

Defense Unicorns, A Podcast
Robert Slaughter, Michaela Flatau, Rebecca Lively and Luke Shabro
Welcome to Defense Unicorns, A Podcast for mission focused innovators. We educate, inform, and provide mission heroes with DevSecOps, cybersecurity, and organizational transformation stories from the world's leading problem solvers. Join our hosts Rob Slaughter, Michaela Flatau, Rebecca Lively and Luke Shabro on this journey building connections across the the defense community.
Episodes
Mentioned books

Sep 25, 2025 • 53min
Teaming for the Mission: Why Collaboration Wins in Complex Environments with Bob Ritchie and Lauren Knausenberger
On this episode of The Defense Unicorns Podcast, host and CEO of Defense Unicorns, Rob Slaughter, sits down with Lauren Knausenberger, Chief Innovation Officer, and Bob Ritchie, CGO/CTO, at SAIC, to unpack the evolving intersection of defense, technology, and innovation. From their roots in the Department of Defense to leadership roles at a Fortune 500 integrator, Lauren and Bob bring a front-row view into how mission-driven tech is reshaping the national security landscape.They share what it means to partner across startups, integrators, and government, and why solving the toughest defense challenges requires an open, collaborative ecosystem. Lauren reflects on the cultural and structural shifts sparked by efforts like AFWERX and DIU, while Bob breaks down how cloud platforms and open source models are changing the game, especially at scale.Together, they dig into the growing momentum behind outcome-based acquisition, the importance of credible venture investment in national security startups, and why the real question isn’t “who owns the tech,” but “who’s focused on the mission.” From acquisition reform to continuous ATOs and lessons from Ukraine, this episode is a grounded, insider perspective on what it takes to modernize defense in both mindset and execution.Key Quotes:"We do bias towards companies that are dedicated to open source and towards the ability to help support those companies succeed, which is one of the most amazing things about what you've done with Defense Unicorns – just the one of the top Kubernetes contributors in the world, then the largest, open source contributor in the industrial base. So, those sorts of principles and values of dedication to mission, and the high standard of craftsmanship around software delivery that it takes to do your software development in open source, is something that really attracts us and how we go and think about partnerships.” - Bob"Our core competency is solving really gnarly problems and bringing all of the tribe and all of the pieces together, and solving the problem. We're not going to be a hyperscaler and an individual enterprise services provider – we can't possibly do all of those things better than everyone else. The warfighter and the operators, they deserve the best capabilities for the mission. So, we do take it very seriously to constantly survey the environment and see who has amazing capabilities that we can bring in now and who has capabilities that we think we need in two years that maybe we should seed through our Ventures program." - Lauren Time Stamps:(00:44) The Mission and Vision of SAIC(08:04) The Impact of Defense Innovation Programs(12:23) SAIC's Approach to Partnerships(21:31) Changes in Defense Policy and Funding (39:32) Today’s Modern Warfare and Information Dominance(45:30) Recommendations for Innovators for Today’s DefenseLinks:Connect with Bob RitchieConnect with Lauren KnausenbergerConnect with Rob SlaughterLearn More About Defense Unicorns Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

May 19, 2025 • 60min
Why Contributing to Open Source Matters for the Mission
In this discussion, Brandt Keller, a former Marine and current software engineer at Defense Unicorns, shares insights on his transition to DevSecOps. He emphasizes the importance of contributing to open-source software, particularly in government systems, where reliance on tools like Kubernetes presents risks due to limited engagement. Brandt also highlights the challenges of designing for air-gapped environments and the need for a cultural shift towards embracing open ecosystems. Plus, he humorously concludes that cereal is indeed soup!

May 5, 2025 • 45min
Shipping Software Faster and Safer with Pepr
On this episode of The Defense Unicorns Podcast, host Rebecca Lively chats with Case Wylie, Software Engineering Lead, about building security-minded software that keeps up with developer velocity. From his early days at Red Hat to architecting open-source tools at Defense Unicorns, Case shares how Pepr—a TypeScript-based operator framework—is redefining how Kubernetes clusters are secured and managed in airgapped environments. It’s not just about enforcing policy; it’s about enabling developers to move faster, safer, and smarter.Through real-world metaphors (ever been to a nightclub with strict bouncers?), Case breaks down the roles of admission controllers, operator frameworks, and how Pepr works seamlessly with GitOps without adding friction. He explains why Pepr isn’t just a tool, but part of a broader movement to standardize security postures, reduce configuration drift, and empower app teams to focus on delivering real value. With a human-first API and open-source DNA, Pepr is built to be accessible to all, not just Kubernetes power users.If you’re curious about what it takes to scale secure software in complex, mission-critical environments—or just want a fresh, practical take on DevSecOps—this episode delivers. Case also shares his philosophy on open-source collaboration and what it means to build tools that truly stand the test of scale and scrutiny.Key Quote:“Pepr will always be open source and the reason why it's open source is because frankly, open source software, when your software is open source, you expose the application or the software or the platform, whatever it is to exponentially more eyes and more eyes over time and then more people start adopting it and using it and saying like, ‘Hey, you know what? I do have this simple thing I always have to do in my cluster. Maybe I try Pepr for that.’ Right? And then they do it with a simple task, and then they say, ‘Hey, you know what? It would be great if Pepr could do this thing. And they put in a feature request. Then we develop that feature request, or they develop it, and they submit a PR to Pepr. And now Pepr as a whole is better because now you're using it. I'm using it. They're using it. The more people that use it, the better.”Case WylieTime Stamps:(02:44) Introduction to UDS and Pepr(05:59) The Importance of Air-Gapped Environments(11:40) Understanding Kubernetes Admission Control(16:05) Comparing Pepr with Other Tools(22:00) Why Pepr Uses TypeScript(34:03) The Benefits of Open Source for Pepr(43:31) Lightning RoundLinks:Connect with Casey WylieConnect with Rebecca LivelyLearn More About Defense Unicorns Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Apr 14, 2025 • 50min
Why DIU Ruined Wayne Starr in the Best Way
On this episode of The Defense Unicorns Podcast, we’re not just talking about writing code—we’re talking about what happens when you try to change the culture of software inside the Department of Defense. From flying to Qatar to debug mission-critical planning tools to reflashing smart lightbulbs with open-source firmware, Wayne Starr has done it all. Host Rebecca Lively sits down with Wayne, a Unicorn Engineer at Defense Unicorns, to unpack what it takes to deliver secure, user-centered software in one of the world’s most complex environments.Wayne shares how his early career at DIU “ruined” him—in the best possible way—by showing what was possible when bureaucratic blockers are set aside and software teams are trusted to deliver. He dives into real DevSecOps wins and war stories, including a mission-planning app that saved hours of planner time and real dollars in fuel. Along the way, he reflects on the absurdity of battles over office headsets, the power of printing MP3s on paper, and how open source gives individuals more control over their technology.If you’ve ever tried to navigate the maze of government compliance, or if you’re just wondering what DevSecOps looks like when it’s done right, Wayne’s story offers a rare behind-the-scenes look. From tactical impact to philosophical reflections, this conversation covers what it means to ship software that matters—and why knowing the rules better than anyone else is sometimes the only way to change the game.Key Quote Options:“ I want to control technology. I don't want technology to control me. If it's closed-source software, it could suddenly require a subscription at some point, it could be connected to the cloud, and who knows what's happening with the data, who knows where that's going. And so I try to pull as much back as I can to things that I can control and that I can monitor and use.”Wayne StarrTime Stamps:(00:49) First Assignment at Defense Innovation Unit(04:28) Skepticism and Acceptance from Users(12:16) Open Source Software Journey(29:55) Creating ZARF(39:23) Other Notable Open Source Projects: Pepper and Lula(43:31) Lightning RoundLinks:Connect with Wayne StarrConnect with Rebecca LivelyLearn More About Defense Unicorns Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Mar 10, 2025 • 45min
Breaking the Myths of DevSecOps
On this episode of The Defense Unicorns Podcast, the question isn’t just how to deliver software—it’s how to do it faster, safer, and smarter. According to Bryan Finster Distinguished Engineer at Defense Unicorns, the answer isn’t in rigid frameworks or bloated processes but in embracing continuous delivery, shortening feedback loops, and eliminating the bureaucratic roadblocks that hold teams back. Host Rebecca Lively sits down with Bryan to debunk DevSecOps’ myths, tackle the frustrations of “Agile theater,” and explore why real software success comes from a culture of ownership, not just following a set of rules.Bryan makes a compelling case that rigid processes, review boards, and bureaucratic bottlenecks don’t make software safer—they make it fragile. He argues that adaptability is the real key to security, and that organizations clinging to outdated waterfall-style contracts are setting themselves up for failure. Drawing on experiences from Walmart’s supply chain to government defense systems, he explains how fostering a culture of ownership, feedback, and accountability leads to better outcomes—not just for users, but for the engineers who build the systems.If you’re tired of buzzwords and top-down mandates that miss the mark, this conversation will hit home. Bryan isn’t just here to talk about DevSecOps—he’s here to challenge the way you think about software, leadership, and even history. Whether you want to deliver better software or just hear an unfiltered take on why Agile often fails in practice, this episode is worth a listen.Key Quote:“ The goal we have is number one, I need to be able to respond to the realities of what's happening in production as quickly as possible safely. I don't want to be making up ways to. Make change, I don't want to be cowboying change in when something's going wrong in production, either with security breach or functional problems or whatever it is, then I don't want to be throwing gasoline on a fire at three o'clock in the morning. I need to be able to recover from what's currently occurring as quickly and safely as possible. So operational responsiveness is key. The other part is, if I'm building something new, software development is not the same as building a car. Unless you think of it as designing the car we're going to build. We're prototyping everything all the time. And the bigger the thing is that we deliver. The more wrong is in that prototype. And so it's not about speed. It's about feedback.”Bryan FinsterTime Stamps:(01:39) Balancing Speed and Safety in DevOps(03:53) The Role of Feedback in Software Development(12:35) The Power of Feedback and Continuous Improvement(18:35) Understanding Conway's Law(23:55) Building a Strong Engineering Community(28:26) DevOps and Quality Assurance(33:48) Being Agile in High-Risk Environments(40:13) Lightning RoundLinks:Connect with Bryan FinsterConnect with Rebecca LivelyLearn More About Defense Unicorns Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Feb 10, 2025 • 49min
Building Trust and Security in the DoD: A DevSecOps Perspective
DevOps, culture, and the battlefield converge in this compelling episode of Defense Unicorns as host Rebecca Lively speaks with Dr. Noe Lorona, a platform engineer at the Army Software Factory. Together, they explore the nuances of DevSecOps, unraveling its critical role in the defense sector, where software isn’t just a tool but a lifeline. Dr. Lorona delves into how the Department of Defense has elevated security to the forefront, embedding it into every phase of the development process to ensure reliable and secure systems that protect both lives and missions.Beyond the technical jargon, this episode shines a light on the human side of DevSecOps. Dr. Lorona emphasizes trust, transparency, and a blameless culture as the foundation of agile teams that thrive under pressure. From the necessity of shifting security left to fostering psychological safety in hierarchical environments, his insights offer a roadmap for cultivating innovation in even the most complex and high-stakes organizations.If you’re passionate about the intersection of technology, leadership, and national defense, this episode is a must-listen. Dr. Lorona and Rebecca Lively bring the mission of Defense Unicorns to life: showcasing thought leaders and experts driving transformational change in DevSecOps. Whether you're in the DoD or simply curious about the future of secure and agile software development, this conversation will leave you inspired and informed.Key Quote: “ DevOps is not about the tools. DevOps is, it's the way that we work together, the way that we accomplish things. And. A funny thing, I actually say DevOps as a way of life. When they say, well, what is DevOps? I say, it's a thing you live by. It's the thing you show up to do. It's not a thing. It's not an object. It's a culture. It's the thing you live to do. It's a reason why we wake up so we can go do the DevOps.”Dr. Noe LoronaTime Stamps:(00:26) DevOps vs DevSecOps: What's the Difference?(03:53) Implementing DevOps in the Department of Defense(06:05) Building a Blameless Culture in the Military(14:21) Education in DevOps(24:47) Bringing Open Source Software in the DoD(30:07) Future of DevOps: Exciting Trends(30:42) Community and Collaboration in DevOps(42:07) Career Advice for Aspiring Developers(43:43) Sci-Fi Tech and FuturismLinks:Connect with Dr. Noe LoronaLearn more about Army Software FactoryConnect with Rebecca LivelyLearn more About Defense Unicorns Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jan 9, 2025 • 52min
Inside Cyber Defense: Col. Sean Kern on Building Agile, Secure Teams
In this episode, Defense Unicorns welcomes Col. Sean Kern, the Director of Cyberspace Operations Strategy at SAIC, who brings experience in military and cybersecurity strategy. Kern shares his journey from military service to civilian leadership, sharing the unique challenges and adjustments required in the transition. He discusses how his military background shaped his understanding of systems and software engineering and how essential it is to cultivate a resilient and adaptable culture in any DevSecOps team. Kern emphasizes that trust, humility, and continuous learning are cornerstones for building high-performing cybersecurity operations, both in the military and private sectors.The conversation dives deep into automation and the role of human judgment in high-stakes cybersecurity decisions. Kern puts a focus on a balanced approach, where automation speeds up processes without sacrificing the critical oversight humans provide. His thoughts on combating biases within AI and ensuring ethical applications of automation highlight the importance of strategic human involvement. His perspective illustrates how both tech innovation and human expertise are essential to adapting cybersecurity practices for dynamic challenges.Kern also addresses the structural complexities of coordinating cybersecurity operations across military branches. He explores the need for a more unified organizational framework that could enhance operational readiness and efficiency in cyber operations. Drawing from his experience, Kern advocates for a strategic, flexible, and consistent approach to cybersecurity management, emphasizing that speed and adaptability are key to staying ahead of potential threats in today's world.Key Quote:“Culture is going to happen whether you do it or not. Like that's the scary part. It's going to exist. You know, if it's left to its own devices, then if you get anything good out of it, that's pure chance. That's pure luck and we don't need to fight China on pure chance or pure luck. So we need to be deliberate about the culture we put in place.”Col. Sean KernTime Stamps:(00:32) Sean Kern's Military Background(06:42) Transitioning from the Military to the Private Sector(11:47) Building Effective Teams and Organizations(19:59) The Importance of Culture(28:24) Automation vs. Human Accuracy(34:50) Organizational Design for Cyber Operations(49:14) Lightning RoundLinks:Connect with Col. Sean KernLearn More About SAICConnect with Rebecca LivelyLearn More About Defense Unicorns Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 17, 2024 • 45min
From Code to Combat: The Tech Transforming the DoD
In this episode of The Defense Unicorns Podcast, we’re joined by Collen Roller, Founder of Dark Saber, as he shares his journey of innovation within the U.S. Air Force. From his work in Natural Language Processing (NLP) to mentoring airmen on developing applications using outdated systems, Collen’s story highlights perseverance and creativity. Discover how Dark Saber has empowered airmen to build production-ready software, transforming their operational efficiency.We explore the transformative potential of generative AI in defense, including its ability to automate tasks like paperwork and coding, enhancing productivity. Collen also introduces Nipper GPT, an AI tool tailored for DoD networks that bridges information gaps through conversational interfaces, pushing the boundaries of data access within military environments.Looking to the future, Collen discusses exciting advancements like Retrieval Augmented Generation (RAG) and multi-agent AI architectures, poised to revolutionize military data interactions. As he reflects on the importance of passion and community in driving change, this episode showcases Collen’s commitment to modernizing defense technology through innovation.Key Quote: “I think that people need to realize that these tools are for their benefits and they need to get involved in using them today to enhance their performance and workflow because if you're not using them, you're being slow.”-Collen Roller, Founder of Dark SaberTime Stamps:(00:00) DoD Software and Conversational Systems(11:28) Future of AI in Military Operations(17:05) Future Developments in Artificial Intelligence(34:38) Revolutionizing Software Development in DoD(44:21) Driving Change in DoD Through PassionLinks:Learn more about Dark SaberConnect with CollenConnect with Luke Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 2, 2024 • 48min
Keeping Open Source Software Secure with Eddie Zaneski
This week on, Defense Unicorns Podcast we welcome Eddie Zaneski, the tech lead for open source here at Defense Unicorns, who takes us through his fascinating career journey from aspiring math teacher to a key player in the tech industry. Eddie shares his experiences transitioning into computer science, his passion for developer relations, and his significant contributions to the Kubernetes project. We dive into the evolution of software deployment, from bare metal servers to virtual machines and containers, and how Kubernetes has become essential in managing large-scale containerized applications. Eddie also reflects on his time at DigitalOcean, Amazon, and ChainGuard, highlighting his work on software supply chain security projects like Protobomb and Sigstore.Our conversation then turns to the security of open-source communities, challenging the misconception that open-source software is less secure than its closed-source counterparts. Eddie discusses the advantages of transparency in open source, using the XZ library's recent security breach as a case study to emphasize the importance of trust and identity verification. We also explore the potential for similar vulnerabilities in closed-source projects and the growing importance of supply chain security measures, including building integrity and software bills of materials (SBOM). The episode concludes with a thought-provoking discussion on the benefits of transparency in open source and whether proprietary software incidents would be as openly shared or understood.Eddie shares his enthusiasm for leveraging government funding to support open-source projects. He expresses his excitement about engaging with soldiers, airmen, and guardians to understand their challenges and explore open-source solutions. We also touch on innovative tools for air-gapped environments, like Zarf, and their applications across various industries. Listen in as Eddie recounts his experiences at Bravo hackathons, the unique challenges faced by developers in constrained environments, and offers valuable career advice for those passionate about open source and software development.Key Quote“There's lots of misconceptions and I'm sure you and I can talk about all of them. One of the big ones is, just. It's less secure, right? that's a massive myth. Open source security is less secure because all the code is in the open and everyone can go find the holes and generally quite the opposite actually, because the code is in the open, everyone can do their own audits and everyone can see what's happening under the covers of the magic box that you usually can't peer into with proprietary software. We have entire teams of like security. So the Kubernetes project is divided up into special interest groups or SIGs. So we have SIGs for security, we have a product security council and committee that is the incident response people for when there is a new CVE or a bug found, and all sorts of different types of things that are just tailored around security.”-Eddie ZaneskiTime Stamps:(00:02) Kubernetes and Open Source Evolution(08:17) Security in Open Source Communities(20:43) Software Bill of Materials for Cybersecurity(24:04) Exploring Defense Unicorns and Open Source(31:43) Navigating Careers in Open Source(42:25) Breaking Barriers in Defense Innovation(46:42) Collaborating for Defense Open SourceLinksConnect with Eddie Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 19, 2024 • 53min
Connecting DevSecOps to Boyd’s Theories with Mark McGrath
In this episode of the Defense Unicorns Podcast, Rebecca sits down with Mark McGrath, a Marine Corps veteran turned asset manager and consultant, to explore how modern DevSecOps practices intersect with John Boyd's theories. Mark’s deep understanding of Boyd's OODA loop—observe, orient, decide, act—shapes how he helps clients in industries like manufacturing, energy, and public relations respond to complexity and streamline decision-making, much like DevSecOps optimizes software development and deployment.Diving into the legacy of John Boyd and going beyond the OODA loop, Mark discusses Boyd’s influence on business strategy, finance, and software development. Mark brings a fresh angle to Boyd’s concept of rapid iteration, emphasizing how speed, adaptability, and customer feedback are key tenets not just in the military or on Wall Street but also in DevSecOps. We also delve into Boyd's "Destruction and Creation," connecting it to principles of continuous integration and delivery, and explore how his philosophy of action and adaptation aligns with the core practices of DevSecOps.Throughout the episode, Mark highlights the critical role of psychological safety and cross-functional collaboration, both key to effective leadership and DevSecOps culture. Whether you're deploying code or managing high-stakes operations, this conversation illuminates the relevance of Boyd's theories for anyone aiming to navigate complexity, enhance agility, and drive innovation in their organization.Key Quote“You realize I have to continuously shatter and smash my understanding of the world or my perception of the world because if I don't I'm going to become Blockbuster video. And if I don't, I'm going to be Blackberry. Or if I don't, I'm going to stagnate and I'm going to become extremely vulnerable to my competitors or the rate of change or whatever it is, it's going to get me and I'm not going to be able to survive on my own terms and it's impossible for me to ever thrive.”-Mark McGrathTime Stamps:00:58 Mark McGrath's Background and Career Journey01:38 Discovering John Boyd's Theories04:13 Joining AGLX and Applying Boyd's Theories06:35 Understanding John Boyd's Broader Impact17:47 Boyd's Conceptual Spiral and Continuous Reorientation28:39 Challenging the Status Quo33:33 The Importance of Humility35:06 Comfort vs. Volatility40:13 The Power of Feedback48:07 Boyd's Universal ApplicabilityLinks:Connect with MarkLearn more about AGLXCheck out the “No Way Out” PodcastThe Whirl of Reorintation SubstackRead Destruction and CreationRead John Boyd, The Fighter Pilot Who Changed The Art of War Read The Psychology of Military Incompetence Read the Timeless Way of Building Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.