<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://feeds.buzzsprout.com/1453324.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>SecurityLah - the Asian Cyber Security Show</title>

  <lastBuildDate>Wed, 04 Mar 2026 21:44:52 -0500</lastBuildDate>
  <link>https://podcast.securitylah.asia</link>
  <language>en-us</language>
  <copyright>© 2026 SecurityLah - the Asian Cyber Security Show (CACT)</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>68977729-e062-50fb-a2eb-1344572e5d61</podcast:guid>
  <itunes:author>SecurityLah</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>asia, cybersecurity, geopolitics, threat intelligence, securitylah</itunes:keywords>
  <itunes:owner>
    <itunes:name>SecurityLah</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/wpvq176nijsgde813et0q80gcofz?.jpg</url>
     <title>SecurityLah - the Asian Cyber Security Show</title>
     <link></link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/wpvq176nijsgde813et0q80gcofz?.jpg" />
  <itunes:category text="Technology" />
  <itunes:category text="News">
    <itunes:category text="Tech News" />
  </itunes:category>
  <itunes:category text="Business">
    <itunes:category text="Management" />
  </itunes:category>
  <item>
    <itunes:title>S04.E1 - Crowdstrike - the global blue screen</itunes:title>
    <title>S04.E1 - Crowdstrike - the global blue screen</title>
    <itunes:summary><![CDATA[Machine's turn up with blue screen all over the world, the cause seems to be a faulty update affecting Crowdstrike. Whats it about, whats going on, and a special segment on responding to your senior management or Board on the matter ]]></itunes:summary>
    <description><![CDATA[<p>Machine&apos;s turn up with blue screen all over the world, the cause seems to be a faulty update affecting Crowdstrike. Whats it about, whats going on, and a special segment on responding to your senior management or Board on the matter</p>]]></description>
    <content:encoded><![CDATA[<p>Machine&apos;s turn up with blue screen all over the world, the cause seems to be a faulty update affecting Crowdstrike. Whats it about, whats going on, and a special segment on responding to your senior management or Board on the matter</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/15446625-s04-e1-crowdstrike-the-global-blue-screen.mp3" length="30394625" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15446625</guid>
    <pubDate>Sun, 21 Jul 2024 20:00:00 +0800</pubDate>
    <itunes:duration>2530</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S03E12. The year wrap up and emerging threats for 2024</itunes:title>
    <title>S03E12. The year wrap up and emerging threats for 2024</title>
    <itunes:summary><![CDATA[team SecurityLah ends the year with a wrap up on the top 10 emerging threats for 2024. Lots of laughs and serious talk on what's up ahead! ]]></itunes:summary>
    <description><![CDATA[<p>team SecurityLah ends the year with a wrap up on the top 10 emerging threats for 2024. Lots of laughs and serious talk on what&apos;s up ahead!</p>]]></description>
    <content:encoded><![CDATA[<p>team SecurityLah ends the year with a wrap up on the top 10 emerging threats for 2024. Lots of laughs and serious talk on what&apos;s up ahead!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/14225044-s03e12-the-year-wrap-up-and-emerging-threats-for-2024.mp3" length="51951241" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14225044</guid>
    <pubDate>Sun, 31 Dec 2023 20:00:00 +0800</pubDate>
    <itunes:duration>4326</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S03E11. Cyber Security Month Special - Security Awareness </itunes:title>
    <title>S03E11. Cyber Security Month Special - Security Awareness </title>
    <itunes:summary><![CDATA[Team Securitylah explores the challenge of Cyber Security awareness and how organizations (using Malaysia as an example) can better adopt and implement awareness sessions! ]]></itunes:summary>
    <description><![CDATA[<p>Team Securitylah explores the challenge of Cyber Security awareness and how organizations (using Malaysia as an example) can better adopt and implement awareness sessions!</p>]]></description>
    <content:encoded><![CDATA[<p>Team Securitylah explores the challenge of Cyber Security awareness and how organizations (using Malaysia as an example) can better adopt and implement awareness sessions!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/13849981-s03e11-cyber-security-month-special-security-awareness.mp3" length="37233235" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13849981</guid>
    <pubDate>Thu, 26 Oct 2023 18:00:00 +0800</pubDate>
    <itunes:duration>3099</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>S03E10: ChatGPT, Generative AI and Security</itunes:title>
    <title>S03E10: ChatGPT, Generative AI and Security</title>
    <itunes:summary><![CDATA[AI is all the buzz right now. Using ChatGPT for daily life and work is slowly becoming a norm. Apps embedding AI is the VC's darling. Is there any security risks associated to ChatGPT use? Team #securitylah explores! ]]></itunes:summary>
    <description><![CDATA[<p>AI is all the buzz right now. Using ChatGPT for daily life and work is slowly becoming a norm. Apps embedding AI is the VC&apos;s darling. Is there any security risks associated to ChatGPT use? Team #securitylah explores!</p>]]></description>
    <content:encoded><![CDATA[<p>AI is all the buzz right now. Using ChatGPT for daily life and work is slowly becoming a norm. Apps embedding AI is the VC&apos;s darling. Is there any security risks associated to ChatGPT use? Team #securitylah explores!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/13187497-s03e10-chatgpt-generative-ai-and-security.mp3" length="28959180" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13187497</guid>
    <pubDate>Thu, 03 Aug 2023 10:00:00 +0800</pubDate>
    <itunes:duration>2410</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S03E09. FMT interviews SecurityLAH</itunes:title>
    <title>S03E09. FMT interviews SecurityLAH</title>
    <itunes:summary><![CDATA[Recently, SecurityLAH was interviewed by Free Malaysia Today on matters pertaining to Cyber Security and Malaysia. The hosts felt that while the article is out, it is only proper that we have a discussion around the questions, to give our listeners a full context of what the answers were.  ]]></itunes:summary>
    <description><![CDATA[<p>Recently, SecurityLAH was interviewed by Free Malaysia Today on matters pertaining to Cyber Security and Malaysia. The hosts felt that while the article is out, it is only proper that we have a discussion around the questions, to give our listeners a full context of what the answers were. </p>]]></description>
    <content:encoded><![CDATA[<p>Recently, SecurityLAH was interviewed by Free Malaysia Today on matters pertaining to Cyber Security and Malaysia. The hosts felt that while the article is out, it is only proper that we have a discussion around the questions, to give our listeners a full context of what the answers were. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/13187503-s03e09-fmt-interviews-securitylah.mp3" length="37719378" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13187503</guid>
    <pubDate>Mon, 17 Jul 2023 09:00:00 +0800</pubDate>
    <itunes:duration>3140</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S03E08. ISO 27000 Series - Document Intro, Clause 1 - 3</itunes:title>
    <title>S03E08. ISO 27000 Series - Document Intro, Clause 1 - 3</title>
    <itunes:summary><![CDATA[Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.  In this episode, the team looks into the document details, from the front page up to Clause 3.  ]]></itunes:summary>
    <description><![CDATA[<p>Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.<br/><br/>In this episode, the team looks into the document details, from the front page up to Clause 3. </p>]]></description>
    <content:encoded><![CDATA[<p>Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.<br/><br/>In this episode, the team looks into the document details, from the front page up to Clause 3. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/13187499-s03e08-iso-27000-series-document-intro-clause-1-3.mp3" length="12855263" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13187499</guid>
    <pubDate>Mon, 10 Jul 2023 09:00:00 +0800</pubDate>
    <itunes:duration>1068</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S03E07. ISO 27000 Series - Mapping ISO 27001:2013 and ISO27001:2022</itunes:title>
    <title>S03E07. ISO 27000 Series - Mapping ISO 27001:2013 and ISO27001:2022</title>
    <itunes:summary><![CDATA[Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.  In this episode, the team looks into the differences between the older version and the current version, with discussion on what needs to be done when moving to the new standard.  ]]></itunes:summary>
    <description><![CDATA[<p>Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.<br/><br/>In this episode, the team looks into the differences between the older version and the current version, with discussion on what needs to be done when moving to the new standard. </p>]]></description>
    <content:encoded><![CDATA[<p>Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.<br/><br/>In this episode, the team looks into the differences between the older version and the current version, with discussion on what needs to be done when moving to the new standard. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/12986185-s03e07-iso-27000-series-mapping-iso-27001-2013-and-iso27001-2022.mp3" length="37725400" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12986185</guid>
    <pubDate>Tue, 06 Jun 2023 11:00:00 +0800</pubDate>
    <itunes:duration>3140</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S03E06. Changes to Singpass</itunes:title>
    <title>S03E06. Changes to Singpass</title>
    <itunes:summary><![CDATA[Singpass, the national digital ID for Singapore has recently made some changes to it's operations and terms of use. In this episode, team #securitylah reviews the changes to see what is the impact to the average Singaporeans and its citizens.   ]]></itunes:summary>
    <description><![CDATA[<div>Singpass, the national digital ID for Singapore has recently made some changes to it&apos;s operations and terms of use. In this episode, team #securitylah reviews the changes to see what is the impact to the average Singaporeans and its citizens. <br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Singpass, the national digital ID for Singapore has recently made some changes to it&apos;s operations and terms of use. In this episode, team #securitylah reviews the changes to see what is the impact to the average Singaporeans and its citizens. <br/><br/></div>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/12726420-s03e06-changes-to-singpass.mp3" length="18279246" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12726420</guid>
    <pubDate>Wed, 26 Apr 2023 18:00:00 +0800</pubDate>
    <itunes:duration>1520</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S03E05. CyberSecurity in Sarawak?</itunes:title>
    <title>S03E05. CyberSecurity in Sarawak?</title>
    <itunes:summary><![CDATA[Team SecurityLah is joined by Dan from SAINS and Awang from MASA to talk about cybersecurity and Sarawak. What do they have in store?  ]]></itunes:summary>
    <description><![CDATA[<p>Team SecurityLah is joined by Dan from SAINS and Awang from MASA to talk about cybersecurity and Sarawak. What do they have in store? </p>]]></description>
    <content:encoded><![CDATA[<p>Team SecurityLah is joined by Dan from SAINS and Awang from MASA to talk about cybersecurity and Sarawak. What do they have in store? </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/12724479-s03e05-cybersecurity-in-sarawak.mp3" length="18183337" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12724479</guid>
    <pubDate>Wed, 26 Apr 2023 10:00:00 +0800</pubDate>
    <itunes:duration>1512</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S3E04. ISO Series - So you&#39;re ready for an ISO Audit (or are you) ? </itunes:title>
    <title>S3E04. ISO Series - So you&#39;re ready for an ISO Audit (or are you) ? </title>
    <itunes:summary><![CDATA[Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.  In this episode, team #SecurityLah looks into the aspect of audit readiness and getting to the moment of having the ISO certification cert in your hands.  ]]></itunes:summary>
    <description><![CDATA[<p>Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.<br/><br/>In this episode, team #SecurityLah looks into the aspect of audit readiness and getting to the moment of having the ISO certification cert in your hands. </p>]]></description>
    <content:encoded><![CDATA[<p>Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.<br/><br/>In this episode, team #SecurityLah looks into the aspect of audit readiness and getting to the moment of having the ISO certification cert in your hands. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/12350165-s3e04-iso-series-so-you-re-ready-for-an-iso-audit-or-are-you.mp3" length="41376380" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12350165</guid>
    <pubDate>Mon, 03 Apr 2023 08:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/12350165/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/12350165/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/12350165/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/12350165/transcript.vtt" type="text/vtt" />
    <itunes:duration>3444</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S3E03. ISO Series - Reading the ISO standard</itunes:title>
    <title>S3E03. ISO Series - Reading the ISO standard</title>
    <itunes:summary><![CDATA[Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.  In this episode, team #securityLah explains the standard structure and how one "reads" the standard.  ]]></itunes:summary>
    <description><![CDATA[<p>Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.<br/><br/>In this episode, team #securityLah explains the standard structure and how one &quot;reads&quot; the standard. </p>]]></description>
    <content:encoded><![CDATA[<p>Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.<br/><br/>In this episode, team #securityLah explains the standard structure and how one &quot;reads&quot; the standard. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/12350137-s3e03-iso-series-reading-the-iso-standard.mp3" length="31233403" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12350137</guid>
    <pubDate>Mon, 06 Mar 2023 08:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/12350137/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/12350137/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/12350137/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/12350137/transcript.vtt" type="text/vtt" />
    <itunes:duration>2599</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S3E02. ISO Series - Primer to the ISO 27000 series</itunes:title>
    <title>S3E02. ISO Series - Primer to the ISO 27000 series</title>
    <itunes:summary><![CDATA[Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.  We've looked at what standards and ISO is, and now we go into the 27k series. Team looks at the progression of the 27k series, the 7799 series and how the standards have evolved to today's needs. ]]></itunes:summary>
    <description><![CDATA[<p>Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.<br/><br/>We&apos;ve looked at what standards and ISO is, and now we go into the 27k series. Team looks at the progression of the 27k series, the 7799 series and how the standards have evolved to today&apos;s needs.</p>]]></description>
    <content:encoded><![CDATA[<p>Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.<br/><br/>We&apos;ve looked at what standards and ISO is, and now we go into the 27k series. Team looks at the progression of the 27k series, the 7799 series and how the standards have evolved to today&apos;s needs.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/11989946-s3e02-iso-series-primer-to-the-iso-27000-series.mp3" length="27933141" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11989946</guid>
    <pubDate>Fri, 06 Jan 2023 08:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11989946/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11989946/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11989946/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11989946/transcript.vtt" type="text/vtt" />
    <itunes:duration>2324</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S3E01. ISO Series - Of International Standards Ep 1/12</itunes:title>
    <title>S3E01. ISO Series - Of International Standards Ep 1/12</title>
    <itunes:summary><![CDATA[Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month. In this introductory episode, the team introduces the concept of international standards and the parties involved in making this global initiative happen.    ]]></itunes:summary>
    <description><![CDATA[<p>Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.</p><p>In this introductory episode, the team introduces the concept of international standards and the parties involved in making this global initiative happen. </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Team SecurityLAH introduces a series of podcast on international standards around cyber security. This is a year long series, with each episode airing beginning of the month.</p><p>In this introductory episode, the team introduces the concept of international standards and the parties involved in making this global initiative happen. </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/11956118-s3e01-iso-series-of-international-standards-ep-1-12.mp3" length="22359418" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11956118</guid>
    <pubDate>Mon, 02 Jan 2023 08:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11956118/transcript" type="text/html" />
    <itunes:duration>1860</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E17: AirAsia (Capital A) breach</itunes:title>
    <title>S2E17: AirAsia (Capital A) breach</title>
    <itunes:summary><![CDATA[Just about a month ago, AirAsia had a data breach. The breach was announced by the ransomware group Daixin. This episode looks into the breach that had happened with team SecurityLah tearing into the details! ]]></itunes:summary>
    <description><![CDATA[<p>Just about a month ago, AirAsia had a data breach. The breach was announced by the ransomware group Daixin. This episode looks into the breach that had happened with team SecurityLah tearing into the details!</p>]]></description>
    <content:encoded><![CDATA[<p>Just about a month ago, AirAsia had a data breach. The breach was announced by the ransomware group Daixin. This episode looks into the breach that had happened with team SecurityLah tearing into the details!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/11926929-s2e17-airasia-capital-a-breach.mp3" length="21632754" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11926929</guid>
    <pubDate>Tue, 27 Dec 2022 08:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11926929/transcript" type="text/html" />
    <itunes:duration>1799</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E16. Seasons greetings!</itunes:title>
    <title>S2E16. Seasons greetings!</title>
    <itunes:summary><![CDATA[We're coming to year end, with Christmas around the corner. Here are the hosts with special greetings to all of you! ]]></itunes:summary>
    <description><![CDATA[<p>We&apos;re coming to year end, with Christmas around the corner. Here are the hosts with special greetings to all of you!</p>]]></description>
    <content:encoded><![CDATA[<p>We&apos;re coming to year end, with Christmas around the corner. Here are the hosts with special greetings to all of you!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/11926925-s2e16-seasons-greetings.mp3" length="2381329" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11926925</guid>
    <pubDate>Sat, 24 Dec 2022 17:00:00 +0800</pubDate>
    <itunes:duration>195</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E15 - Indonesia&#39;s PT Telkom &amp; PLN breach</itunes:title>
    <title>S2E15 - Indonesia&#39;s PT Telkom &amp; PLN breach</title>
    <itunes:summary><![CDATA[Pt Telkom and PLN in Indonesia was breached. What happened?  Team SecurityLah dives into this recent incident.      ]]></itunes:summary>
    <description><![CDATA[<p>Pt Telkom and PLN in Indonesia was breached. What happened? <br/>Team SecurityLah dives into this recent incident.   <br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Pt Telkom and PLN in Indonesia was breached. What happened? <br/>Team SecurityLah dives into this recent incident.   <br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/11896596-s2e15-indonesia-s-pt-telkom-pln-breach.mp3" length="14276899" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11896596</guid>
    <pubDate>Mon, 19 Dec 2022 19:00:00 +0800</pubDate>
    <itunes:duration>1186</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E14: API Security</itunes:title>
    <title>S2E14: API Security</title>
    <itunes:summary><![CDATA[We use API's almost every day, every.minute and it a hidden aspect of our technology use. API is fast becoming a threat vector and needs to be looked at. In this episode, Sku and Doc looks into Top 5 issues plaguing API Security. ]]></itunes:summary>
    <description><![CDATA[<p>We use API&apos;s almost every day, every.minute and it a hidden aspect of our technology use. API is fast becoming a threat vector and needs to be looked at. In this episode, Sku and Doc looks into Top 5 issues plaguing API Security.</p>]]></description>
    <content:encoded><![CDATA[<p>We use API&apos;s almost every day, every.minute and it a hidden aspect of our technology use. API is fast becoming a threat vector and needs to be looked at. In this episode, Sku and Doc looks into Top 5 issues plaguing API Security.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/11165108-s2e14-api-security.mp3" length="23474045" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11165108</guid>
    <pubDate>Mon, 03 Oct 2022 08:00:00 +0800</pubDate>
    <itunes:duration>1952</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E13: iPay88 breach and notification - Part 2/2</itunes:title>
    <title>S2E13: iPay88 breach and notification - Part 2/2</title>
    <itunes:summary><![CDATA[This is the final part to the 2 part series of the iPa88 breach and notification.  ]]></itunes:summary>
    <description><![CDATA[<p>This is the final part to the 2 part series of the iPa88 breach and notification. </p>]]></description>
    <content:encoded><![CDATA[<p>This is the final part to the 2 part series of the iPa88 breach and notification. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/11215613-s2e13-ipay88-breach-and-notification-part-2-2.mp3" length="18513136" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11215613</guid>
    <pubDate>Mon, 19 Sep 2022 00:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11215613/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11215613/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11215613/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11215613/transcript.vtt" type="text/vtt" />
    <itunes:duration>1539</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E12: iPay88 breach and notification - Part 1/2</itunes:title>
    <title>S2E12: iPay88 breach and notification - Part 1/2</title>
    <itunes:summary><![CDATA[Recently, a Mal;aysian payment gateway named iPay88 released a press release stating that they have been breached. Team #securitylah breaks down the press release to make sense of what happened.  ]]></itunes:summary>
    <description><![CDATA[<p>Recently, a Mal;aysian payment gateway named iPay88 released a press release stating that they have been breached. Team #securitylah breaks down the press release to make sense of what happened. </p>]]></description>
    <content:encoded><![CDATA[<p>Recently, a Mal;aysian payment gateway named iPay88 released a press release stating that they have been breached. Team #securitylah breaks down the press release to make sense of what happened. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/11215608-s2e12-ipay88-breach-and-notification-part-1-2.mp3" length="17834162" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11215608</guid>
    <pubDate>Mon, 05 Sep 2022 00:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11215608/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11215608/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11215608/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11215608/transcript.vtt" type="text/vtt" />
    <itunes:duration>1482</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>BONUS: Doc&#39;s Cyber Security Business Plan</itunes:title>
    <title>BONUS: Doc&#39;s Cyber Security Business Plan</title>
    <itunes:summary><![CDATA[Doc came up with a new cyber security plan that, according to him, will revolutionise the industry. What is it?  ]]></itunes:summary>
    <description><![CDATA[<p>Doc came up with a new cyber security plan that, according to him, will revolutionise the industry. What is it? </p>]]></description>
    <content:encoded><![CDATA[<p>Doc came up with a new cyber security plan that, according to him, will revolutionise the industry. What is it? </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/11215586-bonus-doc-s-cyber-security-business-plan.mp3" length="6816012" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11215586</guid>
    <pubDate>Mon, 29 Aug 2022 08:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11215586/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11215586/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11215586/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11215586/transcript.vtt" type="text/vtt" />
    <itunes:duration>564</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E11: Why do breaches happen?</itunes:title>
    <title>S2E11: Why do breaches happen?</title>
    <itunes:summary><![CDATA[In this episode, team SecurityLah talks about data breaches and why it happens. Sky gives his top 5 reasons and Doc tears it apart.    ]]></itunes:summary>
    <description><![CDATA[<p>In this episode, team SecurityLah talks about data breaches and why it happens. Sky gives his top 5 reasons and Doc tears it apart. <br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, team SecurityLah talks about data breaches and why it happens. Sky gives his top 5 reasons and Doc tears it apart. <br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/11165092-s2e11-why-do-breaches-happen.mp3" length="26803425" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11165092</guid>
    <pubDate>Mon, 22 Aug 2022 08:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11165092/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11165092/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11165092/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/11165092/transcript.vtt" type="text/vtt" />
    <itunes:duration>2230</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E10: NSO Pegasus and Thailand</itunes:title>
    <title>S2E10: NSO Pegasus and Thailand</title>
    <itunes:summary><![CDATA[NSO's Pegasus (a commercial malware/spyware) has been hitting the news for sometime. Team #securitylah looks at the genesis of Pegasus/NSO, what has it been and whats happening with it in Thailand.  ]]></itunes:summary>
    <description><![CDATA[<p>NSO&apos;s Pegasus (a commercial malware/spyware) has been hitting the news for sometime. Team #securitylah looks at the genesis of Pegasus/NSO, what has it been and whats happening with it in Thailand. </p>]]></description>
    <content:encoded><![CDATA[<p>NSO&apos;s Pegasus (a commercial malware/spyware) has been hitting the news for sometime. Team #securitylah looks at the genesis of Pegasus/NSO, what has it been and whats happening with it in Thailand. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/11052189-s2e10-nso-pegasus-and-thailand.mp3" length="18338813" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11052189</guid>
    <pubDate>Mon, 01 Aug 2022 08:00:00 +0800</pubDate>
    <itunes:duration>1525</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E09: CWE-655</itunes:title>
    <title>S2E09: CWE-655</title>
    <itunes:summary><![CDATA[CWE or the Common Weakness Enumeration by MITRE is a catalog of identified weaknesses that should be looked at and addressed. In this episode, Doc goes into this particular weakness and shares how most organizations miss this and how it affects security for the organization.  ]]></itunes:summary>
    <description><![CDATA[<p>CWE or the Common Weakness Enumeration by MITRE is a catalog of identified weaknesses that should be looked at and addressed. In this episode, Doc goes into this particular weakness and shares how most organizations miss this and how it affects security for the organization. </p>]]></description>
    <content:encoded><![CDATA[<p>CWE or the Common Weakness Enumeration by MITRE is a catalog of identified weaknesses that should be looked at and addressed. In this episode, Doc goes into this particular weakness and shares how most organizations miss this and how it affects security for the organization. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/10990565-s2e09-cwe-655.mp3" length="20343103" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10990565</guid>
    <pubDate>Wed, 20 Jul 2022 11:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/10990565/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/10990565/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/10990565/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/10990565/transcript.vtt" type="text/vtt" />
    <itunes:duration>1692</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E08: About CISO, and IT Security Part 2/2</itunes:title>
    <title>S2E08: About CISO, and IT Security Part 2/2</title>
    <itunes:summary><![CDATA[Team SecurityLAH continues the discussion on the appointment of CISO for organizations due to regulatory and environmental requirements, and at the same time tearing apart the formation of IT Security in organizations.  ]]></itunes:summary>
    <description><![CDATA[<p>Team SecurityLAH continues the discussion on the appointment of CISO for organizations due to regulatory and environmental requirements, and at the same time tearing apart the formation of IT Security in organizations. </p>]]></description>
    <content:encoded><![CDATA[<p>Team SecurityLAH continues the discussion on the appointment of CISO for organizations due to regulatory and environmental requirements, and at the same time tearing apart the formation of IT Security in organizations. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/10457646-s2e08-about-ciso-and-it-security-part-2-2.mp3" length="16990919" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10457646</guid>
    <pubDate>Mon, 02 May 2022 08:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/10457646/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/10457646/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/10457646/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/10457646/transcript.vtt" type="text/vtt" />
    <itunes:duration>1412</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E07. About CISO… Part 1/2</itunes:title>
    <title>S2E07. About CISO… Part 1/2</title>
    <itunes:summary><![CDATA[“I see, I sow”.. said a podcaster once about CISO position.   It’s now a regulatory requirements for some industries to have CISO (Chief Information Security Officer). Team SecurityLAH reviews this position in greater details, but also looks at the evolution of how IT Security from IT itself, in a holistic view.   ]]></itunes:summary>
    <description><![CDATA[<p>“I see, I sow”.. said a podcaster once about CISO position. <br/><br/>It’s now a regulatory requirements for some industries to have CISO (Chief Information Security Officer). Team SecurityLAH reviews this position in greater details, but also looks at the evolution of how IT Security from IT itself, in a holistic view.  </p>]]></description>
    <content:encoded><![CDATA[<p>“I see, I sow”.. said a podcaster once about CISO position. <br/><br/>It’s now a regulatory requirements for some industries to have CISO (Chief Information Security Officer). Team SecurityLAH reviews this position in greater details, but also looks at the evolution of how IT Security from IT itself, in a holistic view.  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/10457634-s2e07-about-ciso-part-1-2.mp3" length="17758887" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10457634</guid>
    <pubDate>Tue, 19 Apr 2022 08:00:00 +0800</pubDate>
    <itunes:duration>1476</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E06. Proposed SG CyberSecurity Act amendments</itunes:title>
    <title>S2E06. Proposed SG CyberSecurity Act amendments</title>
    <itunes:summary><![CDATA[Singapore is seen to lead the Asian region in technology. This also includes having updated legal and regulatory framework to support this growth. Singapore has made proposals, through CSA , to make changes and keep their CyberSecurity laws updated.  What are the proposed changes? Tune in and find out! ]]></itunes:summary>
    <description><![CDATA[<p>Singapore is seen to lead the Asian region in technology. This also includes having updated legal and regulatory framework to support this growth. Singapore has made proposals, through CSA , to make changes and keep their CyberSecurity laws updated.<br/><br/>What are the proposed changes? Tune in and find out!</p>]]></description>
    <content:encoded><![CDATA[<p>Singapore is seen to lead the Asian region in technology. This also includes having updated legal and regulatory framework to support this growth. Singapore has made proposals, through CSA , to make changes and keep their CyberSecurity laws updated.<br/><br/>What are the proposed changes? Tune in and find out!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/10335909-s2e06-proposed-sg-cybersecurity-act-amendments.mp3" length="10215286" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10335909</guid>
    <pubDate>Tue, 29 Mar 2022 09:00:00 +0800</pubDate>
    <itunes:duration>848</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E05. International Committee of Red Cross (ICRC) hacked</itunes:title>
    <title>S2E05. International Committee of Red Cross (ICRC) hacked</title>
    <itunes:summary><![CDATA[Cyber penetration is now fast becoming a common occurrence. But where do we draw the line?   In this episode, we review a recent incident involving the International Committee of Red Cross, whom had informed the world that they have been hacked. Data was stolen, internal networks were compromised.   What's the impact? Whose affected? What's next?  ]]></itunes:summary>
    <description><![CDATA[<p>Cyber penetration is now fast becoming a common occurrence. But where do we draw the line? <br/><br/>In this episode, we review a recent incident involving the International Committee of Red Cross, whom had informed the world that they have been hacked. Data was stolen, internal networks were compromised. <br/><br/>What&apos;s the impact? Whose affected? What&apos;s next? </p>]]></description>
    <content:encoded><![CDATA[<p>Cyber penetration is now fast becoming a common occurrence. But where do we draw the line? <br/><br/>In this episode, we review a recent incident involving the International Committee of Red Cross, whom had informed the world that they have been hacked. Data was stolen, internal networks were compromised. <br/><br/>What&apos;s the impact? Whose affected? What&apos;s next? </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/10238573-s2e05-international-committee-of-red-cross-icrc-hacked.mp3" length="23192312" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10238573</guid>
    <pubDate>Mon, 14 Mar 2022 08:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/10238573/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/10238573/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/10238573/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/1453324/10238573/transcript.vtt" type="text/vtt" />
    <itunes:duration>1929</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E04. Russia/Ukraine - War on the Cyber front</itunes:title>
    <title>S2E04. Russia/Ukraine - War on the Cyber front</title>
    <itunes:summary><![CDATA[Russia has declared military operations against Ukraine, declaring both Donetsk and Luhansk independent. It’s no longer a war of words, but physical/kinetic and cyber war at large, out in the open.   SecurityLah looks into the geopolitics aspect of this war, analyzing past history and the current standing of the situation, beyond just war but also other aspects that provides key information on why the current situation is happening.  ]]></itunes:summary>
    <description><![CDATA[<p>Russia has declared military operations against Ukraine, declaring both Donetsk and Luhansk independent. It’s no longer a war of words, but physical/kinetic and cyber war at large, out in the open. <br/><br/>SecurityLah looks into the geopolitics aspect of this war, analyzing past history and the current standing of the situation, beyond just war but also other aspects that provides key information on why the current situation is happening. </p>]]></description>
    <content:encoded><![CDATA[<p>Russia has declared military operations against Ukraine, declaring both Donetsk and Luhansk independent. It’s no longer a war of words, but physical/kinetic and cyber war at large, out in the open. <br/><br/>SecurityLah looks into the geopolitics aspect of this war, analyzing past history and the current standing of the situation, beyond just war but also other aspects that provides key information on why the current situation is happening. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/10141391-s2e04-russia-ukraine-war-on-the-cyber-front.mp3" length="33600101" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10141391</guid>
    <pubDate>Fri, 25 Feb 2022 18:00:00 +0800</pubDate>
    <itunes:duration>2796</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E03. OCBC Singapore phishing attack (Part 2/2) </itunes:title>
    <title>S2E03. OCBC Singapore phishing attack (Part 2/2) </title>
    <itunes:summary><![CDATA[This is the continuation and final episode of the OCBC phishing incident. The team picks up from where it left off in the last episode, with Prof joining in to give her views on the matter.  ]]></itunes:summary>
    <description><![CDATA[<p>This is the continuation and final episode of the OCBC phishing incident. The team picks up from where it left off in the last episode, with Prof joining in to give her views on the matter. </p>]]></description>
    <content:encoded><![CDATA[<p>This is the continuation and final episode of the OCBC phishing incident. The team picks up from where it left off in the last episode, with Prof joining in to give her views on the matter. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/10075924-s2e03-ocbc-singapore-phishing-attack-part-2-2.mp3" length="22042804" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10075924</guid>
    <pubDate>Tue, 15 Feb 2022 08:00:00 +0800</pubDate>
    <itunes:duration>1833</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E02: OCBC Singapore phishing attack (Part 1/2)</itunes:title>
    <title>S2E02: OCBC Singapore phishing attack (Part 1/2)</title>
    <itunes:summary><![CDATA[Over the year end of 2021, a massive wave of phishing attack targeting customers of OCBC Singapore was executed. We got heads up from one of our listeners who were kind enough to give us some juicy bits about this incident as we deep dive into the incident. This is the first part of the 2 part series on the OCBC phishing scam.  ]]></itunes:summary>
    <description><![CDATA[<p>Over the year end of 2021, a massive wave of phishing attack targeting customers of OCBC Singapore was executed. We got heads up from one of our listeners who were kind enough to give us some juicy bits about this incident as we deep dive into the incident. This is the first part of the 2 part series on the OCBC phishing scam. </p>]]></description>
    <content:encoded><![CDATA[<p>Over the year end of 2021, a massive wave of phishing attack targeting customers of OCBC Singapore was executed. We got heads up from one of our listeners who were kind enough to give us some juicy bits about this incident as we deep dive into the incident. This is the first part of the 2 part series on the OCBC phishing scam. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/10026507-s2e02-ocbc-singapore-phishing-attack-part-1-2.mp3" length="23612343" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10026507</guid>
    <pubDate>Tue, 08 Feb 2022 08:00:00 +0800</pubDate>
    <itunes:duration>1964</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>S2E01. Trends on Security - 2022</itunes:title>
    <title>S2E01. Trends on Security - 2022</title>
    <itunes:summary><![CDATA[Welcome to Season 2 of SecurityLAH!  In this opening episode, we look at trends that is upcoming, some already here and some destined to dominate the way we look at NCIS (Network. Cyber and Information Security).  ]]></itunes:summary>
    <description><![CDATA[<p>Welcome to Season 2 of SecurityLAH!<br/><br/>In this opening episode, we look at trends that is upcoming, some already here and some destined to dominate the way we look at NCIS (Network. Cyber and Information Security). </p>]]></description>
    <content:encoded><![CDATA[<p>Welcome to Season 2 of SecurityLAH!<br/><br/>In this opening episode, we look at trends that is upcoming, some already here and some destined to dominate the way we look at NCIS (Network. Cyber and Information Security). </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/9938988-s2e01-trends-on-security-2022.mp3" length="23516703" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9938988</guid>
    <pubDate>Mon, 24 Jan 2022 10:00:00 +0800</pubDate>
    <itunes:duration>1956</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Bonus Track - Christmas &amp; New Year wishes!</itunes:title>
    <title>Bonus Track - Christmas &amp; New Year wishes!</title>
    <itunes:summary><![CDATA[Team SecurityLAH would like to wish all of our listeners a very Merry Christmas and a Happy New Year!  The team will be taking a break, practice our vocal chords a bit, maybe laze at a beach somewhere for a while since we have  ]]></itunes:summary>
    <description><![CDATA[<p>Team SecurityLAH would like to wish all of our listeners a very Merry Christmas and a Happy New Year!<br/><br/>The team will be taking a break, practice our vocal chords a bit, maybe laze at a beach somewhere for a while since we have </p>]]></description>
    <content:encoded><![CDATA[<p>Team SecurityLAH would like to wish all of our listeners a very Merry Christmas and a Happy New Year!<br/><br/>The team will be taking a break, practice our vocal chords a bit, maybe laze at a beach somewhere for a while since we have </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/9610767-bonus-track-christmas-new-year-wishes.mp3" length="3482894" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9610767</guid>
    <pubDate>Mon, 20 Dec 2021 08:00:00 +0800</pubDate>
    <itunes:duration>287</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>36</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 35. Risk vs Vulnerabilities </itunes:title>
    <title>Ep 35. Risk vs Vulnerabilities </title>
    <itunes:summary><![CDATA[In a casual chat, the SecurityLah hosts had an internal discussion about security stuff, besides talking about topics for the podcast. This is one of those discussion, that SecurityLah felt should go to a wider audience than just the hosts itself.   The team looks at risk management, specifically when dealing with vulnerability management.  ]]></itunes:summary>
    <description><![CDATA[<p>In a casual chat, the SecurityLah hosts had an internal discussion about security stuff, besides talking about topics for the podcast. This is one of those discussion, that SecurityLah felt should go to a wider audience than just the hosts itself. <br/><br/>The team looks at risk management, specifically when dealing with vulnerability management. </p>]]></description>
    <content:encoded><![CDATA[<p>In a casual chat, the SecurityLah hosts had an internal discussion about security stuff, besides talking about topics for the podcast. This is one of those discussion, that SecurityLah felt should go to a wider audience than just the hosts itself. <br/><br/>The team looks at risk management, specifically when dealing with vulnerability management. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/9605916-ep-35-risk-vs-vulnerabilities.mp3" length="21005497" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9605916</guid>
    <pubDate>Mon, 13 Dec 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1747</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 34. National Bank of Pakistan hacked</itunes:title>
    <title>Ep 34. National Bank of Pakistan hacked</title>
    <itunes:summary><![CDATA[We were recently alerted to a report that National Bank of Pakistan may have experienced a cyber attack. Client facing banking infrastructure was seen to be down, causing panic to its customers. Our resident Securitylah financial expert takes a stab on the matter, hoping to give some sense of clarity into the incident.   ]]></itunes:summary>
    <description><![CDATA[<p>We were recently alerted to a report that National Bank of Pakistan may have experienced a cyber attack. Client facing banking infrastructure was seen to be down, causing panic to its customers. Our resident Securitylah financial expert takes a stab on the matter, hoping to give some sense of clarity into the incident.  </p>]]></description>
    <content:encoded><![CDATA[<p>We were recently alerted to a report that National Bank of Pakistan may have experienced a cyber attack. Client facing banking infrastructure was seen to be down, causing panic to its customers. Our resident Securitylah financial expert takes a stab on the matter, hoping to give some sense of clarity into the incident.  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/9605910-ep-34-national-bank-of-pakistan-hacked.mp3" length="15575283" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9605910</guid>
    <pubDate>Mon, 06 Dec 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1294</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>34</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 33. China&#39;s new data privacy law</itunes:title>
    <title>Ep 33. China&#39;s new data privacy law</title>
    <itunes:summary><![CDATA[China recently published their laws related to data secrecy and privacy. Team SecurityLah looks through some salient points on what the law says and how it affects China, its people and the global as a whole ]]></itunes:summary>
    <description><![CDATA[<p>China recently published their laws related to data secrecy and privacy. Team SecurityLah looks through some salient points on what the law says and how it affects China, its people and the global as a whole</p>]]></description>
    <content:encoded><![CDATA[<p>China recently published their laws related to data secrecy and privacy. Team SecurityLah looks through some salient points on what the law says and how it affects China, its people and the global as a whole</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/9605902-ep-33-china-s-new-data-privacy-law.mp3" length="16700944" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9605902</guid>
    <pubDate>Mon, 29 Nov 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1388</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 32. Indonesian Intelligence Agency compromised</itunes:title>
    <title>Ep 32. Indonesian Intelligence Agency compromised</title>
    <itunes:summary><![CDATA[In a recent report by one of the CTI providers, it was identified that a few government agencies of Indonesia was compromised by a threat actor. In this episode, the team looks at the claims of the compromise and whether its true or just rumours.  ]]></itunes:summary>
    <description><![CDATA[<p>In a recent report by one of the CTI providers, it was identified that a few government agencies of Indonesia was compromised by a threat actor. In this episode, the team looks at the claims of the compromise and whether its true or just rumours. </p>]]></description>
    <content:encoded><![CDATA[<p>In a recent report by one of the CTI providers, it was identified that a few government agencies of Indonesia was compromised by a threat actor. In this episode, the team looks at the claims of the compromise and whether its true or just rumours. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/9440532-ep-32-indonesian-intelligence-agency-compromised.mp3" length="24747104" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9440532</guid>
    <pubDate>Mon, 22 Nov 2021 09:00:00 +0800</pubDate>
    <itunes:duration>2059</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>32</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 31. Thai tourist visa data leak</itunes:title>
    <title>Ep 31. Thai tourist visa data leak</title>
    <itunes:summary><![CDATA[A site, containing visa information to Thailand was left open and discovered by a researcher. What happened? How much of data was potentially left open? What's the impact of that incident? Answers to all those questions in this episode of SecurityLah! ]]></itunes:summary>
    <description><![CDATA[<p>A site, containing visa information to Thailand was left open and discovered by a researcher. What happened? How much of data was potentially left open? What&apos;s the impact of that incident? Answers to all those questions in this episode of SecurityLah!</p>]]></description>
    <content:encoded><![CDATA[<p>A site, containing visa information to Thailand was left open and discovered by a researcher. What happened? How much of data was potentially left open? What&apos;s the impact of that incident? Answers to all those questions in this episode of SecurityLah!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/9440539-ep-31-thai-tourist-visa-data-leak.mp3" length="17234153" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9440539</guid>
    <pubDate>Mon, 15 Nov 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1432</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 30. Indonesian COVID-19 data leak</itunes:title>
    <title>Ep 30. Indonesian COVID-19 data leak</title>
    <itunes:summary><![CDATA[Recently, there were reports of data leak affecting the COVID-19 contact tracing app in Indonesia. Details of users and its usage were made available, and the unfortunate victim that was made as an example was non-other that the Prime Minister himself! ]]></itunes:summary>
    <description><![CDATA[<p>Recently, there were reports of data leak affecting the COVID-19 contact tracing app in Indonesia. Details of users and its usage were made available, and the unfortunate victim that was made as an example was non-other that the Prime Minister himself!</p>]]></description>
    <content:encoded><![CDATA[<p>Recently, there were reports of data leak affecting the COVID-19 contact tracing app in Indonesia. Details of users and its usage were made available, and the unfortunate victim that was made as an example was non-other that the Prime Minister himself!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/9422049-ep-30-indonesian-covid-19-data-leak.mp3" length="10834680" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9422049</guid>
    <pubDate>Mon, 08 Nov 2021 08:00:00 +0800</pubDate>
    <itunes:duration>899</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>30</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 29. APT41 - Double Dragon</itunes:title>
    <title>Ep 29. APT41 - Double Dragon</title>
    <itunes:summary><![CDATA[We explore the activities of APT41 aka Double Dragon which focuses its threat activites around South East Asia, attacking telecommunications, infrastructure and government agencies.  ]]></itunes:summary>
    <description><![CDATA[<p>We explore the activities of APT41 aka Double Dragon which focuses its threat activites around South East Asia, attacking telecommunications, infrastructure and government agencies. </p>]]></description>
    <content:encoded><![CDATA[<p>We explore the activities of APT41 aka Double Dragon which focuses its threat activites around South East Asia, attacking telecommunications, infrastructure and government agencies. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/9205279-ep-29-apt41-double-dragon.mp3" length="18685818" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9205279</guid>
    <pubDate>Mon, 01 Nov 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1553</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>29</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 28. myIdentity, JPN/LHDN data leak</itunes:title>
    <title>Ep 28. myIdentity, JPN/LHDN data leak</title>
    <itunes:summary><![CDATA[A leak was found mentioning data siphoned off using myIdentity interface, originating from JPN and was done through LHDN. Team SecurityLah dissects this incident into greater details, looking at how it could have happened, and nuggets of wisdom for blue team on detecting such attacks.  ]]></itunes:summary>
    <description><![CDATA[<p>A leak was found mentioning data siphoned off using myIdentity interface, originating from JPN and was done through LHDN. Team SecurityLah dissects this incident into greater details, looking at how it could have happened, and nuggets of wisdom for blue team on detecting such attacks. </p>]]></description>
    <content:encoded><![CDATA[<p>A leak was found mentioning data siphoned off using myIdentity interface, originating from JPN and was done through LHDN. Team SecurityLah dissects this incident into greater details, looking at how it could have happened, and nuggets of wisdom for blue team on detecting such attacks. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/9422041-ep-28-myidentity-jpn-lhdn-data-leak.mp3" length="18353872" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9422041</guid>
    <pubDate>Mon, 25 Oct 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1526</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>28</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 27. Are Cryptocurrencies secure?</itunes:title>
    <title>Ep 27. Are Cryptocurrencies secure?</title>
    <itunes:summary><![CDATA[One of the question we get from a lot of people around us, including our listeners is this cryptocurrency. Is it secure, and should someone invest on it? Before investing, what does a person need to know and how does he/she protect their digital assets?  ]]></itunes:summary>
    <description><![CDATA[<p>One of the question we get from a lot of people around us, including our listeners is this cryptocurrency. Is it secure, and should someone invest on it? Before investing, what does a person need to know and how does he/she protect their digital assets? </p>]]></description>
    <content:encoded><![CDATA[<p>One of the question we get from a lot of people around us, including our listeners is this cryptocurrency. Is it secure, and should someone invest on it? Before investing, what does a person need to know and how does he/she protect their digital assets? </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/9192414-ep-27-are-cryptocurrencies-secure.mp3" length="22475677" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9192414</guid>
    <pubDate>Mon, 11 Oct 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1869</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 26. Of Apple CSAM, Samsung Kill Switch and Device Ownership</itunes:title>
    <title>Ep 26. Of Apple CSAM, Samsung Kill Switch and Device Ownership</title>
    <itunes:summary><![CDATA[As consumers, we own a lot of smart devices. Technically they're not that smart, but you get the drift. We look at the interesting relationship between the consumer, the device and the manufacturer and the unique relationship one has with the other. Security will always be the forefront, hence we analyse how security plays out on this context.  ]]></itunes:summary>
    <description><![CDATA[<p>As consumers, we own a lot of smart devices. Technically they&apos;re not that smart, but you get the drift. We look at the interesting relationship between the consumer, the device and the manufacturer and the unique relationship one has with the other. Security will always be the forefront, hence we analyse how security plays out on this context. </p>]]></description>
    <content:encoded><![CDATA[<p>As consumers, we own a lot of smart devices. Technically they&apos;re not that smart, but you get the drift. We look at the interesting relationship between the consumer, the device and the manufacturer and the unique relationship one has with the other. Security will always be the forefront, hence we analyse how security plays out on this context. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/9192409-ep-26-of-apple-csam-samsung-kill-switch-and-device-ownership.mp3" length="19608426" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9192409</guid>
    <pubDate>Mon, 27 Sep 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1630</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 25. Does cybersecurity tools/controls make your organization secure? </itunes:title>
    <title>Ep 25. Does cybersecurity tools/controls make your organization secure? </title>
    <itunes:summary><![CDATA[This is a special episode where we make the hosts into 2 groups, and pit these groups against each other based on a topic given. Cat is the moderator. Whole load of fun, with some interesting aha moments! ]]></itunes:summary>
    <description><![CDATA[<p>This is a special episode where we make the hosts into 2 groups, and pit these groups against each other based on a topic given. Cat is the moderator. Whole load of fun, with some interesting aha moments!</p>]]></description>
    <content:encoded><![CDATA[<p>This is a special episode where we make the hosts into 2 groups, and pit these groups against each other based on a topic given. Cat is the moderator. Whole load of fun, with some interesting aha moments!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8697758-ep-25-does-cybersecurity-tools-controls-make-your-organization-secure.mp3" length="12750990" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8697758</guid>
    <pubDate>Mon, 13 Sep 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1059</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>25</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 24. Single Vendor aka Supply Chain attacks</itunes:title>
    <title>Ep 24. Single Vendor aka Supply Chain attacks</title>
    <itunes:summary><![CDATA[SuecurityLah team finds a disturbing trend. A single attack/hack could affect multiple organizations. In this episode, we dive into the most talked-about attacks which originate from single vendor/source, which for some is known as supply-chain attack.  ]]></itunes:summary>
    <description><![CDATA[<p>SuecurityLah team finds a disturbing trend. A single attack/hack could affect multiple organizations. In this episode, we dive into the most talked-about attacks which originate from single vendor/source, which for some is known as supply-chain attack. </p>]]></description>
    <content:encoded><![CDATA[<p>SuecurityLah team finds a disturbing trend. A single attack/hack could affect multiple organizations. In this episode, we dive into the most talked-about attacks which originate from single vendor/source, which for some is known as supply-chain attack. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8697777-ep-24-single-vendor-aka-supply-chain-attacks.mp3" length="12730874" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8697777</guid>
    <pubDate>Mon, 30 Aug 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1057</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 23. Hacking vs Scraping</itunes:title>
    <title>Ep 23. Hacking vs Scraping</title>
    <itunes:summary><![CDATA[The recent buzz about attacks on personal data. Some say it's not a hack, but just scraping. What's the difference? Why does it matter?  ]]></itunes:summary>
    <description><![CDATA[<p>The recent buzz about attacks on personal data. Some say it&apos;s not a hack, but just scraping. What&apos;s the difference? Why does it matter? </p>]]></description>
    <content:encoded><![CDATA[<p>The recent buzz about attacks on personal data. Some say it&apos;s not a hack, but just scraping. What&apos;s the difference? Why does it matter? </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8697767-ep-23-hacking-vs-scraping.mp3" length="18277050" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8697767</guid>
    <pubDate>Mon, 16 Aug 2021 07:00:00 +0800</pubDate>
    <itunes:duration>1519</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 22. Ransomware - what&#39;s happening?</itunes:title>
    <title>Ep 22. Ransomware - what&#39;s happening?</title>
    <itunes:summary><![CDATA[Open any international news portal and ransomware dominates the headlines.   In this episode, the team examines ransomware and how it affects organizations and even individuals globally.  ]]></itunes:summary>
    <description><![CDATA[<p>Open any international news portal and ransomware dominates the headlines. <br/><br/>In this episode, the team examines ransomware and how it affects organizations and even individuals globally. </p>]]></description>
    <content:encoded><![CDATA[<p>Open any international news portal and ransomware dominates the headlines. <br/><br/>In this episode, the team examines ransomware and how it affects organizations and even individuals globally. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8955394-ep-22-ransomware-what-s-happening.mp3" length="27508745" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8955394</guid>
    <pubDate>Mon, 02 Aug 2021 08:00:00 +0800</pubDate>
    <itunes:duration>2289</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 21. Interpol Cyber Security report on ASEAN (2020)</itunes:title>
    <title>Ep 21. Interpol Cyber Security report on ASEAN (2020)</title>
    <itunes:summary><![CDATA[The SecurityLAH team reviews the Interpol Cyber Security report focused on the ASEAN region, putting some rationale into the data provided. Some insights into the type attacks and why.  ]]></itunes:summary>
    <description><![CDATA[<p>The SecurityLAH team reviews the Interpol Cyber Security report focused on the ASEAN region, putting some rationale into the data provided. Some insights into the type attacks and why. </p>]]></description>
    <content:encoded><![CDATA[<p>The SecurityLAH team reviews the Interpol Cyber Security report focused on the ASEAN region, putting some rationale into the data provided. Some insights into the type attacks and why. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8697772-ep-21-interpol-cyber-security-report-on-asean-2020.mp3" length="24124875" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8697772</guid>
    <pubDate>Mon, 19 Jul 2021 08:00:00 +0800</pubDate>
    <itunes:duration>2007</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 20. Degree vs Certification - which path to take? </itunes:title>
    <title>Ep 20. Degree vs Certification - which path to take? </title>
    <itunes:summary><![CDATA[The question that often runs on everyone's mind. Which educational path should one take? Increase skills and ability through professional training, or pursue academic achievements through post degree programs?  ]]></itunes:summary>
    <description><![CDATA[<p>The question that often runs on everyone&apos;s mind. Which educational path should one take? Increase skills and ability through professional training, or pursue academic achievements through post degree programs? </p>]]></description>
    <content:encoded><![CDATA[<p>The question that often runs on everyone&apos;s mind. Which educational path should one take? Increase skills and ability through professional training, or pursue academic achievements through post degree programs? </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8368357-ep-20-degree-vs-certification-which-path-to-take.mp3" length="24621411" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8368357</guid>
    <pubDate>Mon, 05 Jul 2021 08:00:00 +0800</pubDate>
    <itunes:duration>2048</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 19. ePay breach - What happened? (MY)</itunes:title>
    <title>Ep 19. ePay breach - What happened? (MY)</title>
    <itunes:summary><![CDATA[The Edge Market reported that ePay, a product of GHL may have experienced a breach. The hosts at SecurityLah deep dive into this issue, looking at all of the publicly available data to get into the meat of the matter, or the bits in the cyber, so to say...  ]]></itunes:summary>
    <description><![CDATA[<p>The Edge Market reported that ePay, a product of GHL may have experienced a breach. The hosts at SecurityLah deep dive into this issue, looking at all of the publicly available data to get into the meat of the matter, or the bits in the cyber, so to say... </p>]]></description>
    <content:encoded><![CDATA[<p>The Edge Market reported that ePay, a product of GHL may have experienced a breach. The hosts at SecurityLah deep dive into this issue, looking at all of the publicly available data to get into the meat of the matter, or the bits in the cyber, so to say... </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8368355-ep-19-epay-breach-what-happened-my.mp3" length="23853071" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8368355</guid>
    <pubDate>Mon, 21 Jun 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1984</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 18. Are Passwords still relevant? </itunes:title>
    <title>Ep 18. Are Passwords still relevant? </title>
    <itunes:summary><![CDATA[The abomination called passwords become centerstage discussion in this episode. The bane of everyone's existence, passwords, while becoming the reality of technology and computing, is fast becoming an issue. Data leaks, breaches makes it difficult for an average user to use it effectively. We discuss at length about passwords and what are the alternatives, both to business and end users.  ]]></itunes:summary>
    <description><![CDATA[<p>The abomination called passwords become centerstage discussion in this episode. The bane of everyone&apos;s existence, passwords, while becoming the reality of technology and computing, is fast becoming an issue. Data leaks, breaches makes it difficult for an average user to use it effectively. We discuss at length about passwords and what are the alternatives, both to business and end users. </p>]]></description>
    <content:encoded><![CDATA[<p>The abomination called passwords become centerstage discussion in this episode. The bane of everyone&apos;s existence, passwords, while becoming the reality of technology and computing, is fast becoming an issue. Data leaks, breaches makes it difficult for an average user to use it effectively. We discuss at length about passwords and what are the alternatives, both to business and end users. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8360292-ep-18-are-passwords-still-relevant.mp3" length="13495723" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8360292</guid>
    <pubDate>Mon, 07 Jun 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1121</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 17. MAS TRM Regulations &amp; Solarwinds incident (SG)</itunes:title>
    <title>Ep 17. MAS TRM Regulations &amp; Solarwinds incident (SG)</title>
    <itunes:summary><![CDATA[Monetary Authority of Singapore recently released a circular to update the requirements previously published under the Technology Risk Management guidelines, in view of addressing issues that recently plagued many organizations through Solarwinds supply chain attack. We review the requirements to see what are the changes and how it impacts organizations.  ]]></itunes:summary>
    <description><![CDATA[<p>Monetary Authority of Singapore recently released a circular to update the requirements previously published under the Technology Risk Management guidelines, in view of addressing issues that recently plagued many organizations through Solarwinds supply chain attack. We review the requirements to see what are the changes and how it impacts organizations. </p>]]></description>
    <content:encoded><![CDATA[<p>Monetary Authority of Singapore recently released a circular to update the requirements previously published under the Technology Risk Management guidelines, in view of addressing issues that recently plagued many organizations through Solarwinds supply chain attack. We review the requirements to see what are the changes and how it impacts organizations. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8207389-ep-17-mas-trm-regulations-solarwinds-incident-sg.mp3" length="24435837" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8207389</guid>
    <pubDate>Mon, 24 May 2021 08:00:00 +0800</pubDate>
    <itunes:duration>2033</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 16. Submarine Fiber Cables &amp; Cabotage</itunes:title>
    <title>Ep 16. Submarine Fiber Cables &amp; Cabotage</title>
    <itunes:summary><![CDATA[The Internet powers the world, while the submarine cables powers the Internet. We explore the not-so-public life of submarine cables, the cabotage system and how it affects global Internet and network connectivity, with Australian telco publisher Grahame Lynch from Communications Day. ]]></itunes:summary>
    <description><![CDATA[<p>The Internet powers the world, while the submarine cables powers the Internet. We explore the not-so-public life of submarine cables, the cabotage system and how it affects global Internet and network connectivity, with Australian telco publisher Grahame Lynch from Communications Day.</p>]]></description>
    <content:encoded><![CDATA[<p>The Internet powers the world, while the submarine cables powers the Internet. We explore the not-so-public life of submarine cables, the cabotage system and how it affects global Internet and network connectivity, with Australian telco publisher Grahame Lynch from Communications Day.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8442670-ep-16-submarine-fiber-cables-cabotage.mp3" length="36170851" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8442670</guid>
    <pubDate>Mon, 17 May 2021 08:00:00 +0800</pubDate>
    <itunes:duration>3011</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 15. Mobile Application Ban</itunes:title>
    <title>Ep 15. Mobile Application Ban</title>
    <itunes:summary><![CDATA[Some mobile apps were DEEMED not secured and countries banned them. What happened and why lah? ]]></itunes:summary>
    <description><![CDATA[<p>Some mobile apps were DEEMED not secured and countries banned them. What happened and why lah?</p>]]></description>
    <content:encoded><![CDATA[<p>Some mobile apps were DEEMED not secured and countries banned them. What happened and why lah?</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8368347-ep-15-mobile-application-ban.mp3" length="6815988" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8368347</guid>
    <pubDate>Mon, 10 May 2021 08:00:00 +0800</pubDate>
    <itunes:duration>564</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 14. Semiconductors - the next big supply chain risk? (CN/TW)</itunes:title>
    <title>Ep 14. Semiconductors - the next big supply chain risk? (CN/TW)</title>
    <itunes:summary><![CDATA[Semiconductors power almost everything around us. From mobile phone, computers, connected devices and even cars. The world relies on its semiconductor supplies to keep manufacturing processes running. We explore the tilt in the semiconductor suppliers and how it affects the globe, with Australian telco publisher Grahame Lynch from Communications Day. ]]></itunes:summary>
    <description><![CDATA[<p>Semiconductors power almost everything around us. From mobile phone, computers, connected devices and even cars. The world relies on its semiconductor supplies to keep manufacturing processes running. We explore the tilt in the semiconductor suppliers and how it affects the globe, with Australian telco publisher Grahame Lynch from Communications Day.</p>]]></description>
    <content:encoded><![CDATA[<p>Semiconductors power almost everything around us. From mobile phone, computers, connected devices and even cars. The world relies on its semiconductor supplies to keep manufacturing processes running. We explore the tilt in the semiconductor suppliers and how it affects the globe, with Australian telco publisher Grahame Lynch from Communications Day.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8442648-ep-14-semiconductors-the-next-big-supply-chain-risk-cn-tw.mp3" length="23985715" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8442648</guid>
    <pubDate>Mon, 03 May 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1995</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 13. Deep Fake - Is it real?</itunes:title>
    <title>Ep 13. Deep Fake - Is it real?</title>
    <itunes:summary><![CDATA[Prof described Deep Fake as algorithms duking it out with each other. Is it? What is it? If deep fakes get any more realistic than they already do, will we know what's real anymore? ]]></itunes:summary>
    <description><![CDATA[<p>Prof described Deep Fake as algorithms duking it out with each other. Is it? What is it? If deep fakes get any more realistic than they already do, will we know what&apos;s real anymore?</p>]]></description>
    <content:encoded><![CDATA[<p>Prof described Deep Fake as algorithms duking it out with each other. Is it? What is it? If deep fakes get any more realistic than they already do, will we know what&apos;s real anymore?</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8179228-ep-13-deep-fake-is-it-real.mp3" length="7613143" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8179228</guid>
    <pubDate>Mon, 26 Apr 2021 08:00:00 +0800</pubDate>
    <itunes:duration>631</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 12. Dark Basin (IN) - Hacking as a Service</itunes:title>
    <title>Ep 12. Dark Basin (IN) - Hacking as a Service</title>
    <itunes:summary><![CDATA[Hacking for hire is a lucrative business. The SecurityLAH! team was divided on some things, but in general, there is consensus that Dark Basin's business could close and pack up, but it will likely pop up again somewhere.  Interestingly this was the first episode recorded by SecurityLah last year! It took us a while to schedule and release this episode, competing with other more timely episodes.  ]]></itunes:summary>
    <description><![CDATA[<p>Hacking for hire is a lucrative business. The SecurityLAH! team was divided on some things, but in general, there is consensus that Dark Basin&apos;s business could close and pack up, but it will likely pop up again somewhere.<br/><br/>Interestingly this was the first episode recorded by SecurityLah last year! It took us a while to schedule and release this episode, competing with other more timely episodes. </p>]]></description>
    <content:encoded><![CDATA[<p>Hacking for hire is a lucrative business. The SecurityLAH! team was divided on some things, but in general, there is consensus that Dark Basin&apos;s business could close and pack up, but it will likely pop up again somewhere.<br/><br/>Interestingly this was the first episode recorded by SecurityLah last year! It took us a while to schedule and release this episode, competing with other more timely episodes. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8179213-ep-12-dark-basin-in-hacking-as-a-service.mp3" length="10791125" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8179213</guid>
    <pubDate>Mon, 12 Apr 2021 06:00:00 +0800</pubDate>
    <itunes:duration>896</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 11 Hacker Perspective on UniKL hack - Part 2/2</itunes:title>
    <title>Ep. 11 Hacker Perspective on UniKL hack - Part 2/2</title>
    <itunes:summary><![CDATA[Someone wanted to buy the breach data of UniKL? Who is it? Found out in this episode of SecurityLah!  A Malaysian university was hacked by a threat actor. A host published the matter in Linkedin, just to find the matter commented by the actual hacker. This is the interview between the host and the hacker. First ever, a view from the hacker perspective.  Article link: http://bit.ly/unikl-hackFurther reading: https://www.linkedin.com/pulse/hacker-perspective-unikl-hack-dr-suresh ]]></itunes:summary>
    <description><![CDATA[<p>Someone wanted to buy the breach data of UniKL? Who is it?<br/>Found out in this episode of SecurityLah!<br/><br/>A Malaysian university was hacked by a threat actor. A host published the matter in Linkedin, just to find the matter commented by the actual hacker. This is the interview between the host and the hacker. First ever, a view from the hacker perspective. </p><p>Article link: http://bit.ly/unikl-hackFurther reading: https://www.linkedin.com/pulse/hacker-perspective-unikl-hack-dr-suresh</p>]]></description>
    <content:encoded><![CDATA[<p>Someone wanted to buy the breach data of UniKL? Who is it?<br/>Found out in this episode of SecurityLah!<br/><br/>A Malaysian university was hacked by a threat actor. A host published the matter in Linkedin, just to find the matter commented by the actual hacker. This is the interview between the host and the hacker. First ever, a view from the hacker perspective. </p><p>Article link: http://bit.ly/unikl-hackFurther reading: https://www.linkedin.com/pulse/hacker-perspective-unikl-hack-dr-suresh</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8207061-ep-11-hacker-perspective-on-unikl-hack-part-2-2.mp3" length="28223795" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8207061</guid>
    <pubDate>Mon, 05 Apr 2021 10:00:00 +0800</pubDate>
    <itunes:duration>2348</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 10 Hacker Perspective on UniKL hack - Part 1/2</itunes:title>
    <title>Ep. 10 Hacker Perspective on UniKL hack - Part 1/2</title>
    <itunes:summary><![CDATA[A Malaysian university was hacked by a threat actor. A host published the matter in Linkedin, just to find the matter commented by the actual hacker. This is the interview between the host and the hacker. First ever, a view from the hacker perspective.   Article link: http://bit.ly/unikl-hack Further reading: https://www.linkedin.com/pulse/hacker-perspective-unikl-hack-dr-suresh ]]></itunes:summary>
    <description><![CDATA[<p>A Malaysian university was hacked by a threat actor. A host published the matter in Linkedin, just to find the matter commented by the actual hacker. This is the interview between the host and the hacker. First ever, a view from the hacker perspective. <br/><br/>Article link: http://bit.ly/unikl-hack<br/>Further reading: https://www.linkedin.com/pulse/hacker-perspective-unikl-hack-dr-suresh</p>]]></description>
    <content:encoded><![CDATA[<p>A Malaysian university was hacked by a threat actor. A host published the matter in Linkedin, just to find the matter commented by the actual hacker. This is the interview between the host and the hacker. First ever, a view from the hacker perspective. <br/><br/>Article link: http://bit.ly/unikl-hack<br/>Further reading: https://www.linkedin.com/pulse/hacker-perspective-unikl-hack-dr-suresh</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8195312-ep-10-hacker-perspective-on-unikl-hack-part-1-2.mp3" length="27515354" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8195312</guid>
    <pubDate>Mon, 29 Mar 2021 08:00:00 +0800</pubDate>
    <itunes:duration>2289</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 9. Interview - Keith Rozario (SayaKenaHack) - Part 2/2</itunes:title>
    <title>Ep 9. Interview - Keith Rozario (SayaKenaHack) - Part 2/2</title>
    <itunes:summary><![CDATA[This is the final part on the interview with Keith Rozario, we continue the conversation around Macau Scam, SayaKenaHack and data breaches. ]]></itunes:summary>
    <description><![CDATA[<p>This is the final part on the interview with Keith Rozario, we continue the conversation around Macau Scam, SayaKenaHack and data breaches.</p>]]></description>
    <content:encoded><![CDATA[<p>This is the final part on the interview with Keith Rozario, we continue the conversation around Macau Scam, SayaKenaHack and data breaches.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8179203-ep-9-interview-keith-rozario-sayakenahack-part-2-2.mp3" length="16781549" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8179203</guid>
    <pubDate>Mon, 22 Mar 2021 11:00:00 +0800</pubDate>
    <itunes:duration>1395</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 8. Interview - Keith Rozario (SayaKenaHack/Macau Scam) - Part 1/2</itunes:title>
    <title>Ep 8. Interview - Keith Rozario (SayaKenaHack/Macau Scam) - Part 1/2</title>
    <itunes:summary><![CDATA[In the earlier episode, we had dwelved into what Macau Scam is. In this episode, we speak to our contact Keith Rozario, who has had experience in some aspects of the Macau Scam. This is the first part of the 2 part series.  ]]></itunes:summary>
    <description><![CDATA[<p>In the earlier episode, we had dwelved into what Macau Scam is. In this episode, we speak to our contact Keith Rozario, who has had experience in some aspects of the Macau Scam. This is the first part of the 2 part series. </p>]]></description>
    <content:encoded><![CDATA[<p>In the earlier episode, we had dwelved into what Macau Scam is. In this episode, we speak to our contact Keith Rozario, who has had experience in some aspects of the Macau Scam. This is the first part of the 2 part series. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8125935-ep-8-interview-keith-rozario-sayakenahack-macau-scam-part-1-2.mp3" length="14014779" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8125935</guid>
    <pubDate>Mon, 15 Mar 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1164</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 7. Data Transparency and COVID-19 (MY) Part 3/3</itunes:title>
    <title>Ep 7. Data Transparency and COVID-19 (MY) Part 3/3</title>
    <itunes:summary><![CDATA[We speak to Aidila Razak from Kinilabs on data transparency and COVID-19. This is the final instalment in the series.  ]]></itunes:summary>
    <description><![CDATA[<p>We speak to Aidila Razak from Kinilabs on data transparency and COVID-19. This is the final instalment in the series. </p>]]></description>
    <content:encoded><![CDATA[<p>We speak to Aidila Razak from Kinilabs on data transparency and COVID-19. This is the final instalment in the series. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8065089-ep-7-data-transparency-and-covid-19-my-part-3-3.mp3" length="12913010" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8065089</guid>
    <pubDate>Mon, 08 Mar 2021 10:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/8065089/transcript" type="text/html" />
    <itunes:duration>1072</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 6. Macau Scam</itunes:title>
    <title>Ep 6. Macau Scam</title>
    <itunes:summary><![CDATA[We've been hearing a lot about Macau Scam. What is it? Do you have to go Macau to be scammed? Listen on! ]]></itunes:summary>
    <description><![CDATA[<p>We&apos;ve been hearing a lot about Macau Scam. What is it? Do you have to go Macau to be scammed? Listen on!</p>]]></description>
    <content:encoded><![CDATA[<p>We&apos;ve been hearing a lot about Macau Scam. What is it? Do you have to go Macau to be scammed? Listen on!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/8032202-ep-6-macau-scam.mp3" length="9441582" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8032202</guid>
    <pubDate>Mon, 01 Mar 2021 08:00:00 +0800</pubDate>
    <itunes:duration>783</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 5. Data Transparency &amp; COVID-19 (MY) Part 2/3</itunes:title>
    <title>Ep 5. Data Transparency &amp; COVID-19 (MY) Part 2/3</title>
    <itunes:summary><![CDATA[The discussion with KiniLabs (Aidila Razak) continues on COVID-19 and the data aspect of the pandemic, specifically on data transparency.  ]]></itunes:summary>
    <description><![CDATA[<p>The discussion with KiniLabs (Aidila Razak) continues on COVID-19 and the data aspect of the pandemic, specifically on data transparency. </p>]]></description>
    <content:encoded><![CDATA[<p>The discussion with KiniLabs (Aidila Razak) continues on COVID-19 and the data aspect of the pandemic, specifically on data transparency. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/7935157-ep-5-data-transparency-covid-19-my-part-2-3.mp3" length="16621662" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7935157</guid>
    <pubDate>Mon, 22 Feb 2021 08:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/7935157/transcript" type="text/html" />
    <itunes:duration>1381</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 4. Capitol Hill aftermath - Social Media censorship</itunes:title>
    <title>Ep 4. Capitol Hill aftermath - Social Media censorship</title>
    <itunes:summary><![CDATA[ Rioters stormed Capitol Hill, the US government's administrative building in early January. Large-scale and believed to have been organised via social media, do social media platforms need to put stricter censorship into effect?  ]]></itunes:summary>
    <description><![CDATA[<p> Rioters stormed Capitol Hill, the US government&apos;s administrative building in early January. Large-scale and believed to have been organised via social media, do social media platforms need to put stricter censorship into effect? </p>]]></description>
    <content:encoded><![CDATA[<p> Rioters stormed Capitol Hill, the US government&apos;s administrative building in early January. Large-scale and believed to have been organised via social media, do social media platforms need to put stricter censorship into effect? </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/7367947-ep-4-capitol-hill-aftermath-social-media-censorship.mp3" length="12327043" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7367947</guid>
    <pubDate>Mon, 15 Feb 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1024</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 3. Data Transparency &amp; COVID-19 (MY) Part 1/3</itunes:title>
    <title>Ep 3. Data Transparency &amp; COVID-19 (MY) Part 1/3</title>
    <itunes:summary><![CDATA[Malaysia took drastic steps to combat COVID-19, which resulted in the declaration of emergency. We look at the aspect of data transparency and how it affects the initiatives of battling the COVID-19 pandemic.  ]]></itunes:summary>
    <description><![CDATA[<p>Malaysia took drastic steps to combat COVID-19, which resulted in the declaration of emergency. We look at the aspect of data transparency and how it affects the initiatives of battling the COVID-19 pandemic. </p>]]></description>
    <content:encoded><![CDATA[<p>Malaysia took drastic steps to combat COVID-19, which resulted in the declaration of emergency. We look at the aspect of data transparency and how it affects the initiatives of battling the COVID-19 pandemic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/7685770-ep-3-data-transparency-covid-19-my-part-1-3.mp3" length="15297291" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7685770</guid>
    <pubDate>Mon, 08 Feb 2021 09:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/7685770/transcript" type="text/html" />
    <podcast:chapters url="https://www.buzzsprout.com/1453324/7685770/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Ep 3. Data Transparency &amp; COVID-19 (MY) Part 1/3" />
  <psc:chapter start="0:35" title="Aidila Razak and the Kini News Lab" />
</psc:chapters>
    <itunes:duration>1271</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 2. FireEye &amp; Solarwinds - Nation State attacks</itunes:title>
    <title>Ep 2. FireEye &amp; Solarwinds - Nation State attacks</title>
    <itunes:summary><![CDATA[The world was shocked when a company specialising in APT and nation states fell prey to such attacks. The complication of the attack didn't just stop at one company, many other, names in tech also fell prey.  ]]></itunes:summary>
    <description><![CDATA[<p>The world was shocked when a company specialising in APT and nation states fell prey to such attacks. The complication of the attack didn&apos;t just stop at one company, many other, names in tech also fell prey. </p>]]></description>
    <content:encoded><![CDATA[<p>The world was shocked when a company specialising in APT and nation states fell prey to such attacks. The complication of the attack didn&apos;t just stop at one company, many other, names in tech also fell prey. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/7422967-ep-2-fireeye-solarwinds-nation-state-attacks.mp3" length="19047178" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7422967</guid>
    <pubDate>Mon, 01 Feb 2021 08:00:00 +0800</pubDate>
    <itunes:duration>1584</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 1. Capitol Hill Insurgence - Impact to Information Security</itunes:title>
    <title>Ep 1. Capitol Hill Insurgence - Impact to Information Security</title>
    <itunes:summary><![CDATA[When protestors stormed Capitol Hill,  physical security breach aside, there are implications for cyber security as well. Physical boundaries with even the best security forces failed to prevent insurgence from entering a highly secured located. This caused losses of information, in forms of physical and electronic.  ]]></itunes:summary>
    <description><![CDATA[<p>When protestors stormed Capitol Hill,  physical security breach aside, there are implications for cyber security as well. Physical boundaries with even the best security forces failed to prevent insurgence from entering a highly secured located. This caused losses of information, in forms of physical and electronic. </p>]]></description>
    <content:encoded><![CDATA[<p>When protestors stormed Capitol Hill,  physical security breach aside, there are implications for cyber security as well. Physical boundaries with even the best security forces failed to prevent insurgence from entering a highly secured located. This caused losses of information, in forms of physical and electronic. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/7367929-ep-1-capitol-hill-insurgence-impact-to-information-security.mp3" length="15783047" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7367929</guid>
    <pubDate>Tue, 19 Jan 2021 16:00:00 +0800</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/1453324/7367929/transcript" type="text/html" />
    <itunes:duration>1312</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 0. Introduction to SecurityLAH!</itunes:title>
    <title>Ep 0. Introduction to SecurityLAH!</title>
    <itunes:summary><![CDATA[Does cybersecurity only exist in North America?  Is cybersecurity a Myth in Asia and do issues exist only in "developed" countries?  Come to SecurityLAH! for interesting cybersecurity conversations, with unique Asian perspectives and content.  In this intro episode, find out about the folks behind the show and a little of what we'd like to achieve.    ]]></itunes:summary>
    <description><![CDATA[<div>Does cybersecurity only exist in North America?<br/><br/>Is cybersecurity a Myth in Asia and do issues exist only in &quot;developed&quot; countries?<br/><br/>Come to SecurityLAH! for interesting cybersecurity conversations, with unique Asian perspectives and content.<br/><br/>In this intro episode, find out about the folks behind the show and a little of what we&apos;d like to achieve.<br/><br/><br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Does cybersecurity only exist in North America?<br/><br/>Is cybersecurity a Myth in Asia and do issues exist only in &quot;developed&quot; countries?<br/><br/>Come to SecurityLAH! for interesting cybersecurity conversations, with unique Asian perspectives and content.<br/><br/>In this intro episode, find out about the folks behind the show and a little of what we&apos;d like to achieve.<br/><br/><br/><br/></div>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1453324/episodes/7305796-ep-0-introduction-to-securitylah.mp3" length="6759148" type="audio/mpeg" />
    <itunes:author>SecurityLah</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7305796</guid>
    <pubDate>Fri, 15 Jan 2021 19:00:00 +0800</pubDate>
    <itunes:duration>560</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>0</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
