1. EachPod
EachPod
The Defender's Log Podcast - Podcast

The Defender's Log Podcast

The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines


The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world.


From zero-trust frameworks to ransomware takedowns, from DNS hardening to incident response in regulated industries, this podcast pulls back the curtain on the strategies, frameworks, and mindsets powering modern cyber resilience. Whether you're a security leader, IT strategist, or tech-savvy executive, you’ll walk away with the tools and stories that move the needle.


🔐 Why Listen to The Defender’s Log?

Cyber threats are evolving and so must our defenses. This isn’t theory. These are the actual voices of those defending systems under pressure, making real-time decisions that protect billions in data and infrastructure.


On The Defender’s Log, you’ll hear how seasoned professionals:

  • Implement Zero Trust and “Default Deny All” architectures in dynamic environments
  • Navigate ransomware threats and phishing prevention at scale
  • Align with NIST, CIS20, and DNS-first security frameworks
  • Transform IT operations into proactive defense engines
  • Build and lead resilient, high-performing security teams


Through personal journeys and practical deep-dives, guests share hard-won lessons, strategic pivots, and mindset shifts that can help you stay ahead of the next threat wave.


🔍 What to Expect From Each Episode

Every conversation uncovers the untold truths of digital defense, from the boardroom to the firewall:

  • Tactical Cybersecurity: Learn how today’s defenders are actively neutralizing threats and hardening networks.
  • Architecting Trust: Discover how Zero Trust and DNS-first strategies are being deployed at scale.
  • Incident Response, Redefined: Real-world war stories from ransomware mitigation to phishing campaigns gone viral.
  • Security Leadership: Gain insight into how CISOs and CIOs lead change while navigating compliance, culture, and crisis.
  • Mental Fitness in Security: Explore how top performers stay resilient, focused, and decisive under pressure.
  • Career Arcs & Comebacks: Hear personal journeys of rising through the ranks, surviving breaches, and building legacies.


Technology Tech News News
Update frequency
every 13 days
Average duration
45 minutes
Episodes
4
Years Active
2025
Share to:
Understanding Microsoft Zero Trust DNS with Aditi Patange

Understanding Microsoft Zero Trust DNS with Aditi Patange

In this episode of the Defenders Log, we have Aditi Patange from Microsoft alongside our hosts, David Redekop and Francois from Adam Networks, for an in-depth discussion on Zero Trust DNS, a new ente…

00:46:33  |   Fri 05 Sep 2025
Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen

Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen

In today's episode of the Defender's Log, we welcome special guest Tommy Jensen, an internet technologist with expertise in IPv6, Zero Trust, and standards. The episode covers Jensen's career journey…

00:47:48  |   Fri 22 Aug 2025
Defending the DNS: How Quad9 Protects the Internet | John Todd, CTO - Quad9

Defending the DNS: How Quad9 Protects the Internet | John Todd, CTO - Quad9

In this episode of 'The Defender's Log,' host David engages in a comprehensive discussion with John Todd, an influential figure in the defense technology space and a key player at Quad9. The conversa…

00:52:30  |   Fri 08 Aug 2025
Cybersecurity Explained: Privacy, Threats, and the Future | Chester Wisniewski

Cybersecurity Explained: Privacy, Threats, and the Future | Chester Wisniewski

In the inaugural episode of 'The Defender’s Log,' host David Redekop converses with cybersecurity veteran Chester Wisniewski to explore the dynamic field of cybersecurity. They discuss the differenti…

00:36:11  |   Fri 25 Jul 2025
Disclaimer: The podcast and artwork embedded on this page are the property of David Redekop. This content is not affiliated with or endorsed by eachpod.com.