Épisodes

  • 27 Years of Defending the Web: Inside Peter Lowe’s Blocklist
    Jan 9 2026

    Defending the Internet, One Domain at a Time


    In this episode of The Defender’s Log, host David Redekop sits down with Peter Lowe, the creator and maintainer of one of the internet’s most widely used blocklists, a resource quietly protecting users for over 27 years.


    What started as a personal effort to block intrusive ads has evolved into a critical layer of modern cybersecurity infrastructure. Peter shares the technical, ethical, and human realities of maintaining a blocklist at internet scale, from DNS-based blocking and privacy challenges to dealing with criticism, threats, and constant technological change.


    The conversation also explores unexpected territory: how language, culture, and communication shape security, why defaults in operating systems matter more than most users realize, and how Apple, Microsoft, and modern platforms influence privacy at scale.


    This episode isn’t just about blocking domains; it’s about trust, responsibility, and defending the open internet without owning it.

    Voir plus Voir moins
    55 min
  • The Architect of the Internet on the Future of Trust | Dr. Paul Mockapetris | Inventor, DNS
    Dec 26 2025

    The internet is a collision of legacy protocols and modern asymmetric threats. In this episode of The Defenders Log, I sit down with the man who built the foundation: Dr. Paul Mockapetris, the inventor of the Domain Name System (DNS).


    We don't just reminisce about the 1980s; we dissect how the Universal Threat Ecosystem (UTE) has weaponized the very decentralization that made the internet possible. The failure today does not come from gross negligence, but the imperfect application of the current stack. The odds remain badly stacked against the defender. While generic tools focus on detection, which is fundamentally too late, this conversation pivots toward Zero Trust Connectivity (ZTC).


    Strategic Deep Dive:


    • The "Whack-a-Mole" Reality: Why chasing RaaS and IABs through traditional feeds is a losing game.
    • Default Deny-All: Dr. Mockapetris explains his "day job"—making sure DNS doesn't work when you don't want it to.
    • The DoH/DoT Trap: How hyperscalers are centralizing authority and eroding Sovereign Capabilities.
    • Agentic AI: Preparing for a world with trillions of automated agents jabbering across your infrastructure.


    If you want to survive the next evolution of cyber warfare, you must shut down egress to the attacker. It is time to move beyond simple resolution and toward a hardened state of prevention.


    #CyberSecurity #ZeroTrust #DNS #ZTC #ThreatIntelligence #ADAMnetworks #InfoSec #CyberWarfare #PaulMockapetris #SovereignCapability #DefaultDeny


    Voir plus Voir moins
    59 min
  • The Hidden Layer of Cybersecurity: Andreas Taudte on DNS & DDI Defense
    Dec 12 2025

    In this episode of The Defender’s Log, host David Redekop sits down with DNS and DDI expert Andreas Taudte, who brings more than 16 years of experience in network security, DNS architecture, and threat mitigation.


    Together, they unpack the real challenges organizations face with DNS, from evasion techniques and tunneling threats to the growing complexity of legacy systems and hybrid networks. Andreas explains why DNS predictability is essential, how DDI (DNS, DHCP, IPAM) has evolved, and what enterprises must do to build resilient, zero-trust-aligned network foundations.


    This conversation is packed with real-world stories, practical insights, and actionable strategies for anyone responsible for securing modern infrastructures. If you touch networking, cybersecurity, or cloud architecture; this deep dive is for you.


    Timestamps -

    00:00 Introduction to DNS and DDI

    01:20 Meet Andreas: A Deep Dive into DNS

    06:22 The Journey into DNS and DDI

    06:49 Understanding DDI: DNS, DHCP, and IPAM

    09:53 Challenges and Stories from the Field

    22:21 Security and Management in DNS and DDI

    28:13 External Audits and DNS Management

    30:16 Infrastructure as Code and Network Configuration

    31:15 Building a Strong Foundation for Networks

    31:30 The Reality of Temporary Solutions

    32:00 Buzzwords and IT Management

    33:34 Zero Trust and Default Deny All

    34:25 DNS Threats and Exploits

    44:22 Complex DNS Evasion Techniques

    46:49 Combining Security Layers for Better Defense

    52:03 Predictable DNS Resolution

    54:17 Final Thoughts and Advice


    #DNS #DNSSecurity #DDI #Cybersecurity #NetworkSecurity #ZeroTrust #ITInfrastructure #CyberThreats #IPAM #DHCP #SecurityArchitecture #BlueTeam #NetworkEngineering

    Voir plus Voir moins
    58 min
  • The Dark Truth About Modern Cyber Threats | Joshua Domagalski, CISO, Astronomer
    Nov 28 2025

    In this powerful episode, host David Redekop sits down with Joshua Domagalski, Chief Information Security Officer and former offensive operator, to explore the real complexities of modern cyber defense.


    Joshua opens up about his journey from the military to cybersecurity leadership, the shift from attacking systems to protecting them, and why defending is far more challenging than breaking in.


    This conversation goes far beyond tools and tactics, it uncovers the human, strategic, and geopolitical layers that shape cybersecurity today.


    You’ll learn about:

    • Why offensive skills are essential for strong defense
    • The truth about AI adoption in security operations
    • How insider threats actually work
    • Ransomware strategy (not just response)
    • Why experience matters more than certifications
    • The real job of a CISO in 2025
    • The importance of humility, discipline, and continuous learning
    • How geopolitics fuels cyber conflict
    • Why most breaches originate from human behavior


    If you're a SOC analyst, aspiring CISO, blue team operator, or cybersecurity enthusiast — this episode will reshape how you see the defender’s role.


    Timestamps -

    00:00 Introduction and Early Interests

    01:00 Welcome to The Defender's Log

    01:16 Joshua Domagalski's Journey into Cybersecurity

    02:38 Challenges in Cyber Defense

    04:19 The Importance of Offensive Skills for Defense

    05:08 Balancing Proactive and Reactive Defense

    06:42 AI Adoption and Cybersecurity

    09:46 The Role of Experience vs. Certification

    11:39 Joshua's Path to Becoming a CISO

    14:16 Human Elements in Cybersecurity

    22:09 Strategies for Insider Threats and Ransomware

    36:17 Geopolitical Challenges in Cybersecurity

    39:40 Final Thoughts and Advice

    40:35 Conclusion and Call to Action


    #Cybersecurity #CISO #CyberDefense #Infosec #BlueTeam #Ransomware #AIinSecurity #OffensiveSecurity #SecurityLeadership #TheDefendersLog

    Voir plus Voir moins
    41 min
  • Inside DNS Threat Intelligence: Tim Adams on Privacy, Security & Innovation
    Nov 14 2025

    In this episode of The Defender’s Log, host David Redekop sits down with Tim Adams, DNS threat intelligence expert and founder of ScoutDNS, to uncover the evolving world of DNS security.


    From his early days running a wireless network integrator to building a resilient DNS resolver service, Tim shares lessons in innovation, resilience, and the art of staying ahead of cyber threats.


    They discuss everything from DNS over HTTPS (DOH) and threat intelligence to balancing privacy, compliance, and encryption in a rapidly changing digital landscape.


    Whether you're a cybersecurity professional, MSP, or privacy advocate, this conversation offers an unfiltered look into the next frontier of internet defense.


    #Cybersecurity #DNS #ThreatIntelligence #DataPrivacy #InternetSecurity #NetworkSecurity #TechInnovation #Encryption #DOH #DOT #ScoutDNS #MSP #CyberDefense #TheDefendersLog #Podcast #Technology #Infosec #DigitalPrivacy #CyberThreats #TechLeadership

    Voir plus Voir moins
    51 min
  • Defending the Digital Frontline: Ransomware, AI, and Real-World Lessons | Alexander Rau
    Nov 1 2025

    In this gripping episode of The Defender’s Log, host David Redekop sits down with Alexander Rau, Partner in Cybersecurity at KPMG, to explore the intense world of cyber incident response.


    From ransomware attacks and business email compromises to AI-driven ransom negotiations, Alexander shares firsthand experiences from the cyber frontlines, revealing what really happens when organizations are under digital siege.


    They discuss the psychological toll of defending under pressure, the ethical dilemmas in paying ransom, and why small and medium businesses remain top targets. Rau also explains how threat intelligence sharing, proactive defense, and human resilience can make the difference between recovery and collapse.


    This episode is a must-listen for cybersecurity professionals, executives, and anyone curious about how real digital warfare unfolds, and how to stay ahead of it.


    Timestamps -


    00:00 Introduction

    01:13 Meet the Guest: Alexander Rau

    02:05 The Reality of Cybersecurity Threats

    04:32 The Importance of Threat Intelligence Sharing

    17:47 Challenges in Cybersecurity for Small and Medium Businesses

    23:16 Standardized Unwinding Procedures

    24:46 The Human Factor in Incident Response

    26:32 Memorable Incidents and Threat Actors

    27:13 Ransom Negotiations and AI Involvement

    30:31 Ethical Dilemmas in Ransom Payments

    33:40 The Evolution of Cybersecurity Practices

    41:25 Final Thoughts and Advice

    Voir plus Voir moins
    44 min
  • Cyber Warriors & Digital Shadows: Insights from Canada's Cybersecurity Leader | Sami Khoury
    Oct 16 2025

    In this episode of The Defender’s Log, host David Redekop sits down with Sami Khoury, the Head of the Canadian Centre for Cyber Security, for an inside look at the battle to protect national infrastructure from unseen digital threats.


    From his beginnings as a research engineer in 1992 to leading one of Canada’s most critical cybersecurity agencies, Sami shares lessons from three decades of defense — from combating ransomware to promoting “secure-by-design” innovation.


    Discover how public-private collaboration, education, and technology are shaping the next frontier of digital security. Whether you’re a cybersecurity professional, policymaker, or tech enthusiast, this episode will leave you with a new appreciation for the people protecting the digital realm.


    🧠 Key Takeaways:


    Ransomware and the evolution of modern cyber threats


    Why “secure-by-design” is the foundation of cyber resilience


    The power of collaboration between government and private sectors


    Building a cybersecurity culture through awareness and innovation


    Insights into the mindset of a lifelong defender of the digital realm


    Timestamps / Chapters

    00:00 — The Original Spark: Passion for Problem-Solving

    01:01 — Welcome to The Defender’s Log

    01:17 — Meet Sami Khoury: Canada’s Cybersecurity Leader

    03:34 — The Journey from Engineer to Cyber Chief

    06:34 — A Day in the Life of a National Cyber Defender

    08:55 — Cyber Policy and the Power of Innovation

    12:19 — Inside the Cyber Center: Strategy and Collaboration

    28:50 — Ransomware: The Evolving Threat Landscape

    34:19 — Building a Culture of Cyber Resilience

    40:59 — Recognitions, Reflections, and Lessons Learned

    44:42 — A Call to Action: The Future of Cyber Defense

    Voir plus Voir moins
    49 min
  • An Educator's Guide to DNS Threats with Josh Kuo
    Oct 4 2025

    Is your company's most critical blind spot hiding in plain sight? While most security teams focus on firewalls and web traffic, attackers are increasingly using the internet's phonebook—the Domain Name System (DNS)—as a secret backdoor for malware delivery, data theft, and command and control.


    In this episode of The Defenders Log, host David Redekop sits down with cybersecurity educator Josh Kuo from Infoblox to uncover the shocking ways DNS is weaponized. Josh shares jaw-dropping stories from the field, explaining complex threats in a way that anyone can understand. Learn how a simple DNS query can be used to exfiltrate your most sensitive data and how Protective DNS is becoming an essential layer of defense for modern organizations.


    Whether you're a CISO, a network admin, or just passionate about security, this is a conversation you can't afford to miss.


    Learn More About Our Guest:

    Josh Kuo is a leading cybersecurity educator at Infoblox, specializing in DNS security and threat intelligence. Infoblox is a leader in managing and securing DNS, DHCP, and IP address management (DDI) for enterprise networks. Find out more at https://www.infoblox.com


    00:00 - Intro: The Secret Battles of Cybersecurity

    00:45 - Welcoming Josh Kuo, Educator at Infoblox

    01:40 - Josh's Origin Story: From Aspiring Dentist to Network Engineer

    05:15 - Who Owns DNS? The Ponytail Guy, the Windows Team, or the Network Team?

    07:30 - "If DNS Works, Everything Works": DNS as the Ultimate Network Health Check

    10:05 - From the Field to the Classroom: Why Josh Became an Educator

    12:45 - The First Jaw-Dropping Moment: Discovering Data Theft via DNS

    13:20 - How DNS Tunneling Works to Exfiltrate Data

    16:10 - Explained: DNS for Covert Command and Control (C2) Attacks

    18:00 - When Good Websites Go Bad: Domain Hijacking and Cache Poisoning

    20:15 - The Immense Challenge of Scaling DNS Security Monitoring

    21:10 - The Power of Protective DNS and Threat Intelligence Platforms

    22:00 - Final Thoughts & Outro

    Voir plus Voir moins
    57 min