The Defender's Log Podcast
The Defender’s Log Podcast: Stories from the Cybersecurity FrontlinesThe Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world.From zero-trust frameworks to ransomware takedowns, from DNS hardening to incident response in regulated industries, this podcast pulls back the curtain on the strategies, frameworks, and mindsets powering modern cyber resilience. Whether you're a security leader, IT strategist, or tech-savvy executive, you’ll walk away with the tools and stories that move the needle.🔐 Why Listen to The Defender’s Log?Cyber threats are evolving and so must our defenses. This isn’t theory. These are the actual voices of those defending systems under pressure, making real-time decisions that pr...
Episodes

Friday Sep 05, 2025
Friday Sep 05, 2025
In this episode of the Defenders Log, we have Aditi Patange from Microsoft alongside our hosts, David Redekop and Francois from Adam Networks, for an in-depth discussion on Zero Trust DNS, a new enterprise security feature within Windows 11. Aditi shares her background in computer engineering and product management and how his work contributes to cybersecurity. The conversation delves into the origins and motivations behind Zero Trust DNS, its implementation challenges, and its impact on network security. Aditi also emphasizes the importance of infrastructure in modern cybersecurity and the need for organizations to move towards encrypted DNS. The episode concludes with a discussion on the collaboration between Microsoft and Adam Networks to enhance security solutions.Timestamps - 00:00 Introduction and Guest Welcome00:47 Aditi's Background and Journey into Cybersecurity01:58 The Importance of Network Security03:13 Challenges and Benefits of Zero Trust DNS07:33 Real-World Applications and Feedback13:50 Government and Enterprise Adoption19:43 Unexpected Benefits of Zero Trust DNS21:59 First Principles Approach to Problem Solving23:22 The Evolution of Technology and Security24:37 Challenges and Integration with Endpoint Protection27:02 Kernel Mode Drivers and Security35:23 The Importance of Infrastructure in Modern Technology36:50 Personal Journey into Technology40:12 The Mission of Zero Trust DNS43:27 Final Thoughts and Future Directions

Friday Aug 22, 2025
Friday Aug 22, 2025
In today's episode of the Defender's Log, we welcome special guest Tommy Jensen, an internet technologist with expertise in IPv6, Zero Trust, and standards. The episode covers Jensen's career journey from an AppleCare contractor to a pivotal role in advancing internet technologies. The discussion delves into the importance and challenges of migrating to IPv6, and the need to overcome legacy systems in enterprise networks. Jensen shares insights into his focus on DNS and Zero Trust, stressing the balance between privacy and security. The episode also explores the benefits of encrypted DNS, the drawbacks of TLS termination, and the broader implications for the future of the internet. Finally, Jensen emphasizes the significance of using the internet to connect and understand diverse cultures and circumstances.00:00 Introduction and Guest Introduction02:18 Tommy Jensen's Background and Career Path07:09 The Importance of IPv608:00 Challenges and Benefits of IPv6 Adoption18:08 DNS and Zero Trust39:21 The Future of the Internet and Final Thoughts

Friday Aug 08, 2025
Friday Aug 08, 2025
In this episode of 'The Defender's Log,' host David engages in a comprehensive discussion with John Todd, an influential figure in the defense technology space and a key player at Quad9. The conversation covers John's career journey, starting from the early days of commercial internet services to his current role at Quad9. They delve into the importance of DNS in cybersecurity, Quad9's unique approach to protecting users, and the challenges and strategies involved in maintaining a global DNS infrastructure. Key topics include the implementation of zero-trust DNS, the legal hurdles faced by DNS providers, and the innovative protocols aimed at enhancing internet security and privacy. The episode also highlights the vital role of partnerships and the challenges of operating in regions with restrictive import tariffs. Todd emphasizes the importance of privacy and the legal measures in place to protect user data, concluding with a call to potential sponsors to support Quad9's ongoing mission to secure the internet.Timestamps - 00:00 Introduction and Guest Welcome01:14 John Todd's Journey in Technology03:14 The Birth of Quad905:08 IBM's Role and Quad9's Growth06:40 Threat Intelligence and Data Sharing11:11 Challenges with False Positives18:46 Global Network Expansion21:46 Difficulties in Equipment Importation26:14 Exploring Early Motivations and Interests27:42 The Evolution of Communication Technologies29:01 Defensive Posture in Communication30:56 Balancing Privacy and Security35:18 Challenges in Network Security40:09 Innovations in DNS and Network Management48:17 Legal and Privacy Considerations51:16 Conclusion and Final Thoughts

Friday Jul 25, 2025
Friday Jul 25, 2025
In the inaugural episode of 'The Defender’s Log,' host David Redekop converses with cybersecurity veteran Chester Wisniewski to explore the dynamic field of cybersecurity. They discuss the differentiation between privacy and security, the evolution of hacking from the 1980s to the present, and pivotal moments that reshaped information security. Chet shares anecdotes from his extensive career, offering a deep dive into the challenges and successes of defending against cyber threats. Listeners will learn about the importance of defense-in-depth, the impact of pivotal virus outbreaks, and the emergence of profitable cybercrime. Chet also provides valuable advice on navigating a career in cybersecurity, emphasizing the significance of practical problem-solving and mentorship. Tune in to gain actionable insights and a positive perspective on securing the digital world.Timestamps - 00:00 Introduction01:08 Welcome to the Defender's Log01:47 Guest Introduction: Chet Wisniewski05:21 Early Days of Cybersecurity09:05 Evolution of Cyber Threats15:10 Challenges in Cybersecurity21:08 Personal Stories and Sacrifices25:33 Advice for Aspiring Cyber Defenders33:08 Closing Thoughts and Future Events#Cybersecurity #Infosec #AIethics #HackingHistory #VR #ChetWisniewski #DigitalDefense #PrivacyVsSecurity #TechPodcast #DefendersLog #Cyberwarfare #CyberCrime #FutureOfTech #CyberEthics #EthicalHacking







