Podcast Episodes
Back to SearchInsider Risk Management in the Post-Pandemic Workplace
In the wake of the COVID pandemic, the workforce decentralized and shifted toward remote and hybrid environments. In this podcast from the Carnegie…
2 years, 7 months ago
An Agile Approach to Independent Verification and Validation
Independent verification and validation (IV&V) is a significant step in the process of deploying systems for mission-critical applications in the Dep…
2 years, 8 months ago
Zero Trust Architecture: Best Practices Observed in Industry
Zero trust architecture has the potential to improve an enterprise's security posture. There is still considerable uncertainty about the zero trust t…
2 years, 8 months ago
Automating Infrastructure as Code with Ansible and Molecule
In Ansible, roles allow system administrators to automate the loading of certain variables, tasks, files, templates, and handlers based on a known fi…
2 years, 9 months ago
Identifying and Preventing the Next SolarWinds
In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Gregory J. Touhill, director of the SEI CERT Division, talk…
2 years, 9 months ago
A Penetration Testing Findings Repository
In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI) Marisa Midler and Samantha Chaves, penetration testers wit…
2 years, 10 months ago
Understanding Vulnerabilities in the Rust Programming Language
While the memory safety and security features of the Rust programming language can be effective in many situations, Rust's compiler is very partic…
2 years, 10 months ago
We Live in Software: Engineering Societal-Scale Systems
Societal-scale software systems, such as today's commercial social media platforms, are among the most widely used software systems in the world, wit…
2 years, 10 months ago
Secure by Design, Secure by Default
In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI) Gregory J. Touhill, director of the SEI CERT Division, talks…
2 years, 11 months ago
Key Steps to Integrate Secure by Design into Acquisition and Development
Secure by design means performing more security and assurance activities earlier in the product and system lifecycles. A secure-by-design mindset add…
2 years, 11 months ago