<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 02:11:08 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Threat Intel”</title>
    <link>https://securityconversations.fireside.fm/tags/threat-intel</link>
    <pubDate>Fri, 09 May 2025 09:30:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>JAGS keynote: The intricacies of wartime cyber threat intelligence </title>
  <link>http://securityconversations.fireside.fm/wartime-cyber-threat-intel-counterthreats-keynote</link>
  <guid isPermaLink="false">e86c0a26-27c7-44e7-a6fd-1d85e4e5b3d2</guid>
  <pubDate>Fri, 09 May 2025 09:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e86c0a26-27c7-44e7-a6fd-1d85e4e5b3d2.mp3" length="26254337" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 45: (The buddies are trapped in timezone hell with cross-continent travel this week). 

In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It's a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be aware of the real-world consequences of their work and the ethical responsibility that comes with it.

Acknowledgment: Credit for the audio goes to CyberThreat 2023, SANS Institute, NCSC, and SentinelOne.

Cast: Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
  <itunes:duration>31:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e86c0a26-27c7-44e7-a6fd-1d85e4e5b3d2/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 45: (The buddies are trapped in timezone hell with cross-continent travel this week). 
In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It's a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be aware of the real-world consequences of their work and the ethical responsibility that comes with it.
Acknowledgment: Credit for the audio goes to CyberThreat 2023, SANS Institute, NCSC, and SentinelOne.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>CTI, threat intelligence, wartime, Ukraine, Israel, cyberwar, cyber offense, NCSC, CyberThreat, SANS Institute, SentinelOne</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 45</strong>: (The buddies are trapped in timezone hell with cross-continent travel this week). </p>

<p>In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It&#39;s a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be aware of the real-world consequences of their work and the ethical responsibility that comes with it.</p>

<p><em>Acknowledgment: Credit for the audio goes to CyberThreat 2023, SANS Institute, NCSC, and SentinelOne.</em></p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Keynote transcript" rel="nofollow" href="https://docs.google.com/document/d/1ZBQuHSF3sAwT9acg8ng4AtCw04jPLFOwkuZjS1nnpbI/edit?tab=t.0#heading=h.pi42p8chtkss">Keynote transcript</a></li><li><a title="The ethics and perils of APT research" rel="nofollow" href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2017/10/20080228/Guerrero-Saade-VB2015.pdf">The ethics and perils of APT research</a></li><li><a title="Recommended Talks" rel="nofollow" href="https://www.epicturla.com/recommended-material">Recommended Talks</a></li><li><a title="The Lost APT Reports" rel="nofollow" href="https://www.epicturla.com/blog">The Lost APT Reports</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 45</strong>: (The buddies are trapped in timezone hell with cross-continent travel this week). </p>

<p>In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It&#39;s a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be aware of the real-world consequences of their work and the ethical responsibility that comes with it.</p>

<p><em>Acknowledgment: Credit for the audio goes to CyberThreat 2023, SANS Institute, NCSC, and SentinelOne.</em></p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Keynote transcript" rel="nofollow" href="https://docs.google.com/document/d/1ZBQuHSF3sAwT9acg8ng4AtCw04jPLFOwkuZjS1nnpbI/edit?tab=t.0#heading=h.pi42p8chtkss">Keynote transcript</a></li><li><a title="The ethics and perils of APT research" rel="nofollow" href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2017/10/20080228/Guerrero-Saade-VB2015.pdf">The ethics and perils of APT research</a></li><li><a title="Recommended Talks" rel="nofollow" href="https://www.epicturla.com/recommended-material">Recommended Talks</a></li><li><a title="The Lost APT Reports" rel="nofollow" href="https://www.epicturla.com/blog">The Lost APT Reports</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Michael Laventure, threat detection and response, Netflix</title>
  <link>http://securityconversations.fireside.fm/michael-laventure-netflix-threat-intel</link>
  <guid isPermaLink="false">96f77b2a-f94c-4b25-9870-8652ddaffaa0</guid>
  <pubDate>Thu, 10 Jun 2021 08:45:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/96f77b2a-f94c-4b25-9870-8652ddaffaa0.mp3" length="23563004" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Netflix threat detection and response practitioner Michael Laventure joins the show to talk about a simple goal to "do security better."   We discuss a transition from .gov security work to the fast pace of Silicon Valley, the culture clashes that can make life difficult, the value of threat-intelligence to a modern security program, and why we should all be optimistic about the future of cybersecurity.</itunes:subtitle>
  <itunes:duration>30:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/96f77b2a-f94c-4b25-9870-8652ddaffaa0/cover.jpg?v=1"/>
  <description>Netflix threat detection and response practitioner Michael Laventure joins the show to talk about a simple goal to "do security better."   We discuss a transition from .gov security work to the fast pace of Silicon Valley, the culture clashes that can make life difficult, the value of threat-intelligence to a modern security program, and why we should all be optimistic about the future of cybersecurity. 
</description>
  <itunes:keywords>threat-intel, threat-hunting, supply chain</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Netflix threat detection and response practitioner Michael Laventure joins the show to talk about a simple goal to &quot;do security better.&quot;   We discuss a transition from .gov security work to the fast pace of Silicon Valley, the culture clashes that can make life difficult, the value of threat-intelligence to a modern security program, and why we should all be optimistic about the future of cybersecurity.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Netflix threat detection and response practitioner Michael Laventure joins the show to talk about a simple goal to &quot;do security better.&quot;   We discuss a transition from .gov security work to the fast pace of Silicon Valley, the culture clashes that can make life difficult, the value of threat-intelligence to a modern security program, and why we should all be optimistic about the future of cybersecurity.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Costin Raiu, Global Director, GReAT, Kaspersky Lab</title>
  <link>http://securityconversations.fireside.fm/costin-raiu-great</link>
  <guid isPermaLink="false">c49758d1-bc1a-43d5-8eee-5f91c6d7021f</guid>
  <pubDate>Mon, 03 Sep 2018 04:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c49758d1-bc1a-43d5-8eee-5f91c6d7021f.mp3" length="47022834" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</itunes:subtitle>
  <itunes:duration>51:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c49758d1-bc1a-43d5-8eee-5f91c6d7021f/cover.jpg?v=3"/>
  <description>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</p><p>Links:</p><ul><li><a title="&quot;Equation Group&quot; ran the most advanced hacking operation ever uncovered" rel="nofollow" href="https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/">"Equation Group" ran the most advanced hacking operation ever uncovered</a></li><li><a title="The adventures of lab ED011" rel="nofollow" href="https://arstechnica.com/features/2018/08/the-secret-history-of-ed011-the-obscure-computer-lab-that-hacked-the-world/">The adventures of lab ED011</a> &mdash; One Romanian campus computer lab both pentested the world and eventually helped protect it</li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://twitter.com/craiu">Costin Raiu on Twitter</a></li><li><a title="The &quot;Red October&quot; Campaign" rel="nofollow" href="https://securelist.com/the-red-october-campaign/57647/">The "Red October" Campaign</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</p><p>Links:</p><ul><li><a title="&quot;Equation Group&quot; ran the most advanced hacking operation ever uncovered" rel="nofollow" href="https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/">"Equation Group" ran the most advanced hacking operation ever uncovered</a></li><li><a title="The adventures of lab ED011" rel="nofollow" href="https://arstechnica.com/features/2018/08/the-secret-history-of-ed011-the-obscure-computer-lab-that-hacked-the-world/">The adventures of lab ED011</a> &mdash; One Romanian campus computer lab both pentested the world and eventually helped protect it</li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://twitter.com/craiu">Costin Raiu on Twitter</a></li><li><a title="The &quot;Red October&quot; Campaign" rel="nofollow" href="https://securelist.com/the-red-october-campaign/57647/">The "Red October" Campaign</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Josh Lefkowitz, Founder and CEO, Flashpoint</title>
  <link>http://securityconversations.fireside.fm/josh-lefkowitz-flashpoint</link>
  <guid isPermaLink="false">1f0f4e71-9a49-4d80-8a17-c020c7e2698c</guid>
  <pubDate>Tue, 28 Aug 2018 04:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1f0f4e71-9a49-4d80-8a17-c020c7e2698c.mp3" length="30504303" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Flashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company's approach to gathering and analyzing data, and his mission to be an extension of a client's security team.</itunes:subtitle>
  <itunes:duration>32:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1f0f4e71-9a49-4d80-8a17-c020c7e2698c/cover.jpg?v=3"/>
  <description>Flashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company's approach to gathering and analyzing data, and his mission to be an extension of a client's security team. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Flashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company&#39;s approach to gathering and analyzing data, and his mission to be an extension of a client&#39;s security team.</p><p>Links:</p><ul><li><a title="Flashpoint - Library" rel="nofollow" href="https://www.flashpoint-intel.com/library/">Flashpoint - Library</a></li><li><a title="&#39;7 Minutes&#39; with Flashpoint CEO Josh Lefkowitz" rel="nofollow" href="https://www.channelpartnersonline.com/article/7-minutes-with-flashpoint-ceo-josh-lefkowitz/">'7 Minutes' with Flashpoint CEO Josh Lefkowitz</a></li><li><a title="Video: Josh Lefkowitz on AlphaBay&#39;s demise" rel="nofollow" href="https://www.youtube.com/watch?v=fd6GedN3yng">Video: Josh Lefkowitz on AlphaBay's demise</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Flashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company&#39;s approach to gathering and analyzing data, and his mission to be an extension of a client&#39;s security team.</p><p>Links:</p><ul><li><a title="Flashpoint - Library" rel="nofollow" href="https://www.flashpoint-intel.com/library/">Flashpoint - Library</a></li><li><a title="&#39;7 Minutes&#39; with Flashpoint CEO Josh Lefkowitz" rel="nofollow" href="https://www.channelpartnersonline.com/article/7-minutes-with-flashpoint-ceo-josh-lefkowitz/">'7 Minutes' with Flashpoint CEO Josh Lefkowitz</a></li><li><a title="Video: Josh Lefkowitz on AlphaBay&#39;s demise" rel="nofollow" href="https://www.youtube.com/watch?v=fd6GedN3yng">Video: Josh Lefkowitz on AlphaBay's demise</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Dan Hubbard, Chief Security Architect, Lacework</title>
  <link>http://securityconversations.fireside.fm/dan-hubbard-lacework</link>
  <guid isPermaLink="false">d7db6dd9-a8d4-42ec-a94d-b51821f8e4e3</guid>
  <pubDate>Mon, 16 Jul 2018 14:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d7db6dd9-a8d4-42ec-a94d-b51821f8e4e3.mp3" length="33852535" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Lacework Chief Security Architect Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces.</itunes:subtitle>
  <itunes:duration>38:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d7db6dd9-a8d4-42ec-a94d-b51821f8e4e3/cover.jpg?v=3"/>
  <description>Lacework Chief Security Architect  Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Lacework Chief Security Architect  Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces.</p><p>Links:</p><ul><li><a title="Containers at risk (PDF direct download)" rel="nofollow" href="https://info.lacework.com/hubfs/Containers%20At-Risk_%20A%20Review%20of%2021,000%20Cloud%20Environments.pdf">Containers at risk (PDF direct download)</a></li><li><a title="Dan Hubbard on Twitter" rel="nofollow" href="https://twitter.com/dhubbard858">Dan Hubbard on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Lacework Chief Security Architect  Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces.</p><p>Links:</p><ul><li><a title="Containers at risk (PDF direct download)" rel="nofollow" href="https://info.lacework.com/hubfs/Containers%20At-Risk_%20A%20Review%20of%2021,000%20Cloud%20Environments.pdf">Containers at risk (PDF direct download)</a></li><li><a title="Dan Hubbard on Twitter" rel="nofollow" href="https://twitter.com/dhubbard858">Dan Hubbard on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Andrew Morris, Founder and CEO, GreyNoise Intelligence</title>
  <link>http://securityconversations.fireside.fm/andrew-morris-greynoise-intelligence</link>
  <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=521</guid>
  <pubDate>Thu, 31 May 2018 15:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a441617f-9c5d-49d0-8fd8-d21fc211523a.mp3" length="21465394" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Founder and CEO of GreyNoise Intelligence Andrew Morris talks about his anti threat-intelligence company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up.</itunes:subtitle>
  <itunes:duration>37:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a441617f-9c5d-49d0-8fd8-d21fc211523a/cover.jpg?v=6"/>
  <description>&lt;p&gt;Founder and CEO of GreyNoise Intelligence Andrew Morris (&lt;a href="https://twitter.com/andrew___morris"&gt;andrew___morris&lt;/a&gt;) talks about his “anti threat-intelligence” company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;a href="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3"&gt;https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3&lt;/a&gt;
 
</description>
  <content:encoded>
    <![CDATA[<p>Founder and CEO of GreyNoise Intelligence Andrew Morris (<a href="https://twitter.com/andrew___morris">andrew___morris</a>) talks about his &#8220;anti threat-intelligence&#8221; company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-521-2" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3?_=2" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3">https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3</a></audio><p>Links:</p><ul><li><a title="What is GreyNoise?" rel="nofollow" href="https://greynoise.io/blog/2018/2/1/what-is-greynoise">What is GreyNoise?</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Founder and CEO of GreyNoise Intelligence Andrew Morris (<a href="https://twitter.com/andrew___morris">andrew___morris</a>) talks about his &#8220;anti threat-intelligence&#8221; company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-521-2" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3?_=2" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3">https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3</a></audio><p>Links:</p><ul><li><a title="What is GreyNoise?" rel="nofollow" href="https://greynoise.io/blog/2018/2/1/what-is-greynoise">What is GreyNoise?</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Juan Andrés Guerrero-Saade, Principal Security Researcher, Recorded Future</title>
  <link>http://securityconversations.fireside.fm/juan-andres-guerrero-saade-recorded-future</link>
  <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=499</guid>
  <pubDate>Mon, 14 May 2018 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f69cb1a6-f5e9-4664-bc82-fc229d5b1de4.mp3" length="53015905" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Principal Security Researcher at Recorded Futures Insikt Group, Juan Andrés Guerrero-Saade, explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don't have to be sophisticated to launch successful attacks.</itunes:subtitle>
  <itunes:duration>1:01:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f69cb1a6-f5e9-4664-bc82-fc229d5b1de4/cover.jpg?v=5"/>
  <description>&lt;p&gt;Principal Security Researcher at Recorded Future’s Insikt Group, Juan Andrés Guerrero-Saade (&lt;a href="https://twitter.com/juanandres_gs"&gt;juanandres_gs&lt;/a&gt;), explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don’t have to be “sophisticated” to launch successful attacks.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;a href="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3"&gt;https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3&lt;/a&gt;
 
</description>
  <content:encoded>
    <![CDATA[<p>Principal Security Researcher at Recorded Future&#8217;s Insikt Group, Juan Andrés Guerrero-Saade (<a href="https://twitter.com/juanandres_gs" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://twitter.com/juanandres_gs&amp;source=gmail&amp;ust=1526399114060000&amp;usg=AFQjCNEoPD1PMwpQPcXxUAGMC6Er-NGdWg">juanandres_gs</a>), explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don&#8217;t have to be &#8220;sophisticated&#8221; to launch successful attacks.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-499-4" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3?_=4" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3">https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3</a></audio>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Principal Security Researcher at Recorded Future&#8217;s Insikt Group, Juan Andrés Guerrero-Saade (<a href="https://twitter.com/juanandres_gs" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://twitter.com/juanandres_gs&amp;source=gmail&amp;ust=1526399114060000&amp;usg=AFQjCNEoPD1PMwpQPcXxUAGMC6Er-NGdWg">juanandres_gs</a>), explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don&#8217;t have to be &#8220;sophisticated&#8221; to launch successful attacks.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-499-4" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3?_=4" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3">https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3</a></audio>]]>
  </itunes:summary>
</item>
<item>
  <title>Robert M. Lee, Chief Executive Officer, Dragos Inc.</title>
  <link>http://securityconversations.fireside.fm/robert-m-lee-dragos</link>
  <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=488</guid>
  <pubDate>Thu, 10 May 2018 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/12cf4cec-e81b-4f38-b8ff-956979ab0e93.mp3" length="65117301" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The founder and CEO of Dragos, Inc. Robert M. Lee cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</itunes:subtitle>
  <itunes:duration>54:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/12cf4cec-e81b-4f38-b8ff-956979ab0e93/cover.jpg?v=4"/>
  <description>&lt;p&gt;The founder and CEO of Dragos, Inc. Robert M. Lee (&lt;a href="https://twitter.com/RobertMLee"&gt;RobertMLee&lt;/a&gt;) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;a href="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3"&gt;https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3&lt;/a&gt;
 
</description>
  <content:encoded>
    <![CDATA[<p>The founder and CEO of Dragos, Inc. Robert M. Lee (<a href="https://twitter.com/RobertMLee">RobertMLee</a>) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-488-5" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3?_=5" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3</a></audio>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The founder and CEO of Dragos, Inc. Robert M. Lee (<a href="https://twitter.com/RobertMLee">RobertMLee</a>) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-488-5" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3?_=5" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3</a></audio>]]>
  </itunes:summary>
</item>
<item>
  <title>Mischel Kwon, Founder and CEO, MKA Cyber</title>
  <link>http://securityconversations.fireside.fm/mischel-kwon-mka-cyber</link>
  <guid isPermaLink="false">1acf96d7-a561-4f6f-a936-75f92e67ca7b</guid>
  <pubDate>Thu, 26 Apr 2018 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1acf96d7-a561-4f6f-a936-75f92e67ca7b.mp3" length="43253945" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Founder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics.</itunes:subtitle>
  <itunes:duration>39:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1acf96d7-a561-4f6f-a936-75f92e67ca7b/cover.jpg?v=3"/>
  <description>Founder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Founder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics.</p><p>Links:</p><ul><li><a title="MKACyber" rel="nofollow" href="https://mkacyber.io/">MKACyber</a></li><li><a title="Mischel Kwon on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/mischelkwon/">Mischel Kwon on LinkedIn</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Founder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics.</p><p>Links:</p><ul><li><a title="MKACyber" rel="nofollow" href="https://mkacyber.io/">MKACyber</a></li><li><a title="Mischel Kwon on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/mischelkwon/">Mischel Kwon on LinkedIn</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Tim Maurer, Scholar, Carnegie Endowment for International Peace</title>
  <link>http://securityconversations.fireside.fm/tim-maurer-carnegie-endowment-for-international-peace</link>
  <guid isPermaLink="false">4cddd571-1e73-4625-acb1-321bb47e706f</guid>
  <pubDate>Mon, 05 Mar 2018 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4cddd571-1e73-4625-acb1-321bb47e706f.mp3" length="29020105" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</itunes:subtitle>
  <itunes:duration>32:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4cddd571-1e73-4625-acb1-321bb47e706f/cover.jpg?v=3"/>
  <description>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</p><p>Links:</p><ul><li><a title="Tim Maurer - Carnegie Endowment for International Peace" rel="nofollow" href="http://carnegieendowment.org/experts/1086">Tim Maurer - Carnegie Endowment for International Peace</a> &mdash; Tim Maurer is the co-director of the Cyber Policy Initiative and a fellow at the Carnegie Endowment for International Peace. Since 2010, his work has been focusing on cybersecurity, human rights in the digital age, and Internet governance, currently with a specific focus on cybersecurity and financial stability.</li><li><a title="Tim Maurer on Twitter" rel="nofollow" href="https://twitter.com/maurertim">Tim Maurer on Twitter</a></li><li><a title="Cyber Mercenaries: The State, Hackers, and Power" rel="nofollow" href="https://www.amazon.com/Cyber-Mercenaries-State-Hackers-Power/dp/110756686X/ref=redir_mobile_desktop?_encoding=UTF8&amp;qid=&amp;ref_=tmm_pap_title_0&amp;sr=">Cyber Mercenaries: The State, Hackers, and Power</a> &mdash; Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</p><p>Links:</p><ul><li><a title="Tim Maurer - Carnegie Endowment for International Peace" rel="nofollow" href="http://carnegieendowment.org/experts/1086">Tim Maurer - Carnegie Endowment for International Peace</a> &mdash; Tim Maurer is the co-director of the Cyber Policy Initiative and a fellow at the Carnegie Endowment for International Peace. Since 2010, his work has been focusing on cybersecurity, human rights in the digital age, and Internet governance, currently with a specific focus on cybersecurity and financial stability.</li><li><a title="Tim Maurer on Twitter" rel="nofollow" href="https://twitter.com/maurertim">Tim Maurer on Twitter</a></li><li><a title="Cyber Mercenaries: The State, Hackers, and Power" rel="nofollow" href="https://www.amazon.com/Cyber-Mercenaries-State-Hackers-Power/dp/110756686X/ref=redir_mobile_desktop?_encoding=UTF8&amp;qid=&amp;ref_=tmm_pap_title_0&amp;sr=">Cyber Mercenaries: The State, Hackers, and Power</a> &mdash; Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. </li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Christopher Ahlberg, CEO, Recorded Future</title>
  <link>http://securityconversations.fireside.fm/christopher-ahlberg-recorded-future</link>
  <guid isPermaLink="false">6fc1d3cb-e930-484f-84e6-8c521ddb9e97</guid>
  <pubDate>Tue, 30 Jan 2018 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6fc1d3cb-e930-484f-84e6-8c521ddb9e97.mp3" length="33265132" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</itunes:subtitle>
  <itunes:duration>29:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6fc1d3cb-e930-484f-84e6-8c521ddb9e97/cover.jpg?v=4"/>
  <description>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</p><p>Links:</p><ul><li><a title="Recorded Future" rel="nofollow" href="https://www.recordedfuture.com/">Recorded Future</a></li><li><a title="Christopher Ahlberg on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/christopherahlberg/">Christopher Ahlberg on LinkedIn</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</p><p>Links:</p><ul><li><a title="Recorded Future" rel="nofollow" href="https://www.recordedfuture.com/">Recorded Future</a></li><li><a title="Christopher Ahlberg on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/christopherahlberg/">Christopher Ahlberg on LinkedIn</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Paul Roberts, Editor-in-Chief, Security Ledger</title>
  <link>http://securityconversations.fireside.fm/paul-roberts-security-ledger</link>
  <guid isPermaLink="false">476c43ff-be49-4057-b965-928abc39b9af</guid>
  <pubDate>Fri, 19 Jan 2018 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/476c43ff-be49-4057-b965-928abc39b9af.mp3" length="47164187" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Veteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation.</itunes:subtitle>
  <itunes:duration>40:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/476c43ff-be49-4057-b965-928abc39b9af/cover.jpg?v=5"/>
  <description>Veteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Veteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation.</p><p>Links:</p><ul><li><a title="The Security Ledger" rel="nofollow" href="https://securityledger.com/">The Security Ledger</a></li><li><a title="Paul Roberts on Twitter" rel="nofollow" href="https://twitter.com/paulfroberts">Paul Roberts on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Veteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation.</p><p>Links:</p><ul><li><a title="The Security Ledger" rel="nofollow" href="https://securityledger.com/">The Security Ledger</a></li><li><a title="Paul Roberts on Twitter" rel="nofollow" href="https://twitter.com/paulfroberts">Paul Roberts on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Dino Dai Zovi, co-founder and CTO, Capsule8</title>
  <link>http://securityconversations.fireside.fm/dino-dai-zovi-capsule8</link>
  <guid isPermaLink="false">25fade91-a24d-4173-9831-ddf30dc0d051</guid>
  <pubDate>Thu, 11 Jan 2018 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/25fade91-a24d-4173-9831-ddf30dc0d051.mp3" length="38280103" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker.</itunes:subtitle>
  <itunes:duration>39:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/25fade91-a24d-4173-9831-ddf30dc0d051/cover.jpg?v=5"/>
  <description>Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker.</p><p>Links:</p><ul><li><a title="Part One: Detecting Meltdown using Capsule8" rel="nofollow" href="https://capsule8.com/blog/detecting-meltdown-using-capsule8/">Part One: Detecting Meltdown using Capsule8</a></li><li><a title="Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels " rel="nofollow" href="https://capsule8.com/blog/detecting-meltdown-spectre-detecting-cache-side-channels/">Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels </a></li><li><a title="10 questions for MacBook hacker Dino Dai Zovi" rel="nofollow" href="https://www.zdnet.com/article/10-questions-for-macbook-hacker-dino-dai-zovi/">10 questions for MacBook hacker Dino Dai Zovi</a></li><li><a title="Dino Dai Zovi on Twitter" rel="nofollow" href="https://twitter.com/dinodaizovi">Dino Dai Zovi on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker.</p><p>Links:</p><ul><li><a title="Part One: Detecting Meltdown using Capsule8" rel="nofollow" href="https://capsule8.com/blog/detecting-meltdown-using-capsule8/">Part One: Detecting Meltdown using Capsule8</a></li><li><a title="Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels " rel="nofollow" href="https://capsule8.com/blog/detecting-meltdown-spectre-detecting-cache-side-channels/">Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels </a></li><li><a title="10 questions for MacBook hacker Dino Dai Zovi" rel="nofollow" href="https://www.zdnet.com/article/10-questions-for-macbook-hacker-dino-dai-zovi/">10 questions for MacBook hacker Dino Dai Zovi</a></li><li><a title="Dino Dai Zovi on Twitter" rel="nofollow" href="https://twitter.com/dinodaizovi">Dino Dai Zovi on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Sharon Anolik, President and Founder, Privacy Panacea</title>
  <link>http://securityconversations.fireside.fm/sharon-anolik-privacy-panacea</link>
  <guid isPermaLink="false">0a1d0429-f768-4175-8f48-9416cb420157</guid>
  <pubDate>Thu, 04 Jan 2018 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/0a1d0429-f768-4175-8f48-9416cb420157.mp3" length="48156317" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Sharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’</itunes:subtitle>
  <itunes:duration>43:51</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/0a1d0429-f768-4175-8f48-9416cb420157/cover.jpg?v=4"/>
  <description>Sharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’ 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Sharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’</p><p>Links:</p><ul><li><a title="Privacy Panacea" rel="nofollow" href="https://www.privacypanacea.com/">Privacy Panacea</a></li><li><a title="Sharon Anolik on Twitter" rel="nofollow" href="https://twitter.com/PrivacyPanacea">Sharon Anolik on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Sharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’</p><p>Links:</p><ul><li><a title="Privacy Panacea" rel="nofollow" href="https://www.privacypanacea.com/">Privacy Panacea</a></li><li><a title="Sharon Anolik on Twitter" rel="nofollow" href="https://twitter.com/PrivacyPanacea">Sharon Anolik on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Kim Zetter, Journalist and Author</title>
  <link>http://securityconversations.fireside.fm/kim-zetter</link>
  <guid isPermaLink="false">bf98d79b-204e-4a5f-9418-75c5b554a26e</guid>
  <pubDate>Fri, 29 Dec 2017 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/bf98d79b-204e-4a5f-9418-75c5b554a26e.mp3" length="56197391" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</itunes:subtitle>
  <itunes:duration>52:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
  <description>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</p><p>Links:</p><ul><li><a title="Kim Zetter on Twitter" rel="nofollow" href="https://twitter.com/KimZetter">Kim Zetter on Twitter</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books</a></li><li><a title="Was Georgia’s Election System Hacked in 2016? " rel="nofollow" href="https://www.politico.com/magazine/story/2018/07/18/mueller-indictments-georgia-voting-infrastructure-219018">Was Georgia’s Election System Hacked in 2016? </a></li><li><a title="Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States " rel="nofollow" href="https://motherboard.vice.com/en_us/article/mb4ezy/top-voting-machine-vendor-admits-it-installed-remote-access-software-on-systems-sold-to-states">Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</p><p>Links:</p><ul><li><a title="Kim Zetter on Twitter" rel="nofollow" href="https://twitter.com/KimZetter">Kim Zetter on Twitter</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books</a></li><li><a title="Was Georgia’s Election System Hacked in 2016? " rel="nofollow" href="https://www.politico.com/magazine/story/2018/07/18/mueller-indictments-georgia-voting-infrastructure-219018">Was Georgia’s Election System Hacked in 2016? </a></li><li><a title="Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States " rel="nofollow" href="https://motherboard.vice.com/en_us/article/mb4ezy/top-voting-machine-vendor-admits-it-installed-remote-access-software-on-systems-sold-to-states">Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States </a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Kelly Jackson Higgins, Executive Editor, Dark Reading</title>
  <link>http://securityconversations.fireside.fm/kelly-jackson-higgins-dark-reading</link>
  <guid isPermaLink="false">66709e24-8186-4569-921c-d9b48756d089</guid>
  <pubDate>Wed, 20 Dec 2017 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/66709e24-8186-4569-921c-d9b48756d089.mp3" length="35129760" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely.</itunes:subtitle>
  <itunes:duration>39:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/66709e24-8186-4569-921c-d9b48756d089/cover.jpg?v=5"/>
  <description>Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely.</p><p>Links:</p><ul><li><a title="Kelly Jackson Higgins on Twitter" rel="nofollow" href="https://twitter.com/kjhiggins">Kelly Jackson Higgins on Twitter</a></li><li><a title="Dark Reading" rel="nofollow" href="https://www.darkreading.com/">Dark Reading</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely.</p><p>Links:</p><ul><li><a title="Kelly Jackson Higgins on Twitter" rel="nofollow" href="https://twitter.com/kjhiggins">Kelly Jackson Higgins on Twitter</a></li><li><a title="Dark Reading" rel="nofollow" href="https://www.darkreading.com/">Dark Reading</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
