<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://feeds.buzzsprout.com/2141600.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Genealogy of Cybersecurity - Startup Podcast</title>

  <lastBuildDate>Thu, 05 Mar 2026 00:13:48 -0500</lastBuildDate>
  <link>https://www.buzzsprout.com/2141600</link>
  <language>en-us</language>
  <copyright>© 2026 Genealogy of Cybersecurity - Startup Podcast</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>b80582cc-d317-5622-9cb3-61daaf439e7a</podcast:guid>
  <itunes:author>Paul Shomo</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>Interviews with founders, startup-advising CISOs, venture capitalists, and analysts discussing the issues of cybersecurity, new threats, and emerging technology. The Genealogy of Cyber Security brings listeners into forward-thinking conversations with industry visionaries, to explore big ideas, and discuss out-innovating the competition.</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>Paul Shomo</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/l368dldwtgp5kz8yzvjx19mjrycj?.jpg</url>
     <title>Genealogy of Cybersecurity - Startup Podcast</title>
     <link></link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/l368dldwtgp5kz8yzvjx19mjrycj?.jpg" />
  <itunes:category text="Technology" />
  <itunes:category text="Business">
    <itunes:category text="Entrepreneurship" />
  </itunes:category>
  <itunes:category text="News">
    <itunes:category text="Tech News" />
  </itunes:category>
  <podcast:person role="host" href="https://www.linkedin.com/in/paulshomo/" img="https://storage.buzzsprout.com/m22hjqa5zmbez155stgskg2rynhu">Paul Shomo</podcast:person>
  <item>
    <itunes:title>Ep 16. Varun Badhwar on Pioneering Security Posture Management, and the Story of RedLock</itunes:title>
    <title>Ep 16. Varun Badhwar on Pioneering Security Posture Management, and the Story of RedLock</title>
    <itunes:summary><![CDATA[Founder spotlight interview with Varun Badhwar. Varun is the current CEO of EndorLabs, a three-time Innovation Sandbox finalist, and known for founding cloud security posture management startup RedLock, which became Palo Alto Networks PRISMA Cloud. Varun tells stories about evangelizing the new ways of cloud posture management with RedLock’s Cloud Security Intelligence (CSI) unit that quietly presenting vulnerabilities to potential customers. He contrasts the differences with running startups...]]></itunes:summary>
    <description><![CDATA[<p>Founder spotlight interview with Varun Badhwar. Varun is the current CEO of EndorLabs, a three-time Innovation Sandbox finalist, and known for founding cloud security posture management startup RedLock, which became Palo Alto Networks PRISMA Cloud.</p><p>Varun tells stories about evangelizing the new ways of cloud posture management with RedLock’s Cloud Security Intelligence (CSI) unit that quietly presenting vulnerabilities to potential customers. He contrasts the differences with running startups like EndorLabs, which is in an established Software Composition Analysis (SCA) category with customer budgets vs. establishing new ground with RedLock and CipherCloud.</p><p>Throughout the interview Varun weaves in his philosophy of discipline, team building, culture, sticking to the basics, and, well, getting shit done.</p><p>You can find Varun Badhwar on Twitter <a href='https://twitter.com/varun__badhwar'>@varun__badhwar</a> or at <a href='https://www.linkedin.com/in/vbadhwar/'>LinkedIn.com/in/vbadhwar</a>.</p><p>Visit <a href='https://www.endorlabs.com/'>EndorLabs</a>, or find them on Twitter <a href='https://twitter.com/EndorLabs'>@EndorLabs</a>, or at <a href='https://www.linkedin.com/company/endorlabs/'>LinkedIn.com/company/endorlabs</a>.</p><p>Send feedback to host Paul Shomo on Twitter <a href='https://twitter.com/ShomoBits'>@ShomoBits</a> or connect on <a href='https://www.linkedin.com/in/paulshomo/'>LinkedIn.com/in/paulshomo</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Founder spotlight interview with Varun Badhwar. Varun is the current CEO of EndorLabs, a three-time Innovation Sandbox finalist, and known for founding cloud security posture management startup RedLock, which became Palo Alto Networks PRISMA Cloud.</p><p>Varun tells stories about evangelizing the new ways of cloud posture management with RedLock’s Cloud Security Intelligence (CSI) unit that quietly presenting vulnerabilities to potential customers. He contrasts the differences with running startups like EndorLabs, which is in an established Software Composition Analysis (SCA) category with customer budgets vs. establishing new ground with RedLock and CipherCloud.</p><p>Throughout the interview Varun weaves in his philosophy of discipline, team building, culture, sticking to the basics, and, well, getting shit done.</p><p>You can find Varun Badhwar on Twitter <a href='https://twitter.com/varun__badhwar'>@varun__badhwar</a> or at <a href='https://www.linkedin.com/in/vbadhwar/'>LinkedIn.com/in/vbadhwar</a>.</p><p>Visit <a href='https://www.endorlabs.com/'>EndorLabs</a>, or find them on Twitter <a href='https://twitter.com/EndorLabs'>@EndorLabs</a>, or at <a href='https://www.linkedin.com/company/endorlabs/'>LinkedIn.com/company/endorlabs</a>.</p><p>Send feedback to host Paul Shomo on Twitter <a href='https://twitter.com/ShomoBits'>@ShomoBits</a> or connect on <a href='https://www.linkedin.com/in/paulshomo/'>LinkedIn.com/in/paulshomo</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/13150062-ep-16-varun-badhwar-on-pioneering-security-posture-management-and-the-story-of-redlock.mp3" length="14405405" type="audio/mpeg" />
    <itunes:author>Paul Shomo</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13150062</guid>
    <pubDate>Mon, 23 Oct 2023 02:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13150062/transcript" type="text/html" />
    <itunes:duration>1709</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 15 Founder Mike Fey on Incubating Startups, AI and the Future of Web Browsing</itunes:title>
    <title>Ep. 15 Founder Mike Fey on Incubating Startups, AI and the Future of Web Browsing</title>
    <itunes:summary><![CDATA[CEO and Founder of Enterprise Browser startup Island, Mike Fey, talks about entrepreneurship, innovation, and the future of web browsing. Paul explores Mike's experiences working with venture capitalists like CyberStarts and Sequoia, and startup-advising CISOs, getting early customer feedback during the ideation, seed, and early growth stages. Mike describes the origin story behind Insland and Enterprise Browsers. Mike and Paul discuss AI, ChatGPT, and what new applications we may see AI used...]]></itunes:summary>
    <description><![CDATA[<p><b>CEO and Founder of Enterprise Browser startup Island, Mike Fey, talks about entrepreneurship, innovation, and the future of web browsing. Paul explores Mike&apos;s experiences working with venture capitalists like CyberStarts and Sequoia, and startup-advising CISOs, getting early customer feedback during the ideation, seed, and early growth stages. Mike describes the origin story behind Insland and Enterprise Browsers.</b></p><p><b>Mike and Paul discuss AI, ChatGPT, and what new applications we may see AI used for. Mike explains the issue with miseducating neural networks, and how AI will change building technology, along with its dangers. Mike also riffs on a myriad of technology topics from ChatGPT to quantum computing, Web3, robotic process automation (RPA), and more.</b></p><p><b>Check out </b><a href='https://www.island.io/'><b>Island.io</b></a><b> to learn more about their enterprise browser, or reach them on Twitter </b><a href='https://twitter.com/island_io?lang=en'><b>@island_io</b></a><b>. </b></p><p><b>Mike Fey can be found on </b><a href='https://www.linkedin.com/in/michaelfey/'><b>LinkedIn.com/in/michaelfey</b></a><b>.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></description>
    <content:encoded><![CDATA[<p><b>CEO and Founder of Enterprise Browser startup Island, Mike Fey, talks about entrepreneurship, innovation, and the future of web browsing. Paul explores Mike&apos;s experiences working with venture capitalists like CyberStarts and Sequoia, and startup-advising CISOs, getting early customer feedback during the ideation, seed, and early growth stages. Mike describes the origin story behind Insland and Enterprise Browsers.</b></p><p><b>Mike and Paul discuss AI, ChatGPT, and what new applications we may see AI used for. Mike explains the issue with miseducating neural networks, and how AI will change building technology, along with its dangers. Mike also riffs on a myriad of technology topics from ChatGPT to quantum computing, Web3, robotic process automation (RPA), and more.</b></p><p><b>Check out </b><a href='https://www.island.io/'><b>Island.io</b></a><b> to learn more about their enterprise browser, or reach them on Twitter </b><a href='https://twitter.com/island_io?lang=en'><b>@island_io</b></a><b>. </b></p><p><b>Mike Fey can be found on </b><a href='https://www.linkedin.com/in/michaelfey/'><b>LinkedIn.com/in/michaelfey</b></a><b>.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/13148949-ep-15-founder-mike-fey-on-incubating-startups-ai-and-the-future-of-web-browsing.mp3" length="17443992" type="audio/mpeg" />
    <itunes:author>Paul Shomo</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13148949</guid>
    <pubDate>Tue, 10 Oct 2023 02:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13148949/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13148949/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13148949/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13148949/transcript.vtt" type="text/vtt" />
    <itunes:duration>1450</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 14. Privacy is in the Code: Relyance AI&#39;s Solution for DevOps Data Flows</itunes:title>
    <title>Ep 14. Privacy is in the Code: Relyance AI&#39;s Solution for DevOps Data Flows</title>
    <itunes:summary><![CDATA[Innovation Sandbox finalist and Relyance AI Founder Abhi Sharma discuss privacy and compliance in a world where every company is a software company, and DevOps code produces so many data flows with your private and regulated data. Abhi points out a privacy solution must govern DevOps, “privacy is in the code.”  Abhi discusses NLP, LLMs, OpenAI, and Chat GPT, and how Relyance AI’s intelligence understands privacy clauses in compliance documents, contracts, SLAs, etc., and having shifted l...]]></itunes:summary>
    <description><![CDATA[<p><b>Innovation Sandbox finalist and Relyance AI Founder Abhi Sharma discuss privacy and compliance in a world where every company is a software company, and DevOps code produces so many data flows with your private and regulated data. Abhi points out a privacy solution must govern DevOps, “privacy is in the code.” </b></p><p><b>Abhi discusses NLP, LLMs, OpenAI, and Chat GPT, and how Relyance AI’s intelligence understands privacy clauses in compliance documents, contracts, SLAs, etc., and having shifted left into static code analysis, understands if code is violating these privacy responsibilities. Paul and Abhi discuss how generative AI and NLP have sped up Relyance’s delivery of functionality. Paul pushes back on how they’ve built a product with so much functionality in such a short time. Abhi has an interesting response as they discuss AI and the future of software development.</b></p><p><b>You can find Relyance AI at </b><a href='https://www.relyance.ai/'><b>Relyance.ai</b></a><b>, on </b><a href='https://www.linkedin.com/company/relyanceai/'><b>Linkedin.com/company/relyanceai</b></a><b>, or Twitter </b><a href='https://twitter.com/relyanceai'><b>@relyanceai</b></a><b>. </b></p><p><b>Founder Abhi Sharma can be found on </b><a href='https://www.linkedin.com/in/abhisharmab/'><b>Linkedin.com/in/abhisharmab</b></a><b> or Twitter </b><a href='https://twitter.com/abhisharma_b'><b>@abhisharma_b</b></a><b>.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></description>
    <content:encoded><![CDATA[<p><b>Innovation Sandbox finalist and Relyance AI Founder Abhi Sharma discuss privacy and compliance in a world where every company is a software company, and DevOps code produces so many data flows with your private and regulated data. Abhi points out a privacy solution must govern DevOps, “privacy is in the code.” </b></p><p><b>Abhi discusses NLP, LLMs, OpenAI, and Chat GPT, and how Relyance AI’s intelligence understands privacy clauses in compliance documents, contracts, SLAs, etc., and having shifted left into static code analysis, understands if code is violating these privacy responsibilities. Paul and Abhi discuss how generative AI and NLP have sped up Relyance’s delivery of functionality. Paul pushes back on how they’ve built a product with so much functionality in such a short time. Abhi has an interesting response as they discuss AI and the future of software development.</b></p><p><b>You can find Relyance AI at </b><a href='https://www.relyance.ai/'><b>Relyance.ai</b></a><b>, on </b><a href='https://www.linkedin.com/company/relyanceai/'><b>Linkedin.com/company/relyanceai</b></a><b>, or Twitter </b><a href='https://twitter.com/relyanceai'><b>@relyanceai</b></a><b>. </b></p><p><b>Founder Abhi Sharma can be found on </b><a href='https://www.linkedin.com/in/abhisharmab/'><b>Linkedin.com/in/abhisharmab</b></a><b> or Twitter </b><a href='https://twitter.com/abhisharma_b'><b>@abhisharma_b</b></a><b>.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/13096979-ep-14-privacy-is-in-the-code-relyance-ai-s-solution-for-devops-data-flows.mp3" length="21099728" type="audio/mpeg" />
    <itunes:author>Paul Shomo / Relyance AI Founder Abhi Sharma</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13096979</guid>
    <pubDate>Mon, 25 Sep 2023 02:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13096979/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13096979/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13096979/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13096979/transcript.vtt" type="text/vtt" />
    <itunes:duration>1755</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 13. Zama on the Holy Grail of AI Privacy, Fully Homomorphic Encryption</itunes:title>
    <title>Ep 13. Zama on the Holy Grail of AI Privacy, Fully Homomorphic Encryption</title>
    <itunes:summary><![CDATA[Innovation Sandbox finalist, Cryptographer, and Zama VP Benoit Chevallier-Mames discuss Zama’s efforts to bring fully homomorphic encryption (FHE) into commercial use. How FHE would allow application developers and customers to benefit from the insights obtained by sharing data with AI providers, like OpenAI or ChatGPT, but without exposing private data. Benoit goes through some of the mathematical magic behind FHE, what ML approaches it enables, and some of its history. Benoit explains why f...]]></itunes:summary>
    <description><![CDATA[<p><b>Innovation Sandbox finalist, Cryptographer, and Zama VP Benoit Chevallier-Mames discuss Zama’s efforts to bring fully homomorphic encryption (FHE) into commercial use. How FHE would allow application developers and customers to benefit from the insights obtained by sharing data with AI providers, like OpenAI or ChatGPT, but without exposing private data.</b></p><p><b>Benoit goes through some of the mathematical magic behind FHE, what ML approaches it enables, and some of its history. Benoit explains why fully homomorphic encryption has been such a performance challenge, and discusses Zama’s quantization approach. </b></p><p><b>Finally, Benoit unveils Zama’s announced strategy to focus on securing blockchain smart contracts until cloud computing allows them to wield fully homomorphic encryption for the broader spectrum of AI use cases.</b></p><p><b>Zama can be found online at </b><a href='https://www.zama.ai/'><b>Zama.ai</b></a><b>, on </b><a href='https://www.linkedin.com/company/zama-ai/'><b>LinkedIn.com/company/zama-ai</b></a><b>, or on Twitter </b><a href='https://twitter.com/zama_fhe?lang=en'><b>@zama_fhe</b></a><b>.</b></p><p><a href='https://www.linkedin.com/feed/#'><b>Benoit Chevallier-Mames</b></a><b> can be found at </b><a href='https://www.linkedin.com/in/benoitchevalliermames/'><b>Linkedin.com/in/benoitchevalliermames</b></a><b>.</b></p><p><b>You can also watch this episode on using fully homomorphic encryption (FHE) to preserve privacy with OpenAI, ChatGPT on YouTube.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></description>
    <content:encoded><![CDATA[<p><b>Innovation Sandbox finalist, Cryptographer, and Zama VP Benoit Chevallier-Mames discuss Zama’s efforts to bring fully homomorphic encryption (FHE) into commercial use. How FHE would allow application developers and customers to benefit from the insights obtained by sharing data with AI providers, like OpenAI or ChatGPT, but without exposing private data.</b></p><p><b>Benoit goes through some of the mathematical magic behind FHE, what ML approaches it enables, and some of its history. Benoit explains why fully homomorphic encryption has been such a performance challenge, and discusses Zama’s quantization approach. </b></p><p><b>Finally, Benoit unveils Zama’s announced strategy to focus on securing blockchain smart contracts until cloud computing allows them to wield fully homomorphic encryption for the broader spectrum of AI use cases.</b></p><p><b>Zama can be found online at </b><a href='https://www.zama.ai/'><b>Zama.ai</b></a><b>, on </b><a href='https://www.linkedin.com/company/zama-ai/'><b>LinkedIn.com/company/zama-ai</b></a><b>, or on Twitter </b><a href='https://twitter.com/zama_fhe?lang=en'><b>@zama_fhe</b></a><b>.</b></p><p><a href='https://www.linkedin.com/feed/#'><b>Benoit Chevallier-Mames</b></a><b> can be found at </b><a href='https://www.linkedin.com/in/benoitchevalliermames/'><b>Linkedin.com/in/benoitchevalliermames</b></a><b>.</b></p><p><b>You can also watch this episode on using fully homomorphic encryption (FHE) to preserve privacy with OpenAI, ChatGPT on YouTube.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/13096968-ep-13-zama-on-the-holy-grail-of-ai-privacy-fully-homomorphic-encryption.mp3" length="21189062" type="audio/mpeg" />
    <itunes:author>Paul Shomo / Zama VP Benoit Chevallier-Mames</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13096968</guid>
    <pubDate>Tue, 12 Sep 2023 02:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13096968/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13096968/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13096968/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/13096968/transcript.vtt" type="text/vtt" />
    <itunes:duration>1762</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 12. Astrix Security on Threat of 3rd Party API Connections and Non-Human Identities</itunes:title>
    <title>Ep 12. Astrix Security on Threat of 3rd Party API Connections and Non-Human Identities</title>
    <itunes:summary><![CDATA[Innovation Sandbox finalist and Astrix Security Founder Idan Gour discuss the rising attack surface created by API-to-API connections and non-human identities. How no-code orchestration tools, low code tools, and generative AI, like ChatGPT, are causing non-technical business users to build integration apps that access and sometimes share sensitive data. Idan discusses mapping this web of API-to-API connections, which traffic sensitive data from SaaS apps like Google Workspace, 365, Calendly,...]]></itunes:summary>
    <description><![CDATA[<p>Innovation Sandbox finalist and Astrix Security Founder Idan Gour discuss the rising attack surface created by API-to-API connections and non-human identities. How no-code orchestration tools, low code tools, and generative AI, like ChatGPT, are causing non-technical business users to build integration apps that access and sometimes share sensitive data.</p><p>Idan discusses mapping this web of API-to-API connections, which traffic sensitive data from SaaS apps like Google Workspace, 365, Calendly, and SalesForce. The Circus.AI breach is explored. Idan and Paul also discuss the rising problem of non-human identities which access APIs and data, with Astrix citing their study which found 45X more non-humans than human employees.</p><p>You can find Astrix online at <a href='https://astrix.security/'>Astrix.security</a>, on <a href='https://www.linkedin.com/company/astrix-security'>LinkedIn.com/company/astrix-security</a>, or Twitter at <a href='https://twitter.com/AstrixSecurity'>@AstrixSecurity</a></p><p>Send feedback to host Paul Shomo on Twitter <a href='https://twitter.com/ShomoBits'>@ShomoBits</a> or connect on <a href='https://www.linkedin.com/in/paulshomo/'>LinkedIn.com/in/paulshomo</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Innovation Sandbox finalist and Astrix Security Founder Idan Gour discuss the rising attack surface created by API-to-API connections and non-human identities. How no-code orchestration tools, low code tools, and generative AI, like ChatGPT, are causing non-technical business users to build integration apps that access and sometimes share sensitive data.</p><p>Idan discusses mapping this web of API-to-API connections, which traffic sensitive data from SaaS apps like Google Workspace, 365, Calendly, and SalesForce. The Circus.AI breach is explored. Idan and Paul also discuss the rising problem of non-human identities which access APIs and data, with Astrix citing their study which found 45X more non-humans than human employees.</p><p>You can find Astrix online at <a href='https://astrix.security/'>Astrix.security</a>, on <a href='https://www.linkedin.com/company/astrix-security'>LinkedIn.com/company/astrix-security</a>, or Twitter at <a href='https://twitter.com/AstrixSecurity'>@AstrixSecurity</a></p><p>Send feedback to host Paul Shomo on Twitter <a href='https://twitter.com/ShomoBits'>@ShomoBits</a> or connect on <a href='https://www.linkedin.com/in/paulshomo/'>LinkedIn.com/in/paulshomo</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12971835-ep-12-astrix-security-on-threat-of-3rd-party-api-connections-and-non-human-identities.mp3" length="14377753" type="audio/mpeg" />
    <itunes:author>Paul Shomo / Astrix Security Founder Idan Gour</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12971835</guid>
    <pubDate>Mon, 28 Aug 2023 02:00:00 -0700</pubDate>
    <itunes:duration>1194</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 11. Valence Security on SaaS-to-SaaS Mesh, Shadow Integrations and Generative AI</itunes:title>
    <title>Ep 11. Valence Security on SaaS-to-SaaS Mesh, Shadow Integrations and Generative AI</title>
    <itunes:summary><![CDATA[Innovation Sandbox finalist and Valence Security Founder Yoni Shohet discuss the new SaaS-to-Saas attack surface produced by the proliferation of shadow integrations between SaaS apps. Today users are typically SaaS admins and often okay SaaS App requests to access other apps like their Calendar, Email, or SalesForce.  Yoni explains how automation tools for non-developers are expanding the problem, with no-code orchestration, ChatGPT, and Generative AI-producing integration apps, not to ...]]></itunes:summary>
    <description><![CDATA[<p><b>Innovation Sandbox finalist and Valence Security Founder Yoni Shohet discuss the new SaaS-to-Saas attack surface produced by the proliferation of shadow integrations between SaaS apps. Today users are typically SaaS admins and often okay SaaS App requests to access other apps like their Calendar, Email, or SalesForce. </b></p><p><b>Yoni explains how automation tools for non-developers are expanding the problem, with no-code orchestration, ChatGPT, and Generative AI-producing integration apps, not to mention the explosion of developers and CI/CD pipelines.</b></p><p><b>Yoni explains the magnitude of the problem with so many exposed APIs, allowing common SaaS apps, identity providers (IDP), and shadow connections in your SaaS software supply chain. Valence Security’s approach to mapping the SaaS-to-SaaS mesh is discussed as well as their brand of remediation which includes an education step for the user.</b></p><p><b>Yoni Shohet can be found on </b><a href='https://www.linkedin.com/in/yonishohet/'><b>LinkedIn.com/in/yonishohet</b></a><b> or Twitter </b><a href='https://twitter.com/yonishohet'><b>@yonishohet</b></a><b>.</b></p><p><b>Valence Security can be found at </b><a href='https://t.co/SGtfvy9Ag9'><b>Valencesecurity.com</b></a><b> on </b><a href='https://www.linkedin.com/company/valence-security/'><b>LinkedIn.com/company/valence-security</b></a><b> or on Twitter </b><a href='https://twitter.com/Valencesecurity'><b>@Valencesecurity</b></a><b>.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></description>
    <content:encoded><![CDATA[<p><b>Innovation Sandbox finalist and Valence Security Founder Yoni Shohet discuss the new SaaS-to-Saas attack surface produced by the proliferation of shadow integrations between SaaS apps. Today users are typically SaaS admins and often okay SaaS App requests to access other apps like their Calendar, Email, or SalesForce. </b></p><p><b>Yoni explains how automation tools for non-developers are expanding the problem, with no-code orchestration, ChatGPT, and Generative AI-producing integration apps, not to mention the explosion of developers and CI/CD pipelines.</b></p><p><b>Yoni explains the magnitude of the problem with so many exposed APIs, allowing common SaaS apps, identity providers (IDP), and shadow connections in your SaaS software supply chain. Valence Security’s approach to mapping the SaaS-to-SaaS mesh is discussed as well as their brand of remediation which includes an education step for the user.</b></p><p><b>Yoni Shohet can be found on </b><a href='https://www.linkedin.com/in/yonishohet/'><b>LinkedIn.com/in/yonishohet</b></a><b> or Twitter </b><a href='https://twitter.com/yonishohet'><b>@yonishohet</b></a><b>.</b></p><p><b>Valence Security can be found at </b><a href='https://t.co/SGtfvy9Ag9'><b>Valencesecurity.com</b></a><b> on </b><a href='https://www.linkedin.com/company/valence-security/'><b>LinkedIn.com/company/valence-security</b></a><b> or on Twitter </b><a href='https://twitter.com/Valencesecurity'><b>@Valencesecurity</b></a><b>.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12825431-ep-11-valence-security-on-saas-to-saas-mesh-shadow-integrations-and-generative-ai.mp3" length="17026569" type="audio/mpeg" />
    <itunes:author>Paul Shomo / Valence Security Founder Yoni Shohet</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12825431</guid>
    <pubDate>Tue, 08 Aug 2023 02:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12825431/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12825431/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12825431/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12825431/transcript.vtt" type="text/vtt" />
    <itunes:duration>1415</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 10. Endor Labs on Code Vulnerabilities, Sketchy Open Source Developers, and Software Supply Chain</itunes:title>
    <title>Ep 10. Endor Labs on Code Vulnerabilities, Sketchy Open Source Developers, and Software Supply Chain</title>
    <itunes:summary><![CDATA[Innovation Sandbox finalist and Endor Labs Founder Varun Badhwar discuss the magnitude of open-source vulnerabilities, highlighting the developers behind vulnerabilities like CoreJS and Log4shell, and why strategic pieces of the internet depend on libraries that sometimes rest on a single part-time open-source developer, even developers with prison records. Varun talks about his past pioneering cloud security posture management (CSPM) with RedLock and Palo Alto Network’s PRISMA cloud, and End...]]></itunes:summary>
    <description><![CDATA[<p><b>Innovation Sandbox finalist and Endor Labs Founder Varun Badhwar discuss the magnitude of open-source vulnerabilities, highlighting the developers behind vulnerabilities like CoreJS and Log4shell, and why strategic pieces of the internet depend on libraries that sometimes rest on a single part-time open-source developer, even developers with prison records.</b></p><p><b>Varun talks about his past pioneering cloud security posture management (CSPM) with RedLock and Palo Alto Network’s PRISMA cloud, and Endor Lab’s mission to build a software composition analysis solution that truly enables developers and solves the problems of open source vulnerabilities. Including how Endor Labs is going further than simply shifting left.</b></p><p><b>You can find Varun Badhwar on Twitter </b><a href='https://twitter.com/varun__badhwar'><b>@varun__badhwar</b></a><b> or at </b><a href='https://www.linkedin.com/in/vbadhwar/'><b>LinkedIn.com/in/vbadhwar</b></a><b>.</b></p><p><b>Visit </b><a href='https://www.endorlabs.com/'><b>EndorLabs</b></a><b>, or find them on Twitter </b><a href='https://twitter.com/EndorLabs'><b>@EndorLabs</b></a><b>, or at </b><a href='https://www.linkedin.com/company/endorlabs/'><b>LinkedIn.com/company/endorlabs</b></a><b>.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></description>
    <content:encoded><![CDATA[<p><b>Innovation Sandbox finalist and Endor Labs Founder Varun Badhwar discuss the magnitude of open-source vulnerabilities, highlighting the developers behind vulnerabilities like CoreJS and Log4shell, and why strategic pieces of the internet depend on libraries that sometimes rest on a single part-time open-source developer, even developers with prison records.</b></p><p><b>Varun talks about his past pioneering cloud security posture management (CSPM) with RedLock and Palo Alto Network’s PRISMA cloud, and Endor Lab’s mission to build a software composition analysis solution that truly enables developers and solves the problems of open source vulnerabilities. Including how Endor Labs is going further than simply shifting left.</b></p><p><b>You can find Varun Badhwar on Twitter </b><a href='https://twitter.com/varun__badhwar'><b>@varun__badhwar</b></a><b> or at </b><a href='https://www.linkedin.com/in/vbadhwar/'><b>LinkedIn.com/in/vbadhwar</b></a><b>.</b></p><p><b>Visit </b><a href='https://www.endorlabs.com/'><b>EndorLabs</b></a><b>, or find them on Twitter </b><a href='https://twitter.com/EndorLabs'><b>@EndorLabs</b></a><b>, or at </b><a href='https://www.linkedin.com/company/endorlabs/'><b>LinkedIn.com/company/endorlabs</b></a><b>.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12971844-ep-10-endor-labs-on-code-vulnerabilities-sketchy-open-source-developers-and-software-supply-chain.mp3" length="14808918" type="audio/mpeg" />
    <itunes:author>Paul Shomo / Endor Labs Founder Varun Badhwar</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12971844</guid>
    <pubDate>Mon, 24 Jul 2023 02:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971844/transcript" type="text/html" />
    <itunes:duration>1630</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 9. Concentric AI on NLP, ChatGPT, and Data Security Posture Management</itunes:title>
    <title>Ep 9. Concentric AI on NLP, ChatGPT, and Data Security Posture Management</title>
    <itunes:summary><![CDATA[Concentric AI Founder Karthik Krishnan discusses the new Data Security Posture Management market and answers the age-old questions of what data you have, where is it, and who’s accessing it. Karthik discusses advances in AI, natural language processing (NLP), Open AI ChatGPT, Large Language Models (LLMs), and what it all means to data classification and society. Karthik Krishnan explains the incredible expenses and human power required to classify and govern data, and how Concentric AI’s DSPM...]]></itunes:summary>
    <description><![CDATA[<p><b>Concentric AI Founder Karthik Krishnan discusses the new Data Security Posture Management market and answers the age-old questions of what data you have, where is it, and who’s accessing it. Karthik discusses advances in AI, natural language processing (NLP), Open AI ChatGPT, Large Language Models (LLMs), and what it all means to data classification and society.</b></p><p><b>Karthik Krishnan explains the incredible expenses and human power required to classify and govern data, and how Concentric AI’s DSPM product reduces costs. Paul and Karthik discuss why the cloud native and AI DSPM products differ from data security products of the past, and Paul grills Karthik to see if there are any hidden costs in the cloud.</b></p><p><b>Concentric AI can be found at </b><a href='https://concentric.ai/'><b>Concentric.ai</b></a><b>, on </b><a href='https://www.linkedin.com/company/concentricinc/'><b>LinkedIn.com/company/concentricinc</b></a><b>, or Twitter </b><a href='https://twitter.com/incconcentric?lang=en'><b>@IncConcentric</b></a><b>. </b></p><p><b>Concentric Founder Karthik Krishnan can be found on </b><a href='https://www.linkedin.com/in/kkrishnan/'><b>LinkedIn.com/in/kkrishnan/</b></a><b>.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></description>
    <content:encoded><![CDATA[<p><b>Concentric AI Founder Karthik Krishnan discusses the new Data Security Posture Management market and answers the age-old questions of what data you have, where is it, and who’s accessing it. Karthik discusses advances in AI, natural language processing (NLP), Open AI ChatGPT, Large Language Models (LLMs), and what it all means to data classification and society.</b></p><p><b>Karthik Krishnan explains the incredible expenses and human power required to classify and govern data, and how Concentric AI’s DSPM product reduces costs. Paul and Karthik discuss why the cloud native and AI DSPM products differ from data security products of the past, and Paul grills Karthik to see if there are any hidden costs in the cloud.</b></p><p><b>Concentric AI can be found at </b><a href='https://concentric.ai/'><b>Concentric.ai</b></a><b>, on </b><a href='https://www.linkedin.com/company/concentricinc/'><b>LinkedIn.com/company/concentricinc</b></a><b>, or Twitter </b><a href='https://twitter.com/incconcentric?lang=en'><b>@IncConcentric</b></a><b>. </b></p><p><b>Concentric Founder Karthik Krishnan can be found on </b><a href='https://www.linkedin.com/in/kkrishnan/'><b>LinkedIn.com/in/kkrishnan/</b></a><b>.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12971588-ep-9-concentric-ai-on-nlp-chatgpt-and-data-security-posture-management.mp3" length="15857276" type="audio/mpeg" />
    <itunes:author>Paul Shomo / Concentric AI Founder Karthik Krishnan</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12971588</guid>
    <pubDate>Tue, 11 Jul 2023 02:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971588/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971588/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971588/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971588/transcript.vtt" type="text/vtt" />
    <itunes:duration>1318</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep. 8 CISO Sebastian Goodwin on Advising DSPM and Automation Startups</itunes:title>
    <title>Ep. 8 CISO Sebastian Goodwin on Advising DSPM and Automation Startups</title>
    <itunes:summary><![CDATA[Chief Trust Officer Autodesk and recent CISO of Nutanix Sebastian Goodwin discusses advising startup, Concentric AI, in the new data security posture management (DSPM) space, and the importance of locating your data as a prerequisite for security. Sebastian and Paul discuss the recent maturity of natural language processing (NLP), and how ChatGPT and large language models (LLMs) are impacting the startup world. Also discussed are key questions, like how to wade through the AI hype and setting...]]></itunes:summary>
    <description><![CDATA[<p><b>Chief Trust Officer Autodesk and recent CISO of Nutanix Sebastian Goodwin discusses advising startup, Concentric AI, in the new data security posture management (DSPM) space, and the importance of locating your data as a prerequisite for security. Sebastian and Paul discuss the recent maturity of natural language processing (NLP), and how ChatGPT and large language models (LLMs) are impacting the startup world. Also discussed are key questions, like how to wade through the AI hype and setting expectations in this new generation of AI.</b></p><p><b>Sebastian discusses what it’s like on the Night Dragon Startup Advisory Board, advising startups during ideation and early stage, including tales of brainstorming key product categories over coffee years before anyone heard of them. Paul and Sebastian discuss his work with StrikeReady and the AI virtual assistant space, as well as several other automation startups.</b></p><p><b>Sebastian discusses the future of automation and highlights a couple more startups, like Reach Security, which automates and enables optimal configuration and usage of cybersecurity products. Sebastian also discusses Hadrian which auto-maps attack surfaces and automates finding exploits and vulnerabilities.</b></p><p><b>Sebastian explains the benefits of a non-traditional career path and spanning fields, and Paul and Sebastian discuss the downsides of hyperspecialization.</b></p><p><b>Sebastian Goodwin can be found on </b><a href='https://www.linkedin.com/in/sebgood/'><b>LinkedIn.com/in/sebgood</b></a></p><p><b>Concentric AI can be found at </b><a href='https://concentric.ai/'><b>Concentric.ai</b></a><b>, on </b><a href='https://www.linkedin.com/company/concentricinc/'><b>LinkedIn.com/company/concentricinc</b></a><b>, or Twitter </b><a href='https://twitter.com/incconcentric?lang=en'><b>@IncConcentric</b></a><b>. </b></p><p><b>Hadrian Security is at </b><a href='https://hadrian.io/'><b>Hadrian.io</b></a><b> on Twitter </b><a href='https://twitter.com/hadriansecurity'><b>@hadriansecurity</b></a><b> or </b><a href='https://www.linkedin.com/company/hadriansecurity/'><b>LinkedIn.com/company/hadriansecurity</b></a><b>.</b></p><p><b>Reach Security is at </b><a href='https://reach.security/home'><b>Reach.security</b></a><b> on Twitter </b><a href='https://twitter.com/ReachSecurity'><b>@ReachSecurity</b></a><b> or </b><a href='https://www.linkedin.com/company/reach-security/'><b>LinkedIn.com/company/reach-security</b></a><b>.</b></p><p><b>Find </b><a href='https://strikeready.com/'><b>StrikeReady.com</b></a><b> on Twitter </b><a href='https://twitter.com/strike_ready?lang=en'><b>@strike_ready</b></a><b> or </b><a href='https://www.linkedin.com/company/strikeready/'><b>LinkedIn.com/company/strikeready</b></a><b>.</b></p><p><b>NightDragon is at </b><a href='https://www.nightdragon.com/'><b>NightDragon.com</b></a><b>, on Twitter </b><a href='https://twitter.com/nightdragon'><b>@nightdragon</b></a><b> or </b></p><p><b> </b><a href='https://www.linkedin.com/company/nightdragon-security/'><b>LinkedIn.com/company/nightdragon-security</b></a><b>.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></description>
    <content:encoded><![CDATA[<p><b>Chief Trust Officer Autodesk and recent CISO of Nutanix Sebastian Goodwin discusses advising startup, Concentric AI, in the new data security posture management (DSPM) space, and the importance of locating your data as a prerequisite for security. Sebastian and Paul discuss the recent maturity of natural language processing (NLP), and how ChatGPT and large language models (LLMs) are impacting the startup world. Also discussed are key questions, like how to wade through the AI hype and setting expectations in this new generation of AI.</b></p><p><b>Sebastian discusses what it’s like on the Night Dragon Startup Advisory Board, advising startups during ideation and early stage, including tales of brainstorming key product categories over coffee years before anyone heard of them. Paul and Sebastian discuss his work with StrikeReady and the AI virtual assistant space, as well as several other automation startups.</b></p><p><b>Sebastian discusses the future of automation and highlights a couple more startups, like Reach Security, which automates and enables optimal configuration and usage of cybersecurity products. Sebastian also discusses Hadrian which auto-maps attack surfaces and automates finding exploits and vulnerabilities.</b></p><p><b>Sebastian explains the benefits of a non-traditional career path and spanning fields, and Paul and Sebastian discuss the downsides of hyperspecialization.</b></p><p><b>Sebastian Goodwin can be found on </b><a href='https://www.linkedin.com/in/sebgood/'><b>LinkedIn.com/in/sebgood</b></a></p><p><b>Concentric AI can be found at </b><a href='https://concentric.ai/'><b>Concentric.ai</b></a><b>, on </b><a href='https://www.linkedin.com/company/concentricinc/'><b>LinkedIn.com/company/concentricinc</b></a><b>, or Twitter </b><a href='https://twitter.com/incconcentric?lang=en'><b>@IncConcentric</b></a><b>. </b></p><p><b>Hadrian Security is at </b><a href='https://hadrian.io/'><b>Hadrian.io</b></a><b> on Twitter </b><a href='https://twitter.com/hadriansecurity'><b>@hadriansecurity</b></a><b> or </b><a href='https://www.linkedin.com/company/hadriansecurity/'><b>LinkedIn.com/company/hadriansecurity</b></a><b>.</b></p><p><b>Reach Security is at </b><a href='https://reach.security/home'><b>Reach.security</b></a><b> on Twitter </b><a href='https://twitter.com/ReachSecurity'><b>@ReachSecurity</b></a><b> or </b><a href='https://www.linkedin.com/company/reach-security/'><b>LinkedIn.com/company/reach-security</b></a><b>.</b></p><p><b>Find </b><a href='https://strikeready.com/'><b>StrikeReady.com</b></a><b> on Twitter </b><a href='https://twitter.com/strike_ready?lang=en'><b>@strike_ready</b></a><b> or </b><a href='https://www.linkedin.com/company/strikeready/'><b>LinkedIn.com/company/strikeready</b></a><b>.</b></p><p><b>NightDragon is at </b><a href='https://www.nightdragon.com/'><b>NightDragon.com</b></a><b>, on Twitter </b><a href='https://twitter.com/nightdragon'><b>@nightdragon</b></a><b> or </b></p><p><b> </b><a href='https://www.linkedin.com/company/nightdragon-security/'><b>LinkedIn.com/company/nightdragon-security</b></a><b>.</b></p><p><b>Send feedback to host Paul Shomo on Twitter </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or connect on </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12971580-ep-8-ciso-sebastian-goodwin-on-advising-dspm-and-automation-startups.mp3" length="22152032" type="audio/mpeg" />
    <itunes:author>Paul Shomo / Autodesk CISO Sebastian Goodwin</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12971580</guid>
    <pubDate>Mon, 26 Jun 2023 02:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971580/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971580/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971580/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971580/transcript.vtt" type="text/vtt" />
    <itunes:duration>1842</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 7. Security Practitioner Trends from 2,400 RSA Conference Submissions</itunes:title>
    <title>Ep 7. Security Practitioner Trends from 2,400 RSA Conference Submissions</title>
    <itunes:summary><![CDATA[Join the podcast as we dive into a fascinating conversation with Britta Glade, the Vice President of Content and Curation at RSA Conference. Discover the world of "people's trends" as Britta sheds light on her team's meticulous analysis of 2,400 speaker submissions from influential practitioners in the industry. Get an insider's perspective on RSA's technical session selection process, where industry experts and data science come together to uncover valuable insights and emerging trends.  Hos...]]></itunes:summary>
    <description><![CDATA[<p>Join the podcast as we dive into a fascinating conversation with Britta Glade, the Vice President of Content and Curation at RSA Conference. Discover the world of &quot;people&apos;s trends&quot; as Britta sheds light on her team&apos;s meticulous analysis of 2,400 speaker submissions from influential practitioners in the industry. Get an insider&apos;s perspective on RSA&apos;s technical session selection process, where industry experts and data science come together to uncover valuable insights and emerging trends.<br/><br/>Host Paul Shomo raises an interesting point about the scarcity of industry reports capturing these practitioner trends. The discussion takes an exciting turn as Glade and Shomo geek out over the submission trends for 2023. From the Russia-Ukraine conflict and the vulnerabilities lurking in open source software to the intriguing concepts of shift left and shift right, quantum computing advancements, and the evolving landscape of SBOMs driven by the recent White House executive order, this episode covers it all.<br/><br/>Connect with Britta Glade on Twitter <a href='https://twitter.com/brittaglade'>@brittaglade</a> or find her on LinkedIn at <a href='https://www.linkedin.com/in/britta-glade-5251003/'>linkedIn.com/in/britta-glade-5251003</a>. Share your feedback and join the conversation with host Paul Shomo on Twitter <a href='https://twitter.com/ShomoBits'>@ShomoBits</a> or connect on LinkedIn at <a href='https://www.linkedin.com/in/paulshomo/'>linkedIn.com/in/paulshomo</a>. Don&apos;t miss out on this informative podcast episode that offers deep insights into the ever-evolving world of cybersecurity.</p>]]></description>
    <content:encoded><![CDATA[<p>Join the podcast as we dive into a fascinating conversation with Britta Glade, the Vice President of Content and Curation at RSA Conference. Discover the world of &quot;people&apos;s trends&quot; as Britta sheds light on her team&apos;s meticulous analysis of 2,400 speaker submissions from influential practitioners in the industry. Get an insider&apos;s perspective on RSA&apos;s technical session selection process, where industry experts and data science come together to uncover valuable insights and emerging trends.<br/><br/>Host Paul Shomo raises an interesting point about the scarcity of industry reports capturing these practitioner trends. The discussion takes an exciting turn as Glade and Shomo geek out over the submission trends for 2023. From the Russia-Ukraine conflict and the vulnerabilities lurking in open source software to the intriguing concepts of shift left and shift right, quantum computing advancements, and the evolving landscape of SBOMs driven by the recent White House executive order, this episode covers it all.<br/><br/>Connect with Britta Glade on Twitter <a href='https://twitter.com/brittaglade'>@brittaglade</a> or find her on LinkedIn at <a href='https://www.linkedin.com/in/britta-glade-5251003/'>linkedIn.com/in/britta-glade-5251003</a>. Share your feedback and join the conversation with host Paul Shomo on Twitter <a href='https://twitter.com/ShomoBits'>@ShomoBits</a> or connect on LinkedIn at <a href='https://www.linkedin.com/in/paulshomo/'>linkedIn.com/in/paulshomo</a>. Don&apos;t miss out on this informative podcast episode that offers deep insights into the ever-evolving world of cybersecurity.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12971577-ep-7-security-practitioner-trends-from-2-400-rsa-conference-submissions.mp3" length="13752624" type="audio/mpeg" />
    <itunes:author>Paul Shomo / RSA Conference VP Britta Glade</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12971577</guid>
    <pubDate>Tue, 13 Jun 2023 02:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971577/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971577/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971577/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12971577/transcript.vtt" type="text/vtt" />
    <itunes:duration>1142</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 6. RSAC Innovation Sandbox 2023 Emerging Trends: AI and Automation Attack Surfaces</itunes:title>
    <title>Ep 6. RSAC Innovation Sandbox 2023 Emerging Trends: AI and Automation Attack Surfaces</title>
    <itunes:summary><![CDATA[Paul Shomo’s 7th annual coverage of the RSAC’s startup competition, Innovation Sandbox, is out in DarkReading. In this episode, Paul recaps the show, tells you things you didn’t know about the finalists, some private thoughts from the judges, and highlights a very interesting trend in 2023: automation, ML and software-building tools are creating dangerous attack surfaces, that preoccupy 8 or 9 of this year’s 10 finalists. Paul discusses Hugh Thompson and Paul Kocher’s quirky humor, how the ju...]]></itunes:summary>
    <description><![CDATA[<p>Paul Shomo’s 7th annual coverage of the RSAC’s startup competition, Innovation Sandbox, is out in <a href='https://www.darkreading.com/vulnerabilities-threats/rsa-startup-competition-secures-ml-systems-vulnerabilities-in-new-automation'>DarkReading</a>. In this episode, Paul recaps the show, tells you things you didn’t know about the finalists, some private thoughts from the judges, and highlights a very interesting trend in 2023: automation, ML and software-building tools are creating dangerous attack surfaces, that preoccupy 8 or 9 of this year’s 10 finalists.</p><p>Paul discusses Hugh Thompson and Paul Kocher’s quirky humor, how the judges felt about Zama pivoting from broad use of homomorphic encryption to a blockchain focus, and whether the judges meant to make a statement by choosing mostly startups which secure applications built by developers, data scientists or non-technical software builders, as opposed to cybersecurity’s traditional role in defending off-the-shelf software and hardware.<br/><br/></p><p>We are entering the 4th industrial revolution of AI and automation, hear how HiddenLayer and Zama secure ML systems. How Pangea, EndorLabs, Relyance AI, and Dazz ensure your software developers are writing secure code. And explore this new world of non-technical business users building API and SaaS integrations with orchestration, generative AI, and how Valence Security and Astrix secure them.<br/><br/></p><p>Finally take a look at SafeBase which enables the 3rd party risk process of SBOMs and questionnaires, and AnChain whose Web3 SOC secures blockchain contracts.<br/><br/></p><p>Send feedback to host Paul Shomo on Twitter <a href='https://twitter.com/ShomoBits'>@ShomoBits</a> or connect on <a href='https://www.linkedin.com/in/paulshomo/'>LinkedIn.com/in/paulshomo</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Paul Shomo’s 7th annual coverage of the RSAC’s startup competition, Innovation Sandbox, is out in <a href='https://www.darkreading.com/vulnerabilities-threats/rsa-startup-competition-secures-ml-systems-vulnerabilities-in-new-automation'>DarkReading</a>. In this episode, Paul recaps the show, tells you things you didn’t know about the finalists, some private thoughts from the judges, and highlights a very interesting trend in 2023: automation, ML and software-building tools are creating dangerous attack surfaces, that preoccupy 8 or 9 of this year’s 10 finalists.</p><p>Paul discusses Hugh Thompson and Paul Kocher’s quirky humor, how the judges felt about Zama pivoting from broad use of homomorphic encryption to a blockchain focus, and whether the judges meant to make a statement by choosing mostly startups which secure applications built by developers, data scientists or non-technical software builders, as opposed to cybersecurity’s traditional role in defending off-the-shelf software and hardware.<br/><br/></p><p>We are entering the 4th industrial revolution of AI and automation, hear how HiddenLayer and Zama secure ML systems. How Pangea, EndorLabs, Relyance AI, and Dazz ensure your software developers are writing secure code. And explore this new world of non-technical business users building API and SaaS integrations with orchestration, generative AI, and how Valence Security and Astrix secure them.<br/><br/></p><p>Finally take a look at SafeBase which enables the 3rd party risk process of SBOMs and questionnaires, and AnChain whose Web3 SOC secures blockchain contracts.<br/><br/></p><p>Send feedback to host Paul Shomo on Twitter <a href='https://twitter.com/ShomoBits'>@ShomoBits</a> or connect on <a href='https://www.linkedin.com/in/paulshomo/'>LinkedIn.com/in/paulshomo</a>.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12941610-ep-6-rsac-innovation-sandbox-2023-emerging-trends-ai-and-automation-attack-surfaces.mp3" length="22742408" type="audio/mpeg" />
    <itunes:author>Paul Shomo</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12941610</guid>
    <pubDate>Mon, 29 May 2023 16:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12941610/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12941610/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12941610/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12941610/transcript.vtt" type="text/vtt" />
    <itunes:duration>1893</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 5. Pangea - State of AppSec, DevSecOps, Enabling Developers to Code Securely</itunes:title>
    <title>Ep 5. Pangea - State of AppSec, DevSecOps, Enabling Developers to Code Securely</title>
    <itunes:summary><![CDATA[Interview with Innovation Sandbox 2nd place winner, Pangea. Pangea CEO Oliver Friedrichs, a former Founder of orchestration phenom Phantom, discusses the state of AppSec and what is wrong with the shift-left movement.    Pangea discusses how shifting-left-of-left can bypass both arguments between SecDevOps and app developers, and false positives in code analysis. Paul forgets he’s met Oliver before and then wonders how many security products could be eliminated if developers wrote secure...]]></itunes:summary>
    <description><![CDATA[<p>Interview with Innovation Sandbox 2nd place winner, Pangea. Pangea CEO Oliver Friedrichs, a former Founder of orchestration phenom Phantom, discusses the state of AppSec and what is wrong with the shift-left movement.  <br/><br/>Pangea discusses how shifting-left-of-left can bypass both arguments between SecDevOps and app developers, and false positives in code analysis. Paul forgets he’s met Oliver before and then wonders how many security products could be eliminated if developers wrote secure code on the first place.<br/><br/>Finally Oliver lays out how Pangea’s Security Platform as a Service (SPaaS) hands developers authentication,  security logging,  export restrictions,  personally identifiable information (PII), IOC scans, and more.<br/><br/>Find Pangea on the web at <a href='https://pangea.cloud'>Pangea.cloud</a>,  on Twitter <a href='https://twitter.com/pangeacyber'>@pangeacyber, </a>or <a href='https://www.linkedin.com/company/pangea-cyber/'>LinkedIn</a>.<br/>Founder and CEO Oliver Friedrichs can be found on <a href='https://www.linkedin.com/in/oliverfriedrichs/'>Linkedin.com/in/oliverfriedrichs</a>.<br/><br/><b><em>Paul Shomo can be found at </em></b><a href='https://www.linkedin.com/in/paulshomo/'><b><em>LinkedIn.com/in/paulshomo</em></b></a><b><em>. Send Paul Shomo feedback on Twitter </em></b><a href='https://twitter.com/ShomoBits?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b><em>@ShomoBits</em></b></a><b><em>.</em></b></p><p>Follow us on <a href='https://podcasts.apple.com/podcast/id1676148032'>Apple</a>, <a href='https://open.spotify.com/show/3iRY0A5o9H7NTTPlsO6kCe?si=50bd46d30ee146e7'>Spotify</a>, <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5idXp6c3Byb3V0LmNvbS8yMTQxNjAwLnJzcw'>Google</a>, <a href='https://www.youtube.com/playlist?list=PLdZVJcnK1IcZylUvxwJL7J3cb2TDryD25'>YouTube</a>, or your favorite podcast app. Give us a review and I&apos;ll give my early adopters a shout-out on the show.</p>]]></description>
    <content:encoded><![CDATA[<p>Interview with Innovation Sandbox 2nd place winner, Pangea. Pangea CEO Oliver Friedrichs, a former Founder of orchestration phenom Phantom, discusses the state of AppSec and what is wrong with the shift-left movement.  <br/><br/>Pangea discusses how shifting-left-of-left can bypass both arguments between SecDevOps and app developers, and false positives in code analysis. Paul forgets he’s met Oliver before and then wonders how many security products could be eliminated if developers wrote secure code on the first place.<br/><br/>Finally Oliver lays out how Pangea’s Security Platform as a Service (SPaaS) hands developers authentication,  security logging,  export restrictions,  personally identifiable information (PII), IOC scans, and more.<br/><br/>Find Pangea on the web at <a href='https://pangea.cloud'>Pangea.cloud</a>,  on Twitter <a href='https://twitter.com/pangeacyber'>@pangeacyber, </a>or <a href='https://www.linkedin.com/company/pangea-cyber/'>LinkedIn</a>.<br/>Founder and CEO Oliver Friedrichs can be found on <a href='https://www.linkedin.com/in/oliverfriedrichs/'>Linkedin.com/in/oliverfriedrichs</a>.<br/><br/><b><em>Paul Shomo can be found at </em></b><a href='https://www.linkedin.com/in/paulshomo/'><b><em>LinkedIn.com/in/paulshomo</em></b></a><b><em>. Send Paul Shomo feedback on Twitter </em></b><a href='https://twitter.com/ShomoBits?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b><em>@ShomoBits</em></b></a><b><em>.</em></b></p><p>Follow us on <a href='https://podcasts.apple.com/podcast/id1676148032'>Apple</a>, <a href='https://open.spotify.com/show/3iRY0A5o9H7NTTPlsO6kCe?si=50bd46d30ee146e7'>Spotify</a>, <a href='https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5idXp6c3Byb3V0LmNvbS8yMTQxNjAwLnJzcw'>Google</a>, <a href='https://www.youtube.com/playlist?list=PLdZVJcnK1IcZylUvxwJL7J3cb2TDryD25'>YouTube</a>, or your favorite podcast app. Give us a review and I&apos;ll give my early adopters a shout-out on the show.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12819581-ep-5-pangea-state-of-appsec-devsecops-enabling-developers-to-code-securely.mp3" length="17033724" type="audio/mpeg" />
    <itunes:author>Paul Shomo /  Pangea Founder Oliver Friedrichs</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12819581</guid>
    <pubDate>Tue, 09 May 2023 20:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12819581/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12819581/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12819581/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12819581/transcript.vtt" type="text/vtt" />
    <itunes:duration>1416</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 4. Innovation Sandbox Winner, Hidden Layer, on ML System Attacks and MITRE Atlas</itunes:title>
    <title>Ep 4. Innovation Sandbox Winner, Hidden Layer, on ML System Attacks and MITRE Atlas</title>
    <itunes:summary><![CDATA[Hidden Layer Founder Chris Sestito of RSAC Innovation Sandbox winner Hidden Layer, discusses AI adversarial attacks on ML systems, the ease of stealing intellectual property with ML, Chris Sestito’s history at Cylance building next-gen ML systems, and a historic 2019 attack on Cylance using adversarial ML.   Hidden Layer brings us up to speed on this new important attack surface. Paul and Chris discuss MITRE’s new framework for attacks on ML systems, MITRE Atlas, and if the media is unde...]]></itunes:summary>
    <description><![CDATA[<p><b>Hidden Layer Founder Chris Sestito of RSAC Innovation Sandbox winner Hidden Layer, discusses AI adversarial attacks on ML systems, the ease of stealing intellectual property with ML, Chris Sestito’s history at Cylance building next-gen ML systems, and a historic 2019 attack on Cylance using adversarial ML. <br/><br/>Hidden Layer brings us up to speed on this new important attack surface. Paul and Chris discuss MITRE’s new framework for attacks on ML systems, MITRE Atlas, and if the media is under covering adversarial machine learning attacks.</b></p><p><b>Find Hidden Layer on the web at </b><a href='https://hiddenlayer.com/'><b>HiddenLayer.com</b></a><b>, or on Twitter </b><a href='https://twitter.com/hiddenlayersec?lang=en'><b>@hiddenlayersec</b></a><b>. </b></p><p><b>Checkout MITRE </b><a href='https://atlas.mitre.org/'><b>Atlas</b></a><b>, a knowledge base of adversary tactics, techniques, and case studies for machine learning (ML) systems.</b></p><p><b>Hidden Layer CEO and Founder Chris Sestito can be reached on LinkedIn: </b><a href='https://www.linkedin.com/in/ctito/'><b>https://www.linkedin.com/in/ctito/</b></a></p><p><b>RSAC Innovation Sandbox startup competition can be found </b><a href='https://www.rsaconference.com/usa/programs/innovation-sandbox'><b>here</b></a><b>, and RSAC is on Twitter </b><a href='https://twitter.com/RSAConference?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>@RSAConference</b></a><b>.</b></p><p><b>Paul Shomo can be found at </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>. Send Paul Shomo feedback on Twitter </b><a href='https://twitter.com/ShomoBits?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>@ShomoBits</b></a><b>.</b></p>]]></description>
    <content:encoded><![CDATA[<p><b>Hidden Layer Founder Chris Sestito of RSAC Innovation Sandbox winner Hidden Layer, discusses AI adversarial attacks on ML systems, the ease of stealing intellectual property with ML, Chris Sestito’s history at Cylance building next-gen ML systems, and a historic 2019 attack on Cylance using adversarial ML. <br/><br/>Hidden Layer brings us up to speed on this new important attack surface. Paul and Chris discuss MITRE’s new framework for attacks on ML systems, MITRE Atlas, and if the media is under covering adversarial machine learning attacks.</b></p><p><b>Find Hidden Layer on the web at </b><a href='https://hiddenlayer.com/'><b>HiddenLayer.com</b></a><b>, or on Twitter </b><a href='https://twitter.com/hiddenlayersec?lang=en'><b>@hiddenlayersec</b></a><b>. </b></p><p><b>Checkout MITRE </b><a href='https://atlas.mitre.org/'><b>Atlas</b></a><b>, a knowledge base of adversary tactics, techniques, and case studies for machine learning (ML) systems.</b></p><p><b>Hidden Layer CEO and Founder Chris Sestito can be reached on LinkedIn: </b><a href='https://www.linkedin.com/in/ctito/'><b>https://www.linkedin.com/in/ctito/</b></a></p><p><b>RSAC Innovation Sandbox startup competition can be found </b><a href='https://www.rsaconference.com/usa/programs/innovation-sandbox'><b>here</b></a><b>, and RSAC is on Twitter </b><a href='https://twitter.com/RSAConference?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>@RSAConference</b></a><b>.</b></p><p><b>Paul Shomo can be found at </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>. Send Paul Shomo feedback on Twitter </b><a href='https://twitter.com/ShomoBits?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'><b>@ShomoBits</b></a><b>.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12716628-ep-4-innovation-sandbox-winner-hidden-layer-on-ml-system-attacks-and-mitre-atlas.mp3" length="17949065" type="audio/mpeg" />
    <itunes:author>Paul Shomo / HiddenLayer Founder Chris Sestito </itunes:author>
    <guid isPermaLink="false">Buzzsprout-12716628</guid>
    <pubDate>Mon, 24 Apr 2023 18:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12716628/transcript" type="text/html" />
    <itunes:duration>1492</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 3. Island on Enterprise Browsers Solving Data Loss and Unmanaged Devices</itunes:title>
    <title>Ep 3. Island on Enterprise Browsers Solving Data Loss and Unmanaged Devices</title>
    <itunes:summary><![CDATA[Island CEO Mike Fey discusses unmanaged devices and the enterprise browser as the cloud’s successor to Data Loss Prevention (DLP). Paul and Mike discuss how Island’s browser is disrupting the Virtual Desktop Infrastructure (VDI), and the Cloud Access Security Broker (CASB) industries. Paul and Mike debate whether these new browsers can create a secure edge to the cloud by themselves, or not.  Mike explains how Microsoft and Google teaming up on the Chromium open source code base allows I...]]></itunes:summary>
    <description><![CDATA[<p><b>Island CEO Mike Fey discusses unmanaged devices and the enterprise browser as the cloud’s successor to Data Loss Prevention (DLP). Paul and Mike discuss how Island’s browser is disrupting the Virtual Desktop Infrastructure (VDI), and the Cloud Access Security Broker (CASB) industries. Paul and Mike debate whether these new browsers can create a secure edge to the cloud by themselves, or not. </b></p><p><b>Mike explains how Microsoft and Google teaming up on the Chromium open source code base allows Island to easily deploy across any device, and how the web browser can be seen as its own operating system. Mike also explains the central controls Island customers get, including redacting sensitive data onscreen, and geographic regulatory controls.</b></p><p><b>Check out </b><a href='https://www.island.io/'><b>Island.io</b></a><b> to learn more about their enterprise browser, or reach them on Twitter </b><a href='https://twitter.com/island_io?lang=en'><b>@island_io</b></a><b>. Mike Fey can be found on </b><a href='https://www.linkedin.com/in/michaelfey/'><b>LinkedIn.com/in/michaelfey</b></a><b>.</b></p><p><b>Don’t forget to also watch Episode 2 where startup advisor and Ashland CISO Bob Schuetter discuss hearing Island’s initial startup pitch in 2020, and his experience as a customer.</b></p><p><b>Send feedback to host Paul Shomo </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></description>
    <content:encoded><![CDATA[<p><b>Island CEO Mike Fey discusses unmanaged devices and the enterprise browser as the cloud’s successor to Data Loss Prevention (DLP). Paul and Mike discuss how Island’s browser is disrupting the Virtual Desktop Infrastructure (VDI), and the Cloud Access Security Broker (CASB) industries. Paul and Mike debate whether these new browsers can create a secure edge to the cloud by themselves, or not. </b></p><p><b>Mike explains how Microsoft and Google teaming up on the Chromium open source code base allows Island to easily deploy across any device, and how the web browser can be seen as its own operating system. Mike also explains the central controls Island customers get, including redacting sensitive data onscreen, and geographic regulatory controls.</b></p><p><b>Check out </b><a href='https://www.island.io/'><b>Island.io</b></a><b> to learn more about their enterprise browser, or reach them on Twitter </b><a href='https://twitter.com/island_io?lang=en'><b>@island_io</b></a><b>. Mike Fey can be found on </b><a href='https://www.linkedin.com/in/michaelfey/'><b>LinkedIn.com/in/michaelfey</b></a><b>.</b></p><p><b>Don’t forget to also watch Episode 2 where startup advisor and Ashland CISO Bob Schuetter discuss hearing Island’s initial startup pitch in 2020, and his experience as a customer.</b></p><p><b>Send feedback to host Paul Shomo </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12625768-ep-3-island-on-enterprise-browsers-solving-data-loss-and-unmanaged-devices.mp3" length="24933744" type="audio/mpeg" />
    <itunes:author>Paul Shomo / Island CEO Mike Fey</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12625768</guid>
    <pubDate>Mon, 10 Apr 2023 20:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12625768/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12625768/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12625768/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12625768/transcript.vtt" type="text/vtt" />
    <itunes:duration>2074</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 2. CISO Bob Schuetter on Data Loss, Startup Advising, and Cloud’s Secure Edge</itunes:title>
    <title>Ep 2. CISO Bob Schuetter on Data Loss, Startup Advising, and Cloud’s Secure Edge</title>
    <itunes:summary><![CDATA[Ashland CISO Bob Schuetter on brainstorming secure enterprise browsers in their startup's incubation period. Bob discusses building the cloud’s secure edge, and how new web browsers like Island’s (@island_io) will disrupt Data Loss Prevention (DLP), and the Virtual Desktop Infrastructure (VDI) industries. Bob and Paul explore exactly why DLP failed and if there should be optimism for the SASE vision. They wrap up by discussing automation with the suddenly emerging AI virtual assistant startup...]]></itunes:summary>
    <description><![CDATA[<p>Ashland CISO Bob Schuetter on brainstorming secure enterprise browsers in their startup&apos;s incubation period. Bob discusses building the cloud’s secure edge, and how new web browsers like <a href='https://www.island.io/'>Island’s</a> (<a href='https://twitter.com/island_io?lang=en'>@island_io</a>) will disrupt Data Loss Prevention (DLP), and the Virtual Desktop Infrastructure (VDI) industries. Bob and Paul explore exactly why DLP failed and if there should be optimism for the SASE vision. They wrap up by discussing automation with the suddenly emerging AI virtual assistant startups, and Robotic Process Automation (RPA). Lastly, Bob gives us insight into what it’s like to incubate startup tech for <a href='https://cyberstarts.com/'>Cyberstarts</a> and <a href='https://www.ylventures.com/'>YL Ventures </a>(<a href='https://twitter.com/ylventures'>@ylventures</a>). <br/><br/>Find CISO Bob Schuetter at <a href='https://www.linkedin.com/in/bob-schuetter-7a12958/'>Linkedin.com/bob-schuetter</a>. The other startups mentioned were <a href='https://talon-sec.com/'>Talon Cyber Security </a>(<a href='https://twitter.com/TalonCyber'>@TalonCyber</a>) and <a href='https://m.cadosecurity.com/pdf?utm_source=VTL+-+Google+Ad&amp;utm_source=google&amp;utm_medium=Paid+Search+Google+AD&amp;utm_medium=cpc&amp;utm_campaign=he+Ultimate+Guide+to+Docker+%26+Kubernetes+Forensics+%26+Incident+Response+&amp;utm_campaign=googlecpc_cado+security_p_c_18722985083_630931594047_g&amp;utm_id=VTL+Google+Ad+Ultimate+Guide+to+Docker+%26+Kubernetes+&amp;utm_term=cado+security&amp;hsa_acc=6065627949&amp;hsa_cam=18722985083&amp;hsa_grp=142152602159&amp;hsa_ad=630931594047&amp;hsa_src=g&amp;hsa_tgt=kwd-1040294004181&amp;hsa_kw=cado+security&amp;hsa_mt=p&amp;hsa_net=adwords&amp;hsa_ver=3&amp;gclid=CjwKCAjwiOCgBhAgEiwAjv5whDNxEu5Bq2svZJQpK0VqhXluNqG8jSulFSxmLBwG8uT5IzU5G1fQ4RoCK54QAvD_BwE'>Cado Security </a>(<a href='https://twitter.com/CadoSecurity'>@CadoSecurity</a>). Send feedback to host Paul Shomo <a href='https://twitter.com/ShomoBits'>@ShomoBits</a> or at <a href='https://www.linkedin.com/in/paulshomo/'>LinkedIn.com/paulshomo</a>. </p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Ashland CISO Bob Schuetter on brainstorming secure enterprise browsers in their startup&apos;s incubation period. Bob discusses building the cloud’s secure edge, and how new web browsers like <a href='https://www.island.io/'>Island’s</a> (<a href='https://twitter.com/island_io?lang=en'>@island_io</a>) will disrupt Data Loss Prevention (DLP), and the Virtual Desktop Infrastructure (VDI) industries. Bob and Paul explore exactly why DLP failed and if there should be optimism for the SASE vision. They wrap up by discussing automation with the suddenly emerging AI virtual assistant startups, and Robotic Process Automation (RPA). Lastly, Bob gives us insight into what it’s like to incubate startup tech for <a href='https://cyberstarts.com/'>Cyberstarts</a> and <a href='https://www.ylventures.com/'>YL Ventures </a>(<a href='https://twitter.com/ylventures'>@ylventures</a>). <br/><br/>Find CISO Bob Schuetter at <a href='https://www.linkedin.com/in/bob-schuetter-7a12958/'>Linkedin.com/bob-schuetter</a>. The other startups mentioned were <a href='https://talon-sec.com/'>Talon Cyber Security </a>(<a href='https://twitter.com/TalonCyber'>@TalonCyber</a>) and <a href='https://m.cadosecurity.com/pdf?utm_source=VTL+-+Google+Ad&amp;utm_source=google&amp;utm_medium=Paid+Search+Google+AD&amp;utm_medium=cpc&amp;utm_campaign=he+Ultimate+Guide+to+Docker+%26+Kubernetes+Forensics+%26+Incident+Response+&amp;utm_campaign=googlecpc_cado+security_p_c_18722985083_630931594047_g&amp;utm_id=VTL+Google+Ad+Ultimate+Guide+to+Docker+%26+Kubernetes+&amp;utm_term=cado+security&amp;hsa_acc=6065627949&amp;hsa_cam=18722985083&amp;hsa_grp=142152602159&amp;hsa_ad=630931594047&amp;hsa_src=g&amp;hsa_tgt=kwd-1040294004181&amp;hsa_kw=cado+security&amp;hsa_mt=p&amp;hsa_net=adwords&amp;hsa_ver=3&amp;gclid=CjwKCAjwiOCgBhAgEiwAjv5whDNxEu5Bq2svZJQpK0VqhXluNqG8jSulFSxmLBwG8uT5IzU5G1fQ4RoCK54QAvD_BwE'>Cado Security </a>(<a href='https://twitter.com/CadoSecurity'>@CadoSecurity</a>). Send feedback to host Paul Shomo <a href='https://twitter.com/ShomoBits'>@ShomoBits</a> or at <a href='https://www.linkedin.com/in/paulshomo/'>LinkedIn.com/paulshomo</a>. </p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12482043-ep-2-ciso-bob-schuetter-on-data-loss-startup-advising-and-cloud-s-secure-edge.mp3" length="15945974" type="audio/mpeg" />
    <itunes:author>Paul Shomo / Ashland CISO Bob Schuetter</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12482043</guid>
    <pubDate>Mon, 20 Mar 2023 18:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12482043/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12482043/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12482043/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12482043/transcript.vtt" type="text/vtt" />
    <itunes:duration>1325</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 1. StrikeReady on AI Virtual Assistants and Incident Response</itunes:title>
    <title>Ep 1. StrikeReady on AI Virtual Assistants and Incident Response</title>
    <itunes:summary><![CDATA[StrikeReady’s Chief Product Officer, Anurag Gurtu, discusses AI virtual assistants, the younger generation’s AI optimism, the problems of incident response, and the automation possibilities of artificial intelligence. Anurag and Paul explore how virtual assistants will disrupt cybersecurity, orchestration, SIEM, SOAR, and managed services. Building and training virtual assistants is more complex than it appears, emerging products may need to deliver an ecosystem of familiar tools for bots to ...]]></itunes:summary>
    <description><![CDATA[<p><b>StrikeReady’s Chief Product Officer, Anurag Gurtu, discusses AI virtual assistants, the younger generation’s AI optimism, the problems of incident response, and the automation possibilities of artificial intelligence. Anurag and Paul explore how virtual assistants will disrupt cybersecurity, orchestration, SIEM, SOAR, and managed services. Building and training virtual assistants is more complex than it appears, emerging products may need to deliver an ecosystem of familiar tools for bots to affect their environment. <br/><br/>Find </b><a href='https://strikeready.com/'><b>StrikeReady.com</b></a><b> on Twitter </b><a href='https://twitter.com/strike_ready?lang=en'><b>@strike_ready</b></a><b>. Anurag Gurtu can be found </b><a href='https://twitter.com/AnuragGurtu'><b>@AnuragGurtu</b></a><b> and on </b><a href='https://www.linkedin.com/in/gurtu/'><b>LinkedIn.com/in/gurtu</b></a><b>. Send feedback to host, Paul Shomo </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>. Read Paul’s end-of-year startup wrapup at </b><a href='https://www.darkreading.com/operations/coming-soon-to-a-soc-near-you-posture-management-and-virtual-assisstants'><b>DarkReading</b></a><b>.</b></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>StrikeReady’s Chief Product Officer, Anurag Gurtu, discusses AI virtual assistants, the younger generation’s AI optimism, the problems of incident response, and the automation possibilities of artificial intelligence. Anurag and Paul explore how virtual assistants will disrupt cybersecurity, orchestration, SIEM, SOAR, and managed services. Building and training virtual assistants is more complex than it appears, emerging products may need to deliver an ecosystem of familiar tools for bots to affect their environment. <br/><br/>Find </b><a href='https://strikeready.com/'><b>StrikeReady.com</b></a><b> on Twitter </b><a href='https://twitter.com/strike_ready?lang=en'><b>@strike_ready</b></a><b>. Anurag Gurtu can be found </b><a href='https://twitter.com/AnuragGurtu'><b>@AnuragGurtu</b></a><b> and on </b><a href='https://www.linkedin.com/in/gurtu/'><b>LinkedIn.com/in/gurtu</b></a><b>. Send feedback to host, Paul Shomo </b><a href='https://twitter.com/ShomoBits'><b>@ShomoBits</b></a><b> or </b><a href='https://www.linkedin.com/in/paulshomo/'><b>LinkedIn.com/in/paulshomo</b></a><b>. Read Paul’s end-of-year startup wrapup at </b><a href='https://www.darkreading.com/operations/coming-soon-to-a-soc-near-you-posture-management-and-virtual-assisstants'><b>DarkReading</b></a><b>.</b></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12440553-ep-1-strikeready-on-ai-virtual-assistants-and-incident-response.mp3" length="19164641" type="audio/mpeg" />
    <itunes:author>Paul Shomo / StrikeReady Anurag Gurtu</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12440553</guid>
    <pubDate>Tue, 14 Mar 2023 12:00:00 -0700</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12440553/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12440553/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12440553/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2141600/12440553/transcript.vtt" type="text/vtt" />
    <itunes:duration>1593</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Sneak Peek</itunes:title>
    <title>Sneak Peek</title>
    <itunes:summary><![CDATA[The Genealogy of Innovation is a new kind of cybersecurity podcast, focusing on interviewing the people involved in emerging tech. Here we’ll interview top entrepreneurs, startup-advising CISOs, and analysts. Our topic? What’s wrong with cybersecurity.  Security is an arms race full of hype. But when you focus on the inception point of innovation, you meet fascinating people who simply have better access to information. That’s how they outflank the competition.   ]]></itunes:summary>
    <description><![CDATA[<p><b>The Genealogy of Innovation is a </b><b><em>new</em></b><b> kind of cybersecurity podcast, focusing on interviewing the people involved in emerging tech. Here we’ll interview top entrepreneurs, startup-advising CISOs, and analysts. Our topic? What’s wrong with cybersecurity. </b></p><p><b>Security is an arms race full of hype. But when you focus on the inception point of innovation, you meet fascinating people who simply have better access to information. That’s how they outflank the competition.</b></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><b>The Genealogy of Innovation is a </b><b><em>new</em></b><b> kind of cybersecurity podcast, focusing on interviewing the people involved in emerging tech. Here we’ll interview top entrepreneurs, startup-advising CISOs, and analysts. Our topic? What’s wrong with cybersecurity. </b></p><p><b>Security is an arms race full of hype. But when you focus on the inception point of innovation, you meet fascinating people who simply have better access to information. That’s how they outflank the competition.</b></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2141600/episodes/12397582-sneak-peek.mp3" length="2811875" type="audio/mpeg" />
    <itunes:author>Paul Shomo</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12397582</guid>
    <pubDate>Tue, 07 Mar 2023 19:00:00 -0800</pubDate>
    <itunes:duration>232</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episodeType>trailer</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
</channel>
</rss>
