute of Standards and Technology (NIST) recommend…
7 months, 1 week ago
Understanding Container Reproducibility Challenges: Stopping the Next Solar Winds
Container images are increasingly being used as the main method for software deployment, so ensuring the reproducibility of container images is becom…
8 months, 2 weeks ago
Mitigating Cyber Risk with Secure by Design
Software enables our way of life, but market forces have sidelined security concerns leaving systems vulnerable to attack. Fixing this problem will …
9 months ago
The Magic in the Middle: Evolving Scaled Software Solutions for National Defense
A January 2025 Defense Innovation Board study on scaling nontraditional defense innovation stated, "We must act swiftly to ensure the DoD leads in gl…
9 months, 4 weeks ago
Making Process Respectable Again: Advancing DevSecOps in the DoD Mission Space
Warfighters in the Department of Defense (DoD) operate in high-stakes environments where security, efficiency, and speed are critical. In such enviro…
10 months, 1 week ago
Deploying on the Edge
Deploying cloud-centric technologies such as Kubernetes in edge environments poses challenges, especially for mission-critical defense systems. In t…
10 months, 2 weeks ago