<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 05 Apr 2026 15:48:05 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Bugbounties”</title>
    <link>https://securityconversations.fireside.fm/tags/bugbounties</link>
    <pubDate>Wed, 06 Dec 2017 13:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Katie Moussouris, co-founder and CEO, Luta Security</title>
  <link>http://securityconversations.fireside.fm/katie-moussouris-luta-security</link>
  <guid isPermaLink="false">1bdec75a-1efc-454a-ad6b-8f56c2b526b7</guid>
  <pubDate>Wed, 06 Dec 2017 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1bdec75a-1efc-454a-ad6b-8f56c2b526b7.mp3" length="54354347" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Computer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry.</itunes:subtitle>
  <itunes:duration>52:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1bdec75a-1efc-454a-ad6b-8f56c2b526b7/cover.jpg?v=5"/>
  <description>Computer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry. 
</description>
  <itunes:keywords>cybersecurity, CISOs, bugbounty</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Computer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry.</p><p>Links:</p><ul><li><a title="Luta Security" rel="nofollow" href="http://lutasecurity.com/">Luta Security</a></li><li><a title="How I Got Here: Katie Moussouris" rel="nofollow" href="https://threatpost.com/how-i-got-here-katie-moussouris/102784/">How I Got Here: Katie Moussouris</a></li><li><a title="It’s dangerous to conflate bug bounties and vulnerability disclosure | CSO Online" rel="nofollow" href="https://www.csoonline.com/article/3271088/security/katie-moussouris-its-dangerous-to-conflate-bug-bounties-and-vulnerability-disclosure.html">It’s dangerous to conflate bug bounties and vulnerability disclosure | CSO Online</a></li><li><a title="Katie Moussouris (@k8em0) on Twitter" rel="nofollow" href="https://twitter.com/k8em0">Katie Moussouris (@k8em0) on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Computer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry.</p><p>Links:</p><ul><li><a title="Luta Security" rel="nofollow" href="http://lutasecurity.com/">Luta Security</a></li><li><a title="How I Got Here: Katie Moussouris" rel="nofollow" href="https://threatpost.com/how-i-got-here-katie-moussouris/102784/">How I Got Here: Katie Moussouris</a></li><li><a title="It’s dangerous to conflate bug bounties and vulnerability disclosure | CSO Online" rel="nofollow" href="https://www.csoonline.com/article/3271088/security/katie-moussouris-its-dangerous-to-conflate-bug-bounties-and-vulnerability-disclosure.html">It’s dangerous to conflate bug bounties and vulnerability disclosure | CSO Online</a></li><li><a title="Katie Moussouris (@k8em0) on Twitter" rel="nofollow" href="https://twitter.com/k8em0">Katie Moussouris (@k8em0) on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
