The Defender's Log Podcast
By: David Redekop
Language: en-us
Categories: Technology, News
The Defender’s Log Podcast: Stories from the Cybersecurity FrontlinesThe Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world.From zero-trust frameworks to ransomware takedowns, from DNS hardening to incident response in regulated industries, this podcast pulls back the curtain on the strategies, frameworks, and mindsets powering modern cyber resilience. Whether you're a security leader, IT strategist, or tech-s...
Episodes
27 Years of Defending the Web: Inside Peter Lowe’s Blocklist
Jan 09, 2026Defending the Internet, One Domain at a Time
In this episode of The Defender’s Log, host David Redekop sits down with Peter Lowe, the creator and maintainer of one of the internet’s most widely used blocklists, a resource quietly protecting users for over 27 years.
What started as a personal effort to block intrusive ads has evolved into a critical layer of modern cybersecurity infrastructure. Peter shares the technical, ethical, and human realities of maintaining a blocklist at internet scale, from DNS-based blocking and privacy challenges to dealing with...
Duration: 00:55:16The Architect of the Internet on the Future of Trust | Dr. Paul Mockapetris | Inventor, DNS
Dec 26, 2025The internet is a collision of legacy protocols and modern asymmetric threats. In this episode of The Defenders Log, I sit down with the man who built the foundation: Dr. Paul Mockapetris, the inventor of the Domain Name System (DNS).
We don't just reminisce about the 1980s; we dissect how the Universal Threat Ecosystem (UTE) has weaponized the very decentralization that made the internet possible. The failure today does not come from gross negligence, but the imperfect application of the current stack. The odds remain badly stacked against the defender. While generic tools focus...
Duration: 00:59:27The Hidden Layer of Cybersecurity: Andreas Taudte on DNS & DDI Defense
Dec 12, 2025In this episode of The Defender’s Log, host David Redekop sits down with DNS and DDI expert Andreas Taudte, who brings more than 16 years of experience in network security, DNS architecture, and threat mitigation.
Together, they unpack the real challenges organizations face with DNS, from evasion techniques and tunneling threats to the growing complexity of legacy systems and hybrid networks. Andreas explains why DNS predictability is essential, how DDI (DNS, DHCP, IPAM) has evolved, and what enterprises must do to build resilient, zero-trust-aligned network foundations.
This conversation is pa... Duration: 00:57:45
The Dark Truth About Modern Cyber Threats | Joshua Domagalski, CISO, Astronomer
Nov 28, 2025In this powerful episode, host David Redekop sits down with Joshua Domagalski, Chief Information Security Officer and former offensive operator, to explore the real complexities of modern cyber defense.
Joshua opens up about his journey from the military to cybersecurity leadership, the shift from attacking systems to protecting them, and why defending is far more challenging than breaking in.
This conversation goes far beyond tools and tactics, it uncovers the human, strategic, and geopolitical layers that shape cybersecurity today.
You’ll learn about:
Wh... Duration: 00:41:09Inside DNS Threat Intelligence: Tim Adams on Privacy, Security & Innovation
Nov 14, 2025In this episode of The Defender’s Log, host David Redekop sits down with Tim Adams, DNS threat intelligence expert and founder of ScoutDNS, to uncover the evolving world of DNS security.
From his early days running a wireless network integrator to building a resilient DNS resolver service, Tim shares lessons in innovation, resilience, and the art of staying ahead of cyber threats.
They discuss everything from DNS over HTTPS (DOH) and threat intelligence to balancing privacy, compliance, and encryption in a rapidly changing digital landscape.
Defending the Digital Frontline: Ransomware, AI, and Real-World Lessons | Alexander Rau
Nov 01, 2025In this gripping episode of The Defender’s Log, host David Redekop sits down with Alexander Rau, Partner in Cybersecurity at KPMG, to explore the intense world of cyber incident response.
From ransomware attacks and business email compromises to AI-driven ransom negotiations, Alexander shares firsthand experiences from the cyber frontlines, revealing what really happens when organizations are under digital siege.
They discuss the psychological toll of defending under pressure, the ethical dilemmas in paying ransom, and why small and medium businesses remain top targets. Rau also explains how threat in...
Duration: 00:43:47Cyber Warriors & Digital Shadows: Insights from Canada's Cybersecurity Leader | Sami Khoury
Oct 16, 2025In this episode of The Defender’s Log, host David Redekop sits down with Sami Khoury, the Head of the Canadian Centre for Cyber Security, for an inside look at the battle to protect national infrastructure from unseen digital threats.
From his beginnings as a research engineer in 1992 to leading one of Canada’s most critical cybersecurity agencies, Sami shares lessons from three decades of defense — from combating ransomware to promoting “secure-by-design” innovation.
Discover how public-private collaboration, education, and technology are shaping the next frontier of digital security. Whether you’re a c...
Duration: 00:49:22An Educator's Guide to DNS Threats with Josh Kuo
Oct 04, 2025Is your company's most critical blind spot hiding in plain sight? While most security teams focus on firewalls and web traffic, attackers are increasingly using the internet's phonebook—the Domain Name System (DNS)—as a secret backdoor for malware delivery, data theft, and command and control.
In this episode of The Defenders Log, host David Redekop sits down with cybersecurity educator Josh Kuo from Infoblox to uncover the shocking ways DNS is weaponized. Josh shares jaw-dropping stories from the field, explaining complex threats in a way that anyone can understand. Learn how a simple DNS...
Duration: 00:57:12A Developer's Guide to Life: Passion, Legacy & The "Foggy Staircase" of a Tech Career | Will Earp
Sep 19, 2025"Am I going to spend my life trying to get the thing that I need, or am I going to spend my life
doing the thing that I want?"
In this deeply insightful episode of The Defender's Log, host David Redekop sits down with Will
Earp, a veteran developer whose career journey began with an Amiga 600 in 1998. They
explore the profound philosophy that has guided Will's path from a freelance web developer to a
lead engineer at a charity dedicated to online child safety.
<...
Duration: 00:42:55Understanding Microsoft Zero Trust DNS with Aditi Patange
Sep 05, 2025In this episode of the Defenders Log, we have Aditi Patange from Microsoft alongside our hosts, David Redekop and Francois from Adam Networks, for an in-depth discussion on Zero Trust DNS, a new enterprise security feature within Windows 11. Aditi shares her background in computer engineering and product management and how his work contributes to cybersecurity. The conversation delves into the origins and motivations behind Zero Trust DNS, its implementation challenges, and its impact on network security.
Aditi also emphasizes the importance of infrastructure in modern cybersecurity and the need for organizations to move towards encrypted DNS. The e...
Duration: 00:46:33Breaking Barriers: IPv6 Adoption and DNS Transformation with Tommy Jensen
Aug 22, 2025In today's episode of the Defender's Log, we welcome special guest Tommy Jensen, an internet technologist with expertise in IPv6, Zero Trust, and standards. The episode covers Jensen's career journey from an AppleCare contractor to a pivotal role in advancing internet technologies. The discussion delves into the importance and challenges of migrating to IPv6, and the need to overcome legacy systems in enterprise networks. Jensen shares insights into his focus on DNS and Zero Trust, stressing the balance between privacy and security.
The episode also explores the benefits of encrypted DNS, the drawbacks of TLS termination, and...
Duration: 00:47:48Defending the DNS: How Quad9 Protects the Internet | John Todd, CTO - Quad9
Aug 08, 2025In this episode of 'The Defender's Log,' host David engages in a comprehensive discussion with John Todd, an influential figure in the defense technology space and a key player at Quad9. The conversation covers John's career journey, starting from the early days of commercial internet services to his current role at Quad9.
They delve into the importance of DNS in cybersecurity, Quad9's unique approach to protecting users, and the challenges and strategies involved in maintaining a global DNS infrastructure. Key topics include the implementation of zero-trust DNS, the legal hurdles faced by...
Duration: 00:52:30Cybersecurity Explained: Privacy, Threats, and the Future | Chester Wisniewski
Jul 25, 2025In the inaugural episode of 'The Defender’s Log,' host David Redekop converses with cybersecurity veteran Chester Wisniewski to explore the dynamic field of cybersecurity. They discuss the differentiation between privacy and security, the evolution of hacking from the 1980s to the present, and pivotal moments that reshaped information security.
Chet shares anecdotes from his extensive career, offering a deep dive into the challenges and successes of defending against cyber threats. Listeners will learn about the importance of defense-in-depth, the impact of pivotal virus outbreaks, and the emergence of profitable cybercrime.
Chet also provides valu...
Duration: 00:36:11