<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 00:37:23 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Bug Bounties”</title>
    <link>https://securityconversations.fireside.fm/tags/bug%20bounties</link>
    <pubDate>Thu, 07 Dec 2023 07:30:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Rob Ragan on the excitement of AI solving security problems</title>
  <link>http://securityconversations.fireside.fm/rob-ragan-artificial-intelligence-future-of-security</link>
  <guid isPermaLink="false">5d290c85-90a8-4e41-8e9b-f8c953259be4</guid>
  <pubDate>Thu, 07 Dec 2023 07:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/5d290c85-90a8-4e41-8e9b-f8c953259be4.mp3" length="41368098" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly, the firmware security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the leapfrog potential of AI models and their impact on various aspects of technology and  society.</itunes:subtitle>
  <itunes:duration>51:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/5d290c85-90a8-4e41-8e9b-f8c953259be4/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the potential of AI models and their impact on various aspects of technology and society and digs into the importance of improving model interaction by allowing more thoughtful and refined responses. 
We also discuss how AI can be a superpower, enabling rapid prototyping and idea generation. The discussion concludes with considerations for safeguarding AI models, including transparency, explainability, and potential regulations.
Takeaways:
Scaling pen testing can be challenging, and maintaining quality becomes difficult as the team grows. Bug bounty programs have been a net positive for businesses, providing valuable insights and incentivizing innovative research.
Attack surface management plays a crucial role in identifying vulnerabilities and continuously monitoring an organization's security posture.
Social engineering attacks, such as SIM swapping and phishing, require a multi-faceted defense strategy that includes technical controls, policies, and user education.
AI has the potential to augment human intelligence and improve efficiency and effectiveness in cybersecurity. Improving model interaction by allowing more thoughtful and refined responses can enhance the user experience. Algorithms can be used to delegate tasks and improve performance, leading to better results in complex tasks.
AI is an inflection point in technology, comparable to the internet and the industrial revolution. Can be game-changing to automate time-consuming tasks, freeing up human resources for more strategic work.
Autocomplete and code generation tools like Copilot can significantly speed up coding and reduce errors.  AI can be a superpower, enabling rapid prototyping, idea generation, and creative tasks.
Safeguarding AI models requires transparency, explainability, and consideration of potential biases. Regulations may be necessary to ensure responsible use of AI, but they should not stifle innovation. Global adoption of AI should be encouraged to prevent technological disparities between countries.  
</description>
  <itunes:keywords>artificial intelligence, generative-ai, LLMs, bug bounties, automation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the potential of AI models and their impact on various aspects of technology and society and digs into the importance of improving model interaction by allowing more thoughtful and refined responses. </p>

<p>We also discuss how AI can be a superpower, enabling rapid prototyping and idea generation. The discussion concludes with considerations for safeguarding AI models, including transparency, explainability, and potential regulations.</p>

<p><strong>Takeaways:</strong></p>

<ul>
<li>Scaling pen testing can be challenging, and maintaining quality becomes difficult as the team grows. Bug bounty programs have been a net positive for businesses, providing valuable insights and incentivizing innovative research.</li>
<li>Attack surface management plays a crucial role in identifying vulnerabilities and continuously monitoring an organization&#39;s security posture.</li>
<li>Social engineering attacks, such as SIM swapping and phishing, require a multi-faceted defense strategy that includes technical controls, policies, and user education.</li>
<li>AI has the potential to augment human intelligence and improve efficiency and effectiveness in cybersecurity. Improving model interaction by allowing more thoughtful and refined responses can enhance the user experience. Algorithms can be used to delegate tasks and improve performance, leading to better results in complex tasks.</li>
<li>AI is an inflection point in technology, comparable to the internet and the industrial revolution. Can be game-changing to automate time-consuming tasks, freeing up human resources for more strategic work.</li>
<li>Autocomplete and code generation tools like Copilot can significantly speed up coding and reduce errors.  AI can be a superpower, enabling rapid prototyping, idea generation, and creative tasks.</li>
<li>Safeguarding AI models requires transparency, explainability, and consideration of potential biases. Regulations may be necessary to ensure responsible use of AI, but they should not stifle innovation. Global adoption of AI should be encouraged to prevent technological disparities between countries. </li>
</ul><p>Links:</p><ul><li><a title="Rob Ragan&#39;s Theoradical.ai" rel="nofollow" href="https://theoradical.ai/">Rob Ragan's Theoradical.ai</a></li><li><a title="Testing LLM Algorithms While AI Tests Us" rel="nofollow" href="https://slides.com/robragan/testing-llms">Testing LLM Algorithms While AI Tests Us</a> &mdash; Testing LLM Algorithms While AI Tests Us</li><li><a title="LLM Testing Findings Templates" rel="nofollow" href="https://github.com/BishopFox/llm-testing-findings/blob/main/README.md">LLM Testing Findings Templates</a> &mdash; This collection of open-source templates is designed to facilitate the reporting and documentation of vulnerabilities and opportunities for usability improvement in LLM integrations and applications.</li><li><a title="Rob Ragan on Twitter" rel="nofollow" href="https://twitter.com/sweepthatleg">Rob Ragan on Twitter</a></li><li><a title="Rob Ragan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/robragan/">Rob Ragan on LinkedIn</a></li><li><a title="Bishop Fox Labs" rel="nofollow" href="https://bishopfox.com/labs">Bishop Fox Labs</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the potential of AI models and their impact on various aspects of technology and society and digs into the importance of improving model interaction by allowing more thoughtful and refined responses. </p>

<p>We also discuss how AI can be a superpower, enabling rapid prototyping and idea generation. The discussion concludes with considerations for safeguarding AI models, including transparency, explainability, and potential regulations.</p>

<p><strong>Takeaways:</strong></p>

<ul>
<li>Scaling pen testing can be challenging, and maintaining quality becomes difficult as the team grows. Bug bounty programs have been a net positive for businesses, providing valuable insights and incentivizing innovative research.</li>
<li>Attack surface management plays a crucial role in identifying vulnerabilities and continuously monitoring an organization&#39;s security posture.</li>
<li>Social engineering attacks, such as SIM swapping and phishing, require a multi-faceted defense strategy that includes technical controls, policies, and user education.</li>
<li>AI has the potential to augment human intelligence and improve efficiency and effectiveness in cybersecurity. Improving model interaction by allowing more thoughtful and refined responses can enhance the user experience. Algorithms can be used to delegate tasks and improve performance, leading to better results in complex tasks.</li>
<li>AI is an inflection point in technology, comparable to the internet and the industrial revolution. Can be game-changing to automate time-consuming tasks, freeing up human resources for more strategic work.</li>
<li>Autocomplete and code generation tools like Copilot can significantly speed up coding and reduce errors.  AI can be a superpower, enabling rapid prototyping, idea generation, and creative tasks.</li>
<li>Safeguarding AI models requires transparency, explainability, and consideration of potential biases. Regulations may be necessary to ensure responsible use of AI, but they should not stifle innovation. Global adoption of AI should be encouraged to prevent technological disparities between countries. </li>
</ul><p>Links:</p><ul><li><a title="Rob Ragan&#39;s Theoradical.ai" rel="nofollow" href="https://theoradical.ai/">Rob Ragan's Theoradical.ai</a></li><li><a title="Testing LLM Algorithms While AI Tests Us" rel="nofollow" href="https://slides.com/robragan/testing-llms">Testing LLM Algorithms While AI Tests Us</a> &mdash; Testing LLM Algorithms While AI Tests Us</li><li><a title="LLM Testing Findings Templates" rel="nofollow" href="https://github.com/BishopFox/llm-testing-findings/blob/main/README.md">LLM Testing Findings Templates</a> &mdash; This collection of open-source templates is designed to facilitate the reporting and documentation of vulnerabilities and opportunities for usability improvement in LLM integrations and applications.</li><li><a title="Rob Ragan on Twitter" rel="nofollow" href="https://twitter.com/sweepthatleg">Rob Ragan on Twitter</a></li><li><a title="Rob Ragan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/robragan/">Rob Ragan on LinkedIn</a></li><li><a title="Bishop Fox Labs" rel="nofollow" href="https://bishopfox.com/labs">Bishop Fox Labs</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Kymberlee Price reflects on life at the MSRC, hacker/vendor engagement, bug bounties</title>
  <link>http://securityconversations.fireside.fm/kymberlee-price</link>
  <guid isPermaLink="false">ba435301-e21a-48fa-86e5-f60fac79d8c7</guid>
  <pubDate>Wed, 12 Jul 2023 09:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/ba435301-e21a-48fa-86e5-f60fac79d8c7.mp3" length="45477037" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</itunes:subtitle>
  <itunes:duration>48:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/ba435301-e21a-48fa-86e5-f60fac79d8c7/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market. 
</description>
  <itunes:keywords>microsoft, msrc, bug bounties, product security, appsec</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</p><p>Links:</p><ul><li><a title="Kymberlee Price on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/kymberleeprice/">Kymberlee Price on LinkedIn</a></li><li><a title="BlueHat Seattle Closing Remarks - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=fDoejozUz2w&amp;ab_channel=MicrosoftSecurityResponseCenter%28MSRC%29">BlueHat Seattle Closing Remarks - YouTube</a></li><li><a title="Keynote: Defenders Assemble - Kymberlee Price" rel="nofollow" href="https://www.youtube.com/watch?v=OG-YbSwN9VA&amp;ab_channel=AppSecPacificNorthwest">Keynote: Defenders Assemble - Kymberlee Price</a></li><li><a title="BlueHat | Microsoft" rel="nofollow" href="https://www.microsoft.com/bluehat/">BlueHat | Microsoft</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</p><p>Links:</p><ul><li><a title="Kymberlee Price on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/kymberleeprice/">Kymberlee Price on LinkedIn</a></li><li><a title="BlueHat Seattle Closing Remarks - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=fDoejozUz2w&amp;ab_channel=MicrosoftSecurityResponseCenter%28MSRC%29">BlueHat Seattle Closing Remarks - YouTube</a></li><li><a title="Keynote: Defenders Assemble - Kymberlee Price" rel="nofollow" href="https://www.youtube.com/watch?v=OG-YbSwN9VA&amp;ab_channel=AppSecPacificNorthwest">Keynote: Defenders Assemble - Kymberlee Price</a></li><li><a title="BlueHat | Microsoft" rel="nofollow" href="https://www.microsoft.com/bluehat/">BlueHat | Microsoft</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Vinnie Liu discusses a life in the offensive security trenches</title>
  <link>http://securityconversations.fireside.fm/vinnie-liu-bishop-fox</link>
  <guid isPermaLink="false">7a9eb978-4725-4bcf-8c04-525df6c2bcff</guid>
  <pubDate>Sun, 07 Aug 2022 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7a9eb978-4725-4bcf-8c04-525df6c2bcff.mp3" length="162616279" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a 'growth mode' investment, cybersecurity's people problem, and much more...</itunes:subtitle>
  <itunes:duration>1:07:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7a9eb978-4725-4bcf-8c04-525df6c2bcff/cover.jpg?v=1"/>
  <description>A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a 'growth mode' investment, cybersecurity's people problem, and much more... 
</description>
  <itunes:keywords>red team, blue team, offense vs defense, simulated hacking attacks</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a &#39;growth mode&#39; investment, cybersecurity&#39;s people problem, and much more...</p><p>Links:</p><ul><li><a title="Vinnie Liu on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/vinnieliu/">Vinnie Liu on LinkedIn</a></li><li><a title="Vinnie Liu at MS BlueHat v8" rel="nofollow" href="https://www.youtube.com/watch?v=WC7kpauRr9s&amp;ab_channel=BishopFox">Vinnie Liu at MS BlueHat v8</a></li><li><a title="Anti-Drone Tools Tested: From Shotguns To Superdrones" rel="nofollow" href="https://www.wired.com/story/watch-anti-drone-weapons-test/">Anti-Drone Tools Tested: From Shotguns To Superdrones</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a &#39;growth mode&#39; investment, cybersecurity&#39;s people problem, and much more...</p><p>Links:</p><ul><li><a title="Vinnie Liu on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/vinnieliu/">Vinnie Liu on LinkedIn</a></li><li><a title="Vinnie Liu at MS BlueHat v8" rel="nofollow" href="https://www.youtube.com/watch?v=WC7kpauRr9s&amp;ab_channel=BishopFox">Vinnie Liu at MS BlueHat v8</a></li><li><a title="Anti-Drone Tools Tested: From Shotguns To Superdrones" rel="nofollow" href="https://www.wired.com/story/watch-anti-drone-weapons-test/">Anti-Drone Tools Tested: From Shotguns To Superdrones</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Collin Greene, head of product security, Facebook</title>
  <link>http://securityconversations.fireside.fm/collin-greene-facebook-product-security</link>
  <guid isPermaLink="false">5ca053c8-a041-4288-add6-49c3c7f84bbd</guid>
  <pubDate>Tue, 25 May 2021 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/5ca053c8-a041-4288-add6-49c3c7f84bbd.mp3" length="55918822" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Facebook product security leader Collin Greene joins the show to discuss philosophies around securing code at scale, the pros and cons of relying on bug-bounty programs, the humbling lessons from being on the wrong side of a malicious hack, and why "shift-left" should be the priority for every defender.</itunes:subtitle>
  <itunes:duration>1:01:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/5ca053c8-a041-4288-add6-49c3c7f84bbd/cover.jpg?v=1"/>
  <description>Facebook product security leader Collin Greene joins the show to discuss philosophies around securing code at scale, the pros and cons of relying on bug-bounty programs, the humbling lessons from being on the wrong side of a malicious hack, and why "shift-left" should be the priority for every defender. 
</description>
  <itunes:keywords>bug bounties, pen-testing, security assessments, web app security, product security, facebook</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Facebook product security leader Collin Greene joins the show to discuss philosophies around securing code at scale, the pros and cons of relying on bug-bounty programs, the humbling lessons from being on the wrong side of a malicious hack, and why &quot;shift-left&quot; should be the priority for every defender.</p><p>Links:</p><ul><li><a title="Six Buckets of Product Security" rel="nofollow" href="http://collingreene.com/6_buckets_of_prodsec.html">Six Buckets of Product Security</a></li><li><a title="Outcomes &gt; Bugs" rel="nofollow" href="http://collingreene.com/outcomes_over_bugs.html">Outcomes &gt; Bugs</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Facebook product security leader Collin Greene joins the show to discuss philosophies around securing code at scale, the pros and cons of relying on bug-bounty programs, the humbling lessons from being on the wrong side of a malicious hack, and why &quot;shift-left&quot; should be the priority for every defender.</p><p>Links:</p><ul><li><a title="Six Buckets of Product Security" rel="nofollow" href="http://collingreene.com/6_buckets_of_prodsec.html">Six Buckets of Product Security</a></li><li><a title="Outcomes &gt; Bugs" rel="nofollow" href="http://collingreene.com/outcomes_over_bugs.html">Outcomes &gt; Bugs</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Shubs Shah on finding riches (and lessons) from bug bounty hacking</title>
  <link>http://securityconversations.fireside.fm/shuhbam-shah-assetnote</link>
  <guid isPermaLink="false">8ca9fe4a-f12f-401f-80d8-f42f8c1e7504</guid>
  <pubDate>Tue, 20 Apr 2021 11:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/8ca9fe4a-f12f-401f-80d8-f42f8c1e7504.mp3" length="38562676" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle> Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs.  He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors.   Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about  the stressful life of a fulltime bug-bounty hunter, advancements in web app security defense, and how automation is completely rewriting the bug-discovery business.</itunes:subtitle>
  <itunes:duration>52:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/8ca9fe4a-f12f-401f-80d8-f42f8c1e7504/cover.jpg?v=1"/>
  <description>Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs.  He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors.   Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about  the stressful life of a fulltime bug-bounty hunter, advancements in web app security defense, and how automation is completely rewriting the bug-discovery business. 
</description>
  <itunes:keywords>bug bounties, pen-testing, security assessments, web app security, continuous testing, h2c smuggling</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs.  He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors.   Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about  the stressful life of a fulltime bug-bounty hunter, advancements in web app security defense, and how automation is completely rewriting the bug-discovery business.</p><p>Links:</p><ul><li><a title="Assetnote" rel="nofollow" href="https://assetnote.io">Assetnote</a></li><li><a title="Shubs Shah: Hacking on Bug Bounties for Four Years" rel="nofollow" href="https://blog.assetnote.io/2020/09/15/hacking-on-bug-bounties-for-four-years/">Shubs Shah: Hacking on Bug Bounties for Four Years</a></li><li><a title="High frequency security: 120 days, 120 bugs" rel="nofollow" href="https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/">High frequency security: 120 days, 120 bugs</a></li><li><a title="h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)" rel="nofollow" href="https://labs.bishopfox.com/tech-blog/h2c-smuggling-request-smuggling-via-http/2-cleartext-h2c">h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)</a></li><li><a title="H2C Smuggling in the Wild" rel="nofollow" href="https://blog.assetnote.io/2021/03/18/h2c-smuggling/">H2C Smuggling in the Wild</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs.  He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors.   Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about  the stressful life of a fulltime bug-bounty hunter, advancements in web app security defense, and how automation is completely rewriting the bug-discovery business.</p><p>Links:</p><ul><li><a title="Assetnote" rel="nofollow" href="https://assetnote.io">Assetnote</a></li><li><a title="Shubs Shah: Hacking on Bug Bounties for Four Years" rel="nofollow" href="https://blog.assetnote.io/2020/09/15/hacking-on-bug-bounties-for-four-years/">Shubs Shah: Hacking on Bug Bounties for Four Years</a></li><li><a title="High frequency security: 120 days, 120 bugs" rel="nofollow" href="https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/">High frequency security: 120 days, 120 bugs</a></li><li><a title="h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)" rel="nofollow" href="https://labs.bishopfox.com/tech-blog/h2c-smuggling-request-smuggling-via-http/2-cleartext-h2c">h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)</a></li><li><a title="H2C Smuggling in the Wild" rel="nofollow" href="https://blog.assetnote.io/2021/03/18/h2c-smuggling/">H2C Smuggling in the Wild</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
