<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 16 Apr 2026 23:14:11 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Cybersecurity”</title>
    <link>https://securityconversations.fireside.fm/tags/cybersecurity</link>
    <pubDate>Tue, 07 Oct 2025 14:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Chris Eng on lessons learned from the NSA, @Stake, Veracode, and 20 years in cybersecurity</title>
  <link>http://securityconversations.fireside.fm/chris-eng-software-security-code-quality</link>
  <guid isPermaLink="false">e7c2f699-e4d3-4236-a521-1c1934f52674</guid>
  <pubDate>Tue, 07 Oct 2025 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e7c2f699-e4d3-4236-a521-1c1934f52674.mp3" length="29886415" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>This week on Security Conversations, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. 

Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling.</itunes:subtitle>
  <itunes:duration>44:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e7c2f699-e4d3-4236-a521-1c1934f52674/cover.jpg?v=1"/>
  <description>This week on Security Conversations, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. 
Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling. 
</description>
  <itunes:keywords>Chris Eng, Veracode, Binarly, supply chain, NSA, @Stake, Dan Geer, Monoculture, Windows, Microsoft, IIS, binary, source code</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on <em>Security Conversations</em>, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. </p>

<p>Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling.</p><p>Links:</p><ul><li><a title="Chris Eng on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/realchriseng/">Chris Eng on LinkedIn</a></li><li><a title="Chris Eng on Twitter" rel="nofollow" href="https://x.com/chriseng?lang=en">Chris Eng on Twitter</a></li><li><a title="Monoculture Considered Harmful" rel="nofollow" href="https://www.foo.be/docs/diversity/geer.pdf">Monoculture Considered Harmful</a></li><li><a title="Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’" rel="nofollow" href="https://www.computerworld.com/article/1726646/fired-stake-cto-says-microsoft-critique-was-business-as-usual.html">Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’</a></li><li><a title="Microsoft Takes LSD to Test Vista Security " rel="nofollow" href="https://www.cioinsight.com/news-trends/microsoft-takes-lsd-to-test-vista-security/">Microsoft Takes LSD to Test Vista Security </a></li><li><a title="Code Red (computer worm) " rel="nofollow" href="https://en.wikipedia.org/wiki/Code_Red_(computer_worm)">Code Red (computer worm) </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on <em>Security Conversations</em>, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. </p>

<p>Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling.</p><p>Links:</p><ul><li><a title="Chris Eng on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/realchriseng/">Chris Eng on LinkedIn</a></li><li><a title="Chris Eng on Twitter" rel="nofollow" href="https://x.com/chriseng?lang=en">Chris Eng on Twitter</a></li><li><a title="Monoculture Considered Harmful" rel="nofollow" href="https://www.foo.be/docs/diversity/geer.pdf">Monoculture Considered Harmful</a></li><li><a title="Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’" rel="nofollow" href="https://www.computerworld.com/article/1726646/fired-stake-cto-says-microsoft-critique-was-business-as-usual.html">Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’</a></li><li><a title="Microsoft Takes LSD to Test Vista Security " rel="nofollow" href="https://www.cioinsight.com/news-trends/microsoft-takes-lsd-to-test-vista-security/">Microsoft Takes LSD to Test Vista Security </a></li><li><a title="Code Red (computer worm) " rel="nofollow" href="https://en.wikipedia.org/wiki/Code_Red_(computer_worm)">Code Red (computer worm) </a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Fredrick Lee, Chief Security Officer, Gusto</title>
  <link>http://securityconversations.fireside.fm/frederick-lee-gusto</link>
  <guid isPermaLink="false">d20c248c-131d-4e66-8790-6d0a146e7fa8</guid>
  <pubDate>Thu, 10 Sep 2020 16:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d20c248c-131d-4e66-8790-6d0a146e7fa8.mp3" length="27307999" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Gusto chief security officer Fredrick 'Flee' Lee talks about his passion for democratizing security, solving problems for small businesses, the responsibilities of being a black security leader, and the people and experiences that influenced him along the way.</itunes:subtitle>
  <itunes:duration>41:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d20c248c-131d-4e66-8790-6d0a146e7fa8/cover.jpg?v=2"/>
  <description>Gusto chief security officer Fredrick 'Flee' Lee talks about his passion for democratizing security, solving problems for small businesses, the responsibilities of being a black security leader, and the people and experiences that influenced him along the way. 
</description>
  <itunes:keywords>security, privacy, compliance, crisis management, cybersecurity, pandemic, covid, corona virus, business continuity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Gusto chief security officer Fredrick &#39;Flee&#39; Lee talks about his passion for democratizing security, solving problems for small businesses, the responsibilities of being a black security leader, and the people and experiences that influenced him along the way.</p><p>Links:</p><ul><li><a title="Gusto Appoints Fredrick Lee Chief Security Officer" rel="nofollow" href="https://www.businesswire.com/news/home/20190305005014/en/Gusto-Appoints-Fredrick-Lee-Chief-Security-Officer">Gusto Appoints Fredrick Lee Chief Security Officer</a></li><li><a title="Secret CSO: Fredrick &quot;Flee&quot; Lee, Gusto" rel="nofollow" href="https://www.idgconnect.com/interviews/1504751/secret-cso-fredrick-flee-lee-gusto">Secret CSO: Fredrick "Flee" Lee, Gusto</a></li><li><a title="CISO to CISO Webcast with Fredrick &quot;Flee&quot; Lee" rel="nofollow" href="https://blog.altitudenetworks.com/ciso-to-ciso-live-webcast-with-fredrick-lee-cso-of-gusto/">CISO to CISO Webcast with Fredrick "Flee" Lee</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Gusto chief security officer Fredrick &#39;Flee&#39; Lee talks about his passion for democratizing security, solving problems for small businesses, the responsibilities of being a black security leader, and the people and experiences that influenced him along the way.</p><p>Links:</p><ul><li><a title="Gusto Appoints Fredrick Lee Chief Security Officer" rel="nofollow" href="https://www.businesswire.com/news/home/20190305005014/en/Gusto-Appoints-Fredrick-Lee-Chief-Security-Officer">Gusto Appoints Fredrick Lee Chief Security Officer</a></li><li><a title="Secret CSO: Fredrick &quot;Flee&quot; Lee, Gusto" rel="nofollow" href="https://www.idgconnect.com/interviews/1504751/secret-cso-fredrick-flee-lee-gusto">Secret CSO: Fredrick "Flee" Lee, Gusto</a></li><li><a title="CISO to CISO Webcast with Fredrick &quot;Flee&quot; Lee" rel="nofollow" href="https://blog.altitudenetworks.com/ciso-to-ciso-live-webcast-with-fredrick-lee-cso-of-gusto/">CISO to CISO Webcast with Fredrick "Flee" Lee</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Sounil Yu, Cyber Defense Matrix</title>
  <link>http://securityconversations.fireside.fm/sounil-yu-cyber-defense-matrix</link>
  <guid isPermaLink="false">cda34e0b-2ced-4519-9bee-dda805d6150c</guid>
  <pubDate>Tue, 17 Mar 2020 08:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cda34e0b-2ced-4519-9bee-dda805d6150c.mp3" length="31017607" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Former Chief Security Scientist at Bank of America, Sounil Yu, explains why he created the Cyber Defense Matrix framework and how organizations are using it to drive visibility and security decisions in multiple places.  We discuss securing "cattle vs pets," the next era of security innovation,  and the increasing security poverty line that hurts small- and medium-sized businesses.</itunes:subtitle>
  <itunes:duration>35:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/cda34e0b-2ced-4519-9bee-dda805d6150c/cover.jpg?v=3"/>
  <description>Former Chief Security Scientist at Bank of America, Sounil Yu, explains why he created the Cyber Defense Matrix framework and how organizations are using it to drive visibility and security decisions in multiple places.  We discuss securing "cattle vs pets," the next era of security innovation,  and the increasing security poverty line that hurts small- and medium-sized businesses.  
</description>
  <itunes:keywords>cybersecurity, security framework, NIST, investments</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Former Chief Security Scientist at Bank of America, Sounil Yu, explains why he created the Cyber Defense Matrix framework and how organizations are using it to drive visibility and security decisions in multiple places.  We discuss securing &quot;cattle vs pets,&quot; the next era of security innovation,  and the increasing security poverty line that hurts small- and medium-sized businesses. </p><p>Links:</p><ul><li><a title="Cyber Defense Matrix" rel="nofollow" href="https://owasp.org/www-project-cyber-defense-matrix/">Cyber Defense Matrix</a> &mdash; The Cyber Defense Matrix helps us understand what we need organized through a logical construct so that when we go into the security vendor marketplace, we can quickly discern what products solve what problems and be informed on what is the core function of a given product. In addition, the Cyber Defense Matrix provides a mechanism to ensure that we have capabilities across the entire spectrum of options to help secure our environments.</li><li><a title="Cyber Defense Matrix Reloaded" rel="nofollow" href="https://www.slideshare.net/sounilyu/cyber-defense-matrix-reloaded">Cyber Defense Matrix Reloaded</a> &mdash; This is an update to the Cyber Defense Matrix briefing given at the 2019 RSA Conference. Cybersecurity practitioners can use this to organize vendors, find gaps in security portfolios, understand how to organize security measurements, prioritize investments, minimize business impact, visualize attack surfaces, align other existing frameworks, and gain a fuller understanding of the entire space of cybersecurity.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Former Chief Security Scientist at Bank of America, Sounil Yu, explains why he created the Cyber Defense Matrix framework and how organizations are using it to drive visibility and security decisions in multiple places.  We discuss securing &quot;cattle vs pets,&quot; the next era of security innovation,  and the increasing security poverty line that hurts small- and medium-sized businesses. </p><p>Links:</p><ul><li><a title="Cyber Defense Matrix" rel="nofollow" href="https://owasp.org/www-project-cyber-defense-matrix/">Cyber Defense Matrix</a> &mdash; The Cyber Defense Matrix helps us understand what we need organized through a logical construct so that when we go into the security vendor marketplace, we can quickly discern what products solve what problems and be informed on what is the core function of a given product. In addition, the Cyber Defense Matrix provides a mechanism to ensure that we have capabilities across the entire spectrum of options to help secure our environments.</li><li><a title="Cyber Defense Matrix Reloaded" rel="nofollow" href="https://www.slideshare.net/sounilyu/cyber-defense-matrix-reloaded">Cyber Defense Matrix Reloaded</a> &mdash; This is an update to the Cyber Defense Matrix briefing given at the 2019 RSA Conference. Cybersecurity practitioners can use this to organize vendors, find gaps in security portfolios, understand how to organize security measurements, prioritize investments, minimize business impact, visualize attack surfaces, align other existing frameworks, and gain a fuller understanding of the entire space of cybersecurity.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
