The Defender's Log Podcast

David Redekop

The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to incident response in regulated industries, this podcast pulls back the curtain on the strategies, frameworks, and mindsets powering modern cyber resilience. Whether you're a security leader, IT strategist, or tech-savvy executive, you’ll walk away with the tools and stories that move the needle. 🔐 Why Listen to The Defender’s Log?Cyber threats are evolving and so must our defenses. This isn’t theory. These are the actual voices of those defending systems under pressure, making real-time decisions that protect billions in data and infrastructure. On The Defender’s Log, you’ll hear how seasoned professionals: Implement Zero Trust and “Default Deny All” architectures in dynamic environmentsNavigate ransomware threats and phishing prevention at scaleAlign with NIST, CIS20, and DNS-first security frameworksTransform IT operations into proactive defense enginesBuild and lead resilient, high-performing security teams Through personal journeys and practical deep-dives, guests share hard-won lessons, strategic pivots, and mindset shifts that can help you stay ahead of the next threat wave. 🔍 What to Expect From Each EpisodeEvery conversation uncovers the untold truths of digital defense, from the boardroom to the firewall: Tactical Cybersecurity: Learn how today’s defenders are actively neutralizing threats and hardening networks.Architecting Trust: Discover how Zero Trust and DNS-first strategies are being deployed at scale.Incident Response, Redefined: Real-world war stories from ransomware mitigation to phishing campaigns gone viral.Security Leadership: Gain insight into how CISOs and CIOs lead change while navigating compliance, culture, and crisis.Mental Fitness in Security: Explore how top performers stay resilient, focused, and decisive under pressure.Career Arcs & Comebacks: Hear personal journeys of rising through the ranks, surviving breaches, and building legacies.

单集

  1. Cyber Warriors & Digital Shadows: Insights from Canada's Cybersecurity Leader | Sami Khoury

    1天前

    Cyber Warriors & Digital Shadows: Insights from Canada's Cybersecurity Leader | Sami Khoury

    In this episode of The Defender’s Log, host David Redekop sits down with Sami Khoury, the Head of the Canadian Centre for Cyber Security, for an inside look at the battle to protect national infrastructure from unseen digital threats. From his beginnings as a research engineer in 1992 to leading one of Canada’s most critical cybersecurity agencies, Sami shares lessons from three decades of defense — from combating ransomware to promoting “secure-by-design” innovation. Discover how public-private collaboration, education, and technology are shaping the next frontier of digital security. Whether you’re a cybersecurity professional, policymaker, or tech enthusiast, this episode will leave you with a new appreciation for the people protecting the digital realm. 🧠 Key Takeaways: Ransomware and the evolution of modern cyber threats Why “secure-by-design” is the foundation of cyber resilience The power of collaboration between government and private sectors Building a cybersecurity culture through awareness and innovation Insights into the mindset of a lifelong defender of the digital realm Timestamps / Chapters 00:00 — The Original Spark: Passion for Problem-Solving 01:01 — Welcome to The Defender’s Log 01:17 — Meet Sami Khoury: Canada’s Cybersecurity Leader 03:34 — The Journey from Engineer to Cyber Chief 06:34 — A Day in the Life of a National Cyber Defender 08:55 — Cyber Policy and the Power of Innovation 12:19 — Inside the Cyber Center: Strategy and Collaboration 28:50 — Ransomware: The Evolving Threat Landscape 34:19 — Building a Culture of Cyber Resilience 40:59 — Recognitions, Reflections, and Lessons Learned 44:42 — A Call to Action: The Future of Cyber Defense

    49 分钟
  2. An Educator's Guide to DNS Threats with Josh Kuo

    10月4日

    An Educator's Guide to DNS Threats with Josh Kuo

    Is your company's most critical blind spot hiding in plain sight? While most security teams focus on firewalls and web traffic, attackers are increasingly using the internet's phonebook—the Domain Name System (DNS)—as a secret backdoor for malware delivery, data theft, and command and control. In this episode of The Defenders Log, host David Redekop sits down with cybersecurity educator Josh Kuo from Infoblox to uncover the shocking ways DNS is weaponized. Josh shares jaw-dropping stories from the field, explaining complex threats in a way that anyone can understand. Learn how a simple DNS query can be used to exfiltrate your most sensitive data and how Protective DNS is becoming an essential layer of defense for modern organizations. Whether you're a CISO, a network admin, or just passionate about security, this is a conversation you can't afford to miss. Learn More About Our Guest: Josh Kuo is a leading cybersecurity educator at Infoblox, specializing in DNS security and threat intelligence. Infoblox is a leader in managing and securing DNS, DHCP, and IP address management (DDI) for enterprise networks. Find out more at https://www.infoblox.com 00:00 - Intro: The Secret Battles of Cybersecurity 00:45 - Welcoming Josh Kuo, Educator at Infoblox 01:40 - Josh's Origin Story: From Aspiring Dentist to Network Engineer 05:15 - Who Owns DNS? The Ponytail Guy, the Windows Team, or the Network Team? 07:30 - "If DNS Works, Everything Works": DNS as the Ultimate Network Health Check 10:05 - From the Field to the Classroom: Why Josh Became an Educator 12:45 - The First Jaw-Dropping Moment: Discovering Data Theft via DNS 13:20 - How DNS Tunneling Works to Exfiltrate Data 16:10 - Explained: DNS for Covert Command and Control (C2) Attacks 18:00 - When Good Websites Go Bad: Domain Hijacking and Cache Poisoning 20:15 - The Immense Challenge of Scaling DNS Security Monitoring 21:10 - The Power of Protective DNS and Threat Intelligence Platforms 22:00 - Final Thoughts & Outro

    57 分钟
  3. A Developer's Guide to Life: Passion, Legacy & The "Foggy Staircase" of a Tech Career | Will Earp

    9月19日

    A Developer's Guide to Life: Passion, Legacy & The "Foggy Staircase" of a Tech Career | Will Earp

    "Am I going to spend my life trying to get the thing that I need, or am I going to spend my life doing the thing that I want?" In this deeply insightful episode of The Defender's Log, host David Redekop sits down with Will Earp, a veteran developer whose career journey began with an Amiga 600 in 1998. They explore the profound philosophy that has guided Will's path from a freelance web developer to a lead engineer at a charity dedicated to online child safety. Will shares his belief that a career isn't a clear path but a "foggy staircase," where you can only see one or two steps ahead. He explains how choosing to follow passion over a paycheck—whether running his own business for a decade or contributing to open-source projects—led to unexpected doors opening, including his involvement with the prestigious Internet Engineering Task Force (IETF). This conversation goes beyond code and cyber defense, touching on the importance of legacy, the unique challenges of protecting children in the digital age, and the simple but powerful advice to find what you love and go do it. In this discussion, you will learn about: ● The "Foggy Staircase" approach to navigating your career path. ● Pivoting from general web development to a mission-driven role in cybersecurity. ● The profound choice between pursuing passion versus financial security. ● How open-source work and personal projects can become your greatest career assets. ● The unique challenges and responsibilities of protecting children vs. adults online. ● Key insights on modern defense, including Zero Trust in DNS. ● Invaluable advice for the next generation of cybersecurity defenders. ● Why the ultimate goal is building a life and a legacy you can be proud of. Join us for a conversation that will inspire you to think differently about your own career, the choices you make, and the impact you want to have on the world. Chapters 00:00 - Intro 01:18 - Welcome & How Will Herp Got Started in Tech 05:09 - The "Foggy Staircase" of a Tech Career 07:25 - Finding a Mission-Driven Career in Child Safety 09:28 - The Difference Between Protecting Kids vs. Adults Online 13:27 - Philosophy, Human Nature, and Long-Term Thinking 18:44 - Choosing Passion Over Money: The Journey to Open Source 21:20 - The British Perspective on Policy and Culture 28:18 - Innovations in Cyber Defense: Zero Trust in DNS 31:48 - Advice for the Next Generation of Defenders 36:07 - Finding Balance in Markets, Technology, and Bitcoin 41:34 - Final Message: Find What You Love and Go Do It 44:20 - Outro #CareerAdvice #Cybersecurity #SoftwareDevelopment #OpenSource #TechPhilosophy #PassionVsMoney #DeveloperLife #TechCareer #IETF #ZeroTrust #WillEarp #DavidRedekop #adamone #adamnetworks

    43 分钟
  4. Understanding Microsoft Zero Trust DNS with Aditi Patange

    9月5日

    Understanding Microsoft Zero Trust DNS with Aditi Patange

    In this episode of the Defenders Log, we have Aditi Patange from Microsoft alongside our hosts, David Redekop and Francois from Adam Networks, for an in-depth discussion on Zero Trust DNS, a new enterprise security feature within Windows 11. Aditi shares her background in computer engineering and product management and how his work contributes to cybersecurity. The conversation delves into the origins and motivations behind Zero Trust DNS, its implementation challenges, and its impact on network security.  Aditi also emphasizes the importance of infrastructure in modern cybersecurity and the need for organizations to move towards encrypted DNS. The episode concludes with a discussion on the collaboration between Microsoft and Adam Networks to enhance security solutions. Timestamps -  00:00 Introduction and Guest Welcome 00:47 Aditi's Background and Journey into Cybersecurity 01:58 The Importance of Network Security 03:13 Challenges and Benefits of Zero Trust DNS 07:33 Real-World Applications and Feedback 13:50 Government and Enterprise Adoption 19:43 Unexpected Benefits of Zero Trust DNS 21:59 First Principles Approach to Problem Solving 23:22 The Evolution of Technology and Security 24:37 Challenges and Integration with Endpoint Protection 27:02 Kernel Mode Drivers and Security 35:23 The Importance of Infrastructure in Modern Technology 36:50 Personal Journey into Technology 40:12 The Mission of Zero Trust DNS 43:27 Final Thoughts and Future Directions

    47 分钟
  5. Defending the DNS: How Quad9 Protects the Internet | John Todd, CTO - Quad9

    8月8日

    Defending the DNS: How Quad9 Protects the Internet | John Todd, CTO - Quad9

    In this episode of 'The Defender's Log,' host David engages in a comprehensive discussion with John Todd, an influential figure in the defense technology space and a key player at Quad9. The conversation covers John's career journey, starting from the early days of commercial internet services to his current role at Quad9. They delve into the importance of DNS in cybersecurity, Quad9's unique approach to protecting users, and the challenges and strategies involved in maintaining a global DNS infrastructure. Key topics include the implementation of zero-trust DNS, the legal hurdles faced by DNS providers, and the innovative protocols aimed at enhancing internet security and privacy. The episode also highlights the vital role of partnerships and the challenges of operating in regions with restrictive import tariffs. Todd emphasizes the importance of privacy and the legal measures in place to protect user data, concluding with a call to potential sponsors to support Quad9's ongoing mission to secure the internet. Timestamps - 00:00 Introduction and Guest Welcome 01:14 John Todd's Journey in Technology 03:14 The Birth of Quad9 05:08 IBM's Role and Quad9's Growth 06:40 Threat Intelligence and Data Sharing 11:11 Challenges with False Positives 18:46 Global Network Expansion 21:46 Difficulties in Equipment Importation 26:14 Exploring Early Motivations and Interests 27:42 The Evolution of Communication Technologies 29:01 Defensive Posture in Communication 30:56 Balancing Privacy and Security 35:18 Challenges in Network Security 40:09 Innovations in DNS and Network Management 48:17 Legal and Privacy Considerations 51:16 Conclusion and Final Thoughts

    53 分钟
  6. Cybersecurity Explained: Privacy, Threats, and the Future | Chester Wisniewski

    7月25日

    Cybersecurity Explained: Privacy, Threats, and the Future | Chester Wisniewski

    In the inaugural episode of 'The Defender’s Log,' host David Redekop converses with cybersecurity veteran Chester Wisniewski to explore the dynamic field of cybersecurity. They discuss the differentiation between privacy and security, the evolution of hacking from the 1980s to the present, and pivotal moments that reshaped information security.  Chet shares anecdotes from his extensive career, offering a deep dive into the challenges and successes of defending against cyber threats. Listeners will learn about the importance of defense-in-depth, the impact of pivotal virus outbreaks, and the emergence of profitable cybercrime.  Chet also provides valuable advice on navigating a career in cybersecurity, emphasizing the significance of practical problem-solving and mentorship. Tune in to gain actionable insights and a positive perspective on securing the digital world. Timestamps -  00:00 Introduction 01:08 Welcome to the Defender's Log 01:47 Guest Introduction: Chet Wisniewski 05:21 Early Days of Cybersecurity 09:05 Evolution of Cyber Threats 15:10 Challenges in Cybersecurity 21:08 Personal Stories and Sacrifices 25:33 Advice for Aspiring Cyber Defenders 33:08 Closing Thoughts and Future Events #Cybersecurity #Infosec #AIethics #HackingHistory #VR #ChetWisniewski #DigitalDefense #PrivacyVsSecurity #TechPodcast #DefendersLog #Cyberwarfare #CyberCrime #FutureOfTech #CyberEthics #EthicalHacking

    36 分钟

关于

The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to incident response in regulated industries, this podcast pulls back the curtain on the strategies, frameworks, and mindsets powering modern cyber resilience. Whether you're a security leader, IT strategist, or tech-savvy executive, you’ll walk away with the tools and stories that move the needle. 🔐 Why Listen to The Defender’s Log?Cyber threats are evolving and so must our defenses. This isn’t theory. These are the actual voices of those defending systems under pressure, making real-time decisions that protect billions in data and infrastructure. On The Defender’s Log, you’ll hear how seasoned professionals: Implement Zero Trust and “Default Deny All” architectures in dynamic environmentsNavigate ransomware threats and phishing prevention at scaleAlign with NIST, CIS20, and DNS-first security frameworksTransform IT operations into proactive defense enginesBuild and lead resilient, high-performing security teams Through personal journeys and practical deep-dives, guests share hard-won lessons, strategic pivots, and mindset shifts that can help you stay ahead of the next threat wave. 🔍 What to Expect From Each EpisodeEvery conversation uncovers the untold truths of digital defense, from the boardroom to the firewall: Tactical Cybersecurity: Learn how today’s defenders are actively neutralizing threats and hardening networks.Architecting Trust: Discover how Zero Trust and DNS-first strategies are being deployed at scale.Incident Response, Redefined: Real-world war stories from ransomware mitigation to phishing campaigns gone viral.Security Leadership: Gain insight into how CISOs and CIOs lead change while navigating compliance, culture, and crisis.Mental Fitness in Security: Explore how top performers stay resilient, focused, and decisive under pressure.Career Arcs & Comebacks: Hear personal journeys of rising through the ranks, surviving breaches, and building legacies.