<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 05:04:54 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Shift Left”</title>
    <link>https://securityconversations.fireside.fm/tags/shift-left</link>
    <pubDate>Wed, 02 Aug 2023 07:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>GitHub security chief Mike Hanley on secure coding, AI and SBOMs</title>
  <link>http://securityconversations.fireside.fm/mike-hanley-github</link>
  <guid isPermaLink="false">7532f1bd-4ebc-404a-9553-2f3339cc005f</guid>
  <pubDate>Wed, 02 Aug 2023 07:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7532f1bd-4ebc-404a-9553-2f3339cc005f.mp3" length="43779417" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

GitHub security chief Mike Hanley joins the show to discuss merging the CSO and SVP/Engineering roles, securing data and code in an organization under constant attack, the thrilling promise of AI to the future of secure code, the dangers of equating SBOMs to supply chain security, and new SEC reporting rules for CISOs.</itunes:subtitle>
  <itunes:duration>40:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7532f1bd-4ebc-404a-9553-2f3339cc005f/cover.jpg?v=3"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
GitHub security chief Mike Hanley joins the show to discuss merging the CSO and SVP/Engineering roles, securing data and code in an organization under constant attack, the thrilling promise of AI to the future of secure code, the dangers of equating SBOMs to supply chain security, and new SEC reporting rules for CISOs. 
</description>
  <itunes:keywords>supply chain, open source software, sbom, log4j, codecov, solarwinds, sunburst, apt, credential theft, npm, typosquatting, code quality, shift-left</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>GitHub security chief Mike Hanley joins the show to discuss merging the CSO and SVP/Engineering roles, securing data and code in an organization under constant attack, the thrilling promise of AI to the future of secure code, the dangers of equating SBOMs to supply chain security, and new SEC reporting rules for CISOs.</p><p>Links:</p><ul><li><a title="Michael Hanley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/michael-hanley-b6508913/">Michael Hanley on LinkedIn</a></li><li><a title="GitHub Security" rel="nofollow" href="https://github.com/security">GitHub Security</a></li><li><a title="GitHub Copilot AI pair programmer" rel="nofollow" href="https://github.com/features/copilot">GitHub Copilot AI pair programmer</a></li><li><a title="Big Tech Vendors Object to US Gov SBOM Mandate" rel="nofollow" href="https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate/">Big Tech Vendors Object to US Gov SBOM Mandate</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>GitHub security chief Mike Hanley joins the show to discuss merging the CSO and SVP/Engineering roles, securing data and code in an organization under constant attack, the thrilling promise of AI to the future of secure code, the dangers of equating SBOMs to supply chain security, and new SEC reporting rules for CISOs.</p><p>Links:</p><ul><li><a title="Michael Hanley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/michael-hanley-b6508913/">Michael Hanley on LinkedIn</a></li><li><a title="GitHub Security" rel="nofollow" href="https://github.com/security">GitHub Security</a></li><li><a title="GitHub Copilot AI pair programmer" rel="nofollow" href="https://github.com/features/copilot">GitHub Copilot AI pair programmer</a></li><li><a title="Big Tech Vendors Object to US Gov SBOM Mandate" rel="nofollow" href="https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate/">Big Tech Vendors Object to US Gov SBOM Mandate</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Microsoft's Justin Campbell on offensive security research</title>
  <link>http://securityconversations.fireside.fm/justin-campbell-microsoft</link>
  <guid isPermaLink="false">367c5dd6-8956-42a5-b804-887991a31ff3</guid>
  <pubDate>Sat, 08 Jan 2022 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/367c5dd6-8956-42a5-b804-887991a31ff3.mp3" length="23909293" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team's discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving 'shift-left' mindset and Redmond's ongoing work to reduce attack surfaces.</itunes:subtitle>
  <itunes:duration>27:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/367c5dd6-8956-42a5-b804-887991a31ff3/cover.jpg?v=1"/>
  <description>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team's discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving 'shift-left' mindset and Redmond's ongoing work to reduce attack surfaces. 
</description>
  <itunes:keywords>microsoft, windows, memory safety, shift-left, secure coding, zero-days</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team&#39;s discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving &#39;shift-left&#39; mindset and Redmond&#39;s ongoing work to reduce attack surfaces.</p><p>Links:</p><ul><li><a title="Microsoft Flags SolarWinds Serv-U 0-day exploit" rel="nofollow" href="https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/">Microsoft Flags SolarWinds Serv-U 0-day exploit</a></li><li><a title="SolarWinds Serv-U RCE advisory" rel="nofollow" href="https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211">SolarWinds Serv-U RCE advisory</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation" rel="nofollow" href="https://www.securityweek.com/microsoft-hacked-solarwinds-ftp-software-lacked-basic-anti-exploit-mitigation">Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team&#39;s discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving &#39;shift-left&#39; mindset and Redmond&#39;s ongoing work to reduce attack surfaces.</p><p>Links:</p><ul><li><a title="Microsoft Flags SolarWinds Serv-U 0-day exploit" rel="nofollow" href="https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/">Microsoft Flags SolarWinds Serv-U 0-day exploit</a></li><li><a title="SolarWinds Serv-U RCE advisory" rel="nofollow" href="https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211">SolarWinds Serv-U RCE advisory</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation" rel="nofollow" href="https://www.securityweek.com/microsoft-hacked-solarwinds-ftp-software-lacked-basic-anti-exploit-mitigation">Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
