<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 11 Apr 2026 18:01:29 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Chrome”</title>
    <link>https://securityconversations.fireside.fm/tags/chrome</link>
    <pubDate>Thu, 11 Apr 2024 10:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Cris Neckar on the early days of securing Chrome, chasing browser exploits</title>
  <link>http://securityconversations.fireside.fm/cris-neckar-chrome-security-stories</link>
  <guid isPermaLink="false">8151cb78-e91b-4526-95cc-6ea1dd6ddec5</guid>
  <pubDate>Thu, 11 Apr 2024 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/8151cb78-e91b-4526-95cc-6ea1dd6ddec5.mp3" length="52672988" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- XZ.fail backdoor detector  (https://xz.fail)

Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital.  In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium and the cat-and-mouse battle for browser exploit chains. We also discuss the zero-day exploit marketplace, the hype and promise of AI, and his mission to help highly technical founders bring products to market.</itunes:subtitle>
  <itunes:duration>54:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/8151cb78-e91b-4526-95cc-6ea1dd6ddec5/cover.jpg?v=4"/>
  <description>Episode sponsors:
Binarly, the supply chain security experts (https://binarly.io)
XZ.fail backdoor detector  (https://xz.fail)
Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital.  In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium, and the cat-and-mouse battle for browser exploit chains. We also discuss the zero-day exploit marketplace, the hype and promise of AI, and his mission to help highly technical founders bring products to market. 
</description>
  <itunes:keywords>venture capital, investments, supply chain, Chrome, Pwn2Own</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital.  In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium, and the cat-and-mouse battle for browser exploit chains. We also discuss the zero-day exploit marketplace, the hype and promise of AI, and his mission to help highly technical founders bring products to market.</p><p>Links:</p><ul><li><a title="Unedited transcript (AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1Xhf2pVxE4Trb9TVbK2VEBP6zDDe25MAbPdiAeh501h0/edit#heading=h.ulpyi4qqiq06">Unedited transcript (AI-generated)</a></li><li><a title="Cris Neckar on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/crisneckar/">Cris Neckar on LinkedIn</a></li><li><a title="Cris Neckar Bio (Two Bear Capital)" rel="nofollow" href="https://www.twobearcapital.com/team/cris-neckar">Cris Neckar Bio (Two Bear Capital)</a></li><li><a title="Teenager hacks Google Chrome with three 0days" rel="nofollow" href="https://www.zdnet.com/article/teenager-hacks-google-chrome-with-three-0day-vulnerabilities/">Teenager hacks Google Chrome with three 0days</a></li><li><a title="Research on Trident zero-day flaws" rel="nofollow" href="https://www.lookout.com/threat-intelligence/article/trident-pegasus-technical-details">Research on Trident zero-day flaws</a></li><li><a title="Cris Neckar podcast transcript (Unedited)" rel="nofollow" href="https://docs.google.com/document/d/1Xhf2pVxE4Trb9TVbK2VEBP6zDDe25MAbPdiAeh501h0/edit#heading">Cris Neckar podcast transcript (Unedited)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital.  In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium, and the cat-and-mouse battle for browser exploit chains. We also discuss the zero-day exploit marketplace, the hype and promise of AI, and his mission to help highly technical founders bring products to market.</p><p>Links:</p><ul><li><a title="Unedited transcript (AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1Xhf2pVxE4Trb9TVbK2VEBP6zDDe25MAbPdiAeh501h0/edit#heading=h.ulpyi4qqiq06">Unedited transcript (AI-generated)</a></li><li><a title="Cris Neckar on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/crisneckar/">Cris Neckar on LinkedIn</a></li><li><a title="Cris Neckar Bio (Two Bear Capital)" rel="nofollow" href="https://www.twobearcapital.com/team/cris-neckar">Cris Neckar Bio (Two Bear Capital)</a></li><li><a title="Teenager hacks Google Chrome with three 0days" rel="nofollow" href="https://www.zdnet.com/article/teenager-hacks-google-chrome-with-three-0day-vulnerabilities/">Teenager hacks Google Chrome with three 0days</a></li><li><a title="Research on Trident zero-day flaws" rel="nofollow" href="https://www.lookout.com/threat-intelligence/article/trident-pegasus-technical-details">Research on Trident zero-day flaws</a></li><li><a title="Cris Neckar podcast transcript (Unedited)" rel="nofollow" href="https://docs.google.com/document/d/1Xhf2pVxE4Trb9TVbK2VEBP6zDDe25MAbPdiAeh501h0/edit#heading">Cris Neckar podcast transcript (Unedited)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Google's Heather Adkins on defenders playing the long game</title>
  <link>http://securityconversations.fireside.fm/heather-adkins-google-security</link>
  <guid isPermaLink="false">97a0eeb7-c6f6-4757-9cf5-bbd21380223f</guid>
  <pubDate>Wed, 26 May 2021 16:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/97a0eeb7-c6f6-4757-9cf5-bbd21380223f.mp3" length="32532700" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the "long-game," the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</itunes:subtitle>
  <itunes:duration>38:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/97a0eeb7-c6f6-4757-9cf5-bbd21380223f/cover.jpg?v=1"/>
  <description>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the "long-game," the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.
Sponsored by Eclypsium:
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices.  Request a demo at Eclypsium.com (https://eclypsium.com).
</description>
  <itunes:keywords>google, zero-trust, chrome</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the &quot;long-game,&quot; the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</p>

<p><strong>Sponsored by Eclypsium:</strong><br>
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices.  <a href="https://eclypsium.com" rel="nofollow">Request a demo at Eclypsium.com</a>.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the &quot;long-game,&quot; the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</p>

<p><strong>Sponsored by Eclypsium:</strong><br>
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices.  <a href="https://eclypsium.com" rel="nofollow">Request a demo at Eclypsium.com</a>.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
