<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 07 Apr 2026 11:43:32 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Pen Testing”</title>
    <link>https://securityconversations.fireside.fm/tags/pen-testing</link>
    <pubDate>Wed, 12 Jul 2023 09:15:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Kymberlee Price reflects on life at the MSRC, hacker/vendor engagement, bug bounties</title>
  <link>http://securityconversations.fireside.fm/kymberlee-price</link>
  <guid isPermaLink="false">ba435301-e21a-48fa-86e5-f60fac79d8c7</guid>
  <pubDate>Wed, 12 Jul 2023 09:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/ba435301-e21a-48fa-86e5-f60fac79d8c7.mp3" length="45477037" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</itunes:subtitle>
  <itunes:duration>48:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/ba435301-e21a-48fa-86e5-f60fac79d8c7/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market. 
</description>
  <itunes:keywords>microsoft, msrc, bug bounties, product security, appsec</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</p><p>Links:</p><ul><li><a title="Kymberlee Price on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/kymberleeprice/">Kymberlee Price on LinkedIn</a></li><li><a title="BlueHat Seattle Closing Remarks - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=fDoejozUz2w&amp;ab_channel=MicrosoftSecurityResponseCenter%28MSRC%29">BlueHat Seattle Closing Remarks - YouTube</a></li><li><a title="Keynote: Defenders Assemble - Kymberlee Price" rel="nofollow" href="https://www.youtube.com/watch?v=OG-YbSwN9VA&amp;ab_channel=AppSecPacificNorthwest">Keynote: Defenders Assemble - Kymberlee Price</a></li><li><a title="BlueHat | Microsoft" rel="nofollow" href="https://www.microsoft.com/bluehat/">BlueHat | Microsoft</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</p><p>Links:</p><ul><li><a title="Kymberlee Price on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/kymberleeprice/">Kymberlee Price on LinkedIn</a></li><li><a title="BlueHat Seattle Closing Remarks - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=fDoejozUz2w&amp;ab_channel=MicrosoftSecurityResponseCenter%28MSRC%29">BlueHat Seattle Closing Remarks - YouTube</a></li><li><a title="Keynote: Defenders Assemble - Kymberlee Price" rel="nofollow" href="https://www.youtube.com/watch?v=OG-YbSwN9VA&amp;ab_channel=AppSecPacificNorthwest">Keynote: Defenders Assemble - Kymberlee Price</a></li><li><a title="BlueHat | Microsoft" rel="nofollow" href="https://www.microsoft.com/bluehat/">BlueHat | Microsoft</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Vinnie Liu discusses a life in the offensive security trenches</title>
  <link>http://securityconversations.fireside.fm/vinnie-liu-bishop-fox</link>
  <guid isPermaLink="false">7a9eb978-4725-4bcf-8c04-525df6c2bcff</guid>
  <pubDate>Sun, 07 Aug 2022 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7a9eb978-4725-4bcf-8c04-525df6c2bcff.mp3" length="162616279" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a 'growth mode' investment, cybersecurity's people problem, and much more...</itunes:subtitle>
  <itunes:duration>1:07:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7a9eb978-4725-4bcf-8c04-525df6c2bcff/cover.jpg?v=1"/>
  <description>A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a 'growth mode' investment, cybersecurity's people problem, and much more... 
</description>
  <itunes:keywords>red team, blue team, offense vs defense, simulated hacking attacks</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a &#39;growth mode&#39; investment, cybersecurity&#39;s people problem, and much more...</p><p>Links:</p><ul><li><a title="Vinnie Liu on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/vinnieliu/">Vinnie Liu on LinkedIn</a></li><li><a title="Vinnie Liu at MS BlueHat v8" rel="nofollow" href="https://www.youtube.com/watch?v=WC7kpauRr9s&amp;ab_channel=BishopFox">Vinnie Liu at MS BlueHat v8</a></li><li><a title="Anti-Drone Tools Tested: From Shotguns To Superdrones" rel="nofollow" href="https://www.wired.com/story/watch-anti-drone-weapons-test/">Anti-Drone Tools Tested: From Shotguns To Superdrones</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a &#39;growth mode&#39; investment, cybersecurity&#39;s people problem, and much more...</p><p>Links:</p><ul><li><a title="Vinnie Liu on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/vinnieliu/">Vinnie Liu on LinkedIn</a></li><li><a title="Vinnie Liu at MS BlueHat v8" rel="nofollow" href="https://www.youtube.com/watch?v=WC7kpauRr9s&amp;ab_channel=BishopFox">Vinnie Liu at MS BlueHat v8</a></li><li><a title="Anti-Drone Tools Tested: From Shotguns To Superdrones" rel="nofollow" href="https://www.wired.com/story/watch-anti-drone-weapons-test/">Anti-Drone Tools Tested: From Shotguns To Superdrones</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Collin Greene, head of product security, Facebook</title>
  <link>http://securityconversations.fireside.fm/collin-greene-facebook-product-security</link>
  <guid isPermaLink="false">5ca053c8-a041-4288-add6-49c3c7f84bbd</guid>
  <pubDate>Tue, 25 May 2021 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/5ca053c8-a041-4288-add6-49c3c7f84bbd.mp3" length="55918822" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Facebook product security leader Collin Greene joins the show to discuss philosophies around securing code at scale, the pros and cons of relying on bug-bounty programs, the humbling lessons from being on the wrong side of a malicious hack, and why "shift-left" should be the priority for every defender.</itunes:subtitle>
  <itunes:duration>1:01:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/5ca053c8-a041-4288-add6-49c3c7f84bbd/cover.jpg?v=1"/>
  <description>Facebook product security leader Collin Greene joins the show to discuss philosophies around securing code at scale, the pros and cons of relying on bug-bounty programs, the humbling lessons from being on the wrong side of a malicious hack, and why "shift-left" should be the priority for every defender. 
</description>
  <itunes:keywords>bug bounties, pen-testing, security assessments, web app security, product security, facebook</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Facebook product security leader Collin Greene joins the show to discuss philosophies around securing code at scale, the pros and cons of relying on bug-bounty programs, the humbling lessons from being on the wrong side of a malicious hack, and why &quot;shift-left&quot; should be the priority for every defender.</p><p>Links:</p><ul><li><a title="Six Buckets of Product Security" rel="nofollow" href="http://collingreene.com/6_buckets_of_prodsec.html">Six Buckets of Product Security</a></li><li><a title="Outcomes &gt; Bugs" rel="nofollow" href="http://collingreene.com/outcomes_over_bugs.html">Outcomes &gt; Bugs</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Facebook product security leader Collin Greene joins the show to discuss philosophies around securing code at scale, the pros and cons of relying on bug-bounty programs, the humbling lessons from being on the wrong side of a malicious hack, and why &quot;shift-left&quot; should be the priority for every defender.</p><p>Links:</p><ul><li><a title="Six Buckets of Product Security" rel="nofollow" href="http://collingreene.com/6_buckets_of_prodsec.html">Six Buckets of Product Security</a></li><li><a title="Outcomes &gt; Bugs" rel="nofollow" href="http://collingreene.com/outcomes_over_bugs.html">Outcomes &gt; Bugs</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Shubs Shah on finding riches (and lessons) from bug bounty hacking</title>
  <link>http://securityconversations.fireside.fm/shuhbam-shah-assetnote</link>
  <guid isPermaLink="false">8ca9fe4a-f12f-401f-80d8-f42f8c1e7504</guid>
  <pubDate>Tue, 20 Apr 2021 11:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/8ca9fe4a-f12f-401f-80d8-f42f8c1e7504.mp3" length="38562676" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle> Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs.  He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors.   Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about  the stressful life of a fulltime bug-bounty hunter, advancements in web app security defense, and how automation is completely rewriting the bug-discovery business.</itunes:subtitle>
  <itunes:duration>52:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/8ca9fe4a-f12f-401f-80d8-f42f8c1e7504/cover.jpg?v=1"/>
  <description>Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs.  He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors.   Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about  the stressful life of a fulltime bug-bounty hunter, advancements in web app security defense, and how automation is completely rewriting the bug-discovery business. 
</description>
  <itunes:keywords>bug bounties, pen-testing, security assessments, web app security, continuous testing, h2c smuggling</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs.  He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors.   Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about  the stressful life of a fulltime bug-bounty hunter, advancements in web app security defense, and how automation is completely rewriting the bug-discovery business.</p><p>Links:</p><ul><li><a title="Assetnote" rel="nofollow" href="https://assetnote.io">Assetnote</a></li><li><a title="Shubs Shah: Hacking on Bug Bounties for Four Years" rel="nofollow" href="https://blog.assetnote.io/2020/09/15/hacking-on-bug-bounties-for-four-years/">Shubs Shah: Hacking on Bug Bounties for Four Years</a></li><li><a title="High frequency security: 120 days, 120 bugs" rel="nofollow" href="https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/">High frequency security: 120 days, 120 bugs</a></li><li><a title="h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)" rel="nofollow" href="https://labs.bishopfox.com/tech-blog/h2c-smuggling-request-smuggling-via-http/2-cleartext-h2c">h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)</a></li><li><a title="H2C Smuggling in the Wild" rel="nofollow" href="https://blog.assetnote.io/2021/03/18/h2c-smuggling/">H2C Smuggling in the Wild</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs.  He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors.   Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about  the stressful life of a fulltime bug-bounty hunter, advancements in web app security defense, and how automation is completely rewriting the bug-discovery business.</p><p>Links:</p><ul><li><a title="Assetnote" rel="nofollow" href="https://assetnote.io">Assetnote</a></li><li><a title="Shubs Shah: Hacking on Bug Bounties for Four Years" rel="nofollow" href="https://blog.assetnote.io/2020/09/15/hacking-on-bug-bounties-for-four-years/">Shubs Shah: Hacking on Bug Bounties for Four Years</a></li><li><a title="High frequency security: 120 days, 120 bugs" rel="nofollow" href="https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/">High frequency security: 120 days, 120 bugs</a></li><li><a title="h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)" rel="nofollow" href="https://labs.bishopfox.com/tech-blog/h2c-smuggling-request-smuggling-via-http/2-cleartext-h2c">h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)</a></li><li><a title="H2C Smuggling in the Wild" rel="nofollow" href="https://blog.assetnote.io/2021/03/18/h2c-smuggling/">H2C Smuggling in the Wild</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
