The Defender's Log Podcast cover art

The Defender's Log Podcast

The Defender's Log Podcast

Written by: David Redekop
Listen for free

About this listen

The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines


The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world.


From zero-trust frameworks to ransomware takedowns, from DNS hardening to incident response in regulated industries, this podcast pulls back the curtain on the strategies, frameworks, and mindsets powering modern cyber resilience. Whether you're a security leader, IT strategist, or tech-savvy executive, you’ll walk away with the tools and stories that move the needle.


🔐 Why Listen to The Defender’s Log?

Cyber threats are evolving and so must our defenses. This isn’t theory. These are the actual voices of those defending systems under pressure, making real-time decisions that protect billions in data and infrastructure.


On The Defender’s Log, you’ll hear how seasoned professionals:

  • Implement Zero Trust and “Default Deny All” architectures in dynamic environments
  • Navigate ransomware threats and phishing prevention at scale
  • Align with NIST, CIS20, and DNS-first security frameworks
  • Transform IT operations into proactive defense engines
  • Build and lead resilient, high-performing security teams


Through personal journeys and practical deep-dives, guests share hard-won lessons, strategic pivots, and mindset shifts that can help you stay ahead of the next threat wave.


🔍 What to Expect From Each Episode

Every conversation uncovers the untold truths of digital defense, from the boardroom to the firewall:

  • Tactical Cybersecurity: Learn how today’s defenders are actively neutralizing threats and hardening networks.
  • Architecting Trust: Discover how Zero Trust and DNS-first strategies are being deployed at scale.
  • Incident Response, Redefined: Real-world war stories from ransomware mitigation to phishing campaigns gone viral.
  • Security Leadership: Gain insight into how CISOs and CIOs lead change while navigating compliance, culture, and crisis.
  • Mental Fitness in Security: Explore how top performers stay resilient, focused, and decisive under pressure.
  • Career Arcs & Comebacks: Hear personal journeys of rising through the ranks, surviving breaches, and building legacies.


Copyright 2025 | All Rights Reserved | David Redekop
Politics & Government
Episodes
  • The Defender’s Mindset: Why Proactive Security Beats Detection
    Jan 24 2026

    The odds remain badly stacked against the defender. As we hurtle toward a digital ecosystem populated by a trillion AI agents, the Universal Threat Ecosystem (UTE) is expanding at an asymmetric rate. The traditional security stack—obsessed with detection and response—is fundamentally broken because it requires a "Patient Zero." It waits for the compromise to occur before it rings the alarm.


    In this episode of The Defender’s Log, David Redekop sits down with Francois, CISO and partner at ADAMnetworks, to dismantle the "Whack-a-mole" approach to cybersecurity. From the high-stakes world of film production and technical diving to the front lines of cyber warfare, Francois shares how a life spent mitigating physical risk informed a "Default Deny-all" posture.


    The Asymmetric Challenge

    We are currently witnessing the rise of Generative Adversarial Networks (GANs) in the hands of the adversary. Initial Access Brokers (IAB) and Ransomware-as-a-Service (RaaS) operators are using the defender’s own AI tools to train malware to be invisible. If your strategy relies on identifying "known bad," you have already lost.


    Why "True Proactive" Defense is Mandatory:


    • Neutralize Egress: If the malware cannot "call home" to its Command & Control (C2), the ATTACK IS DISRUPTED.


    • Eliminate the Patient Zero Requirement: By moving the security boundary to the DNS layer with a Zero Trust Resolver, we stop connections to unknown and unverified entities.


    • Sovereign Capability: Reclaim control over your network’s connectivity. Stop letting the internet happen to you and start shaping it.



    Detection is a post-mortem. Prevention is sovereignty.


    Francois and David explore the human element of the "Sheepdog mentality" and why the next generation of Blue Teamers must move beyond the application layer (Layer 7) and harden the foundation of connectivity itself.


    Key Technical Concepts Discussed:


    • Zero Trust Connectivity (ZTC): Moving beyond identity to strict connection control.


    • OT & IoT Vulnerabilities: Why agentless protection is the only path forward for critical infrastructure.


    • Preemptive Defense: Cutting off the attacker's resources before the infrastructure is even fully deployed.



    In a world of a trillion AI agents, where the adversary uses your own defenses to train their attacks, can you afford to maintain a "Detect and Respond" posture? At what point does the convenience of an "open" network become an existential liability for your organization?



    Show More Show Less
    41 mins
  • 27 Years of Defending the Web: Inside Peter Lowe’s Blocklist
    Jan 9 2026

    Defending the Internet, One Domain at a Time


    In this episode of The Defender’s Log, host David Redekop sits down with Peter Lowe, the creator and maintainer of one of the internet’s most widely used blocklists, a resource quietly protecting users for over 27 years.


    What started as a personal effort to block intrusive ads has evolved into a critical layer of modern cybersecurity infrastructure. Peter shares the technical, ethical, and human realities of maintaining a blocklist at internet scale, from DNS-based blocking and privacy challenges to dealing with criticism, threats, and constant technological change.


    The conversation also explores unexpected territory: how language, culture, and communication shape security, why defaults in operating systems matter more than most users realize, and how Apple, Microsoft, and modern platforms influence privacy at scale.


    This episode isn’t just about blocking domains; it’s about trust, responsibility, and defending the open internet without owning it.

    Show More Show Less
    55 mins
  • The Architect of the Internet on the Future of Trust | Dr. Paul Mockapetris | Inventor, DNS
    Dec 26 2025

    The internet is a collision of legacy protocols and modern asymmetric threats. In this episode of The Defenders Log, I sit down with the man who built the foundation: Dr. Paul Mockapetris, the inventor of the Domain Name System (DNS).


    We don't just reminisce about the 1980s; we dissect how the Universal Threat Ecosystem (UTE) has weaponized the very decentralization that made the internet possible. The failure today does not come from gross negligence, but the imperfect application of the current stack. The odds remain badly stacked against the defender. While generic tools focus on detection, which is fundamentally too late, this conversation pivots toward Zero Trust Connectivity (ZTC).


    Strategic Deep Dive:


    • The "Whack-a-Mole" Reality: Why chasing RaaS and IABs through traditional feeds is a losing game.
    • Default Deny-All: Dr. Mockapetris explains his "day job"—making sure DNS doesn't work when you don't want it to.
    • The DoH/DoT Trap: How hyperscalers are centralizing authority and eroding Sovereign Capabilities.
    • Agentic AI: Preparing for a world with trillions of automated agents jabbering across your infrastructure.


    If you want to survive the next evolution of cyber warfare, you must shut down egress to the attacker. It is time to move beyond simple resolution and toward a hardened state of prevention.


    #CyberSecurity #ZeroTrust #DNS #ZTC #ThreatIntelligence #ADAMnetworks #InfoSec #CyberWarfare #PaulMockapetris #SovereignCapability #DefaultDeny


    Show More Show Less
    59 mins
No reviews yet