<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 10 May 2026 17:01:45 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Tech Transforms - Episodes Tagged with “Zerotrust”</title>
    <link>https://techtransforms.fireside.fm/tags/zerotrust</link>
    <pubDate>Thu, 07 May 2026 10:00:00 -0400</pubDate>
    <description>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Tech Transforms, brought to you by Owl Cyber Defense, talks to some of the most prominent influencers shaping government technology.</itunes:subtitle>
    <itunes:author>Carolyn Ford</itunes:author>
    <itunes:summary>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/cover.jpg?v=3"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Carolyn Ford</itunes:name>
      <itunes:email>Galadrielford@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="Government"/>
<item>
  <title>Episode 123: Breaking the 18-Month Barrier: How StormBreaker is Trading Red Tape for Rapid Delivery</title>
  <link>https://techtransforms.fireside.fm/123</link>
  <guid isPermaLink="false">fbac3197-157c-4228-94d4-eefbc03d7d9c</guid>
  <pubDate>Thu, 07 May 2026 10:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/fbac3197-157c-4228-94d4-eefbc03d7d9c.mp3" length="58659803" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle> Dave Raley is transforming federal IT through Operation Stormbreaker, a platform that reduces deployment timelines from months to minutes. By shifting to shared infrastructure, continuous authorization, and containerized development, the Marine Corps is breaking free from the legacy “maintenance trap.” The result is faster, more secure innovation that brings real capability into production—when it actually matters.</itunes:subtitle>
  <itunes:duration>48:50</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/f/fbac3197-157c-4228-94d4-eefbc03d7d9c/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode of Tech Transforms, Carolyn Ford sits down with Dave Raley, Chief Digital Business Officer at Marine Corps Community Services, to unpack one of the most persistent challenges in federal IT: why innovation moves so slowly and how that can change.&lt;/p&gt;

&lt;p&gt;At the center of the conversation is Operation Stormbreaker, the Marine Corps’ only RAISE-certified software factory, designed to eliminate the inefficiencies that plague government technology deployment. Dave explains how agencies fall into a “maintenance trap,” where nearly 80% of IT budgets are consumed by legacy systems, leaving little room for modernization. The root issue, he argues, isn’t just technology, it’s architecture. By shifting from rebuilding infrastructure for every application to a shared platform-as-a-service model, Stormbreaker allows mission owners to inherit infrastructure, security, and authorization dramatically reducing both cost and complexity. &lt;/p&gt;

&lt;p&gt;The impact is significant. What once took 12–18 months to deploy can now be achieved in minutes through automated pipelines, containerized workloads, and continuous authorization. Rey breaks down how this model transforms the notoriously slow Authority to Operate (ATO) process, enabling faster innovation without sacrificing security. The discussion also highlights how this approach lowers barriers for vendors, accelerates adoption of emerging technologies like AI, and creates a more agile, production-focused culture within government.&lt;/p&gt;

&lt;p&gt;Beyond the technical architecture, the episode explores the cultural resistance to change across federal systems and the need to simplify complex cybersecurity processes for mission owners. Rey emphasizes that true modernization isn’t about new tools, it’s about rethinking how systems are built, secured, and delivered at scale.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Dave Raley LinkedIn:  &lt;a href="https://www.linkedin.com/in/daveraley/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/daveraley/&lt;/a&gt;&lt;br&gt;
Marine Corps Community Service:  &lt;a href="https://www.usmc-mccs.org/" target="_blank" rel="nofollow noopener"&gt;https://www.usmc-mccs.org/&lt;/a&gt;&lt;br&gt;
White Paper: Clarifying Cloud Foundations: Understanding PaaS vs. IaaS &lt;br&gt;
Operation StormBreaker: &lt;a href="https://operationstormbreaker.usmc-mccs.org/" target="_blank" rel="nofollow noopener"&gt;https://operationstormbreaker.usmc-mccs.org/&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>Federal IT modernization, Continuous Authorization, Zero Trust architecture</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Dave Raley, Chief Digital Business Officer at Marine Corps Community Services, to unpack one of the most persistent challenges in federal IT: why innovation moves so slowly and how that can change.</p>

<p>At the center of the conversation is Operation Stormbreaker, the Marine Corps’ only RAISE-certified software factory, designed to eliminate the inefficiencies that plague government technology deployment. Dave explains how agencies fall into a “maintenance trap,” where nearly 80% of IT budgets are consumed by legacy systems, leaving little room for modernization. The root issue, he argues, isn’t just technology, it’s architecture. By shifting from rebuilding infrastructure for every application to a shared platform-as-a-service model, Stormbreaker allows mission owners to inherit infrastructure, security, and authorization dramatically reducing both cost and complexity. </p>

<p>The impact is significant. What once took 12–18 months to deploy can now be achieved in minutes through automated pipelines, containerized workloads, and continuous authorization. Rey breaks down how this model transforms the notoriously slow Authority to Operate (ATO) process, enabling faster innovation without sacrificing security. The discussion also highlights how this approach lowers barriers for vendors, accelerates adoption of emerging technologies like AI, and creates a more agile, production-focused culture within government.</p>

<p>Beyond the technical architecture, the episode explores the cultural resistance to change across federal systems and the need to simplify complex cybersecurity processes for mission owners. Rey emphasizes that true modernization isn’t about new tools, it’s about rethinking how systems are built, secured, and delivered at scale.</p>

<p>Show Notes:<br>
Dave Raley LinkedIn:  <a href="https://www.linkedin.com/in/daveraley/" rel="nofollow">https://www.linkedin.com/in/daveraley/</a><br>
Marine Corps Community Service:  <a href="https://www.usmc-mccs.org/" rel="nofollow">https://www.usmc-mccs.org/</a><br>
White Paper: Clarifying Cloud Foundations: Understanding PaaS vs. IaaS <br>
Operation StormBreaker: <a href="https://operationstormbreaker.usmc-mccs.org/" rel="nofollow">https://operationstormbreaker.usmc-mccs.org/</a> </p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Dave Raley, Chief Digital Business Officer at Marine Corps Community Services, to unpack one of the most persistent challenges in federal IT: why innovation moves so slowly and how that can change.</p>

<p>At the center of the conversation is Operation Stormbreaker, the Marine Corps’ only RAISE-certified software factory, designed to eliminate the inefficiencies that plague government technology deployment. Dave explains how agencies fall into a “maintenance trap,” where nearly 80% of IT budgets are consumed by legacy systems, leaving little room for modernization. The root issue, he argues, isn’t just technology, it’s architecture. By shifting from rebuilding infrastructure for every application to a shared platform-as-a-service model, Stormbreaker allows mission owners to inherit infrastructure, security, and authorization dramatically reducing both cost and complexity. </p>

<p>The impact is significant. What once took 12–18 months to deploy can now be achieved in minutes through automated pipelines, containerized workloads, and continuous authorization. Rey breaks down how this model transforms the notoriously slow Authority to Operate (ATO) process, enabling faster innovation without sacrificing security. The discussion also highlights how this approach lowers barriers for vendors, accelerates adoption of emerging technologies like AI, and creates a more agile, production-focused culture within government.</p>

<p>Beyond the technical architecture, the episode explores the cultural resistance to change across federal systems and the need to simplify complex cybersecurity processes for mission owners. Rey emphasizes that true modernization isn’t about new tools, it’s about rethinking how systems are built, secured, and delivered at scale.</p>

<p>Show Notes:<br>
Dave Raley LinkedIn:  <a href="https://www.linkedin.com/in/daveraley/" rel="nofollow">https://www.linkedin.com/in/daveraley/</a><br>
Marine Corps Community Service:  <a href="https://www.usmc-mccs.org/" rel="nofollow">https://www.usmc-mccs.org/</a><br>
White Paper: Clarifying Cloud Foundations: Understanding PaaS vs. IaaS <br>
Operation StormBreaker: <a href="https://operationstormbreaker.usmc-mccs.org/" rel="nofollow">https://operationstormbreaker.usmc-mccs.org/</a> </p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 118: Zero Trust ≠ Zero Risk: Debunking the Myths and Building Real Resilience</title>
  <link>https://techtransforms.fireside.fm/118</link>
  <guid isPermaLink="false">0b52b82b-c214-4dea-947c-4220662984b7</guid>
  <pubDate>Tue, 10 Mar 2026 10:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/0b52b82b-c214-4dea-947c-4220662984b7.mp3" length="70436703" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Unpacking the realities—and myths—of Zero Trust.exploring why Zero Trust is not a product but a strategy for containing breaches, managing legacy systems, and securing increasingly complex networks. The conversation also examines micro segmentation, cross-domain inspection, and how emerging technologies like AI are reshaping the way organizations must think about trust and security.</itunes:subtitle>
  <itunes:duration>58:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/0/0b52b82b-c214-4dea-947c-4220662984b7/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode of Tech Transforms, Carolyn Ford sits down with Michael Blake of Owl Cyber Defense and Chris Rule of GME to unpack one of cybersecurity’s most misunderstood concepts: Zero Trust. What begins as a discussion of architecture quickly evolves into something broader, an exploration of mindset, modernization, and the reality that today’s networks must operate under the assumption that a breach has already occurred. &lt;/p&gt;

&lt;p&gt;The conversation breaks down the core principle behind Zero Trust: minimizing the “blast radius” of a breach. Instead of assuming everything inside a network is safe, Zero Trust requires constant authentication, strict access controls, and segmentation so that even if an attacker gains entry, they cannot move freely across systems. &lt;/p&gt;

&lt;p&gt;We explore common misconceptions, especially the idea that Zero Trust is a product that can simply be purchased and installed. In reality, it’s a whole-of-organization approach involving people, processes, infrastructure modernization, and ongoing monitoring. Legacy systems, skill shortages, and the sheer complexity of modern networks make implementation a long-term journey rather than a quick fix. &lt;/p&gt;

&lt;p&gt;The discussion highlights why segmentation, boundary management, and cross-domain inspection remain critical even in a Zero Trust architecture—particularly in environments with legacy infrastructure, international partnerships, and tactical edge deployments. As AI systems and autonomous technologies increasingly interact with sensitive networks, the need to treat AI as another “actor” with controlled privileges becomes essential. &lt;/p&gt;

&lt;p&gt;The episode concludes with practical guidance for leaders beginning their Zero Trust journey—from inventorying everything on their network and planning segmentation, to implementing role-based access controls, budgeting for modernization, and ensuring organizations have the skilled personnel required to sustain the architecture. &lt;br&gt;
Ultimately, the takeaway is clear: Zero Trust isn’t a tool—it’s a strategy for operating in a world where persistent threats are the norm.&lt;/p&gt;

&lt;p&gt;Show notes:&lt;br&gt;
GME - &lt;a href="http://www.gme.net.au" target="_blank" rel="nofollow noopener"&gt;www.gme.net.au&lt;/a&gt;&lt;br&gt;
Owl Cyber Defense - &lt;a href="http://www.owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;www.owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Modern Defense Architecture (Australia) - &lt;a href="https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture" target="_blank" rel="nofollow noopener"&gt;https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture&lt;/a&gt;&lt;br&gt;
Chris Rule - &lt;a href="https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/&lt;/a&gt;&lt;br&gt;
Michael Blake - &lt;a href="https://www.linkedin.com/in/michael-blake-734b0a21/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/michael-blake-734b0a21/&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>zero trust, micro segmentation, Legacy systems, partnerships</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Michael Blake of Owl Cyber Defense and Chris Rule of GME to unpack one of cybersecurity’s most misunderstood concepts: Zero Trust. What begins as a discussion of architecture quickly evolves into something broader, an exploration of mindset, modernization, and the reality that today’s networks must operate under the assumption that a breach has already occurred. </p>

<p>The conversation breaks down the core principle behind Zero Trust: minimizing the “blast radius” of a breach. Instead of assuming everything inside a network is safe, Zero Trust requires constant authentication, strict access controls, and segmentation so that even if an attacker gains entry, they cannot move freely across systems. </p>

<p>We explore common misconceptions, especially the idea that Zero Trust is a product that can simply be purchased and installed. In reality, it’s a whole-of-organization approach involving people, processes, infrastructure modernization, and ongoing monitoring. Legacy systems, skill shortages, and the sheer complexity of modern networks make implementation a long-term journey rather than a quick fix. </p>

<p>The discussion highlights why segmentation, boundary management, and cross-domain inspection remain critical even in a Zero Trust architecture—particularly in environments with legacy infrastructure, international partnerships, and tactical edge deployments. As AI systems and autonomous technologies increasingly interact with sensitive networks, the need to treat AI as another “actor” with controlled privileges becomes essential. </p>

<p>The episode concludes with practical guidance for leaders beginning their Zero Trust journey—from inventorying everything on their network and planning segmentation, to implementing role-based access controls, budgeting for modernization, and ensuring organizations have the skilled personnel required to sustain the architecture. <br>
Ultimately, the takeaway is clear: Zero Trust isn’t a tool—it’s a strategy for operating in a world where persistent threats are the norm.</p>

<p>Show notes:<br>
GME - <a href="http://www.gme.net.au" rel="nofollow">www.gme.net.au</a><br>
Owl Cyber Defense - <a href="http://www.owlcyberdefense.com" rel="nofollow">www.owlcyberdefense.com</a><br>
Modern Defense Architecture (Australia) - <a href="https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture" rel="nofollow">https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture</a><br>
Chris Rule - <a href="https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/" rel="nofollow">https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/</a><br>
Michael Blake - <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Michael Blake of Owl Cyber Defense and Chris Rule of GME to unpack one of cybersecurity’s most misunderstood concepts: Zero Trust. What begins as a discussion of architecture quickly evolves into something broader, an exploration of mindset, modernization, and the reality that today’s networks must operate under the assumption that a breach has already occurred. </p>

<p>The conversation breaks down the core principle behind Zero Trust: minimizing the “blast radius” of a breach. Instead of assuming everything inside a network is safe, Zero Trust requires constant authentication, strict access controls, and segmentation so that even if an attacker gains entry, they cannot move freely across systems. </p>

<p>We explore common misconceptions, especially the idea that Zero Trust is a product that can simply be purchased and installed. In reality, it’s a whole-of-organization approach involving people, processes, infrastructure modernization, and ongoing monitoring. Legacy systems, skill shortages, and the sheer complexity of modern networks make implementation a long-term journey rather than a quick fix. </p>

<p>The discussion highlights why segmentation, boundary management, and cross-domain inspection remain critical even in a Zero Trust architecture—particularly in environments with legacy infrastructure, international partnerships, and tactical edge deployments. As AI systems and autonomous technologies increasingly interact with sensitive networks, the need to treat AI as another “actor” with controlled privileges becomes essential. </p>

<p>The episode concludes with practical guidance for leaders beginning their Zero Trust journey—from inventorying everything on their network and planning segmentation, to implementing role-based access controls, budgeting for modernization, and ensuring organizations have the skilled personnel required to sustain the architecture. <br>
Ultimately, the takeaway is clear: Zero Trust isn’t a tool—it’s a strategy for operating in a world where persistent threats are the norm.</p>

<p>Show notes:<br>
GME - <a href="http://www.gme.net.au" rel="nofollow">www.gme.net.au</a><br>
Owl Cyber Defense - <a href="http://www.owlcyberdefense.com" rel="nofollow">www.owlcyberdefense.com</a><br>
Modern Defense Architecture (Australia) - <a href="https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture" rel="nofollow">https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture</a><br>
Chris Rule - <a href="https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/" rel="nofollow">https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/</a><br>
Michael Blake - <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 110: Stealth Mode: Unmasking Cyber Threats Hiding in Plain Sight</title>
  <link>https://techtransforms.fireside.fm/110</link>
  <guid isPermaLink="false">cb21ed1a-1e9f-4ae6-9f2d-9e4760757aeb</guid>
  <pubDate>Wed, 12 Nov 2025 09:30:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/cb21ed1a-1e9f-4ae6-9f2d-9e4760757aeb.mp3" length="68683663" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Ever wonder what’s hiding inside your “safe” files? On Tech Transforms, Carolyn Ford and Glasswall’s Connor Morley unpack steganography, polyglot files, QR code traps &amp; how Zero Trust file filtering/CDR shuts it all down.</itunes:subtitle>
  <itunes:duration>57:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/c/cb21ed1a-1e9f-4ae6-9f2d-9e4760757aeb/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode of Tech Transforms, host Carolyn Ford welcomes Connor Morley, Head of Security Research at Glasswall, for a deep dive into the spy-thriller world of modern file security. From malware hidden in images and PDFs to “polyglot” files that can appear as multiple formats at once, Morley exposes how attackers are redefining what a “safe file” really means.&lt;/p&gt;

&lt;p&gt;They explore how artificial intelligence is supercharging phishing and social-engineering campaigns, making malicious messages nearly indistinguishable from legitimate ones. Morley explains the evolution of steganography—the art of concealing code inside digital images and why emerging threats like QR-code hijacking (“quishing”) have become one of the easiest ways to breach both corporate and personal devices.&lt;/p&gt;

&lt;p&gt;But this isn’t a doom-and-gloom story. Morley shows how zero-trust file filtering and Content Disarm &amp;amp; Reconstruction (CDR) can neutralize hidden payloads without disrupting everyday workflows. He also reveals how these proactive defenses reduce “SOC noise,” giving security teams back valuable focus time and keeping threats from ever reaching end users.&lt;/p&gt;

&lt;p&gt;From AI-powered deception to invisible payloads hidden in plain sight, this conversation uncovers the unseen layer of cyber defense and reminds leaders that innovation, not fear, is the best shield against tomorrow’s threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Show Notes:&lt;/strong&gt;&lt;br&gt;
• Whitepapers: &lt;br&gt;
&lt;a href="https://www.glasswall.com/blog/unmasking-polyglot-files-how-glasswalls-cdr-technology-tackles-this-stealthy-threat" target="_blank" rel="nofollow noopener"&gt;Polyglot Files: Unmasking Images &amp;amp; PDFs&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.glasswall.com/blog/innovative-steganography-mitigation-research-safeguarding-against-covert-data-concealment" target="_blank" rel="nofollow noopener"&gt;Steganography: Smudging the Invisible Ink&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.glasswall.com/blog/beyond-the-scan-why-government-agencies-and-enterprises-must-tackle-qr-code-security-now" target="_blank" rel="nofollow noopener"&gt;QR Codes: Neutralizing Threats with CDR&lt;/a&gt;&lt;br&gt;
• Webinar: &lt;a href="https://www.youtube.com/watch?v=FCBYEDCXpXk" target="_blank" rel="nofollow noopener"&gt;File Analysis &amp;amp; CDR: Forging A Formidable Defense&lt;/a&gt;&lt;br&gt;
• Website: &lt;a href="https://www.glasswall.com/" target="_blank" rel="nofollow noopener"&gt;https://www.glasswall.com/&lt;/a&gt;&lt;br&gt;
• Connor Morley - &lt;a href="https://www.linkedin.com/in/connormorley/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/connormorley/&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>CDR, QR codes, Polyglot, zero trust, TechTransforms</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, host Carolyn Ford welcomes Connor Morley, Head of Security Research at Glasswall, for a deep dive into the spy-thriller world of modern file security. From malware hidden in images and PDFs to “polyglot” files that can appear as multiple formats at once, Morley exposes how attackers are redefining what a “safe file” really means.</p>

<p>They explore how artificial intelligence is supercharging phishing and social-engineering campaigns, making malicious messages nearly indistinguishable from legitimate ones. Morley explains the evolution of steganography—the art of concealing code inside digital images and why emerging threats like QR-code hijacking (“quishing”) have become one of the easiest ways to breach both corporate and personal devices.</p>

<p>But this isn’t a doom-and-gloom story. Morley shows how zero-trust file filtering and Content Disarm &amp; Reconstruction (CDR) can neutralize hidden payloads without disrupting everyday workflows. He also reveals how these proactive defenses reduce “SOC noise,” giving security teams back valuable focus time and keeping threats from ever reaching end users.</p>

<p>From AI-powered deception to invisible payloads hidden in plain sight, this conversation uncovers the unseen layer of cyber defense and reminds leaders that innovation, not fear, is the best shield against tomorrow’s threats.</p>

<p><strong>Show Notes:</strong><br>
• Whitepapers: <br>
<a href="https://www.glasswall.com/blog/unmasking-polyglot-files-how-glasswalls-cdr-technology-tackles-this-stealthy-threat" rel="nofollow">Polyglot Files: Unmasking Images &amp; PDFs</a><br>
<a href="https://www.glasswall.com/blog/innovative-steganography-mitigation-research-safeguarding-against-covert-data-concealment" rel="nofollow">Steganography: Smudging the Invisible Ink</a><br>
<a href="https://www.glasswall.com/blog/beyond-the-scan-why-government-agencies-and-enterprises-must-tackle-qr-code-security-now" rel="nofollow">QR Codes: Neutralizing Threats with CDR</a><br>
• Webinar: <a href="https://www.youtube.com/watch?v=FCBYEDCXpXk" rel="nofollow">File Analysis &amp; CDR: Forging A Formidable Defense</a><br>
• Website: <a href="https://www.glasswall.com/" rel="nofollow">https://www.glasswall.com/</a><br>
• Connor Morley - <a href="https://www.linkedin.com/in/connormorley/" rel="nofollow">https://www.linkedin.com/in/connormorley/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, host Carolyn Ford welcomes Connor Morley, Head of Security Research at Glasswall, for a deep dive into the spy-thriller world of modern file security. From malware hidden in images and PDFs to “polyglot” files that can appear as multiple formats at once, Morley exposes how attackers are redefining what a “safe file” really means.</p>

<p>They explore how artificial intelligence is supercharging phishing and social-engineering campaigns, making malicious messages nearly indistinguishable from legitimate ones. Morley explains the evolution of steganography—the art of concealing code inside digital images and why emerging threats like QR-code hijacking (“quishing”) have become one of the easiest ways to breach both corporate and personal devices.</p>

<p>But this isn’t a doom-and-gloom story. Morley shows how zero-trust file filtering and Content Disarm &amp; Reconstruction (CDR) can neutralize hidden payloads without disrupting everyday workflows. He also reveals how these proactive defenses reduce “SOC noise,” giving security teams back valuable focus time and keeping threats from ever reaching end users.</p>

<p>From AI-powered deception to invisible payloads hidden in plain sight, this conversation uncovers the unseen layer of cyber defense and reminds leaders that innovation, not fear, is the best shield against tomorrow’s threats.</p>

<p><strong>Show Notes:</strong><br>
• Whitepapers: <br>
<a href="https://www.glasswall.com/blog/unmasking-polyglot-files-how-glasswalls-cdr-technology-tackles-this-stealthy-threat" rel="nofollow">Polyglot Files: Unmasking Images &amp; PDFs</a><br>
<a href="https://www.glasswall.com/blog/innovative-steganography-mitigation-research-safeguarding-against-covert-data-concealment" rel="nofollow">Steganography: Smudging the Invisible Ink</a><br>
<a href="https://www.glasswall.com/blog/beyond-the-scan-why-government-agencies-and-enterprises-must-tackle-qr-code-security-now" rel="nofollow">QR Codes: Neutralizing Threats with CDR</a><br>
• Webinar: <a href="https://www.youtube.com/watch?v=FCBYEDCXpXk" rel="nofollow">File Analysis &amp; CDR: Forging A Formidable Defense</a><br>
• Website: <a href="https://www.glasswall.com/" rel="nofollow">https://www.glasswall.com/</a><br>
• Connor Morley - <a href="https://www.linkedin.com/in/connormorley/" rel="nofollow">https://www.linkedin.com/in/connormorley/</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 105: From Compliance to Capability: Securing the Federal Software Supply Chain in the Age of AI</title>
  <link>https://techtransforms.fireside.fm/105</link>
  <guid isPermaLink="false">b78757c1-8167-4e0d-8921-afe3fa00ca3b</guid>
  <pubDate>Tue, 09 Sep 2025 10:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/b78757c1-8167-4e0d-8921-afe3fa00ca3b.mp3" length="49888610" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity.</itunes:subtitle>
  <itunes:duration>40:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/b/b78757c1-8167-4e0d-8921-afe3fa00ca3b/cover.jpg?v=1"/>
  <description>&lt;p&gt;On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity: securing the software supply chain. With more than 25 years of experience at Oracle, Google, and now Sonatype, Antoine shares why software supply chain risks from SolarWinds to Log4j have pushed SBOMs (Software Bills of Materials) and continuous monitoring into the spotlight.&lt;/p&gt;

&lt;p&gt;Together, they break down what SBOMs are (think nutrition labels for software), how mandates like Executive Order 14028 and frameworks like NIST’s Secure Software Development Framework (SSDF) and DoD’s SWFT are changing the compliance landscape, and why automation is essential to get from static ATOs to continuous authorization.&lt;/p&gt;

&lt;p&gt;Antoine also explains how Sonatype uses AI and software composition analysis tools to close critical gaps in open source and AI-heavy environments, helping agencies shift left, reduce vulnerabilities, and accelerate secure delivery of mission-critical systems. Along the way, the conversation covers everything from JFK delays caused by vulnerabilities, to the risks of “ludicrous speed” AI adoption, to the surprising history of Project Pigeon in WWII.&lt;/p&gt;

&lt;p&gt;For federal leaders ready to take action, Antoine offers one concrete step: start with a single mission-critical application, mandate an SBOM, and see what hidden risks you uncover.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Connect with Antoine  &lt;a href="https://www.linkedin.com/in/antoine-harden-mba-035a441/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/antoine-harden-mba-035a441/&lt;/a&gt; &lt;br&gt;
&lt;a href="https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity" target="_blank" rel="nofollow noopener"&gt;Executive Order 14028&lt;/a&gt;&lt;a href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-218.pdf" target="_blank" rel="nofollow noopener"&gt;NIST Secure Software Development Framework (SSDF)&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.cisa.gov/zero-trust-maturity-model" target="_blank" rel="nofollow noopener"&gt;CISA Zero Trust Maturity Model&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.defense.gov/News/Releases/Release/Article/4174350/software-fast-track-initiative/" target="_blank" rel="nofollow noopener"&gt;DoD’s SWFT (Software Fast Track Initiative) &lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.sonatype.com/resources?_gl=1*1jtfn7r*_up*MQ..*_ga*Mzc1ODU4NTM3LjE3NTYzMTc3NTc.*_ga_3W70E95Z6Q*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_2TMM6KZPXQ*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_08HT33J01V*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw" target="_blank" rel="nofollow noopener"&gt;Sonatype Resource Center&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>SBOM, Software Supply Chain, Compliance, AI</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity: securing the software supply chain. With more than 25 years of experience at Oracle, Google, and now Sonatype, Antoine shares why software supply chain risks from SolarWinds to Log4j have pushed SBOMs (Software Bills of Materials) and continuous monitoring into the spotlight.</p>

<p>Together, they break down what SBOMs are (think nutrition labels for software), how mandates like Executive Order 14028 and frameworks like NIST’s Secure Software Development Framework (SSDF) and DoD’s SWFT are changing the compliance landscape, and why automation is essential to get from static ATOs to continuous authorization.</p>

<p>Antoine also explains how Sonatype uses AI and software composition analysis tools to close critical gaps in open source and AI-heavy environments, helping agencies shift left, reduce vulnerabilities, and accelerate secure delivery of mission-critical systems. Along the way, the conversation covers everything from JFK delays caused by vulnerabilities, to the risks of “ludicrous speed” AI adoption, to the surprising history of Project Pigeon in WWII.</p>

<p>For federal leaders ready to take action, Antoine offers one concrete step: start with a single mission-critical application, mandate an SBOM, and see what hidden risks you uncover.</p>

<p>Show Notes:<br>
Connect with Antoine  <a href="https://www.linkedin.com/in/antoine-harden-mba-035a441/" rel="nofollow">https://www.linkedin.com/in/antoine-harden-mba-035a441/</a> <br>
<a href="https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity" rel="nofollow">Executive Order 14028</a><a href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-218.pdf" rel="nofollow">NIST Secure Software Development Framework (SSDF)</a><br>
<a href="https://www.cisa.gov/zero-trust-maturity-model" rel="nofollow">CISA Zero Trust Maturity Model</a><br>
<a href="https://www.defense.gov/News/Releases/Release/Article/4174350/software-fast-track-initiative/" rel="nofollow">DoD’s SWFT (Software Fast Track Initiative) </a><br>
<a href="https://www.sonatype.com/resources?_gl=1*1jtfn7r*_up*MQ..*_ga*Mzc1ODU4NTM3LjE3NTYzMTc3NTc.*_ga_3W70E95Z6Q*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_2TMM6KZPXQ*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_08HT33J01V*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw" rel="nofollow">Sonatype Resource Center</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity: securing the software supply chain. With more than 25 years of experience at Oracle, Google, and now Sonatype, Antoine shares why software supply chain risks from SolarWinds to Log4j have pushed SBOMs (Software Bills of Materials) and continuous monitoring into the spotlight.</p>

<p>Together, they break down what SBOMs are (think nutrition labels for software), how mandates like Executive Order 14028 and frameworks like NIST’s Secure Software Development Framework (SSDF) and DoD’s SWFT are changing the compliance landscape, and why automation is essential to get from static ATOs to continuous authorization.</p>

<p>Antoine also explains how Sonatype uses AI and software composition analysis tools to close critical gaps in open source and AI-heavy environments, helping agencies shift left, reduce vulnerabilities, and accelerate secure delivery of mission-critical systems. Along the way, the conversation covers everything from JFK delays caused by vulnerabilities, to the risks of “ludicrous speed” AI adoption, to the surprising history of Project Pigeon in WWII.</p>

<p>For federal leaders ready to take action, Antoine offers one concrete step: start with a single mission-critical application, mandate an SBOM, and see what hidden risks you uncover.</p>

<p>Show Notes:<br>
Connect with Antoine  <a href="https://www.linkedin.com/in/antoine-harden-mba-035a441/" rel="nofollow">https://www.linkedin.com/in/antoine-harden-mba-035a441/</a> <br>
<a href="https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity" rel="nofollow">Executive Order 14028</a><a href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-218.pdf" rel="nofollow">NIST Secure Software Development Framework (SSDF)</a><br>
<a href="https://www.cisa.gov/zero-trust-maturity-model" rel="nofollow">CISA Zero Trust Maturity Model</a><br>
<a href="https://www.defense.gov/News/Releases/Release/Article/4174350/software-fast-track-initiative/" rel="nofollow">DoD’s SWFT (Software Fast Track Initiative) </a><br>
<a href="https://www.sonatype.com/resources?_gl=1*1jtfn7r*_up*MQ..*_ga*Mzc1ODU4NTM3LjE3NTYzMTc3NTc.*_ga_3W70E95Z6Q*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_2TMM6KZPXQ*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_08HT33J01V*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw" rel="nofollow">Sonatype Resource Center</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 98: SCRM: Securing the Federal Technology Supply Chain</title>
  <link>https://techtransforms.fireside.fm/98</link>
  <guid isPermaLink="false">816bd0eb-6750-4019-8470-1231c5a716f4</guid>
  <pubDate>Wed, 04 Jun 2025 09:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/816bd0eb-6750-4019-8470-1231c5a716f4.mp3" length="43860046" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Supply Chain Risk Management isn’t just a cybersecurity issue—it’s a leadership imperative. In this episode, Timothy Amerson, CEO of CASMO Consulting and Army veteran, breaks down how agencies can build real resilience in a world of insider threats, tech bans, and shifting global risks.</itunes:subtitle>
  <itunes:duration>45:41</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/8/816bd0eb-6750-4019-8470-1231c5a716f4/cover.jpg?v=1"/>
  <description>&lt;p&gt;What do Dune’s spice trade, HAL 9000, and federal supply chains have in common? They all reveal how deeply our systems rely on trust—and how dangerous things get when that trust breaks down. I’m joined by Timothy Amerson, CEO of CASMO Consulting, former Chief Information Security Officer at the Social Security Administration, and Army veteran, to explore why Supply Chain Risk Management is no longer just a CISO concern. From insider threats to shifting geopolitical pressures, Tim brings sharp, actionable insight for leaders navigating today’s complex cyber landscape. If you’re serious about moving from compliance to real resilience, this episode is for you. &lt;/p&gt;
</description>
  <itunes:keywords>Supply Chain Risk Management, Cybersecurity, Federal Technology, Zero Trust, Insider Threats</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>What do Dune’s spice trade, HAL 9000, and federal supply chains have in common? They all reveal how deeply our systems rely on trust—and how dangerous things get when that trust breaks down. I’m joined by Timothy Amerson, CEO of CASMO Consulting, former Chief Information Security Officer at the Social Security Administration, and Army veteran, to explore why Supply Chain Risk Management is no longer just a CISO concern. From insider threats to shifting geopolitical pressures, Tim brings sharp, actionable insight for leaders navigating today’s complex cyber landscape. If you’re serious about moving from compliance to real resilience, this episode is for you.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>What do Dune’s spice trade, HAL 9000, and federal supply chains have in common? They all reveal how deeply our systems rely on trust—and how dangerous things get when that trust breaks down. I’m joined by Timothy Amerson, CEO of CASMO Consulting, former Chief Information Security Officer at the Social Security Administration, and Army veteran, to explore why Supply Chain Risk Management is no longer just a CISO concern. From insider threats to shifting geopolitical pressures, Tim brings sharp, actionable insight for leaders navigating today’s complex cyber landscape. If you’re serious about moving from compliance to real resilience, this episode is for you.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
