<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 08:54:24 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Red Teaming”</title>
    <link>https://securityconversations.fireside.fm/tags/red-teaming</link>
    <pubDate>Mon, 06 Aug 2018 08:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Christine Gadsby, Director of Product Security Operations, BlackBerry</title>
  <link>http://securityconversations.fireside.fm/christine-gadsby-blackberry</link>
  <guid isPermaLink="false">37e1bbf9-9add-4a52-9c5e-dc0940f670b6</guid>
  <pubDate>Mon, 06 Aug 2018 08:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/37e1bbf9-9add-4a52-9c5e-dc0940f670b6.mp3" length="26141237" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>BlackBerry security response executive Christine Gadsby joins the podcast to talk about tough decisions around shipping secure software, the challenges of securing supply chain dependencies, BlackBerry's new ransomware recovery feature, and her upcoming Black Hat 2018 presentation.</itunes:subtitle>
  <itunes:duration>27:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/37e1bbf9-9add-4a52-9c5e-dc0940f670b6/cover.jpg?v=3"/>
  <description>BlackBerry security response executive Christine Gadsby joins the podcast to talk about tough decisions around shipping secure software, the challenges of securing supply chain dependencies, BlackBerry's new ransomware recovery feature, and her upcoming Black Hat 2018 presentation. 
</description>
  <itunes:keywords>vulnerabilities, blackberry, securityresponse, CISOs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>BlackBerry security response executive Christine Gadsby joins the podcast to talk about tough decisions around shipping secure software, the challenges of securing supply chain dependencies, BlackBerry&#39;s new ransomware recovery feature, and her upcoming Black Hat 2018 presentation.</p><p>Links:</p><ul><li><a title="Black Hat 2018: Stop that Release There&#39;s a Vulnerability!" rel="nofollow" href="https://www.blackhat.com/us-18/briefings.html#stop-that-release-theres-a-vulnerability">Black Hat 2018: Stop that Release There's a Vulnerability!</a></li><li><a title="Christine Gadsby on Twitter" rel="nofollow" href="https://twitter.com/ChristineGadsby">Christine Gadsby on Twitter</a></li><li><a title="BlackBerry Enterprise Software - Security &amp; Management for the Enterprise of Things" rel="nofollow" href="https://us.blackberry.com/enterprise">BlackBerry Enterprise Software - Security &amp; Management for the Enterprise of Things</a></li><li><a title="Christine Gadsby on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/bbchristine/">Christine Gadsby on LinkedIn</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>BlackBerry security response executive Christine Gadsby joins the podcast to talk about tough decisions around shipping secure software, the challenges of securing supply chain dependencies, BlackBerry&#39;s new ransomware recovery feature, and her upcoming Black Hat 2018 presentation.</p><p>Links:</p><ul><li><a title="Black Hat 2018: Stop that Release There&#39;s a Vulnerability!" rel="nofollow" href="https://www.blackhat.com/us-18/briefings.html#stop-that-release-theres-a-vulnerability">Black Hat 2018: Stop that Release There's a Vulnerability!</a></li><li><a title="Christine Gadsby on Twitter" rel="nofollow" href="https://twitter.com/ChristineGadsby">Christine Gadsby on Twitter</a></li><li><a title="BlackBerry Enterprise Software - Security &amp; Management for the Enterprise of Things" rel="nofollow" href="https://us.blackberry.com/enterprise">BlackBerry Enterprise Software - Security &amp; Management for the Enterprise of Things</a></li><li><a title="Christine Gadsby on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/bbchristine/">Christine Gadsby on LinkedIn</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Chad Loder, co-founder and CEO, Habitu8</title>
  <link>http://securityconversations.fireside.fm/chad-loder-habitu8</link>
  <guid isPermaLink="false">d2f343f6-c9ae-4e29-a5be-bf8f746446b6</guid>
  <pubDate>Tue, 31 Jul 2018 09:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d2f343f6-c9ae-4e29-a5be-bf8f746446b6.mp3" length="45359306" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Cybersecurity industry veteran Chad Loder talks about his time as co-founder of Rapid7, the decision to acquire Metasploit, lessons learned from moving to the CISO chair and why the industry still struggles with security awareness training.</itunes:subtitle>
  <itunes:duration>53:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d2f343f6-c9ae-4e29-a5be-bf8f746446b6/cover.jpg?v=3"/>
  <description>Cybersecurity industry veteran Chad Loder talks about his time as co-founder of Rapid7, the decision to acquire Metasploit, lessons learned from moving to the CISO chair and why the industry still struggles with security awareness training. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Cybersecurity industry veteran Chad Loder talks about his time as co-founder of Rapid7, the decision to acquire Metasploit, lessons learned from moving to the CISO chair and why the industry still struggles with security awareness training.</p><p>Links:</p><ul><li><a title="About Habitu8" rel="nofollow" href="https://www.habitu8.io/about-us/">About Habitu8</a></li><li><a title="Chad Loder on Twitter" rel="nofollow" href="https://twitter.com/chadloder">Chad Loder on Twitter</a></li><li><a title="Rapid7 Acquires Metasploit" rel="nofollow" href="https://www.businesswire.com/news/home/20091021005675/en/Rapid7-Acquires-Metasploit">Rapid7 Acquires Metasploit</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Cybersecurity industry veteran Chad Loder talks about his time as co-founder of Rapid7, the decision to acquire Metasploit, lessons learned from moving to the CISO chair and why the industry still struggles with security awareness training.</p><p>Links:</p><ul><li><a title="About Habitu8" rel="nofollow" href="https://www.habitu8.io/about-us/">About Habitu8</a></li><li><a title="Chad Loder on Twitter" rel="nofollow" href="https://twitter.com/chadloder">Chad Loder on Twitter</a></li><li><a title="Rapid7 Acquires Metasploit" rel="nofollow" href="https://www.businesswire.com/news/home/20091021005675/en/Rapid7-Acquires-Metasploit">Rapid7 Acquires Metasploit</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Wim Remes, CEO and Principal Researcher, Wire Security</title>
  <link>http://securityconversations.fireside.fm/wim-remes-wire-security</link>
  <guid isPermaLink="false">2eee789f-5d35-4620-bef5-79a98b867ffb</guid>
  <pubDate>Mon, 23 Jul 2018 12:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/2eee789f-5d35-4620-bef5-79a98b867ffb.mp3" length="29368681" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Founder and CEO of Wire Security Wim Remes discusses the intricacies of penetration testing, red-teaming, bug bounties, and calls for defenders to embrace continuous pen-testing.</itunes:subtitle>
  <itunes:duration>40:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/2eee789f-5d35-4620-bef5-79a98b867ffb/cover.jpg?v=3"/>
  <description>Founder and CEO of Wire Security, Wim Remes, joins the podcast to discuss the intricacies of penetration testing, red-teaming, bug bounty programs, and calls for defenders to embrace continuous pen-testing. 
</description>
  <content:encoded>
    <![CDATA[<p>Founder and CEO of Wire Security, Wim Remes, joins the podcast to discuss the intricacies of penetration testing, red-teaming, bug bounty programs, and calls for defenders to embrace continuous pen-testing.</p><p>Links:</p><ul><li><a title="Wim Remes on GitHub" rel="nofollow" href="https://github.com/wimremes/">Wim Remes on GitHub</a></li><li><a title="Wim Remes on Twitter" rel="nofollow" href="https://twitter.com/wimremes">Wim Remes on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Founder and CEO of Wire Security, Wim Remes, joins the podcast to discuss the intricacies of penetration testing, red-teaming, bug bounty programs, and calls for defenders to embrace continuous pen-testing.</p><p>Links:</p><ul><li><a title="Wim Remes on GitHub" rel="nofollow" href="https://github.com/wimremes/">Wim Remes on GitHub</a></li><li><a title="Wim Remes on Twitter" rel="nofollow" href="https://twitter.com/wimremes">Wim Remes on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Rick Holland, CISO and VP of Strategy, Digital Shadows</title>
  <link>http://securityconversations.fireside.fm/rick-holland-digital-shadows</link>
  <guid isPermaLink="false">5714f72d-d6d1-4ec0-9ba7-0b5ffbd297de</guid>
  <pubDate>Tue, 24 Apr 2018 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/5714f72d-d6d1-4ec0-9ba7-0b5ffbd297de.mp3" length="55915215" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>CISO and VP of Strategy at Digital Shadows Rick Holland discusses his path in the information security industry, advancements in the threat intel space, and his passion for good bar-b-que.</itunes:subtitle>
  <itunes:duration>35:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/5714f72d-d6d1-4ec0-9ba7-0b5ffbd297de/cover.jpg?v=3"/>
  <description>CISO and VP of Strategy at Digital Shadows Rick Holland discusses his path in the information security industry, advancements in the threat intel space, and his passion for good bar-b-que. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>CISO and VP of Strategy at Digital Shadows Rick Holland discusses his path in the information security industry, advancements in the threat intel space, and his passion for good bar-b-que.</p><p>Links:</p><ul><li><a title="Rick Holland on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/rick-holland-4737a93/">Rick Holland on LinkedIn</a></li><li><a title="Digital Shadows" rel="nofollow" href="https://www.digitalshadows.com/">Digital Shadows</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>CISO and VP of Strategy at Digital Shadows Rick Holland discusses his path in the information security industry, advancements in the threat intel space, and his passion for good bar-b-que.</p><p>Links:</p><ul><li><a title="Rick Holland on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/rick-holland-4737a93/">Rick Holland on LinkedIn</a></li><li><a title="Digital Shadows" rel="nofollow" href="https://www.digitalshadows.com/">Digital Shadows</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Zane Lackey, Chief Security Officer, Signal Sciences</title>
  <link>http://securityconversations.fireside.fm/zane-lackey-signal-sciences</link>
  <guid isPermaLink="false">517fd50b-7794-4b77-a0f5-4c898524b014</guid>
  <pubDate>Mon, 16 Apr 2018 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/517fd50b-7794-4b77-a0f5-4c898524b014.mp3" length="42101169" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Co-founder and Chief Security Officer at Signal Sciences Zane Lackey riffs on DevOps, the almost impossible task of defending organizations from intruders, bug bounties versus penetration testing, and the pros and cons of launching a company with venture capital investment.</itunes:subtitle>
  <itunes:duration>41:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/517fd50b-7794-4b77-a0f5-4c898524b014/cover.jpg?v=3"/>
  <description>Co-founder and Chief Security Officer at Signal Sciences Zane Lackey riffs on DevOps, the almost impossible task of defending organizations from intruders, bug bounties versus penetration testing, and the pros and cons of launching a company with venture capital investment. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Co-founder and Chief Security Officer at Signal Sciences Zane Lackey riffs on DevOps, the almost impossible task of defending organizations from intruders, bug bounties versus penetration testing, and the pros and cons of launching a company with venture capital investment.</p><p>Links:</p><ul><li><a title="Zane Lackey on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/zane-lackey-66a3404/">Zane Lackey on LinkedIn</a></li><li><a title="Signal Sciences -The Next-Gen Web Protection Platform" rel="nofollow" href="https://www.signalsciences.com/">Signal Sciences -The Next-Gen Web Protection Platform</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Co-founder and Chief Security Officer at Signal Sciences Zane Lackey riffs on DevOps, the almost impossible task of defending organizations from intruders, bug bounties versus penetration testing, and the pros and cons of launching a company with venture capital investment.</p><p>Links:</p><ul><li><a title="Zane Lackey on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/zane-lackey-66a3404/">Zane Lackey on LinkedIn</a></li><li><a title="Signal Sciences -The Next-Gen Web Protection Platform" rel="nofollow" href="https://www.signalsciences.com/">Signal Sciences -The Next-Gen Web Protection Platform</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Haroon Meer, CEO, Thinkst Applied Research</title>
  <link>http://securityconversations.fireside.fm/haroon-meer-thinkst-applied-research</link>
  <guid isPermaLink="false">21e54dc1-246e-4efb-a0dd-9cd1ab69a610</guid>
  <pubDate>Thu, 12 Apr 2018 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/21e54dc1-246e-4efb-a0dd-9cd1ab69a610.mp3" length="49733509" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Thinkst founder Haroon Meer talks about building a security company from scratch without VC funding, using Canaries to pinpoint signs of intruder activity, advancements in security research, and the state of the bug bounty market.</itunes:subtitle>
  <itunes:duration>1:00:26</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/21e54dc1-246e-4efb-a0dd-9cd1ab69a610/cover.jpg?v=3"/>
  <description>Thinkst founder Haroon Meer talks about building a security company from scratch without VC funding, using Canaries to pinpoint signs of intruder activity, advancements in security research, and the state of the bug bounty market. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Thinkst founder Haroon Meer talks about building a security company from scratch without VC funding, using Canaries to pinpoint signs of intruder activity, advancements in security research, and the state of the bug bounty market.</p><p>Links:</p><ul><li><a title="Thinkst Canary - how it works" rel="nofollow" href="https://canary.tools/#how-it-works">Thinkst Canary - how it works</a></li><li><a title="Video : Enterprise security - A new hope" rel="nofollow" href="https://www.youtube.com/watch?v=gbbq7FSPxdA">Video : Enterprise security - A new hope</a></li><li><a title="Haroon Meer on Twitter" rel="nofollow" href="https://twitter.com/haroonmeer">Haroon Meer on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Thinkst founder Haroon Meer talks about building a security company from scratch without VC funding, using Canaries to pinpoint signs of intruder activity, advancements in security research, and the state of the bug bounty market.</p><p>Links:</p><ul><li><a title="Thinkst Canary - how it works" rel="nofollow" href="https://canary.tools/#how-it-works">Thinkst Canary - how it works</a></li><li><a title="Video : Enterprise security - A new hope" rel="nofollow" href="https://www.youtube.com/watch?v=gbbq7FSPxdA">Video : Enterprise security - A new hope</a></li><li><a title="Haroon Meer on Twitter" rel="nofollow" href="https://twitter.com/haroonmeer">Haroon Meer on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>David (int eighty), Dual Core</title>
  <link>http://securityconversations.fireside.fm/int-eighty-dual-core</link>
  <guid isPermaLink="false">76f82d6c-8983-4786-abaf-d0426dc65a4c</guid>
  <pubDate>Wed, 11 Apr 2018 15:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/76f82d6c-8983-4786-abaf-d0426dc65a4c.mp3" length="34938743" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Red teamer and security researcher by day, nerdcore rapper by night, ‘int eighty’ joins the podcast to talk about his work breaking into computer systems, common security mistakes that people make, and his double life as a musician in Dual Core.</itunes:subtitle>
  <itunes:duration>39:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/76f82d6c-8983-4786-abaf-d0426dc65a4c/cover.jpg?v=4"/>
  <description>Red teamer and security researcher by day, nerdcore rapper by night, ‘int eighty’ joins the podcast to talk about his work breaking into computer systems, common security mistakes that people make, and his double life as a musician in Dual Core. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Red teamer and security researcher by day, nerdcore rapper by night, ‘int eighty’ joins the podcast to talk about his work breaking into computer systems, common security mistakes that people make, and his double life as a musician in Dual Core.</p><p>Links:</p><ul><li><a title="Dual Core / International hip hop duo" rel="nofollow" href="http://dualcoremusic.com/nerdcore/">Dual Core / International hip hop duo</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Red teamer and security researcher by day, nerdcore rapper by night, ‘int eighty’ joins the podcast to talk about his work breaking into computer systems, common security mistakes that people make, and his double life as a musician in Dual Core.</p><p>Links:</p><ul><li><a title="Dual Core / International hip hop duo" rel="nofollow" href="http://dualcoremusic.com/nerdcore/">Dual Core / International hip hop duo</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Dennis Fisher, Editor-in-Chief, Decipher</title>
  <link>http://securityconversations.fireside.fm/dennis-fisher-decipher</link>
  <guid isPermaLink="false">470c2cbd-ffb9-4df1-aa97-1e70410dcc81</guid>
  <pubDate>Thu, 05 Apr 2018 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/470c2cbd-ffb9-4df1-aa97-1e70410dcc81.mp3" length="36569236" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Veteran cybersecurity writer Dennis Fisher joins the podcast to talk about his new journalism venture at decipher.sc, his preference for long-form writing, and the trends worth following in the security space.</itunes:subtitle>
  <itunes:duration>43:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/470c2cbd-ffb9-4df1-aa97-1e70410dcc81/cover.jpg?v=4"/>
  <description>Veteran cybersecurity writer Dennis Fisher joins the podcast to talk about his new journalism venture at decipher.sc, his preference for long-form writing, and the trends worth following in the security space. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Veteran cybersecurity writer Dennis Fisher joins the podcast to talk about his new journalism venture at decipher.sc, his preference for long-form writing, and the trends worth following in the security space.</p><p>Links:</p><ul><li><a title="Dennis Fisher | Decipher" rel="nofollow" href="https://duo.com/decipher/article_author/dfisher">Dennis Fisher | Decipher</a> &mdash; He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.</li><li><a title="Dennis Fisher on Twitter" rel="nofollow" href="https://twitter.com/DennisF">Dennis Fisher on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Veteran cybersecurity writer Dennis Fisher joins the podcast to talk about his new journalism venture at decipher.sc, his preference for long-form writing, and the trends worth following in the security space.</p><p>Links:</p><ul><li><a title="Dennis Fisher | Decipher" rel="nofollow" href="https://duo.com/decipher/article_author/dfisher">Dennis Fisher | Decipher</a> &mdash; He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.</li><li><a title="Dennis Fisher on Twitter" rel="nofollow" href="https://twitter.com/DennisF">Dennis Fisher on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Will Lin, Principal and Founding Investor, ForgePoint Capital</title>
  <link>http://securityconversations.fireside.fm/will-lin-forgepoint-capital</link>
  <guid isPermaLink="false">2f444967-e9fd-4c80-87eb-5ff56aee1ae4</guid>
  <pubDate>Fri, 02 Mar 2018 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/2f444967-e9fd-4c80-87eb-5ff56aee1ae4.mp3" length="43759308" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Principal and founding investor at ForgePoint Capital Cybersecurity William Lin talks about venture capital activity in the security space, sectors that are ripe for investment, missed bets on successful companies, and the cybersecurity talent shortage.</itunes:subtitle>
  <itunes:duration>55:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/2f444967-e9fd-4c80-87eb-5ff56aee1ae4/cover.jpg?v=3"/>
  <description>Principal and founding investor at ForgePoint Capital Cybersecurity William Lin talks about venture capital activity in the security space, sectors that are ripe for investment, missed bets on successful companies, and the cybersecurity talent shortage. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Principal and founding investor at ForgePoint Capital Cybersecurity William Lin talks about venture capital activity in the security space, sectors that are ripe for investment, missed bets on successful companies, and the cybersecurity talent shortage.</p><p>Links:</p><ul><li><a title="William Lin on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/linwilliam/">William Lin on LinkedIn</a></li><li><a title="Forgepoint portfolio companies" rel="nofollow" href="https://forgepointcap.com/companies/">Forgepoint portfolio companies</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Principal and founding investor at ForgePoint Capital Cybersecurity William Lin talks about venture capital activity in the security space, sectors that are ripe for investment, missed bets on successful companies, and the cybersecurity talent shortage.</p><p>Links:</p><ul><li><a title="William Lin on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/linwilliam/">William Lin on LinkedIn</a></li><li><a title="Forgepoint portfolio companies" rel="nofollow" href="https://forgepointcap.com/companies/">Forgepoint portfolio companies</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Masha Sedova, co-founder, Elevate Security</title>
  <link>http://securityconversations.fireside.fm/masha-sedova-elevate-security</link>
  <guid isPermaLink="false">fa20320a-7a94-45b5-b054-bbe06d3b723b</guid>
  <pubDate>Fri, 26 Jan 2018 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/fa20320a-7a94-45b5-b054-bbe06d3b723b.mp3" length="33579206" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>As businesses struggle with security awareness training for employees, Elevate Security co-founder Masha Sedova argues that the focus should be on “behavior change” and recommends the use of positive motivation and available tools to get employees to make better security decisions.</itunes:subtitle>
  <itunes:duration>30:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/fa20320a-7a94-45b5-b054-bbe06d3b723b/cover.jpg?v=4"/>
  <description>As businesses struggle with security awareness training for employees, Elevate Security co-founder Masha Sedova argues that the focus should be on “behavior change” and recommends the use of positive motivation and available tools to get employees to make better security decisions. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>As businesses struggle with security awareness training for employees, Elevate Security co-founder Masha Sedova argues that the focus should be on “behavior change” and recommends the use of positive motivation and available tools to get employees to make better security decisions.</p><p>Links:</p><ul><li><a title="Masha Sedova on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/msedova/">Masha Sedova on LinkedIn</a></li><li><a title="Hacker&#39;s Mind by Elevate Security" rel="nofollow" href="https://elevatesecurity.com/hackers-mind/">Hacker's Mind by Elevate Security</a></li><li><a title="Masha Sedova on Twitter" rel="nofollow" href="https://twitter.com/modMasha">Masha Sedova on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>As businesses struggle with security awareness training for employees, Elevate Security co-founder Masha Sedova argues that the focus should be on “behavior change” and recommends the use of positive motivation and available tools to get employees to make better security decisions.</p><p>Links:</p><ul><li><a title="Masha Sedova on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/msedova/">Masha Sedova on LinkedIn</a></li><li><a title="Hacker&#39;s Mind by Elevate Security" rel="nofollow" href="https://elevatesecurity.com/hackers-mind/">Hacker's Mind by Elevate Security</a></li><li><a title="Masha Sedova on Twitter" rel="nofollow" href="https://twitter.com/modMasha">Masha Sedova on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Katie Moussouris, co-founder and CEO, Luta Security</title>
  <link>http://securityconversations.fireside.fm/katie-moussouris-luta-security</link>
  <guid isPermaLink="false">1bdec75a-1efc-454a-ad6b-8f56c2b526b7</guid>
  <pubDate>Wed, 06 Dec 2017 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1bdec75a-1efc-454a-ad6b-8f56c2b526b7.mp3" length="54354347" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Computer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry.</itunes:subtitle>
  <itunes:duration>52:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1bdec75a-1efc-454a-ad6b-8f56c2b526b7/cover.jpg?v=5"/>
  <description>Computer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry. 
</description>
  <itunes:keywords>cybersecurity, CISOs, bugbounty</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Computer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry.</p><p>Links:</p><ul><li><a title="Luta Security" rel="nofollow" href="http://lutasecurity.com/">Luta Security</a></li><li><a title="How I Got Here: Katie Moussouris" rel="nofollow" href="https://threatpost.com/how-i-got-here-katie-moussouris/102784/">How I Got Here: Katie Moussouris</a></li><li><a title="It’s dangerous to conflate bug bounties and vulnerability disclosure | CSO Online" rel="nofollow" href="https://www.csoonline.com/article/3271088/security/katie-moussouris-its-dangerous-to-conflate-bug-bounties-and-vulnerability-disclosure.html">It’s dangerous to conflate bug bounties and vulnerability disclosure | CSO Online</a></li><li><a title="Katie Moussouris (@k8em0) on Twitter" rel="nofollow" href="https://twitter.com/k8em0">Katie Moussouris (@k8em0) on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Computer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry.</p><p>Links:</p><ul><li><a title="Luta Security" rel="nofollow" href="http://lutasecurity.com/">Luta Security</a></li><li><a title="How I Got Here: Katie Moussouris" rel="nofollow" href="https://threatpost.com/how-i-got-here-katie-moussouris/102784/">How I Got Here: Katie Moussouris</a></li><li><a title="It’s dangerous to conflate bug bounties and vulnerability disclosure | CSO Online" rel="nofollow" href="https://www.csoonline.com/article/3271088/security/katie-moussouris-its-dangerous-to-conflate-bug-bounties-and-vulnerability-disclosure.html">It’s dangerous to conflate bug bounties and vulnerability disclosure | CSO Online</a></li><li><a title="Katie Moussouris (@k8em0) on Twitter" rel="nofollow" href="https://twitter.com/k8em0">Katie Moussouris (@k8em0) on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
