<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 15 Apr 2026 16:42:26 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Entrepreneur”</title>
    <link>https://securityconversations.fireside.fm/tags/entrepreneur</link>
    <pubDate>Tue, 28 Aug 2018 04:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Josh Lefkowitz, Founder and CEO, Flashpoint</title>
  <link>http://securityconversations.fireside.fm/josh-lefkowitz-flashpoint</link>
  <guid isPermaLink="false">1f0f4e71-9a49-4d80-8a17-c020c7e2698c</guid>
  <pubDate>Tue, 28 Aug 2018 04:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1f0f4e71-9a49-4d80-8a17-c020c7e2698c.mp3" length="30504303" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Flashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company's approach to gathering and analyzing data, and his mission to be an extension of a client's security team.</itunes:subtitle>
  <itunes:duration>32:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1f0f4e71-9a49-4d80-8a17-c020c7e2698c/cover.jpg?v=3"/>
  <description>Flashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company's approach to gathering and analyzing data, and his mission to be an extension of a client's security team. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Flashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company&#39;s approach to gathering and analyzing data, and his mission to be an extension of a client&#39;s security team.</p><p>Links:</p><ul><li><a title="Flashpoint - Library" rel="nofollow" href="https://www.flashpoint-intel.com/library/">Flashpoint - Library</a></li><li><a title="&#39;7 Minutes&#39; with Flashpoint CEO Josh Lefkowitz" rel="nofollow" href="https://www.channelpartnersonline.com/article/7-minutes-with-flashpoint-ceo-josh-lefkowitz/">'7 Minutes' with Flashpoint CEO Josh Lefkowitz</a></li><li><a title="Video: Josh Lefkowitz on AlphaBay&#39;s demise" rel="nofollow" href="https://www.youtube.com/watch?v=fd6GedN3yng">Video: Josh Lefkowitz on AlphaBay's demise</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Flashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company&#39;s approach to gathering and analyzing data, and his mission to be an extension of a client&#39;s security team.</p><p>Links:</p><ul><li><a title="Flashpoint - Library" rel="nofollow" href="https://www.flashpoint-intel.com/library/">Flashpoint - Library</a></li><li><a title="&#39;7 Minutes&#39; with Flashpoint CEO Josh Lefkowitz" rel="nofollow" href="https://www.channelpartnersonline.com/article/7-minutes-with-flashpoint-ceo-josh-lefkowitz/">'7 Minutes' with Flashpoint CEO Josh Lefkowitz</a></li><li><a title="Video: Josh Lefkowitz on AlphaBay&#39;s demise" rel="nofollow" href="https://www.youtube.com/watch?v=fd6GedN3yng">Video: Josh Lefkowitz on AlphaBay's demise</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Dan Hubbard, Chief Security Architect, Lacework</title>
  <link>http://securityconversations.fireside.fm/dan-hubbard-lacework</link>
  <guid isPermaLink="false">d7db6dd9-a8d4-42ec-a94d-b51821f8e4e3</guid>
  <pubDate>Mon, 16 Jul 2018 14:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d7db6dd9-a8d4-42ec-a94d-b51821f8e4e3.mp3" length="33852535" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Lacework Chief Security Architect Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces.</itunes:subtitle>
  <itunes:duration>38:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d7db6dd9-a8d4-42ec-a94d-b51821f8e4e3/cover.jpg?v=3"/>
  <description>Lacework Chief Security Architect  Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Lacework Chief Security Architect  Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces.</p><p>Links:</p><ul><li><a title="Containers at risk (PDF direct download)" rel="nofollow" href="https://info.lacework.com/hubfs/Containers%20At-Risk_%20A%20Review%20of%2021,000%20Cloud%20Environments.pdf">Containers at risk (PDF direct download)</a></li><li><a title="Dan Hubbard on Twitter" rel="nofollow" href="https://twitter.com/dhubbard858">Dan Hubbard on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Lacework Chief Security Architect  Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces.</p><p>Links:</p><ul><li><a title="Containers at risk (PDF direct download)" rel="nofollow" href="https://info.lacework.com/hubfs/Containers%20At-Risk_%20A%20Review%20of%2021,000%20Cloud%20Environments.pdf">Containers at risk (PDF direct download)</a></li><li><a title="Dan Hubbard on Twitter" rel="nofollow" href="https://twitter.com/dhubbard858">Dan Hubbard on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Andrew Morris, Founder and CEO, GreyNoise Intelligence</title>
  <link>http://securityconversations.fireside.fm/andrew-morris-greynoise-intelligence</link>
  <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=521</guid>
  <pubDate>Thu, 31 May 2018 15:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a441617f-9c5d-49d0-8fd8-d21fc211523a.mp3" length="21465394" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Founder and CEO of GreyNoise Intelligence Andrew Morris talks about his anti threat-intelligence company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up.</itunes:subtitle>
  <itunes:duration>37:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a441617f-9c5d-49d0-8fd8-d21fc211523a/cover.jpg?v=6"/>
  <description>&lt;p&gt;Founder and CEO of GreyNoise Intelligence Andrew Morris (&lt;a href="https://twitter.com/andrew___morris"&gt;andrew___morris&lt;/a&gt;) talks about his “anti threat-intelligence” company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;a href="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3"&gt;https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3&lt;/a&gt;
 
</description>
  <content:encoded>
    <![CDATA[<p>Founder and CEO of GreyNoise Intelligence Andrew Morris (<a href="https://twitter.com/andrew___morris">andrew___morris</a>) talks about his &#8220;anti threat-intelligence&#8221; company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-521-2" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3?_=2" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3">https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3</a></audio><p>Links:</p><ul><li><a title="What is GreyNoise?" rel="nofollow" href="https://greynoise.io/blog/2018/2/1/what-is-greynoise">What is GreyNoise?</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Founder and CEO of GreyNoise Intelligence Andrew Morris (<a href="https://twitter.com/andrew___morris">andrew___morris</a>) talks about his &#8220;anti threat-intelligence&#8221; company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-521-2" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3?_=2" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3">https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3</a></audio><p>Links:</p><ul><li><a title="What is GreyNoise?" rel="nofollow" href="https://greynoise.io/blog/2018/2/1/what-is-greynoise">What is GreyNoise?</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Mischel Kwon, Founder and CEO, MKA Cyber</title>
  <link>http://securityconversations.fireside.fm/mischel-kwon-mka-cyber</link>
  <guid isPermaLink="false">1acf96d7-a561-4f6f-a936-75f92e67ca7b</guid>
  <pubDate>Thu, 26 Apr 2018 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1acf96d7-a561-4f6f-a936-75f92e67ca7b.mp3" length="43253945" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Founder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics.</itunes:subtitle>
  <itunes:duration>39:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1acf96d7-a561-4f6f-a936-75f92e67ca7b/cover.jpg?v=3"/>
  <description>Founder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Founder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics.</p><p>Links:</p><ul><li><a title="MKACyber" rel="nofollow" href="https://mkacyber.io/">MKACyber</a></li><li><a title="Mischel Kwon on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/mischelkwon/">Mischel Kwon on LinkedIn</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Founder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics.</p><p>Links:</p><ul><li><a title="MKACyber" rel="nofollow" href="https://mkacyber.io/">MKACyber</a></li><li><a title="Mischel Kwon on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/mischelkwon/">Mischel Kwon on LinkedIn</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Paul Roberts, Editor-in-Chief, Security Ledger</title>
  <link>http://securityconversations.fireside.fm/paul-roberts-security-ledger</link>
  <guid isPermaLink="false">476c43ff-be49-4057-b965-928abc39b9af</guid>
  <pubDate>Fri, 19 Jan 2018 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/476c43ff-be49-4057-b965-928abc39b9af.mp3" length="47164187" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Veteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation.</itunes:subtitle>
  <itunes:duration>40:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/476c43ff-be49-4057-b965-928abc39b9af/cover.jpg?v=5"/>
  <description>Veteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Veteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation.</p><p>Links:</p><ul><li><a title="The Security Ledger" rel="nofollow" href="https://securityledger.com/">The Security Ledger</a></li><li><a title="Paul Roberts on Twitter" rel="nofollow" href="https://twitter.com/paulfroberts">Paul Roberts on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Veteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation.</p><p>Links:</p><ul><li><a title="The Security Ledger" rel="nofollow" href="https://securityledger.com/">The Security Ledger</a></li><li><a title="Paul Roberts on Twitter" rel="nofollow" href="https://twitter.com/paulfroberts">Paul Roberts on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Dino Dai Zovi, co-founder and CTO, Capsule8</title>
  <link>http://securityconversations.fireside.fm/dino-dai-zovi-capsule8</link>
  <guid isPermaLink="false">25fade91-a24d-4173-9831-ddf30dc0d051</guid>
  <pubDate>Thu, 11 Jan 2018 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/25fade91-a24d-4173-9831-ddf30dc0d051.mp3" length="38280103" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker.</itunes:subtitle>
  <itunes:duration>39:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/25fade91-a24d-4173-9831-ddf30dc0d051/cover.jpg?v=5"/>
  <description>Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker.</p><p>Links:</p><ul><li><a title="Part One: Detecting Meltdown using Capsule8" rel="nofollow" href="https://capsule8.com/blog/detecting-meltdown-using-capsule8/">Part One: Detecting Meltdown using Capsule8</a></li><li><a title="Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels " rel="nofollow" href="https://capsule8.com/blog/detecting-meltdown-spectre-detecting-cache-side-channels/">Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels </a></li><li><a title="10 questions for MacBook hacker Dino Dai Zovi" rel="nofollow" href="https://www.zdnet.com/article/10-questions-for-macbook-hacker-dino-dai-zovi/">10 questions for MacBook hacker Dino Dai Zovi</a></li><li><a title="Dino Dai Zovi on Twitter" rel="nofollow" href="https://twitter.com/dinodaizovi">Dino Dai Zovi on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker.</p><p>Links:</p><ul><li><a title="Part One: Detecting Meltdown using Capsule8" rel="nofollow" href="https://capsule8.com/blog/detecting-meltdown-using-capsule8/">Part One: Detecting Meltdown using Capsule8</a></li><li><a title="Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels " rel="nofollow" href="https://capsule8.com/blog/detecting-meltdown-spectre-detecting-cache-side-channels/">Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels </a></li><li><a title="10 questions for MacBook hacker Dino Dai Zovi" rel="nofollow" href="https://www.zdnet.com/article/10-questions-for-macbook-hacker-dino-dai-zovi/">10 questions for MacBook hacker Dino Dai Zovi</a></li><li><a title="Dino Dai Zovi on Twitter" rel="nofollow" href="https://twitter.com/dinodaizovi">Dino Dai Zovi on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Sharon Anolik, President and Founder, Privacy Panacea</title>
  <link>http://securityconversations.fireside.fm/sharon-anolik-privacy-panacea</link>
  <guid isPermaLink="false">0a1d0429-f768-4175-8f48-9416cb420157</guid>
  <pubDate>Thu, 04 Jan 2018 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/0a1d0429-f768-4175-8f48-9416cb420157.mp3" length="48156317" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Sharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’</itunes:subtitle>
  <itunes:duration>43:51</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/0a1d0429-f768-4175-8f48-9416cb420157/cover.jpg?v=4"/>
  <description>Sharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’ 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Sharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’</p><p>Links:</p><ul><li><a title="Privacy Panacea" rel="nofollow" href="https://www.privacypanacea.com/">Privacy Panacea</a></li><li><a title="Sharon Anolik on Twitter" rel="nofollow" href="https://twitter.com/PrivacyPanacea">Sharon Anolik on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Sharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’</p><p>Links:</p><ul><li><a title="Privacy Panacea" rel="nofollow" href="https://www.privacypanacea.com/">Privacy Panacea</a></li><li><a title="Sharon Anolik on Twitter" rel="nofollow" href="https://twitter.com/PrivacyPanacea">Sharon Anolik on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Kelly Jackson Higgins, Executive Editor, Dark Reading</title>
  <link>http://securityconversations.fireside.fm/kelly-jackson-higgins-dark-reading</link>
  <guid isPermaLink="false">66709e24-8186-4569-921c-d9b48756d089</guid>
  <pubDate>Wed, 20 Dec 2017 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/66709e24-8186-4569-921c-d9b48756d089.mp3" length="35129760" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely.</itunes:subtitle>
  <itunes:duration>39:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/66709e24-8186-4569-921c-d9b48756d089/cover.jpg?v=5"/>
  <description>Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely.</p><p>Links:</p><ul><li><a title="Kelly Jackson Higgins on Twitter" rel="nofollow" href="https://twitter.com/kjhiggins">Kelly Jackson Higgins on Twitter</a></li><li><a title="Dark Reading" rel="nofollow" href="https://www.darkreading.com/">Dark Reading</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely.</p><p>Links:</p><ul><li><a title="Kelly Jackson Higgins on Twitter" rel="nofollow" href="https://twitter.com/kjhiggins">Kelly Jackson Higgins on Twitter</a></li><li><a title="Dark Reading" rel="nofollow" href="https://www.darkreading.com/">Dark Reading</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
