<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://feeds.buzzsprout.com/439093.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Active Cyber Zone from ActiveCyber.net</title>

  <lastBuildDate>Thu, 05 Mar 2026 16:53:25 -0500</lastBuildDate>
  <link>https://www.activecyber.net</link>
  <language>en-us</language>
  <copyright>© 2026 Active Cyber Zone from ActiveCyber.net</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>bb1cf9fa-4978-5b3a-9169-076fa0823f21</podcast:guid>
  <itunes:author>Chris Daly of Active Cyber</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[Chris Daly podcast on security topics and other emerging topics]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>security automation, augmented reality, cybersecurity, emerging technology, active cyber defense</itunes:keywords>
  <itunes:owner>
    <itunes:name>Chris Daly of Active Cyber</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/iellsffn1a5dpqmelkh3e4xoy7d9?.jpg</url>
     <title>Active Cyber Zone from ActiveCyber.net</title>
     <link>https://www.activecyber.net</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/iellsffn1a5dpqmelkh3e4xoy7d9?.jpg" />
  <itunes:category text="News">
    <itunes:category text="Tech News" />
  </itunes:category>
  <itunes:category text="Technology" />
  <itunes:category text="Business">
    <itunes:category text="Management" />
  </itunes:category>
  <item>
    <itunes:title>George Barnes, Former NSA Deputy Director, Reflects On Cybersecurity Challenges With Active Cyber</itunes:title>
    <title>George Barnes, Former NSA Deputy Director, Reflects On Cybersecurity Challenges With Active Cyber</title>
    <itunes:summary><![CDATA[Send a text At the beginning of each year, for the past 10 or more years, I am excited to get the invite from my friend Larry Gordon to make the trek to the University of Maryland to attend the annual, day long forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective. This year's agenda for the 20th Forum was loaded with interesting topics and speakers. The luncheon keynote, delivered by the former Deputy Director of NSA, George Barnes, especially grabbed my inter...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>At the beginning of each year, for the past 10 or more years, I am excited to get the invite from my friend Larry Gordon to make the trek to the University of Maryland to attend the annual, day long forum on <em>Financial Information Systems and Cybersecurity: A Public Policy Perspective</em>. This year&apos;s agenda for the 20th Forum was loaded with interesting topics and speakers. The luncheon keynote, delivered by the former Deputy Director of NSA, George Barnes, especially grabbed my interest and I was delighted that George accepted my offer to do a podcast and interview. I appreciate the insight George has gained from overseeing operations at NSA, which is at the forefront of the cyber war with nation states, especially in light of the recent Salt Typhoon and Volt Typhoon attacks. So listen to the podcast here as George Barnes reflects about the cyber challenges we face and how AI is also rapidly changing the landscape of cyber offense and defense.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>At the beginning of each year, for the past 10 or more years, I am excited to get the invite from my friend Larry Gordon to make the trek to the University of Maryland to attend the annual, day long forum on <em>Financial Information Systems and Cybersecurity: A Public Policy Perspective</em>. This year&apos;s agenda for the 20th Forum was loaded with interesting topics and speakers. The luncheon keynote, delivered by the former Deputy Director of NSA, George Barnes, especially grabbed my interest and I was delighted that George accepted my offer to do a podcast and interview. I appreciate the insight George has gained from overseeing operations at NSA, which is at the forefront of the cyber war with nation states, especially in light of the recent Salt Typhoon and Volt Typhoon attacks. So listen to the podcast here as George Barnes reflects about the cyber challenges we face and how AI is also rapidly changing the landscape of cyber offense and defense.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/16664777-george-barnes-former-nsa-deputy-director-reflects-on-cybersecurity-challenges-with-active-cyber.mp3" length="39905498" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16664777</guid>
    <pubDate>Mon, 24 Feb 2025 07:00:00 -0500</pubDate>
    <itunes:duration>3322</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Learn How OneTier and Vantiq Are Collaborating To Deliver Full Coverage Zero Trust Solution In This Discussion in the Active Cyber Zone</itunes:title>
    <title>Learn How OneTier and Vantiq Are Collaborating To Deliver Full Coverage Zero Trust Solution In This Discussion in the Active Cyber Zone</title>
    <itunes:summary><![CDATA[Send a text I received a call a while back from my good friend, Jim Rice, who wanted to introduce me to a company with whom he had been collaborating on a solution. Jim has a knack to be on top of the next big market wave – in this case it was zero trust – and so I was eager to hear more about the solution. Jim introduced me to Chris Romeo, the CEO of OneTier who is partnered with Vantiq – Jim’s employer. When I heard more from Chris, I learned that this solution was all-encompassing, coverin...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>I received a call a while back from my good friend, Jim Rice, who wanted to introduce me to a company with whom he had been collaborating on a solution. Jim has a knack to be on top of the next big market wave – in this case it was zero trust – and so I was eager to hear more about the solution. Jim introduced me to Chris Romeo, the CEO of OneTier who is partnered with Vantiq – Jim’s employer. When I heard more from Chris, I learned that this solution was all-encompassing, covering the foundation layers and five pillars of the zero trust framework.</p><p>It is the first one I have seen that was so comprehensive. By being built on top of Vantiq’s real-time, intelligent, orchestration platform, the partnership embeds zero trust principles while enabling real-time monitoring, adaptive threat response, and seamless automation. So you can read the interview at www.activecyber.net to learn more about this zero trust solution partnership, or you can listen to the podcast here, or do both.</p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>I received a call a while back from my good friend, Jim Rice, who wanted to introduce me to a company with whom he had been collaborating on a solution. Jim has a knack to be on top of the next big market wave – in this case it was zero trust – and so I was eager to hear more about the solution. Jim introduced me to Chris Romeo, the CEO of OneTier who is partnered with Vantiq – Jim’s employer. When I heard more from Chris, I learned that this solution was all-encompassing, covering the foundation layers and five pillars of the zero trust framework.</p><p>It is the first one I have seen that was so comprehensive. By being built on top of Vantiq’s real-time, intelligent, orchestration platform, the partnership embeds zero trust principles while enabling real-time monitoring, adaptive threat response, and seamless automation. So you can read the interview at www.activecyber.net to learn more about this zero trust solution partnership, or you can listen to the podcast here, or do both.</p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/16026635-learn-how-onetier-and-vantiq-are-collaborating-to-deliver-full-coverage-zero-trust-solution-in-this-discussion-in-the-active-cyber-zone.mp3" length="44727987" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16026635</guid>
    <pubDate>Tue, 05 Nov 2024 09:00:00 -0500</pubDate>
    <itunes:duration>3724</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Active Cyber Zone Panel Discussion About New CISA Software Acquisition Guide - Why It Is Important And What You Need to Do About It</itunes:title>
    <title>Active Cyber Zone Panel Discussion About New CISA Software Acquisition Guide - Why It Is Important And What You Need to Do About It</title>
    <itunes:summary><![CDATA[Send a text The CISA Software Acquisition Guide for Government Enterprise Consumers: Software Assurance in the Cyber-Supply Chain Risk Management (C-SCRM) Lifecycle product was developed in response to the core challenges of software assurance and cybersecurity transparency in the acquisition process, focusing primarily on software lifecycle activities. The Software Acquisition Guide focuses on the “Secure by Demand” elements by providing recommendations for agency personnel, including missio...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>The CISA <b>Software Acquisition Guide for Government Enterprise Consumers: Software Assurance in the Cyber-Supply Chain Risk Management (C-SCRM) Lifecycle</b> product was developed in response to the core challenges of software assurance and cybersecurity transparency in the acquisition process, focusing primarily on software lifecycle activities. The Software Acquisition Guide focuses on the <b><em>“Secure by Demand”</em></b> elements by providing recommendations for agency personnel, including mission owners and contracting staff or requirements office to engage in more relevant discussions with their enterprise risk owners (such as CIOs and CISOs) and candidate suppliers such that better, risk-informed decisions can be made associated with acquisition and procurement of software and cyber-physical products. <br/><br/>This Active Cyber Zone podcast features two members of the team that developed the Guide. We explore why the Guide is needed and what government vendors need to know as the Guide makes its way into the federal acqusition process.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>The CISA <b>Software Acquisition Guide for Government Enterprise Consumers: Software Assurance in the Cyber-Supply Chain Risk Management (C-SCRM) Lifecycle</b> product was developed in response to the core challenges of software assurance and cybersecurity transparency in the acquisition process, focusing primarily on software lifecycle activities. The Software Acquisition Guide focuses on the <b><em>“Secure by Demand”</em></b> elements by providing recommendations for agency personnel, including mission owners and contracting staff or requirements office to engage in more relevant discussions with their enterprise risk owners (such as CIOs and CISOs) and candidate suppliers such that better, risk-informed decisions can be made associated with acquisition and procurement of software and cyber-physical products. <br/><br/>This Active Cyber Zone podcast features two members of the team that developed the Guide. We explore why the Guide is needed and what government vendors need to know as the Guide makes its way into the federal acqusition process.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/15578975-active-cyber-zone-panel-discussion-about-new-cisa-software-acquisition-guide-why-it-is-important-and-what-you-need-to-do-about-it.mp3" length="32543738" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15578975</guid>
    <pubDate>Wed, 21 Aug 2024 08:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/439093/15578975/transcript" type="text/html" />
    <itunes:duration>2709</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Active Cyber Zone Interview with Ron Perez, Intel Chief Security Architect, on Confidential Computing</itunes:title>
    <title>Active Cyber Zone Interview with Ron Perez, Intel Chief Security Architect, on Confidential Computing</title>
    <itunes:summary><![CDATA[Send a text Chris Daly, host of the Active Cyber Zone, discusses the evolution, use cases, and benefits of Confidential Computing with Ron Perez, Intel Fellow and Chief Security Architect. From the cloud, to the edge, to the endpoint, Confidental Computing is seeing an uptick of adoption and new applications as industry and governments recognize the need for hardware-based separation and attestation to build a trustworthy stack - and one that is secure by design.  ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Chris Daly, host of the Active Cyber Zone, discusses the evolution, use cases, and benefits of Confidential Computing with Ron Perez, Intel Fellow and Chief Security Architect. From the cloud, to the edge, to the endpoint, Confidental Computing is seeing an uptick of adoption and new applications as industry and governments recognize the need for hardware-based separation and attestation to build a trustworthy stack - and one that is secure by design. </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Chris Daly, host of the Active Cyber Zone, discusses the evolution, use cases, and benefits of Confidential Computing with Ron Perez, Intel Fellow and Chief Security Architect. From the cloud, to the edge, to the endpoint, Confidental Computing is seeing an uptick of adoption and new applications as industry and governments recognize the need for hardware-based separation and attestation to build a trustworthy stack - and one that is secure by design. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/15556851-active-cyber-zone-interview-with-ron-perez-intel-chief-security-architect-on-confidential-computing.mp3" length="39673225" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15556851</guid>
    <pubDate>Sun, 11 Aug 2024 20:00:00 -0400</pubDate>
    <itunes:duration>3303</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Alison King, VP of Forescout Technologies, Talks About Government Cybersecurity Policy on the Active Cyber™ Zone</itunes:title>
    <title>Alison King, VP of Forescout Technologies, Talks About Government Cybersecurity Policy on the Active Cyber™ Zone</title>
    <itunes:summary><![CDATA[Send a text Alison King, VP of Government Affairs of Forescout Technologies, joins Chris Daly in the Active Cyber Zone to discuss government policies across a range of cyber topics and technologies. Ali was deeply involved in the crafting of multiple federal cyber reports and doctrinal materials durng her time as a civil servant. Now she leads Forescout's government policy efforts for the progress still being made in improving active cyber defenses through the public-private cooperative initi...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Alison King, VP of Government Affairs of Forescout Technologies, joins Chris Daly in the Active Cyber Zone to discuss government policies across a range of cyber topics and technologies. Ali was deeply involved in the crafting of multiple federal cyber reports and doctrinal materials durng her time as a civil servant. Now she leads Forescout&apos;s government policy efforts for the progress still being made in improving active cyber defenses through the public-private cooperative initiatives for cyber.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Alison King, VP of Government Affairs of Forescout Technologies, joins Chris Daly in the Active Cyber Zone to discuss government policies across a range of cyber topics and technologies. Ali was deeply involved in the crafting of multiple federal cyber reports and doctrinal materials durng her time as a civil servant. Now she leads Forescout&apos;s government policy efforts for the progress still being made in improving active cyber defenses through the public-private cooperative initiatives for cyber.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/15429354-alison-king-vp-of-forescout-technologies-talks-about-government-cybersecurity-policy-on-the-active-cyber-zone.mp3" length="33585358" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15429354</guid>
    <pubDate>Wed, 17 Jul 2024 10:00:00 -0400</pubDate>
    <itunes:duration>2795</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Learn About the Cybersecurity Maturity Model Certification (CMMC) From Two Government Experts</itunes:title>
    <title>Learn About the Cybersecurity Maturity Model Certification (CMMC) From Two Government Experts</title>
    <itunes:summary><![CDATA[Send a text The  Cybersecurity Maturity Model Certification (CMMC) is a DoD initiative to help secure the supply chain of controlled unclassified information (CUI). Run out of the DoD CIO office, and required through DoD acquisition provisions, it requires contractors and integrators to meet stringent security measures to protect CUI. Learn about the CMMC process, how it evolved, its status today, and some things you can do to prepare for and pass the CMMC assessments, including some too...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>The  Cybersecurity Maturity Model Certification (CMMC) is a DoD initiative to help secure the supply chain of controlled unclassified information (CUI). Run out of the DoD CIO office, and required through DoD acquisition provisions, it requires contractors and integrators to meet stringent security measures to protect CUI. Learn about the CMMC process, how it evolved, its status today, and some things you can do to prepare for and pass the CMMC assessments, including some tools you will need such as KDM Analytics&apos; Blade RiskManager. </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>The  Cybersecurity Maturity Model Certification (CMMC) is a DoD initiative to help secure the supply chain of controlled unclassified information (CUI). Run out of the DoD CIO office, and required through DoD acquisition provisions, it requires contractors and integrators to meet stringent security measures to protect CUI. Learn about the CMMC process, how it evolved, its status today, and some things you can do to prepare for and pass the CMMC assessments, including some tools you will need such as KDM Analytics&apos; Blade RiskManager. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/15416676-learn-about-the-cybersecurity-maturity-model-certification-cmmc-from-two-government-experts.mp3" length="48844697" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15416676</guid>
    <pubDate>Mon, 15 Jul 2024 11:00:00 -0400</pubDate>
    <itunes:duration>4067</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Learn How Ransomware Affects Government Agencies In This Active Cyber™ Interview with Jason Baker of GRIT</itunes:title>
    <title>Learn How Ransomware Affects Government Agencies In This Active Cyber™ Interview with Jason Baker of GRIT</title>
    <itunes:summary><![CDATA[Send a text I like returning each year to the AFCEA Technet Cyber Conference as it always has a lively exhibit hall and interesting panels and discussions. It is also focused quite a bit on government issues and solutions, although not exclusively, as members of the IC, DoD, and other federal agencies provide their insights into the trending cyber issues of the day. As a member of the media, I sometimes receive requests for interviews and this year I received one from GuidePoint Security for ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>I like returning each year to the <a href='https://events.afcea.org/AFCEACyber24/Public/enter.aspx'><b>AFCEA Technet Cyber Conference</b></a> as it always has a lively exhibit hall and interesting panels and discussions. It is also focused quite a bit on government issues and solutions, although not exclusively, as members of the IC, DoD, and other federal agencies provide their insights into the trending cyber issues of the day. As a member of the media, I sometimes receive requests for interviews and this year I received one from GuidePoint Security for Jason Baker, a senior member of the GuidePoint Research and Intelligence Team (GRIT). After doing a little research on the company I was excited to see them positioned to help on defending and mitigating ransomware attacks. I have been interested in learning how ransomware is affecting federal agencies, or government in general, so I was happy when Jason accepted my invite to do an interview / podcast. So you can listen to our interview and learn a little more about ransomware and how it affects our government agencies.</p><p> </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>I like returning each year to the <a href='https://events.afcea.org/AFCEACyber24/Public/enter.aspx'><b>AFCEA Technet Cyber Conference</b></a> as it always has a lively exhibit hall and interesting panels and discussions. It is also focused quite a bit on government issues and solutions, although not exclusively, as members of the IC, DoD, and other federal agencies provide their insights into the trending cyber issues of the day. As a member of the media, I sometimes receive requests for interviews and this year I received one from GuidePoint Security for Jason Baker, a senior member of the GuidePoint Research and Intelligence Team (GRIT). After doing a little research on the company I was excited to see them positioned to help on defending and mitigating ransomware attacks. I have been interested in learning how ransomware is affecting federal agencies, or government in general, so I was happy when Jason accepted my invite to do an interview / podcast. So you can listen to our interview and learn a little more about ransomware and how it affects our government agencies.</p><p> </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/15388329-learn-how-ransomware-affects-government-agencies-in-this-active-cyber-interview-with-jason-baker-of-grit.mp3" length="21965034" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15388329</guid>
    <pubDate>Wed, 10 Jul 2024 07:00:00 -0400</pubDate>
    <itunes:duration>1827</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Learn How Nucleus Security Takes Vulnerability Management To Next Level In This Interview With Active Cyber™</itunes:title>
    <title>Learn How Nucleus Security Takes Vulnerability Management To Next Level In This Interview With Active Cyber™</title>
    <itunes:summary><![CDATA[Send a text  Vulnerability management programs form the foundation of most managed security services and SOC efforts. Despite a plethora of scanning and discovery tools, I remember as a former SOC Manager how difficult it was to maintain comprehensive visibility of managed assets and to provide quick reaction to detected vulnerabilities. Remediation efforts were often laborious and it was difficult in many instances to know what to prioritize first. So I got excited when I ran across Nuc...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p> Vulnerability management programs form the foundation of most managed security services and SOC efforts. Despite a plethora of scanning and discovery tools, I remember as a former SOC Manager how difficult it was to maintain comprehensive visibility of managed assets and to provide quick reaction to detected vulnerabilities. Remediation efforts were often laborious and it was difficult in many instances to know what to prioritize first. So I got excited when I ran across Nucleus Security at a conference this past summer and saw how they are helping organizations take vulnerability management to the next level. I was delighted when Patrick Garrity, a researcher and VP at Nucleus, agreed to sit down and talk to me about Nucleus. So learn more about Nucleus Security in this podcast with Active Cyber™.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p> Vulnerability management programs form the foundation of most managed security services and SOC efforts. Despite a plethora of scanning and discovery tools, I remember as a former SOC Manager how difficult it was to maintain comprehensive visibility of managed assets and to provide quick reaction to detected vulnerabilities. Remediation efforts were often laborious and it was difficult in many instances to know what to prioritize first. So I got excited when I ran across Nucleus Security at a conference this past summer and saw how they are helping organizations take vulnerability management to the next level. I was delighted when Patrick Garrity, a researcher and VP at Nucleus, agreed to sit down and talk to me about Nucleus. So learn more about Nucleus Security in this podcast with Active Cyber™.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/14063596-learn-how-nucleus-security-takes-vulnerability-management-to-next-level-in-this-interview-with-active-cyber.mp3" length="36098655" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14063596</guid>
    <pubDate>Mon, 04 Dec 2023 00:00:00 -0500</pubDate>
    <itunes:duration>3005</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Learn the Fundamentals of Managed Security Services Providers in this podcast interview wwith Members of Securely Managed LLC</itunes:title>
    <title>Learn the Fundamentals of Managed Security Services Providers in this podcast interview wwith Members of Securely Managed LLC</title>
    <itunes:summary><![CDATA[Send a text Chris Daly sits down with two members of Securely Managed LLC to discuss the day-to-day operations of a MSSP and a SOC as a service. Richard Cozart, Security Architect, and Michael Staley, SOC Director, go over the ins and outs of running 24/7 managed security services and review some of the fundamental technologies that make a SOC go. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Chris Daly sits down with two members of Securely Managed LLC to discuss the day-to-day operations of a MSSP and a SOC as a service. Richard Cozart, Security Architect, and Michael Staley, SOC Director, go over the ins and outs of running 24/7 managed security services and review some of the fundamental technologies that make a SOC go.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Chris Daly sits down with two members of Securely Managed LLC to discuss the day-to-day operations of a MSSP and a SOC as a service. Richard Cozart, Security Architect, and Michael Staley, SOC Director, go over the ins and outs of running 24/7 managed security services and review some of the fundamental technologies that make a SOC go.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/11244238-learn-the-fundamentals-of-managed-security-services-providers-in-this-podcast-interview-wwith-members-of-securely-managed-llc.mp3" length="18531864" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11244238</guid>
    <pubDate>Thu, 01 Sep 2022 13:00:00 -0400</pubDate>
    <itunes:duration>1541</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Active Cyber Discusses Cyber Readiness With Sajay Rai - CEO of Securely Yours LLC</itunes:title>
    <title>Active Cyber Discusses Cyber Readiness With Sajay Rai - CEO of Securely Yours LLC</title>
    <itunes:summary><![CDATA[Send a text Active Cyber sits down with Sajay Rai - CEO of Securely Yours - to discuss what it takes to be "cyber ready." Sajay dives into the consulting offerings of Securely Yours, describes the foundational standards and guides for becoming cyber ready, and discusses how different customers in different industries at different levels of maturity look at cyber readiness a little differently.  ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Active Cyber sits down with Sajay Rai - CEO of Securely Yours - to discuss what it takes to be &quot;cyber ready.&quot; Sajay dives into the consulting offerings of Securely Yours, describes the foundational standards and guides for becoming cyber ready, and discusses how different customers in different industries at different levels of maturity look at cyber readiness a little differently. </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Active Cyber sits down with Sajay Rai - CEO of Securely Yours - to discuss what it takes to be &quot;cyber ready.&quot; Sajay dives into the consulting offerings of Securely Yours, describes the foundational standards and guides for becoming cyber ready, and discusses how different customers in different industries at different levels of maturity look at cyber readiness a little differently. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/11167528-active-cyber-discusses-cyber-readiness-with-sajay-rai-ceo-of-securely-yours-llc.mp3" length="16851267" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11167528</guid>
    <pubDate>Mon, 22 Aug 2022 00:00:00 -0400</pubDate>
    <itunes:duration>1401</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Sajay Rai, CEO of Securely Managed LLC, Discusses MSSP Offerings with Active Cyber</itunes:title>
    <title>Sajay Rai, CEO of Securely Managed LLC, Discusses MSSP Offerings with Active Cyber</title>
    <itunes:summary><![CDATA[Send a text Chris Daly of Active Cyber sits down with Sajay Rai, CEO of Securely Managed LLC, a top 250 MSSP, to discuss the challenges of being a MSSP. He reveals how he customizes offerings and partners with leading vendors to meet the changing needs of his diverse customer set. He also discusses his journey from security consulting to MSSP and how his sister company - Securely Yours, which focuses on security consulting - provides a synergy that benefits his customers from risk assessments...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Chris Daly of Active Cyber sits down with Sajay Rai, CEO of Securely Managed LLC, a top 250 MSSP, to discuss the challenges of being a MSSP. He reveals how he customizes offerings and partners with leading vendors to meet the changing needs of his diverse customer set. He also discusses his journey from security consulting to MSSP and how his sister company - Securely Yours, which focuses on security consulting - provides a synergy that benefits his customers from risk assessments to bootstrapping new companies into a cost-effective and resilient security posture. Learn more about Securely Managed at https://securelymanaged.com/<br/>and Securely Yours at https://www.securelyyoursllc.com/</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Chris Daly of Active Cyber sits down with Sajay Rai, CEO of Securely Managed LLC, a top 250 MSSP, to discuss the challenges of being a MSSP. He reveals how he customizes offerings and partners with leading vendors to meet the changing needs of his diverse customer set. He also discusses his journey from security consulting to MSSP and how his sister company - Securely Yours, which focuses on security consulting - provides a synergy that benefits his customers from risk assessments to bootstrapping new companies into a cost-effective and resilient security posture. Learn more about Securely Managed at https://securelymanaged.com/<br/>and Securely Yours at https://www.securelyyoursllc.com/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/11113774-sajay-rai-ceo-of-securely-managed-llc-discusses-mssp-offerings-with-active-cyber.mp3" length="18572216" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11113774</guid>
    <pubDate>Wed, 10 Aug 2022 09:00:00 -0400</pubDate>
    <itunes:duration>1544</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Active Cyber™ Interviews Djenana Campara - CEO of KDM Analytics - On How Integrated Software Assurance Can Reduce Cyber Risk</itunes:title>
    <title>Active Cyber™ Interviews Djenana Campara - CEO of KDM Analytics - On How Integrated Software Assurance Can Reduce Cyber Risk</title>
    <itunes:summary><![CDATA[Send a text  Assuring the secure adoption of a new technology, assessing your software supply chain for risks, hunting for vulnerabilities in your infrastructure are all complex and challenging tasks - but ones that are critical to securing your business or government agency. Having specialized, automated tools that are seamlessly integrated using standard methods and interfaces can significantly reduce the complexity of these activities while increasing speed to capability. In particula...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p> Assuring the secure adoption of a new technology, assessing your software supply chain for risks, hunting for vulnerabilities in your infrastructure are all complex and challenging tasks - but ones that are critical to securing your business or government agency. Having specialized, automated tools that are seamlessly integrated using standard methods and interfaces can significantly reduce the complexity of these activities while increasing speed to capability. In particular, leveraging a software assurance ecosystem of integrated tools has proven to be an effective approach to managing security needs at an industrial scale. One example of a standards-based software assurance ecosystem effort can be found at the Open Management Group in the form of the <a href='https://www.omg.org/sysa/'><b>System Assurance Platform Level Task Force</b></a>. Headed by Djenana Campara of KDM Analytics, the Task Force aims to establish a <em>common framework</em> for analysis and exchange of information related to <em>system assurance and trustworthiness. </em>Ms. Campara has incorporated the work of this Task Force into her company&apos;s products that provide risk analytics. I was intrigued by how she combined risk analytics and model-based systems engineering to provide enterprise level risk assessments and thought the subject was worth exploring, especially given how risk management approaches are really moving to the forefront of needs given the software supply chain problems that seem to be coming up on a regular basis. So check out this Active Cyber™ podcast with Ms. Campara. </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p> Assuring the secure adoption of a new technology, assessing your software supply chain for risks, hunting for vulnerabilities in your infrastructure are all complex and challenging tasks - but ones that are critical to securing your business or government agency. Having specialized, automated tools that are seamlessly integrated using standard methods and interfaces can significantly reduce the complexity of these activities while increasing speed to capability. In particular, leveraging a software assurance ecosystem of integrated tools has proven to be an effective approach to managing security needs at an industrial scale. One example of a standards-based software assurance ecosystem effort can be found at the Open Management Group in the form of the <a href='https://www.omg.org/sysa/'><b>System Assurance Platform Level Task Force</b></a>. Headed by Djenana Campara of KDM Analytics, the Task Force aims to establish a <em>common framework</em> for analysis and exchange of information related to <em>system assurance and trustworthiness. </em>Ms. Campara has incorporated the work of this Task Force into her company&apos;s products that provide risk analytics. I was intrigued by how she combined risk analytics and model-based systems engineering to provide enterprise level risk assessments and thought the subject was worth exploring, especially given how risk management approaches are really moving to the forefront of needs given the software supply chain problems that seem to be coming up on a regular basis. So check out this Active Cyber™ podcast with Ms. Campara. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/9451450-active-cyber-interviews-djenana-campara-ceo-of-kdm-analytics-on-how-integrated-software-assurance-can-reduce-cyber-risk.mp3" length="21370954" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9451450</guid>
    <pubDate>Thu, 28 Oct 2021 16:00:00 -0400</pubDate>
    <itunes:duration>1777</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>ActiveCyber.net Interviews Groupsense and Airgap Networks on Joint Offering for Ransomware Response Service</itunes:title>
    <title>ActiveCyber.net Interviews Groupsense and Airgap Networks on Joint Offering for Ransomware Response Service</title>
    <itunes:summary><![CDATA[Send a text Kurtis Minder, CEO of Groupsense - a digital risk protection services company , and Ritesh Agrawal, CEO of Airgap Networks - a cybersecurity vendor of the industry’s first agentless Ransomware Kill Switch, met with Chris Daly in this podcast by ActiveCyber.net to discuss their partnership to help companies fight ransomware. Clients can microsegment their networks to automatically stop the spread of ransomware during the incident mitigation lifecycle and have a detailed and tested ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Kurtis Minder, CEO of Groupsense - a digital risk protection services company , and Ritesh Agrawal, CEO of Airgap Networks - a cybersecurity vendor of the industry’s first agentless Ransomware Kill Switch, met with Chris Daly in this podcast by ActiveCyber.net to discuss their partnership to help companies fight ransomware. Clients can microsegment their networks to automatically stop the spread of ransomware during the incident mitigation lifecycle and have a detailed and tested ransomware “playbook” for mitigating the damage caused by these cyberattacks by integrating GroupSense’s Ransomware Response Readiness Subscription (R3S) service offering with Airgap’s Ransomware Kill Switch annual SaaS subscription.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Kurtis Minder, CEO of Groupsense - a digital risk protection services company , and Ritesh Agrawal, CEO of Airgap Networks - a cybersecurity vendor of the industry’s first agentless Ransomware Kill Switch, met with Chris Daly in this podcast by ActiveCyber.net to discuss their partnership to help companies fight ransomware. Clients can microsegment their networks to automatically stop the spread of ransomware during the incident mitigation lifecycle and have a detailed and tested ransomware “playbook” for mitigating the damage caused by these cyberattacks by integrating GroupSense’s Ransomware Response Readiness Subscription (R3S) service offering with Airgap’s Ransomware Kill Switch annual SaaS subscription.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/8971514-activecyber-net-interviews-groupsense-and-airgap-networks-on-joint-offering-for-ransomware-response-service.mp3" length="17140024" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8971514</guid>
    <pubDate>Tue, 03 Aug 2021 21:00:00 -0400</pubDate>
    <itunes:duration>1425</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>ActiveCyber.net Podcast Interview with Corey White of Cyvatar</itunes:title>
    <title>ActiveCyber.net Podcast Interview with Corey White of Cyvatar</title>
    <itunes:summary><![CDATA[Send a text As a former SOC Director, I can appreciate the value of a cyber platform that provides the hygiene and cleaning of the network. Although the mantra of "assume breach" is often valid, we still need to pay close and continuous attention to preventative measures. That is also the target area of Cyvatar who provides a "Cybersecurity-as-a-Service" offering. I got a chance to learn more about this offering from the start-up's co-founder - Corey White. Listen to the podcast to learn more...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>As a former SOC Director, I can appreciate the value of a cyber platform that provides the hygiene and cleaning of the network. Although the mantra of &quot;assume breach&quot; is often valid, we still need to pay close and continuous attention to preventative measures. That is also the target area of Cyvatar who provides a &quot;Cybersecurity-as-a-Service&quot; offering. I got a chance to learn more about this offering from the start-up&apos;s co-founder - Corey White. Listen to the podcast to learn more about how Cyvatar&apos;s platform works and how the company&apos;s plans to &quot;democratize&quot; cybersecurity should pay dividends to customers large and small.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>As a former SOC Director, I can appreciate the value of a cyber platform that provides the hygiene and cleaning of the network. Although the mantra of &quot;assume breach&quot; is often valid, we still need to pay close and continuous attention to preventative measures. That is also the target area of Cyvatar who provides a &quot;Cybersecurity-as-a-Service&quot; offering. I got a chance to learn more about this offering from the start-up&apos;s co-founder - Corey White. Listen to the podcast to learn more about how Cyvatar&apos;s platform works and how the company&apos;s plans to &quot;democratize&quot; cybersecurity should pay dividends to customers large and small.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/8966862-activecyber-net-podcast-interview-with-corey-white-of-cyvatar.mp3" length="18514495" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8966862</guid>
    <pubDate>Tue, 03 Aug 2021 08:00:00 -0400</pubDate>
    <itunes:duration>1539</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>ActiveCyber Interview with John Morgan, CEO of Confluera</itunes:title>
    <title>ActiveCyber Interview with John Morgan, CEO of Confluera</title>
    <itunes:summary><![CDATA[Send a text This week is a busy week for those getting ready for Black Hat and Defcon. So I felt very lucky to land an interview with John Morgan - the CEO of Confluera, a cybersecurity start-up focused on endpoint detection and response. Learn how Confluera's innovative storyboarding platform provides enhanced insights for runtime threat detection and response. Find out why they are focused on the cloud and learn about how they differentiate in the crowded XDR market in this podcast intervie...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>This week is a busy week for those getting ready for Black Hat and Defcon. So I felt very lucky to land an interview with John Morgan - the CEO of Confluera, a cybersecurity start-up focused on endpoint detection and response. Learn how Confluera&apos;s innovative storyboarding platform provides enhanced insights for runtime threat detection and response. Find out why they are focused on the cloud and learn about how they differentiate in the crowded XDR market in this podcast interview with Chris Daly of ActiveCyber.net. </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>This week is a busy week for those getting ready for Black Hat and Defcon. So I felt very lucky to land an interview with John Morgan - the CEO of Confluera, a cybersecurity start-up focused on endpoint detection and response. Learn how Confluera&apos;s innovative storyboarding platform provides enhanced insights for runtime threat detection and response. Find out why they are focused on the cloud and learn about how they differentiate in the crowded XDR market in this podcast interview with Chris Daly of ActiveCyber.net. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/8934264-activecyber-interview-with-john-morgan-ceo-of-confluera.mp3" length="18995347" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8934264</guid>
    <pubDate>Tue, 27 Jul 2021 21:00:00 -0400</pubDate>
    <itunes:duration>1580</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Active Cyber Podcast: ADS and KDM Analytics Unveil New Risk Assessment Tool </itunes:title>
    <title>Active Cyber Podcast: ADS and KDM Analytics Unveil New Risk Assessment Tool </title>
    <itunes:summary><![CDATA[Send a text Djenana Campara, CEO of KDM Analytics along with Steve Seiden, President of AcquireData Solutions (ADS) and Dr. Tony Barber discuss the features and benefits of the Blade Risk Assessment tool. Blade applies a model-based systems engineering approach to risk assessment while using NIST RMF controls to provide a strong foundation for developing mitigations for identified risk areas. ADS, with over 20 years of test engineering credentials, is well positioned to take Blade to the Oper...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Djenana Campara, CEO of KDM Analytics along with Steve Seiden, President of AcquireData Solutions (ADS) and Dr. Tony Barber discuss the features and benefits of the Blade Risk Assessment tool. Blade applies a model-based systems engineering approach to risk assessment while using NIST RMF controls to provide a strong foundation for developing mitigations for identified risk areas. ADS, with over 20 years of test engineering credentials, is well positioned to take Blade to the Operational Technology marketplace as it looks to merge OT and IT safety, security, and resiliency needs. Chris Daly of Active Cyber hosts this whirlwind discussion. </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Djenana Campara, CEO of KDM Analytics along with Steve Seiden, President of AcquireData Solutions (ADS) and Dr. Tony Barber discuss the features and benefits of the Blade Risk Assessment tool. Blade applies a model-based systems engineering approach to risk assessment while using NIST RMF controls to provide a strong foundation for developing mitigations for identified risk areas. ADS, with over 20 years of test engineering credentials, is well positioned to take Blade to the Operational Technology marketplace as it looks to merge OT and IT safety, security, and resiliency needs. Chris Daly of Active Cyber hosts this whirlwind discussion. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/2806459-active-cyber-podcast-ads-and-kdm-analytics-unveil-new-risk-assessment-tool.mp3" length="22990435" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2806459</guid>
    <pubDate>Fri, 21 Feb 2020 14:00:00 -0500</pubDate>
    <itunes:duration>1912</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Active Cyber Podcast with John - Founder of New Augmented Reality Start-up</itunes:title>
    <title>Active Cyber Podcast with John - Founder of New Augmented Reality Start-up</title>
    <itunes:summary><![CDATA[Send a text John D - the founder of AR start-up Virfiti - describes some of the use cases, technology and opportunities in the field of augmented reality in this interview with Chris Daly of Active Cyber.net. Learn how SLAM, Unity3D, meshed point clouds, blockchain, image recognition, social media all play together as John takes us through a technology journey that will become a disrupter and major change agent in our everyday lives. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>John D - the founder of AR start-up Virfiti - describes some of the use cases, technology and opportunities in the field of augmented reality in this interview with Chris Daly of Active Cyber.net. Learn how SLAM, Unity3D, meshed point clouds, blockchain, image recognition, social media all play together as John takes us through a technology journey that will become a disrupter and major change agent in our everyday lives.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>John D - the founder of AR start-up Virfiti - describes some of the use cases, technology and opportunities in the field of augmented reality in this interview with Chris Daly of Active Cyber.net. Learn how SLAM, Unity3D, meshed point clouds, blockchain, image recognition, social media all play together as John takes us through a technology journey that will become a disrupter and major change agent in our everyday lives.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/1512028-active-cyber-podcast-with-john-founder-of-new-augmented-reality-start-up.mp3" length="23341363" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber / John D of Virfiti</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1512028</guid>
    <pubDate>Tue, 06 Aug 2019 11:00:00 -0400</pubDate>
    <itunes:duration>1942</itunes:duration>
    <itunes:keywords>augmented reality, AR</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Active Cyber Podcast with Air Force MG Earl Matthews (Ret) of Verodin, Inc.</itunes:title>
    <title>Active Cyber Podcast with Air Force MG Earl Matthews (Ret) of Verodin, Inc.</title>
    <itunes:summary><![CDATA[Send a text Chris Daly of Active Cyber and Major General Matthews discuss emerging cyber issues, the role of security instrumentation platforms such as Verodin, and emerging IoT security requirements. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Chris Daly of Active Cyber and Major General Matthews discuss emerging cyber issues, the role of security instrumentation platforms such as Verodin, and emerging IoT security requirements.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/439093/open_sms">Send a text</a></p><p>Chris Daly of Active Cyber and Major General Matthews discuss emerging cyber issues, the role of security instrumentation platforms such as Verodin, and emerging IoT security requirements.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/439093/episodes/1472506-active-cyber-podcast-with-air-force-mg-earl-matthews-ret-of-verodin-inc.mp3" length="24751136" type="audio/mpeg" />
    <itunes:author>Chris Daly of Active Cyber / MG Earl Matthews (Ret) of Verodin</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1472506</guid>
    <pubDate>Mon, 29 Jul 2019 11:00:00 -0400</pubDate>
    <itunes:duration>2059</itunes:duration>
    <itunes:keywords>Verodin, security instrumentation, active cyber</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
