<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 02 May 2026 18:11:29 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Entrepreneurship”</title>
    <link>https://securityconversations.fireside.fm/tags/entrepreneurship</link>
    <pubDate>Tue, 07 Oct 2025 14:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Chris Eng on lessons learned from the NSA, @Stake, Veracode, and 20 years in cybersecurity</title>
  <link>http://securityconversations.fireside.fm/chris-eng-software-security-code-quality</link>
  <guid isPermaLink="false">e7c2f699-e4d3-4236-a521-1c1934f52674</guid>
  <pubDate>Tue, 07 Oct 2025 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e7c2f699-e4d3-4236-a521-1c1934f52674.mp3" length="29886415" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>This week on Security Conversations, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. 

Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling.</itunes:subtitle>
  <itunes:duration>44:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e7c2f699-e4d3-4236-a521-1c1934f52674/cover.jpg?v=1"/>
  <description>This week on Security Conversations, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. 
Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling. 
</description>
  <itunes:keywords>Chris Eng, Veracode, Binarly, supply chain, NSA, @Stake, Dan Geer, Monoculture, Windows, Microsoft, IIS, binary, source code</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on <em>Security Conversations</em>, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. </p>

<p>Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling.</p><p>Links:</p><ul><li><a title="Chris Eng on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/realchriseng/">Chris Eng on LinkedIn</a></li><li><a title="Chris Eng on Twitter" rel="nofollow" href="https://x.com/chriseng?lang=en">Chris Eng on Twitter</a></li><li><a title="Monoculture Considered Harmful" rel="nofollow" href="https://www.foo.be/docs/diversity/geer.pdf">Monoculture Considered Harmful</a></li><li><a title="Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’" rel="nofollow" href="https://www.computerworld.com/article/1726646/fired-stake-cto-says-microsoft-critique-was-business-as-usual.html">Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’</a></li><li><a title="Microsoft Takes LSD to Test Vista Security " rel="nofollow" href="https://www.cioinsight.com/news-trends/microsoft-takes-lsd-to-test-vista-security/">Microsoft Takes LSD to Test Vista Security </a></li><li><a title="Code Red (computer worm) " rel="nofollow" href="https://en.wikipedia.org/wiki/Code_Red_(computer_worm)">Code Red (computer worm) </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on <em>Security Conversations</em>, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. </p>

<p>Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling.</p><p>Links:</p><ul><li><a title="Chris Eng on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/realchriseng/">Chris Eng on LinkedIn</a></li><li><a title="Chris Eng on Twitter" rel="nofollow" href="https://x.com/chriseng?lang=en">Chris Eng on Twitter</a></li><li><a title="Monoculture Considered Harmful" rel="nofollow" href="https://www.foo.be/docs/diversity/geer.pdf">Monoculture Considered Harmful</a></li><li><a title="Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’" rel="nofollow" href="https://www.computerworld.com/article/1726646/fired-stake-cto-says-microsoft-critique-was-business-as-usual.html">Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’</a></li><li><a title="Microsoft Takes LSD to Test Vista Security " rel="nofollow" href="https://www.cioinsight.com/news-trends/microsoft-takes-lsd-to-test-vista-security/">Microsoft Takes LSD to Test Vista Security </a></li><li><a title="Code Red (computer worm) " rel="nofollow" href="https://en.wikipedia.org/wiki/Code_Red_(computer_worm)">Code Red (computer worm) </a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Jason Chan on Microsoft's security problems, layoffs and startups</title>
  <link>http://securityconversations.fireside.fm/jason-chan-bessemer-venture-partners</link>
  <guid isPermaLink="false">c38cc994-c217-4b50-b5bb-07900a1bee04</guid>
  <pubDate>Mon, 07 Aug 2023 07:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c38cc994-c217-4b50-b5bb-07900a1bee04.mp3" length="19285621" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Bessemer Venture Partner's Jason Chan returns to the show for a frank discussion on the state of cyber, including thoughts on Microsoft's prominent security failures, the meaning of layoffs hitting security teams, the excitement around AI, and the long road ahead.  The former Netflix security chief also talks about merging of the IT and security functions and the importance of cybersecurity proving its value to the business.</itunes:subtitle>
  <itunes:duration>27:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c38cc994-c217-4b50-b5bb-07900a1bee04/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Bessemer Venture Partner's Jason Chan returns to the show for a frank discussion on the state of cyber, including thoughts on Microsoft's prominent security failures, the meaning of layoffs hitting security teams, the excitement around AI, and the long road ahead.  The former Netflix security chief also talks about merging of the IT and security functions and the importance of cybersecurity proving its value to the business. 
</description>
  <itunes:keywords>Microsoft, entrepreneurship, generative ai, layoffs, VC funding, open source software, CISO, transparency</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Bessemer Venture Partner&#39;s Jason Chan returns to the show for a frank discussion on the state of cyber, including thoughts on Microsoft&#39;s prominent security failures, the meaning of layoffs hitting security teams, the excitement around AI, and the long road ahead.  The former Netflix security chief also talks about merging of the IT and security functions and the importance of cybersecurity proving its value to the business.</p><p>Links:</p><ul><li><a title="Jason Chan, VP, Information Security, Netflix" rel="nofollow" href="https://securityconversations.com/episode/jason-chan-vp-information-security-netflix/">Jason Chan, VP, Information Security, Netflix</a></li><li><a title="Jason Chan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/jasonbchan/">Jason Chan on LinkedIn</a></li><li><a title="Follow Jason on Twitter / X" rel="nofollow" href="https://twitter.com/chanjbs">Follow Jason on Twitter / X</a></li><li><a title="Jason Chan - Bessemer Venture Partners" rel="nofollow" href="https://www.bvp.com/team/jason-chan">Jason Chan - Bessemer Venture Partners</a> &mdash; Jason Chan&nbsp;is an operating advisor at Bessemer where he brings over twenty years of experience in cybersecurity and is especially passionate about large-scale systems, cloud security, and improving security in modern software development practices. Most recently, Jason built and led the information security team at Netflix for over a decade. His team at Netflix was known for its contributions to the security community, including over 30 open-source security releases and dozens of conference presentations. He also previously led the security team at VMware and spent most of his earlier career in security consulting.&nbsp;</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Bessemer Venture Partner&#39;s Jason Chan returns to the show for a frank discussion on the state of cyber, including thoughts on Microsoft&#39;s prominent security failures, the meaning of layoffs hitting security teams, the excitement around AI, and the long road ahead.  The former Netflix security chief also talks about merging of the IT and security functions and the importance of cybersecurity proving its value to the business.</p><p>Links:</p><ul><li><a title="Jason Chan, VP, Information Security, Netflix" rel="nofollow" href="https://securityconversations.com/episode/jason-chan-vp-information-security-netflix/">Jason Chan, VP, Information Security, Netflix</a></li><li><a title="Jason Chan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/jasonbchan/">Jason Chan on LinkedIn</a></li><li><a title="Follow Jason on Twitter / X" rel="nofollow" href="https://twitter.com/chanjbs">Follow Jason on Twitter / X</a></li><li><a title="Jason Chan - Bessemer Venture Partners" rel="nofollow" href="https://www.bvp.com/team/jason-chan">Jason Chan - Bessemer Venture Partners</a> &mdash; Jason Chan&nbsp;is an operating advisor at Bessemer where he brings over twenty years of experience in cybersecurity and is especially passionate about large-scale systems, cloud security, and improving security in modern software development practices. Most recently, Jason built and led the information security team at Netflix for over a decade. His team at Netflix was known for its contributions to the security community, including over 30 open-source security releases and dozens of conference presentations. He also previously led the security team at VMware and spent most of his earlier career in security consulting.&nbsp;</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Chainguard's Dan Lorenc gets real on software supply chain problems</title>
  <link>http://securityconversations.fireside.fm/dan-lorenc-chainguard-supply-chain</link>
  <guid isPermaLink="false">04e22eb6-dc8d-4dae-af5b-44f4d4aca81d</guid>
  <pubDate>Thu, 13 Oct 2022 08:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/04e22eb6-dc8d-4dae-af5b-44f4d4aca81d.mp3" length="36469411" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>* Episode sponsors: [Binarly](https://binarly.io/) and [FwHunt](https://fwhunt.run/) - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.

Dan Lorenc and team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government's efforts will speed up technology innovation.</itunes:subtitle>
  <itunes:duration>47:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/04e22eb6-dc8d-4dae-af5b-44f4d4aca81d/cover.jpg?v=1"/>
  <description>Episode sponsors: Binarly (https://binarly.io/) and FwHunt (https://fwhunt.run/) - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.
Dan Lorenc and a team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government's efforts will speed up technology innovation.  
</description>
  <itunes:keywords>supply chain, open source software, sbom, log4j, codecov, solarwinds, sunburst, apt, credential theft, npm, typosquatting, code quality, shift-left</itunes:keywords>
  <content:encoded>
    <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>Dan Lorenc and a team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government&#39;s efforts will speed up technology innovation. </p><p>Links:</p><ul><li><a title="Dan Lorenc on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/danlorenc/">Dan Lorenc on LinkedIn</a></li><li><a title="Chainguard Enforce" rel="nofollow" href="https://www.chainguard.dev/chainguard-enforce">Chainguard Enforce</a></li><li><a title="Sounil Yu on SBOMs, software supply chain security" rel="nofollow" href="https://securityconversations.com/episode/sounil-yu-on-sboms-software-supply-chain-security/">Sounil Yu on SBOMs, software supply chain security</a></li><li><a title="Extending SBOMs to the firmware layer" rel="nofollow" href="https://securityconversations.com/extending-sboms-to-the-firmware-layer/">Extending SBOMs to the firmware layer</a></li><li><a title="Cybersecurity Leaders Scramble to Decipher SBOM Mandate" rel="nofollow" href="https://www.securityweek.com/cybersecurity-leaders-scramble-decipher-sbom-mandate">Cybersecurity Leaders Scramble to Decipher SBOM Mandate</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>Dan Lorenc and a team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government&#39;s efforts will speed up technology innovation. </p><p>Links:</p><ul><li><a title="Dan Lorenc on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/danlorenc/">Dan Lorenc on LinkedIn</a></li><li><a title="Chainguard Enforce" rel="nofollow" href="https://www.chainguard.dev/chainguard-enforce">Chainguard Enforce</a></li><li><a title="Sounil Yu on SBOMs, software supply chain security" rel="nofollow" href="https://securityconversations.com/episode/sounil-yu-on-sboms-software-supply-chain-security/">Sounil Yu on SBOMs, software supply chain security</a></li><li><a title="Extending SBOMs to the firmware layer" rel="nofollow" href="https://securityconversations.com/extending-sboms-to-the-firmware-layer/">Extending SBOMs to the firmware layer</a></li><li><a title="Cybersecurity Leaders Scramble to Decipher SBOM Mandate" rel="nofollow" href="https://www.securityweek.com/cybersecurity-leaders-scramble-decipher-sbom-mandate">Cybersecurity Leaders Scramble to Decipher SBOM Mandate</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Tony Pepper, co-founder and CEO, Egress</title>
  <link>http://securityconversations.fireside.fm/tony-pepper-egress</link>
  <guid isPermaLink="false">d26fa37e-4956-44ec-922d-de42c4ebf58f</guid>
  <pubDate>Tue, 22 Feb 2022 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d26fa37e-4956-44ec-922d-de42c4ebf58f.mp3" length="22890355" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Chief executive officer at Egress Tony Pepper joins the show to talk about entrepreneurship in the fast-paced age of modern computing, the state of e-mail security, and his company's bet on securing the future of messaging in the enterprise.</itunes:subtitle>
  <itunes:duration>19:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d26fa37e-4956-44ec-922d-de42c4ebf58f/cover.jpg?v=2"/>
  <description>Chief executive officer at Egress Tony Pepper joins the show to talk about entrepreneurship in the fast-paced age of modern computing, the state of e-mail security, and his company's bet on securing the future of messaging in the enterprise. 
</description>
  <itunes:keywords>email security, messaging, teams, slack, whatsapp, email</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Chief executive officer at Egress Tony Pepper joins the show to talk about entrepreneurship in the fast-paced age of modern computing, the state of e-mail security, and his company&#39;s bet on securing the future of messaging in the enterprise.</p><p>Links:</p><ul><li><a title="About Egress" rel="nofollow" href="https://www.egress.com/about">About Egress</a></li><li><a title="Tony Pepper on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/tony-pepper-023298">Tony Pepper on LinkedIn</a></li><li><a title="InfoSecurity Interview: Tony Pepper " rel="nofollow" href="https://www.infosecurity-magazine.com/interviews/tony-pepper-egress-acquisition/">InfoSecurity Interview: Tony Pepper </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Chief executive officer at Egress Tony Pepper joins the show to talk about entrepreneurship in the fast-paced age of modern computing, the state of e-mail security, and his company&#39;s bet on securing the future of messaging in the enterprise.</p><p>Links:</p><ul><li><a title="About Egress" rel="nofollow" href="https://www.egress.com/about">About Egress</a></li><li><a title="Tony Pepper on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/tony-pepper-023298">Tony Pepper on LinkedIn</a></li><li><a title="InfoSecurity Interview: Tony Pepper " rel="nofollow" href="https://www.infosecurity-magazine.com/interviews/tony-pepper-egress-acquisition/">InfoSecurity Interview: Tony Pepper </a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Matt Suiche, Comae Technologies</title>
  <link>http://securityconversations.fireside.fm/matt-suiche-comae</link>
  <guid isPermaLink="false">9a77e22d-d2e8-4f91-a79b-f6edb4f69eaa</guid>
  <pubDate>Fri, 17 Apr 2020 06:45:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/9a77e22d-d2e8-4f91-a79b-f6edb4f69eaa.mp3" length="35719975" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Hacker-turned-entrepreneur Matt Suiche reminisces about the hacking scene in France, his introduction to memory forensics, building a selling a company, and his passion for spreading security research in developing countries.</itunes:subtitle>
  <itunes:duration>42:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/9a77e22d-d2e8-4f91-a79b-f6edb4f69eaa/cover.jpg?v=4"/>
  <description>Hacker-turned-entrepreneur Matt Suiche reminisces about the hacking scene in France, his introduction to memory forensics and how his research led to presenting at Microsoft's Blue Hat, the grind of building and selling a company, and his passion for supporting young security researchers in developing countries.  
</description>
  <itunes:keywords>memory forensics, community building, africa, entrepreneurship</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Hacker-turned-entrepreneur Matt Suiche reminisces about the hacking scene in France, his introduction to memory forensics and how his research led to presenting at Microsoft&#39;s Blue Hat, the grind of building and selling a company, and his passion for supporting young security researchers in developing countries. </p><p>Links:</p><ul><li><a title="OPCDE Online" rel="nofollow" href="https://online.opcde.com">OPCDE Online</a></li><li><a title="Comae Technologies" rel="nofollow" href="https://www.comae.com/">Comae Technologies</a></li><li><a title="Follow Matt Suiche on Twitter" rel="nofollow" href="https://twitter.com/msuiche">Follow Matt Suiche on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Hacker-turned-entrepreneur Matt Suiche reminisces about the hacking scene in France, his introduction to memory forensics and how his research led to presenting at Microsoft&#39;s Blue Hat, the grind of building and selling a company, and his passion for supporting young security researchers in developing countries. </p><p>Links:</p><ul><li><a title="OPCDE Online" rel="nofollow" href="https://online.opcde.com">OPCDE Online</a></li><li><a title="Comae Technologies" rel="nofollow" href="https://www.comae.com/">Comae Technologies</a></li><li><a title="Follow Matt Suiche on Twitter" rel="nofollow" href="https://twitter.com/msuiche">Follow Matt Suiche on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
