Podcast Episodes

Back to Search
Cloud Computing for the Battlefield

Soldiers can use handheld mobile computing devices (aka smart-phones) to help with various tasks, such as speech and image recognition, natural langu…

13 years, 7 months ago

Short Long
View Episode
An Architecture-Focused Measurement Framework for Managing Technical Debt

Managing technical debt, which refers to the rework and degraded quality resulting from overly hasty delivery of software capabilities to users, is a…

13 years, 7 months ago

Short Long
View Episode
Agile Acquisition

The SEI is focused on reducing the DoD information technology (IT) development cycle currently as long as 81 months to short, incremental approaches …

13 years, 7 months ago

Short Long
View Episode
How a Disciplined Process Enhances & Enables Agility

Typically, people who believe themselves to be Agile, believe that developers realize the best results when they focus on empowered teams, collaborat…

13 years, 7 months ago

Short Long
View Episode
U.S. Postal Inspection Service Use of the CERT Resilience Management Model

CERT-RMM can be used to establish and meet resilience requirements for a wide range and diverse set of business objectives. Related Courses Introd…

13 years, 7 months ago

Short Long
View Episode
Insights from the First CERT Resilience Management Model Users Group

Implementing CERT-RMM requires well-defined improvement objectives, sponsorship, proper scoping and diagnosis, and defined processes and measures. …

13 years, 8 months ago

Short Long
View Episode
NIST Catalog of Security and Privacy Controls, Including Insider Threat

Security controls, including those for insider threat, are the safeguards necessary to protect information and information systems. Related Course I…

13 years, 11 months ago

Short Long
View Episode
Cisco's Adoption of CERT Secure Coding Standards

Implementing secure coding standards to reduce the number of vulnerabilities that can escape into operational systems is a sound business decision. …

14 years, 1 month ago

Short Long
View Episode
How to Become a Cyber Warrior

Protecting the internet and its users against cyber attacks requires a significant increase in the number of skilled cyber warriors. Related Courses…

14 years, 2 months ago

Short Long
View Episode
Considering Security and Privacy in the Move to Electronic Health Records

Electronic health records bring many benefits along with security and privacy challenges. Listen on Apple Podcasts.

14 years, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us