<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/2244005.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Hack Responsibly</title>

  <lastBuildDate>Wed, 20 May 2026 13:00:33 -0500</lastBuildDate>
  <link>https://www.buzzsprout.com/2244005</link>
  <language>en-us</language>
  <copyright>© 2026 Hack Responsibly</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>d6f84799-b5bf-5814-83e2-50842d94bed0</podcast:guid>
  <itunes:author>NetSPI</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>Coming soon.</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>NetSPI</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/1r3igbxrq24hjnqwa7emjqci8g37?.jpg</url>
     <title>Hack Responsibly</title>
     <link></link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/1r3igbxrq24hjnqwa7emjqci8g37?.jpg" />
  <itunes:category text="Arts" />
  <podcast:person role="host" img="https://storage.buzzsprout.com/kzefp9sai4u10lvofa3z06ck371q">Karl Fosaaen</podcast:person>
  <item>
    <itunes:title>Hack Responsibly Episode 06: Testing at the Speed of Attackers</itunes:title>
    <title>Hack Responsibly Episode 06: Testing at the Speed of Attackers</title>
    <itunes:summary><![CDATA[In this episode of Hack Responsibly, Karl Fossen talks to James Albany, NetSPI’s Senior Director of Network Pentesting, about his path from a SOC analyst to a penetration testing leader. They cover how AI and continuous testing are reshaping the security industry, what common gaps still show up in assessments, and what James is up to outside of work.  What’s discussed:  Advice for newcomers: understand the fundamentals so you can gut-check what AI is doing well versus poorly Th...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of Hack Responsibly, Karl Fossen talks to James Albany, NetSPI’s Senior Director of Network Pentesting, about his path from a SOC analyst to a penetration testing leader. They cover how AI and continuous testing are reshaping the security industry, what common gaps still show up in assessments, and what James is up to outside of work. </p><p><b>What’s discussed:</b> </p><ul><li>Advice for newcomers: understand the fundamentals so you can gut-check what AI is doing well versus poorly </li><li>The shift from point-in-time assessments to continuous testing programs and why clients are increasingly asking for it </li><li>AI&apos;s role in security testing, including generating Nuclei templates and accelerating vulnerability discovery, and when traditional automation is still the better choice </li><li>The &quot;fire hose effect&quot; of AI tools like Mythos compressing timelines for vulnerability discovery, proof-of-concept development, and remediation </li><li>Underrepresented topics in security: SCCM/deployment server risks, Linux and Kubernetes environments, and supply chain security </li><li>Common gaps still showing up in assessments, including Active Directory and application-level vulnerabilities that network scanners miss </li><li>TFTP and PXE booting as surprisingly persistent and effective attack vectors </li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of Hack Responsibly, Karl Fossen talks to James Albany, NetSPI’s Senior Director of Network Pentesting, about his path from a SOC analyst to a penetration testing leader. They cover how AI and continuous testing are reshaping the security industry, what common gaps still show up in assessments, and what James is up to outside of work. </p><p><b>What’s discussed:</b> </p><ul><li>Advice for newcomers: understand the fundamentals so you can gut-check what AI is doing well versus poorly </li><li>The shift from point-in-time assessments to continuous testing programs and why clients are increasingly asking for it </li><li>AI&apos;s role in security testing, including generating Nuclei templates and accelerating vulnerability discovery, and when traditional automation is still the better choice </li><li>The &quot;fire hose effect&quot; of AI tools like Mythos compressing timelines for vulnerability discovery, proof-of-concept development, and remediation </li><li>Underrepresented topics in security: SCCM/deployment server risks, Linux and Kubernetes environments, and supply chain security </li><li>Common gaps still showing up in assessments, including Active Directory and application-level vulnerabilities that network scanners miss </li><li>TFTP and PXE booting as surprisingly persistent and effective attack vectors </li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2244005/episodes/19210529-hack-responsibly-episode-06-testing-at-the-speed-of-attackers.mp3" length="25215243" type="audio/mpeg" />
    <itunes:author>NetSPI</itunes:author>
    <guid isPermaLink="false">Buzzsprout-19210529</guid>
    <pubDate>Wed, 20 May 2026 12:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2244005/19210529/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2244005/19210529/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2244005/19210529/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2244005/19210529/transcript.vtt" type="text/vtt" />
    <itunes:duration>2097</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hack Responsibly Episode 05: Proactive Cloud Security: Mitigate Real Risks</itunes:title>
    <title>Hack Responsibly Episode 05: Proactive Cloud Security: Mitigate Real Risks</title>
    <itunes:summary><![CDATA[In this episode of Hack Responsibly, Karl Fossen chats with Thomas Elling, NetSPI’s Director of Cloud Pentesting, about today’s cloud security challenges. They dive into cloud pentesting tips and common misconfigurations, discussing how attackers take advantage of these gaps. Thomas also shares his own path into cybersecurity. Listen to practical advice for newcomers, and a look at why staying curious and adaptable matters for anyone tackling today’s evolving threats.  We dive into:&nbsp...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of Hack Responsibly, Karl Fossen chats with Thomas Elling, NetSPI’s Director of Cloud Pentesting, about today’s cloud security challenges. They dive into cloud pentesting tips and common misconfigurations, discussing how attackers take advantage of these gaps. Thomas also shares his own path into cybersecurity. Listen to practical advice for newcomers, and a look at why staying curious and adaptable matters for anyone tackling today’s evolving threats. </p><p>We dive into: </p><ul><li>Strategic cloud adoption and layered security </li><li>Mitigating high-impact cloud vulnerabilities </li><li>The threat of attack chaining </li><li>Cultivating a resilience security culture </li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode of Hack Responsibly, Karl Fossen chats with Thomas Elling, NetSPI’s Director of Cloud Pentesting, about today’s cloud security challenges. They dive into cloud pentesting tips and common misconfigurations, discussing how attackers take advantage of these gaps. Thomas also shares his own path into cybersecurity. Listen to practical advice for newcomers, and a look at why staying curious and adaptable matters for anyone tackling today’s evolving threats. </p><p>We dive into: </p><ul><li>Strategic cloud adoption and layered security </li><li>Mitigating high-impact cloud vulnerabilities </li><li>The threat of attack chaining </li><li>Cultivating a resilience security culture </li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2244005/episodes/18879865-hack-responsibly-episode-05-proactive-cloud-security-mitigate-real-risks.mp3" length="21960201" type="audio/mpeg" />
    <itunes:author>NetSPI</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18879865</guid>
    <pubDate>Fri, 20 Mar 2026 09:00:00 -0500</pubDate>
    <itunes:duration>1826</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hack Responsibly Episode 04: From Blue Team to Pentesting - Tools, Tales, and Techniques</itunes:title>
    <title>Hack Responsibly Episode 04: From Blue Team to Pentesting - Tools, Tales, and Techniques</title>
    <itunes:summary><![CDATA[In this episode, host Karl Fosaaen sits down with Paul Ryan, Senior Director of Application Security at NetSPI, to explore his journey in cybersecurity and his leadership in application pentesting. Paul shares how his career evolved from IT and blue team roles to becoming a key figure in application security at NetSPI.  We dive into:  The evolution of application pentesting, including the rise of APIs and AI in security testing. Paul’s favorite tools and techniques, including t...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, host Karl Fosaaen sits down with Paul Ryan, Senior Director of Application Security at NetSPI, to explore his journey in cybersecurity and his leadership in application pentesting. Paul shares how his career evolved from IT and blue team roles to becoming a key figure in application security at NetSPI. </p><p>We dive into: </p><ul><li>The evolution of application pentesting, including the rise of APIs and AI in security testing. </li><li>Paul’s favorite tools and techniques, including the importance of checklists for consistency and quality. </li><li>Advice for aspiring cybersecurity professionals: &quot;Follow your passions.&quot; </li><li>Memorable pentesting engagements, from formula injection debates to creative vulnerability discoveries. </li><li>Paul’s love for hacker culture, including his favorite movie, <em>Sneakers</em>, and his passion for tinkering with old tech. </li></ul>]]></description>
    <content:encoded><![CDATA[<p>In this episode, host Karl Fosaaen sits down with Paul Ryan, Senior Director of Application Security at NetSPI, to explore his journey in cybersecurity and his leadership in application pentesting. Paul shares how his career evolved from IT and blue team roles to becoming a key figure in application security at NetSPI. </p><p>We dive into: </p><ul><li>The evolution of application pentesting, including the rise of APIs and AI in security testing. </li><li>Paul’s favorite tools and techniques, including the importance of checklists for consistency and quality. </li><li>Advice for aspiring cybersecurity professionals: &quot;Follow your passions.&quot; </li><li>Memorable pentesting engagements, from formula injection debates to creative vulnerability discoveries. </li><li>Paul’s love for hacker culture, including his favorite movie, <em>Sneakers</em>, and his passion for tinkering with old tech. </li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2244005/episodes/18734696-hack-responsibly-episode-04-from-blue-team-to-pentesting-tools-tales-and-techniques.mp3" length="21779984" type="audio/mpeg" />
    <itunes:author>NetSPI</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18734696</guid>
    <pubDate>Mon, 23 Feb 2026 15:00:00 -0600</pubDate>
    <itunes:duration>1811</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hack Responsibly Episode 03: The Hidden Risk in Legacy Infrastructure</itunes:title>
    <title>Hack Responsibly Episode 03: The Hidden Risk in Legacy Infrastructure</title>
    <itunes:summary><![CDATA[For many enterprise organizations (particularly in financial services and healthcare) mainframes remain the backbone of daily operations. Yet, these critical legacy systems often operate under a false assumption of "security by obscurity." Overlooking the security of these core assets represents a significant, often unaddressed, operational risk.  In this episode of the Hack Responsibly podcast, NetSPI VP of Research Karl Fosaaen connects with Phil Young, NetSPI Director of Mainframe Pen...]]></itunes:summary>
    <description><![CDATA[<p>For many enterprise organizations (particularly in financial services and healthcare) mainframes remain the backbone of daily operations. Yet, these critical legacy systems often operate under a false assumption of &quot;security by obscurity.&quot; Overlooking the security of these core assets represents a significant, often unaddressed, operational risk. </p><p>In this episode of the <em>Hack Responsibly</em> podcast, NetSPI VP of Research Karl Fosaaen connects with Phil Young, NetSPI Director of Mainframe Pentesting. Known in the industry as &quot;Soldier of Fortran,&quot; Phil is a leading authority on mainframe security. Together, they dismantle the myth that legacy infrastructure is immune to modern threats and discuss why specialized testing is essential for business continuity. </p>]]></description>
    <content:encoded><![CDATA[<p>For many enterprise organizations (particularly in financial services and healthcare) mainframes remain the backbone of daily operations. Yet, these critical legacy systems often operate under a false assumption of &quot;security by obscurity.&quot; Overlooking the security of these core assets represents a significant, often unaddressed, operational risk. </p><p>In this episode of the <em>Hack Responsibly</em> podcast, NetSPI VP of Research Karl Fosaaen connects with Phil Young, NetSPI Director of Mainframe Pentesting. Known in the industry as &quot;Soldier of Fortran,&quot; Phil is a leading authority on mainframe security. Together, they dismantle the myth that legacy infrastructure is immune to modern threats and discuss why specialized testing is essential for business continuity. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2244005/episodes/18471212-hack-responsibly-episode-03-the-hidden-risk-in-legacy-infrastructure.mp3" length="27706412" type="audio/mpeg" />
    <itunes:author>Karl Fosaaen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18471212</guid>
    <pubDate>Wed, 07 Jan 2026 16:00:00 -0600</pubDate>
    <itunes:duration>2305</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hack Responsibly Episode 02: Securing the AI Frontier</itunes:title>
    <title>Hack Responsibly Episode 02: Securing the AI Frontier</title>
    <itunes:summary><![CDATA[The adoption of artificial intelligence and large language models (LLMs) presents a significant opportunity for business innovation, but also introduces a new and complex attack surfaces. Balancing the drive for AI integration with robust security measures is essential for long-term strategic success and risk mitigation.  In this episode of the Hack Responsibly podcast, NetSPI VP of Research Karl Fosaaen speaks with Kim Wiles, Director of AI Penetration Testing, about the unique security...]]></itunes:summary>
    <description><![CDATA[<p>The adoption of artificial intelligence and large language models (LLMs) presents a significant opportunity for business innovation, but also introduces a new and complex attack surfaces. Balancing the drive for AI integration with robust security measures is essential for long-term strategic success and risk mitigation. </p><p>In this episode of the <em>Hack Responsibly</em> podcast, NetSPI VP of Research Karl Fosaaen speaks with Kim Wiles, Director of AI Penetration Testing, about the unique security challenges posed by emerging AI technologies.  </p>]]></description>
    <content:encoded><![CDATA[<p>The adoption of artificial intelligence and large language models (LLMs) presents a significant opportunity for business innovation, but also introduces a new and complex attack surfaces. Balancing the drive for AI integration with robust security measures is essential for long-term strategic success and risk mitigation. </p><p>In this episode of the <em>Hack Responsibly</em> podcast, NetSPI VP of Research Karl Fosaaen speaks with Kim Wiles, Director of AI Penetration Testing, about the unique security challenges posed by emerging AI technologies.  </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2244005/episodes/18471077-hack-responsibly-episode-02-securing-the-ai-frontier.mp3" length="19348346" type="audio/mpeg" />
    <itunes:author>Karl Fosaaen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18471077</guid>
    <pubDate>Wed, 07 Jan 2026 15:00:00 -0600</pubDate>
    <itunes:duration>1608</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hack Responsibly Episode 01: Inside the Mind of a Social Engineer</itunes:title>
    <title>Hack Responsibly Episode 01: Inside the Mind of a Social Engineer</title>
    <itunes:summary><![CDATA[A single human error can compromise even the most robust technical infrastructure. For executives and security leaders, understanding the psychology behind these breaches is critical to protecting organizational assets.  In the first episode of the Hack Responsibly podcast, host and NetSPI VP of Research Karl Fosaaen talked with Patrick Sayler about dissecting the evolving landscape of social engineering. This discussion moves beyond simple phishing definitions to explore the sophisticat...]]></itunes:summary>
    <description><![CDATA[<p>A single human error can compromise even the most robust technical infrastructure. For executives and security leaders, understanding the psychology behind these breaches is critical to protecting organizational assets. </p><p>In the first episode of the <em>Hack Responsibly</em> podcast, host and NetSPI VP of Research Karl Fosaaen talked with Patrick Sayler about dissecting the evolving landscape of social engineering. This discussion moves beyond simple phishing definitions to explore the sophisticated tactics threat actors use to bypass advanced security controls, from multi-factor authentication (MFA) fatigue to AI-driven deception. </p><p>This episode offers high-level insights into how social engineering impacts your risk posture and what proactive measures you can take to align your security initiatives with business continuity goals. </p>]]></description>
    <content:encoded><![CDATA[<p>A single human error can compromise even the most robust technical infrastructure. For executives and security leaders, understanding the psychology behind these breaches is critical to protecting organizational assets. </p><p>In the first episode of the <em>Hack Responsibly</em> podcast, host and NetSPI VP of Research Karl Fosaaen talked with Patrick Sayler about dissecting the evolving landscape of social engineering. This discussion moves beyond simple phishing definitions to explore the sophisticated tactics threat actors use to bypass advanced security controls, from multi-factor authentication (MFA) fatigue to AI-driven deception. </p><p>This episode offers high-level insights into how social engineering impacts your risk posture and what proactive measures you can take to align your security initiatives with business continuity goals. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2244005/episodes/18470468-hack-responsibly-episode-01-inside-the-mind-of-a-social-engineer.mp3" length="33954789" type="audio/mpeg" />
    <itunes:author>Karl Fosaaen</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18470468</guid>
    <pubDate>Wed, 07 Jan 2026 14:00:00 -0600</pubDate>
    <itunes:duration>2826</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
