<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 01:40:10 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Supply Chain Security”</title>
    <link>https://securityconversations.fireside.fm/tags/supply%20chain%20security</link>
    <pubDate>Thu, 13 Oct 2022 08:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Chainguard's Dan Lorenc gets real on software supply chain problems</title>
  <link>http://securityconversations.fireside.fm/dan-lorenc-chainguard-supply-chain</link>
  <guid isPermaLink="false">04e22eb6-dc8d-4dae-af5b-44f4d4aca81d</guid>
  <pubDate>Thu, 13 Oct 2022 08:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/04e22eb6-dc8d-4dae-af5b-44f4d4aca81d.mp3" length="36469411" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>* Episode sponsors: [Binarly](https://binarly.io/) and [FwHunt](https://fwhunt.run/) - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.

Dan Lorenc and team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government's efforts will speed up technology innovation.</itunes:subtitle>
  <itunes:duration>47:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/04e22eb6-dc8d-4dae-af5b-44f4d4aca81d/cover.jpg?v=1"/>
  <description>Episode sponsors: Binarly (https://binarly.io/) and FwHunt (https://fwhunt.run/) - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.
Dan Lorenc and a team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government's efforts will speed up technology innovation.  
</description>
  <itunes:keywords>supply chain, open source software, sbom, log4j, codecov, solarwinds, sunburst, apt, credential theft, npm, typosquatting, code quality, shift-left</itunes:keywords>
  <content:encoded>
    <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>Dan Lorenc and a team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government&#39;s efforts will speed up technology innovation. </p><p>Links:</p><ul><li><a title="Dan Lorenc on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/danlorenc/">Dan Lorenc on LinkedIn</a></li><li><a title="Chainguard Enforce" rel="nofollow" href="https://www.chainguard.dev/chainguard-enforce">Chainguard Enforce</a></li><li><a title="Sounil Yu on SBOMs, software supply chain security" rel="nofollow" href="https://securityconversations.com/episode/sounil-yu-on-sboms-software-supply-chain-security/">Sounil Yu on SBOMs, software supply chain security</a></li><li><a title="Extending SBOMs to the firmware layer" rel="nofollow" href="https://securityconversations.com/extending-sboms-to-the-firmware-layer/">Extending SBOMs to the firmware layer</a></li><li><a title="Cybersecurity Leaders Scramble to Decipher SBOM Mandate" rel="nofollow" href="https://www.securityweek.com/cybersecurity-leaders-scramble-decipher-sbom-mandate">Cybersecurity Leaders Scramble to Decipher SBOM Mandate</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>Dan Lorenc and a team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government&#39;s efforts will speed up technology innovation. </p><p>Links:</p><ul><li><a title="Dan Lorenc on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/danlorenc/">Dan Lorenc on LinkedIn</a></li><li><a title="Chainguard Enforce" rel="nofollow" href="https://www.chainguard.dev/chainguard-enforce">Chainguard Enforce</a></li><li><a title="Sounil Yu on SBOMs, software supply chain security" rel="nofollow" href="https://securityconversations.com/episode/sounil-yu-on-sboms-software-supply-chain-security/">Sounil Yu on SBOMs, software supply chain security</a></li><li><a title="Extending SBOMs to the firmware layer" rel="nofollow" href="https://securityconversations.com/extending-sboms-to-the-firmware-layer/">Extending SBOMs to the firmware layer</a></li><li><a title="Cybersecurity Leaders Scramble to Decipher SBOM Mandate" rel="nofollow" href="https://www.securityweek.com/cybersecurity-leaders-scramble-decipher-sbom-mandate">Cybersecurity Leaders Scramble to Decipher SBOM Mandate</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
