<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/660007.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Secure AF - A Cybersecurity Podcast</title>

  <lastBuildDate>Thu, 09 Apr 2026 09:11:18 -0400</lastBuildDate>
  <link>https://aliascybersecurity.com/</link>
  <language>en-us</language>
  <copyright>© 2026 Secure AF - A Cybersecurity Podcast</copyright>
  <podcast:locked>yes</podcast:locked>
  <podcast:funding url="https://www.buzzsprout.com/660007/support">Support this Podcast</podcast:funding>
  <podcast:guid>a588aa1f-b756-51ea-a6c1-d8d0b6470068</podcast:guid>
<podcast:podroll>
    <podcast:remoteItem feedGuid="e8428525-a6ee-5913-8bcf-0b1bc80400ca" feedUrl="https://feeds.buzzsprout.com/2275094.rss" />
  </podcast:podroll>
  <itunes:author>Alias Cybersecurity</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p><b>Think like a hacker. Defend like a pro.</b><br><br></p><p>Welcome to the <b>Secure AF Cybersecurity Podcast</b> — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including&nbsp;<b>Donovan Farrow</b> and <b>Jonathan Kimmitt</b>, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape.</p><p><br></p><p>Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insights, expert interviews, and unfiltered discussions with Alias team members and top-tier guests from across the cybersecurity spectrum.</p><p><br></p><p>Stay sharp. Stay informed.<b> Stay Secure AF.</b></p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>cyber security, cybersecurity, information security, infosec, technology, digital forensics, hacking, digital security, alias</itunes:keywords>
  <itunes:owner>
    <itunes:name>Alias Cybersecurity</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/66gdx5am5uknmu4ttmz2etpgicq9?.jpg</url>
     <title>Secure AF - A Cybersecurity Podcast</title>
     <link>https://aliascybersecurity.com/</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/66gdx5am5uknmu4ttmz2etpgicq9?.jpg" />
  <itunes:category text="Technology" />
  <itunes:category text="Business" />
  <itunes:category text="Education" />
  <item>
    <itunes:title>Google Chrome Zero-Days Under Active Attack – What SOCs Need to Do Now</itunes:title>
    <title>Google Chrome Zero-Days Under Active Attack – What SOCs Need to Do Now</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Chrome just became the attack surface of the week.   We’re breaking down the latest zero-day exploits, what attackers are doing with them, and how SOC teams can respond before it turns into something bigger.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><em>Chrome just became the attack surface of the week.<br/></em><br/></p><p>We’re breaking down the latest zero-day exploits, what attackers are doing with them, and how SOC teams can respond before it turns into something bigger. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><em>Chrome just became the attack surface of the week.<br/></em><br/></p><p>We’re breaking down the latest zero-day exploits, what attackers are doing with them, and how SOC teams can respond before it turns into something bigger. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18950343-google-chrome-zero-days-under-active-attack-what-socs-need-to-do-now.mp3" length="3946818" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/egtaeqrb8n89ozxd1uvwogaolapa?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18950343</guid>
    <pubDate>Wed, 08 Apr 2026 12:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/660007/18950343/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18950343/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18950343/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18950343/transcript.vtt" type="text/vtt" />
    <itunes:duration>327</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Beyond the Network: The Rise of Medical Device Security</itunes:title>
    <title>Beyond the Network: The Rise of Medical Device Security</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Healthcare security isn’t just about networks anymore.  In this episode, we dive into the complex world of connected medical devices, the challenges of securing them, and why organizations need a more holistic approach to cybersecurity. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><em>Healthcare security isn’t just about networks anymore. </em></p><p>In this episode, we dive into the complex world of connected medical devices, the challenges of securing them, and why organizations need a more holistic approach to cybersecurity.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><em>Healthcare security isn’t just about networks anymore. </em></p><p>In this episode, we dive into the complex world of connected medical devices, the challenges of securing them, and why organizations need a more holistic approach to cybersecurity.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18930415-beyond-the-network-the-rise-of-medical-device-security.mp3" length="19643973" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/c9hd72kgizfegyij4h8vdy346ahi?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18930415</guid>
    <pubDate>Tue, 07 Apr 2026 11:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/660007/18930415/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18930415/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18930415/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18930415/transcript.vtt" type="text/vtt" />
    <itunes:duration>1633</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Interlock Ransomware Hits Cisco FMC Zero-Day: Lessons for SOCs on Edge Device Security</itunes:title>
    <title>Interlock Ransomware Hits Cisco FMC Zero-Day: Lessons for SOCs on Edge Device Security</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Your firewall could be the entry point. A critical Cisco FMC zero-day is being used in real-world ransomware attacks, turning security tools into launchpads.  In this episode, we cover what’s happening, how attackers are exploiting edge devices, and how SOC teams can stay ahead. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b><em>Your firewall could be the entry point. </em></b>A critical Cisco FMC zero-day is being used in real-world ransomware attacks, turning security tools into launchpads. </p><p>In this episode, we cover what’s happening, how attackers are exploiting edge devices, and how SOC teams can stay ahead.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b><em>Your firewall could be the entry point. </em></b>A critical Cisco FMC zero-day is being used in real-world ransomware attacks, turning security tools into launchpads. </p><p>In this episode, we cover what’s happening, how attackers are exploiting edge devices, and how SOC teams can stay ahead.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18908347-interlock-ransomware-hits-cisco-fmc-zero-day-lessons-for-socs-on-edge-device-security.mp3" length="4232421" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/nmmvwruwdue33yjya1gl3hd5tqzx?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18908347</guid>
    <pubDate>Wed, 01 Apr 2026 12:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/660007/18908347/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18908347/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18908347/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18908347/transcript.vtt" type="text/vtt" />
    <itunes:duration>350</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Chinese Hackers Breach FBI Surveillance Network: Supply-Chain Lessons for SOCs</itunes:title>
    <title>Chinese Hackers Breach FBI Surveillance Network: Supply-Chain Lessons for SOCs</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Suspected Chinese state-linked hackers breached an FBI surveillance network ... not by breaking through the front door, but through a third-party provider. In this episode of the #SOCBrief, we break down how the attack happened, why supply chain vulnerabilities are one of the biggest risks facing SOC teams today, and what this means for organizations of all sizes. From compromised vendor access to real-world detection strategies, we’re covering how ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Suspected Chinese state-linked hackers breached an FBI surveillance network ... not by breaking through the front door, but through a third-party provider.</p><p>In this episode of the <b>#SOCBrief,</b> we break down how the attack happened, why supply chain vulnerabilities are one of the biggest risks facing SOC teams today, and what this means for organizations of all sizes. From compromised vendor access to real-world detection strategies, we’re covering how attackers are exploiting trusted connections, and how you can stay one step ahead.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Suspected Chinese state-linked hackers breached an FBI surveillance network ... not by breaking through the front door, but through a third-party provider.</p><p>In this episode of the <b>#SOCBrief,</b> we break down how the attack happened, why supply chain vulnerabilities are one of the biggest risks facing SOC teams today, and what this means for organizations of all sizes. From compromised vendor access to real-world detection strategies, we’re covering how attackers are exploiting trusted connections, and how you can stay one step ahead.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18874834-chinese-hackers-breach-fbi-surveillance-network-supply-chain-lessons-for-socs.mp3" length="4192281" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/k4dbmfvfvdz5dyp1al781iwpp4gt?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18874834</guid>
    <pubDate>Wed, 25 Mar 2026 12:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/660007/18874834/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18874834/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18874834/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18874834/transcript.vtt" type="text/vtt" />
    <itunes:duration>347</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ransomware as a Business: Inside Qilin’s Rise</itunes:title>
    <title>Ransomware as a Business: Inside Qilin’s Rise</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Qilin is quickly becoming one of the most dominant ransomware groups in the world, and it’s not because of groundbreaking tactics. It’s because of their business model. In this episode, we break down how Qilin operates as a ransomware-as-a-service group, why affiliates are flocking to them (hint: 80–85% payouts), and how that’s fueling explosive growth across industries worldwide. From real-world attack patterns to how they gain access and evade det...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b><em>Qilin</em></b> is quickly becoming one of the most dominant ransomware groups in the world, and it’s not because of groundbreaking tactics. It’s because of their business model.</p><p>In this episode, we break down how <b><em>Qilin </em></b>operates as a ransomware-as-a-service group, why affiliates are flocking to them (hint: 80–85% payouts), and how that’s fueling explosive growth across industries worldwide. From real-world attack patterns to how they gain access and evade detection, we’re diving into what makes this group so effective, and why organizations should be paying attention. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b><em>Qilin</em></b> is quickly becoming one of the most dominant ransomware groups in the world, and it’s not because of groundbreaking tactics. It’s because of their business model.</p><p>In this episode, we break down how <b><em>Qilin </em></b>operates as a ransomware-as-a-service group, why affiliates are flocking to them (hint: 80–85% payouts), and how that’s fueling explosive growth across industries worldwide. From real-world attack patterns to how they gain access and evade detection, we’re diving into what makes this group so effective, and why organizations should be paying attention. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18875198-ransomware-as-a-business-inside-qilin-s-rise.mp3" length="28400206" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zvegr3b9o2f51fxwptzxd6x2hbv8?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18875198</guid>
    <pubDate>Tue, 24 Mar 2026 11:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/660007/18875198/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18875198/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18875198/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18875198/transcript.vtt" type="text/vtt" />
    <itunes:duration>2362</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>MuddyWater&#39;s New BugSleep Malware – Iran&#39;s Cyber Retaliation Ramps Up</itunes:title>
    <title>MuddyWater&#39;s New BugSleep Malware – Iran&#39;s Cyber Retaliation Ramps Up</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In this episode of the #SOCBrief, we break down BugSleep, a new backdoor malware tied to the Iranian threat group MuddyWater, and how it’s being used in targeted spear-phishing campaigns against organizations.  Learn how the malware works, what indicators SOC teams should watch for, and practical steps to detect and defend against these evolving attacks.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Ap...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode of the<b> #SOCBrief</b>, we break down <b>BugSleep</b>, a new backdoor malware tied to the Iranian threat group MuddyWater, and how it’s being used in targeted spear-phishing campaigns against organizations. </p><p>Learn how the malware works, what indicators SOC teams should watch for, and practical steps to detect and defend against these evolving attacks. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode of the<b> #SOCBrief</b>, we break down <b>BugSleep</b>, a new backdoor malware tied to the Iranian threat group MuddyWater, and how it’s being used in targeted spear-phishing campaigns against organizations. </p><p>Learn how the malware works, what indicators SOC teams should watch for, and practical steps to detect and defend against these evolving attacks. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18857050-muddywater-s-new-bugsleep-malware-iran-s-cyber-retaliation-ramps-up.mp3" length="4955247" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kis3q1vjqtkmwqyyqgn683m3x7ib?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18857050</guid>
    <pubDate>Wed, 18 Mar 2026 12:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/660007/18857050/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18857050/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18857050/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18857050/transcript.vtt" type="text/vtt" />
    <itunes:duration>411</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>🚨 The Telus Hack – ShinyHunters Strikes a Telecom Giant 🚨</itunes:title>
    <title>🚨 The Telus Hack – ShinyHunters Strikes a Telecom Giant 🚨</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! A massive breach has shaken the telecom world.  In this episode of the #SOCBrief, we break down the alleged TELUS hack claimed by the ShinyHunters threat group, what data may have been stolen, and why the potential exfiltration of massive datasets could have far-reaching consequences for organizations worldwide. From OAuth tokens and API keys to customer PII and enterprise systems, we explore how attacks like this unfold and what organizations ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>A <b><em>massive</em></b> breach has shaken the telecom world. </p><p>In this episode of the #<em>SOCBrief</em>, we break down the alleged TELUS hack claimed by the ShinyHunters threat group, what data may have been stolen, and why the potential exfiltration of massive datasets could have far-reaching consequences for organizations worldwide. From OAuth tokens and API keys to customer PII and enterprise systems, we explore how attacks like this unfold and what organizations should be on the lookout. <br/><br/>🎧 <b>Tune in now at </b><a href='http://secureafpodcast.com'><b>secureafpodcast.com</b></a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>A <b><em>massive</em></b> breach has shaken the telecom world. </p><p>In this episode of the #<em>SOCBrief</em>, we break down the alleged TELUS hack claimed by the ShinyHunters threat group, what data may have been stolen, and why the potential exfiltration of massive datasets could have far-reaching consequences for organizations worldwide. From OAuth tokens and API keys to customer PII and enterprise systems, we explore how attacks like this unfold and what organizations should be on the lookout. <br/><br/>🎧 <b>Tune in now at </b><a href='http://secureafpodcast.com'><b>secureafpodcast.com</b></a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18842556-the-telus-hack-shinyhunters-strikes-a-telecom-giant.mp3" length="8150167" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/d8l2bm8fgy435asapvve1xjb8t5q?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18842556</guid>
    <pubDate>Fri, 13 Mar 2026 12:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/660007/18842556/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18842556/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18842556/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18842556/transcript.vtt" type="text/vtt" />
    <itunes:duration>678</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A.I. as a Multiplier: Introducing Vector Pulse A.I.</itunes:title>
    <title>A.I. as a Multiplier: Introducing Vector Pulse A.I.</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! A.I. conversations are everywhere ... but how can businesses realistically use it today? In this episode of Secure AF, we introduce Vector Pulse A.I. and discuss how A.I. can help organizations automate workflows, improve operational efficiency, and support smarter decision-making.  We also dive into the growing excitement (and concerns) around A.I., common mistakes companies make when adopting it, and practical advice for leaders looking to ex...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>A.I. conversations are everywhere ... but how can businesses realistically use it today? In this episode of Secure AF, we introduce <b>Vector Pulse A.I.</b> and discuss how A.I. can help organizations automate workflows, improve operational efficiency, and support smarter decision-making. </p><p>We also dive into the growing excitement (and concerns) around A.I., common mistakes companies make when adopting it, and practical advice for leaders looking to explore A.I. responsibly.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>A.I. conversations are everywhere ... but how can businesses realistically use it today? In this episode of Secure AF, we introduce <b>Vector Pulse A.I.</b> and discuss how A.I. can help organizations automate workflows, improve operational efficiency, and support smarter decision-making. </p><p>We also dive into the growing excitement (and concerns) around A.I., common mistakes companies make when adopting it, and practical advice for leaders looking to explore A.I. responsibly.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18830001-a-i-as-a-multiplier-introducing-vector-pulse-a-i.mp3" length="30540547" type="audio/mpeg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18830001</guid>
    <pubDate>Thu, 12 Mar 2026 11:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/660007/18830001/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18830001/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18830001/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/18830001/transcript.vtt" type="text/vtt" />
    <itunes:duration>2541</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Heightened Cyber Threats Amid U.S.-Iran Conflict Escalation</itunes:title>
    <title>Heightened Cyber Threats Amid U.S.-Iran Conflict Escalation</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Geopolitical tensions are rising ... and cyber threats aren’t far behind. In this episode of the #SOCBrief, we break down the escalating U.S.-Iran conflict, the potential cyber retaliation from Iranian threat actors, and the steps SOC teams can take now to stay ahead of attacks and protect critical systems. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Geopolitical tensions are rising ... and cyber threats aren’t far behind. In this episode of the <b>#SOCBrief</b>, we break down the escalating U.S.-Iran conflict, the potential cyber retaliation from Iranian threat actors, and the steps SOC teams can take now to stay ahead of attacks and protect critical systems.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Geopolitical tensions are rising ... and cyber threats aren’t far behind. In this episode of the <b>#SOCBrief</b>, we break down the escalating U.S.-Iran conflict, the potential cyber retaliation from Iranian threat actors, and the steps SOC teams can take now to stay ahead of attacks and protect critical systems.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18814928-heightened-cyber-threats-amid-u-s-iran-conflict-escalation.mp3" length="4159642" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gtz17ricqv4bi3e84isi5xvvhz4y?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18814928</guid>
    <pubDate>Wed, 11 Mar 2026 12:00:00 -0500</pubDate>
    <itunes:duration>344</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>OSINT Essentials – Unlocking Not So Hidden Insights for Your SOC</itunes:title>
    <title>OSINT Essentials – Unlocking Not So Hidden Insights for Your SOC</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Open-source intelligence (OSINT) isn’t just for threat actors ... it’s a powerful advantage for SOC teams too. In this episode, we break down how publicly available data can help you uncover exposed assets, detect vulnerabilities early, and shrink your attack surface before attackers do. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Open-source intelligence <b><em>(OSINT)</em></b> isn’t just for threat actors ... it’s a powerful advantage for SOC teams too. In this episode, we break down how publicly available data can help you uncover exposed assets, detect vulnerabilities early, and shrink your attack surface before attackers do.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Open-source intelligence <b><em>(OSINT)</em></b> isn’t just for threat actors ... it’s a powerful advantage for SOC teams too. In this episode, we break down how publicly available data can help you uncover exposed assets, detect vulnerabilities early, and shrink your attack surface before attackers do.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18774958-osint-essentials-unlocking-not-so-hidden-insights-for-your-soc.mp3" length="4414189" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/c7bi44yu9mp8v5pfo6rt01qmvikp?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18774958</guid>
    <pubDate>Wed, 04 Mar 2026 12:00:00 -0600</pubDate>
    <itunes:duration>365</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talking SOC Shop: How SOCs Show Value to Leadership 📈</itunes:title>
    <title>Talking SOC Shop: How SOCs Show Value to Leadership 📈</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This episode of the #SOCBrief goes beyond day-to-day cybersecurity news and dives into what SOC success actually looks like from the leadership side. Andrew and CISO Jonathan Kimmitt discuss how SOC teams can communicate risk, create meaningful deliverables, use metrics effectively, and gain leadership buy-in for security decisions. From risk profiles to reporting and real-world decision making, this episode focuses on turning SOC activity into meas...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This episode of the <b>#</b><b><em>SOCBrief</em></b> goes beyond day-to-day cybersecurity news and dives into what SOC success actually looks like from the leadership side. Andrew and CISO Jonathan Kimmitt discuss how SOC teams can communicate risk, create meaningful deliverables, use metrics effectively, and gain leadership buy-in for security decisions.</p><p>From risk profiles to reporting and real-world decision making, this episode focuses on turning SOC activity into measurable organizational value. 📊</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This episode of the <b>#</b><b><em>SOCBrief</em></b> goes beyond day-to-day cybersecurity news and dives into what SOC success actually looks like from the leadership side. Andrew and CISO Jonathan Kimmitt discuss how SOC teams can communicate risk, create meaningful deliverables, use metrics effectively, and gain leadership buy-in for security decisions.</p><p>From risk profiles to reporting and real-world decision making, this episode focuses on turning SOC activity into measurable organizational value. 📊</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18713163-talking-soc-shop-how-socs-show-value-to-leadership.mp3" length="8798979" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/p7mass8a0krma2z8inqcn29dmbb5?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18713163</guid>
    <pubDate>Wed, 25 Feb 2026 12:00:00 -0600</pubDate>
    <itunes:duration>731</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Keeping AI Human-Centered in Digital Forensics 🧑‍💻⚖️</itunes:title>
    <title>Keeping AI Human-Centered in Digital Forensics 🧑‍💻⚖️</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! AI can categorize images, analyze logs, and surface patterns faster than any human ever could, but it doesn’t understand context, legality, or nuance. In this episode, we discuss how AI is transforming criminal forensics and SOC investigations while examining the ethical, legal, and operational guardrails that must stay in place. As organizations adopt more AI-driven tools, the real challenge isn’t capability ... it’s maintaining responsible human c...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>AI can categorize images, analyze logs, and surface patterns faster than any human ever could, but it doesn’t understand context, legality, or nuance. In this episode, we discuss how AI is transforming criminal forensics and SOC investigations while examining the ethical, legal, and operational guardrails that must stay in place. As organizations adopt more AI-driven tools, the real challenge isn’t capability ... it’s maintaining responsible human control. 💻🔍</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>AI can categorize images, analyze logs, and surface patterns faster than any human ever could, but it doesn’t understand context, legality, or nuance. In this episode, we discuss how AI is transforming criminal forensics and SOC investigations while examining the ethical, legal, and operational guardrails that must stay in place. As organizations adopt more AI-driven tools, the real challenge isn’t capability ... it’s maintaining responsible human control. 💻🔍</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18731017-keeping-ai-human-centered-in-digital-forensics.mp3" length="29944260" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/twl56a5hp3z1hzw4lzclwf7mokre?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18731017</guid>
    <pubDate>Tue, 24 Feb 2026 11:00:00 -0600</pubDate>
    <itunes:duration>2491</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SmarterMail RCE Flaw – Ransomware&#39;s New Favorite Door</itunes:title>
    <title>SmarterMail RCE Flaw – Ransomware&#39;s New Favorite Door</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! No phishing. No user interaction. Just exposed services and a missing authentication check. In this episode of the #SOCBrief, we dive into the SmarterMail RCE flaw already being exploited in the wild and why mail servers continue to be prime ransomware targets. We cover indicators to hunt for, detection tips, and practical steps SOC teams can take to reduce risk fast. 🛡️ Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>No phishing. No user interaction. Just exposed services and a missing authentication check. In this episode of the #SOCBrief, we dive into the SmarterMail RCE flaw already being exploited in the wild and why mail servers continue to be prime ransomware targets. We cover indicators to hunt for, detection tips, and practical steps SOC teams can take to reduce risk fast. 🛡️</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>No phishing. No user interaction. Just exposed services and a missing authentication check. In this episode of the #SOCBrief, we dive into the SmarterMail RCE flaw already being exploited in the wild and why mail servers continue to be prime ransomware targets. We cover indicators to hunt for, detection tips, and practical steps SOC teams can take to reduce risk fast. 🛡️</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18671154-smartermail-rce-flaw-ransomware-s-new-favorite-door.mp3" length="4808198" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/w5sfej2i1m0v269ydmggmvabvaoa?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18671154</guid>
    <pubDate>Wed, 18 Feb 2026 12:00:00 -0600</pubDate>
    <itunes:duration>398</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>MSI Mayhem – RATs Hiding in Phishing Installers to Evade Detection 🧠</itunes:title>
    <title>MSI Mayhem – RATs Hiding in Phishing Installers to Evade Detection 🧠</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Attackers are hiding remote access trojans (RATs) inside malicious MSI installers disguised as legit software, and it’s surging in early 2026. We break down how these phishing attacks bypass EDR, what to look for, and how SOC teams can stop them before they turn into full-blown breaches.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Attackers are hiding <b>remote access trojans (RATs)</b> inside <b>malicious MSI installers</b> disguised as legit software, and it’s surging in early 2026. We break down how these phishing attacks bypass EDR, what to look for, and how SOC teams can stop them before they turn into full-blown breaches. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Attackers are hiding <b>remote access trojans (RATs)</b> inside <b>malicious MSI installers</b> disguised as legit software, and it’s surging in early 2026. We break down how these phishing attacks bypass EDR, what to look for, and how SOC teams can stop them before they turn into full-blown breaches. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18624982-msi-mayhem-rats-hiding-in-phishing-installers-to-evade-detection.mp3" length="4350878" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1vlmdk9179326wp6gya9iwecpy6j?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18624982</guid>
    <pubDate>Wed, 11 Feb 2026 12:00:00 -0600</pubDate>
    <itunes:duration>360</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Love as an Attack Vector 💌</itunes:title>
    <title>Love as an Attack Vector 💌</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Romance scams spike around Valentine’s Day ... and they’re more dangerous than you think. In this episode, we break down how scammers build emotional trust, isolate victims, and turn relationships into financial and emotional traps. Learn the warning signs, the psychology behind the scams, and how to protect yourself and the people you love 💞. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Romance scams spike around Valentine’s Day ... and they’re more dangerous than you think. In this episode, we break down how scammers build emotional trust, isolate victims, and turn relationships into financial and emotional traps. Learn the warning signs, the psychology behind the scams, and how to protect yourself and the people you love 💞.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Romance scams spike around Valentine’s Day ... and they’re more dangerous than you think. In this episode, we break down how scammers build emotional trust, isolate victims, and turn relationships into financial and emotional traps. Learn the warning signs, the psychology behind the scams, and how to protect yourself and the people you love 💞.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18648728-love-as-an-attack-vector.mp3" length="28233408" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/z10jqh773n9xg8m1tmreujvpy4lp?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18648728</guid>
    <pubDate>Tue, 10 Feb 2026 09:00:00 -0600</pubDate>
    <itunes:duration>2348</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Double Trouble: Microsoft Office and Fortinet FortiCloud Flaws Under Attack 💥</itunes:title>
    <title>Double Trouble: Microsoft Office and Fortinet FortiCloud Flaws Under Attack 💥</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This week’s #SOCBrief covers a dangerous double-hit: a Microsoft Office security bypass and a Fortinet FortiCloud authentication flaw, both exploited in the wild. Andrew walks through what the CVEs mean, how attackers are abusing trusted tools, and the patching and hunting steps SOC teams should take immediately. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podca...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b>This week’s #SOCBrief covers a dangerous double-hit:</b> a Microsoft Office security bypass and a Fortinet FortiCloud authentication flaw, both exploited in the wild. Andrew walks through what the CVEs mean, how attackers are abusing trusted tools, and the patching and hunting steps SOC teams should take immediately.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b>This week’s #SOCBrief covers a dangerous double-hit:</b> a Microsoft Office security bypass and a Fortinet FortiCloud authentication flaw, both exploited in the wild. Andrew walks through what the CVEs mean, how attackers are abusing trusted tools, and the patching and hunting steps SOC teams should take immediately.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18598244-double-trouble-microsoft-office-and-fortinet-forticloud-flaws-under-attack.mp3" length="4336790" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cdlqsf4amo1nzs2s035t5lhcxl1p?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18598244</guid>
    <pubDate>Wed, 04 Feb 2026 12:00:00 -0600</pubDate>
    <itunes:duration>359</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Top Ransomware Threats Dominating Early 2026</itunes:title>
    <title>Top Ransomware Threats Dominating Early 2026</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Ransomware is kicking off 2026 at full speed. We break down the top active groups right now, how they’re getting in, what infrastructure they’re targeting, and the key indicators your SOC should be watching to stay ahead. 🔐⚠️ Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Ransomware is kicking off 2026 at full speed. We break down the top active groups right now, how they’re getting in, what infrastructure they’re targeting, and the key indicators your SOC should be watching to stay ahead. 🔐⚠️</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Ransomware is kicking off 2026 at full speed. We break down the top active groups right now, how they’re getting in, what infrastructure they’re targeting, and the key indicators your SOC should be watching to stay ahead. 🔐⚠️</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18553357-top-ransomware-threats-dominating-early-2026.mp3" length="5515054" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kozzvpilgo81jl8ad6uaad9vbx3s?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18553357</guid>
    <pubDate>Wed, 28 Jan 2026 12:00:00 -0600</pubDate>
    <itunes:duration>457</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>📂 Inside the Breaches: Real Insider Threat Case Files</itunes:title>
    <title>📂 Inside the Breaches: Real Insider Threat Case Files</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Insider threats don’t start with malware ... they start with access. From disgruntled employees to overlooked contractors, this episode breaks down real-world cases, common patterns, and how organizations can better protect what matters most. 🎧🛡️ Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Insider threats don’t start with malware ... they start with access. From disgruntled employees to overlooked contractors, this episode breaks down real-world cases, common patterns, and how organizations can better protect what matters most. 🎧🛡️</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Insider threats don’t start with malware ... they start with access. From disgruntled employees to overlooked contractors, this episode breaks down real-world cases, common patterns, and how organizations can better protect what matters most. 🎧🛡️</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18514285-inside-the-breaches-real-insider-threat-case-files.mp3" length="28789603" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5nflefp0plsriv0s1ti5q2wkij5f?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18514285</guid>
    <pubDate>Tue, 27 Jan 2026 11:00:00 -0600</pubDate>
    <itunes:duration>2394</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CISA Retires 10 Emergency Directives – Progress for Feds, Wake-Up for the Rest of Us</itunes:title>
    <title>CISA Retires 10 Emergency Directives – Progress for Feds, Wake-Up for the Rest of Us</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! CISA has officially retired 10 emergency directives ... marking real progress for federal cybersecurity 🚀 But for the private sector, these “old” vulnerabilities are still very much in play ⚠️ In this #SOCBrief, we break down what was retired, why it matters, and what your SOC should do next. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>CISA has officially retired 10 emergency directives ... marking real progress for federal cybersecurity 🚀 But for the private sector, these “old” vulnerabilities are still very much in play ⚠️ In this <b>#SOCBrief</b>, we break down what was retired, why it matters, and what your SOC should do next.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>CISA has officially retired 10 emergency directives ... marking real progress for federal cybersecurity 🚀 But for the private sector, these “old” vulnerabilities are still very much in play ⚠️ In this <b>#SOCBrief</b>, we break down what was retired, why it matters, and what your SOC should do next.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18508359-cisa-retires-10-emergency-directives-progress-for-feds-wake-up-for-the-rest-of-us.mp3" length="4715473" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/epda1ur6lheqnwzg21pv462ydc3x?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18508359</guid>
    <pubDate>Wed, 21 Jan 2026 12:00:00 -0600</pubDate>
    <itunes:duration>391</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>New Year SOC Reset: New Year, New You(r Security Posture) 🔒</itunes:title>
    <title>New Year SOC Reset: New Year, New You(r Security Posture) 🔒</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Kick off 2026 by hitting reset on your SOC 📊. In this episode of the #SOCBrief, we break down key January priorities, from annual security posture reviews and rule tuning to training refreshers and forward planning, so your team starts the year resilient, aligned, and ready for what’s next.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Kick off 2026 by hitting reset on your SOC 📊. In this episode of the <b>#SOCBrief</b>, we break down key January priorities, from annual security posture reviews and rule tuning to training refreshers and forward planning, so your team starts the year resilient, aligned, and ready for what’s next. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Kick off 2026 by hitting reset on your SOC 📊. In this episode of the <b>#SOCBrief</b>, we break down key January priorities, from annual security posture reviews and rule tuning to training refreshers and forward planning, so your team starts the year resilient, aligned, and ready for what’s next. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18469511-new-year-soc-reset-new-year-new-you-r-security-posture.mp3" length="4117012" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/sflrwhiqx7hehp4eee1uvngd1dj6?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18469511</guid>
    <pubDate>Wed, 14 Jan 2026 12:00:00 -0600</pubDate>
    <itunes:duration>341</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Trusted Access, Malicious Intent: Insider Threats Explained</itunes:title>
    <title>Trusted Access, Malicious Intent: Insider Threats Explained</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! When the threat isn’t external, it’s personal. This episode breaks down insider threats and corporate espionage: how trusted access turns into real risk, what warning signs to watch for, and how organizations can protect themselves. 🔐⚠️ Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>When the threat isn’t external, it’s personal. This episode breaks down insider threats and corporate espionage: how trusted access turns into real risk, what warning signs to watch for, and how organizations can protect themselves. 🔐⚠️</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>When the threat isn’t external, it’s personal. This episode breaks down insider threats and corporate espionage: how trusted access turns into real risk, what warning signs to watch for, and how organizations can protect themselves. 🔐⚠️</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18482666-trusted-access-malicious-intent-insider-threats-explained.mp3" length="33211478" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gkhclwhuud6lxu6dfq8lejrcglvo?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18482666</guid>
    <pubDate>Tue, 13 Jan 2026 11:00:00 -0600</pubDate>
    <itunes:duration>2763</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>🔐 Holiday Cyber Threats &amp; What’s Coming Next</itunes:title>
    <title>🔐 Holiday Cyber Threats &amp; What’s Coming Next</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! 🎙️ In this episode, CISO Jonathan Kimmitt steps in to break down the latest cybersecurity threats impacting organizations during the holiday season and beyond. From ransomware spikes during understaffed weekends to holiday-themed phishing, critical Patch Tuesday vulnerabilities, and emerging AI-powered social engineering, Kimmitt covers what security leaders need to know as we head into 2026. Support the show Watch full episodes at youtube.com/@alia...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🎙️ In this episode, <b>CISO Jonathan Kimmitt</b> steps in to break down the latest cybersecurity threats impacting organizations during the holiday season and beyond. From ransomware spikes during understaffed weekends to holiday-themed phishing, critical Patch Tuesday vulnerabilities, and emerging AI-powered social engineering, <b>Kimmitt </b>covers what security leaders need to know as we head into 2026.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🎙️ In this episode, <b>CISO Jonathan Kimmitt</b> steps in to break down the latest cybersecurity threats impacting organizations during the holiday season and beyond. From ransomware spikes during understaffed weekends to holiday-themed phishing, critical Patch Tuesday vulnerabilities, and emerging AI-powered social engineering, <b>Kimmitt </b>covers what security leaders need to know as we head into 2026.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18432244-holiday-cyber-threats-what-s-coming-next.mp3" length="7573609" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0q5jpk8qmkl0gsdgbymd5r4lh105?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18432244</guid>
    <pubDate>Wed, 07 Jan 2026 12:00:00 -0600</pubDate>
    <itunes:duration>629</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>End-of-Year Wrap: 2025 Threat Trends and Bold Predictions for 2026 🎆 </itunes:title>
    <title>End-of-Year Wrap: 2025 Threat Trends and Bold Predictions for 2026 🎆 </title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In this special end-of-year SOC Brief, Andrew breaks down the biggest threat-actor and ransomware trends that shaped 2025,  and what cybersecurity teams should be preparing for in 2026. From AI-powered ransomware and supply-chain attacks to the growing blur between nation-state operations and cybercrime, this episode connects the data, the patterns, and the predictions that matter most heading into the new year. ✨  Tune in at secureafpodcast.co...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this special end-of-year SOC Brief, Andrew breaks down the biggest threat-actor and ransomware trends that shaped 2025,  and what cybersecurity teams should be preparing for in 2026. From AI-powered ransomware and supply-chain attacks to the growing blur between nation-state operations and cybercrime, this episode connects the data, the patterns, and the predictions that matter most heading into the new year. ✨<br/><br/>Tune in at secureafpodcast.com to hear what’s evolving, what’s accelerating, and where defenders have a real chance to shift the advantage before 2026 begins.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this special end-of-year SOC Brief, Andrew breaks down the biggest threat-actor and ransomware trends that shaped 2025,  and what cybersecurity teams should be preparing for in 2026. From AI-powered ransomware and supply-chain attacks to the growing blur between nation-state operations and cybercrime, this episode connects the data, the patterns, and the predictions that matter most heading into the new year. ✨<br/><br/>Tune in at secureafpodcast.com to hear what’s evolving, what’s accelerating, and where defenders have a real chance to shift the advantage before 2026 begins.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18415991-end-of-year-wrap-2025-threat-trends-and-bold-predictions-for-2026.mp3" length="5237685" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3kjbg4zx04fikl9zh48qcxydxylf?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18415991</guid>
    <pubDate>Wed, 31 Dec 2025 12:00:00 -0600</pubDate>
    <itunes:duration>434</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>🎄 Holiday Season Security: Preparing Your SOC for the Festive Chaos</itunes:title>
    <title>🎄 Holiday Season Security: Preparing Your SOC for the Festive Chaos</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This week’s SOC Brief dives into why the holidays are prime time for cyberattacks 🎄 from surging phishing attempts to sloppy vendor configs, alert fatigue, staffing gaps, and the seasonal spike in ransomware activity. Andrew and Dylan break down what SOCs should be watching for, how to prep, and how to stay covered even when headcount is low. Stay ahead of the threats this holiday season. Support the show Watch full episodes at youtube.com/@aliascyb...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week’s SOC Brief dives into why the holidays are prime time for cyberattacks 🎄 from surging phishing attempts to sloppy vendor configs, alert fatigue, staffing gaps, and the seasonal spike in ransomware activity. Andrew and Dylan break down what SOCs should be watching for, how to prep, and how to stay covered even when headcount is low. Stay ahead of the threats this holiday season.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week’s SOC Brief dives into why the holidays are prime time for cyberattacks 🎄 from surging phishing attempts to sloppy vendor configs, alert fatigue, staffing gaps, and the seasonal spike in ransomware activity. Andrew and Dylan break down what SOCs should be watching for, how to prep, and how to stay covered even when headcount is low. Stay ahead of the threats this holiday season.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18387384-holiday-season-security-preparing-your-soc-for-the-festive-chaos.mp3" length="7973642" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bjcl08670bqcuck9dhp02tr503e2?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18387384</guid>
    <pubDate>Wed, 24 Dec 2025 12:00:00 -0600</pubDate>
    <itunes:duration>662</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 100: Retrospective AF!</itunes:title>
    <title>Episode 100: Retrospective AF!</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! 🎉🎙️ EPISODE 100 IS LIVE! We’re celebrating 100 episodes of the Secure AF Podcast!  This special edition features CEO Donovan Farrow and CISO Jonathan Kimmitt as they look back on the history of Alias Cybersecurity, the growth of this show, and the journey that brought us here. And we wouldn’t be here without you, the listeners who made this possible. 💜  Additional links: Seccon information and tickets: https://seccon.com/ Hacker Gift Guide: https://...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🎉🎙️ EPISODE 100 IS LIVE! We’re celebrating 100 episodes of the Secure AF Podcast!<br/><br/>This special edition features CEO Donovan Farrow and CISO Jonathan Kimmitt as they look back on the history of Alias Cybersecurity, the growth of this show, and the journey that brought us here. And we wouldn’t be here without you, the listeners who made this possible. 💜<br/><br/>Additional links:<br/>Seccon information and tickets: https://seccon.com/<br/>Hacker Gift Guide: https://aliascybersecurity.com/blog/2025-ethical-hackers-holiday-gift-guide/</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🎉🎙️ EPISODE 100 IS LIVE! We’re celebrating 100 episodes of the Secure AF Podcast!<br/><br/>This special edition features CEO Donovan Farrow and CISO Jonathan Kimmitt as they look back on the history of Alias Cybersecurity, the growth of this show, and the journey that brought us here. And we wouldn’t be here without you, the listeners who made this possible. 💜<br/><br/>Additional links:<br/>Seccon information and tickets: https://seccon.com/<br/>Hacker Gift Guide: https://aliascybersecurity.com/blog/2025-ethical-hackers-holiday-gift-guide/</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18386414-episode-100-retrospective-af.mp3" length="37794006" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/b0x02dez9rcflgeva30b81fe5zea?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18386414</guid>
    <pubDate>Tue, 23 Dec 2025 11:00:00 -0600</pubDate>
    <itunes:duration>3144</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Reality of Stalking in a Digital Age 🕵️‍♂️⚠️</itunes:title>
    <title>The Reality of Stalking in a Digital Age 🕵️‍♂️⚠️</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This episode dives into one of the darkest issues cybersecurity intersects with: stalking. Kimmitt and Peters discuss real cases, modern cyberstalking tactics, privacy failures, the challenges of protective orders, and what victims can do to stay safe. If you've ever wondered how digital footprints turn into real-world danger, or how to protect yourself, this episode is essential. 🛡️ Support the show Watch full episodes at youtube.com/@aliascybersec...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This episode dives into one of the darkest issues cybersecurity intersects with: stalking. Kimmitt and Peters discuss real cases, modern cyberstalking tactics, privacy failures, the challenges of protective orders, and what victims can do to stay safe. If you&apos;ve ever wondered how digital footprints turn into real-world danger, or how to protect yourself, this episode is essential. 🛡️</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This episode dives into one of the darkest issues cybersecurity intersects with: stalking. Kimmitt and Peters discuss real cases, modern cyberstalking tactics, privacy failures, the challenges of protective orders, and what victims can do to stay safe. If you&apos;ve ever wondered how digital footprints turn into real-world danger, or how to protect yourself, this episode is essential. 🛡️</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18331548-the-reality-of-stalking-in-a-digital-age.mp3" length="40413323" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ueftdl9w6w7qzrqtlxm1or25qcnr?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18331548</guid>
    <pubDate>Tue, 16 Dec 2025 11:00:00 -0600</pubDate>
    <itunes:duration>3363</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Special Episode: Inside Weekly Threat-Intel Briefings with a vCISO 💼 </itunes:title>
    <title>Special Episode: Inside Weekly Threat-Intel Briefings with a vCISO 💼 </title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Get an inside look at how weekly threat-intel briefings really work in a mature security program. 🔍⚡ In this special episode, vCISO Jonathan Kimmitt breaks down how raw intel turns into real risk decisions, what trends are hitting organizations right now, and how SOC teams can brief leadership in a way that actually drives action. Stay sharp, stay informed, and stay secure. 🔐 Support the show Watch full episodes at youtube.com/@aliascybersecurity. L...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Get an inside look at how weekly threat-intel briefings really work in a mature security program. 🔍⚡ In this special episode, vCISO Jonathan Kimmitt breaks down how raw intel turns into real risk decisions, what trends are hitting organizations right now, and how SOC teams can brief leadership in a way that actually drives action. Stay sharp, stay informed, and stay secure. 🔐</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Get an inside look at how weekly threat-intel briefings really work in a mature security program. 🔍⚡ In this special episode, vCISO Jonathan Kimmitt breaks down how raw intel turns into real risk decisions, what trends are hitting organizations right now, and how SOC teams can brief leadership in a way that actually drives action. Stay sharp, stay informed, and stay secure. 🔐</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18300673-special-episode-inside-weekly-threat-intel-briefings-with-a-vciso.mp3" length="13059373" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/b4dzvktfxcqxq39q4ty4kelsb9z8?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18300673</guid>
    <pubDate>Mon, 15 Dec 2025 12:00:00 -0600</pubDate>
    <itunes:duration>1086</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>⚠️ React2Shell Zero-Day ⚠️: Chinese Hackers Strike Within Hours</itunes:title>
    <title>⚠️ React2Shell Zero-Day ⚠️: Chinese Hackers Strike Within Hours</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! A new zero-day is already under active exploitation. This week’s SOC Brief breaks down the React2Shell vulnerability (CVE-2025-55182), how attackers moved within hours of disclosure, and what SOC teams need to do now to reduce exposure and stay ahead of fast-moving threats. 🔐🚨 Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b>A new zero-day is already under active exploitation.</b> This week’s SOC Brief breaks down the React2Shell vulnerability (CVE-2025-55182), how attackers moved within hours of disclosure, and what SOC teams need to do <em>now</em> to reduce exposure and stay ahead of fast-moving threats. 🔐🚨</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b>A new zero-day is already under active exploitation.</b> This week’s SOC Brief breaks down the React2Shell vulnerability (CVE-2025-55182), how attackers moved within hours of disclosure, and what SOC teams need to do <em>now</em> to reduce exposure and stay ahead of fast-moving threats. 🔐🚨</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18327377-react2shell-zero-day-chinese-hackers-strike-within-hours.mp3" length="4779066" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/t1drls4muxk2a25kvxn27rawm9i5?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18327377</guid>
    <pubDate>Wed, 10 Dec 2025 08:00:00 -0600</pubDate>
    <itunes:duration>396</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tis the Season for Cybercrime: How Hackers Target Holidays 🎄</itunes:title>
    <title>Tis the Season for Cybercrime: How Hackers Target Holidays 🎄</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In this #SecureAF episode, Tanner and Dylan share real-world IR stories, common attack vectors, SOC fatigue during holiday PTO, and the #1 thing every organization should do before stepping away for the season. If you’ve ever wondered why cyber incidents always seem to hit when everyone is off work, this one explains it. 🎁💻 Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this <b>#SecureAF</b> episode, Tanner and Dylan share real-world IR stories, common attack vectors, SOC fatigue during holiday PTO, and the <b>#1</b> thing every organization should do before stepping away for the season. If you’ve ever wondered why cyber incidents always seem to hit when everyone is off work, this one explains it. 🎁💻</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this <b>#SecureAF</b> episode, Tanner and Dylan share real-world IR stories, common attack vectors, SOC fatigue during holiday PTO, and the <b>#1</b> thing every organization should do before stepping away for the season. If you’ve ever wondered why cyber incidents always seem to hit when everyone is off work, this one explains it. 🎁💻</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18300356-tis-the-season-for-cybercrime-how-hackers-target-holidays.mp3" length="25752294" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/y6shf9p55yezknh44dmgj6ec03i6?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18300356</guid>
    <pubDate>Tue, 09 Dec 2025 11:00:00 -0600</pubDate>
    <itunes:duration>2141</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>U.S.-Venezuela Tensions: Cyber Risks for American SOCs </itunes:title>
    <title>U.S.-Venezuela Tensions: Cyber Risks for American SOCs </title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In this episode of the #SOCBrief, we dig into how world events can trigger cyber fallout that lands directly on the desks of security teams. From ransomware crews capitalizing on instability to hacktivists launching DDoS attacks and opportunistic actors going after vulnerable sectors, we talk through why geopolitical tension often leads to increased cyber activity. We break down real patterns, recent trends, and the warnings SOCs should be paying at...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode of the #SOCBrief, we dig into how world events can trigger cyber fallout that lands directly on the desks of security teams. From ransomware crews capitalizing on instability to hacktivists launching DDoS attacks and opportunistic actors going after vulnerable sectors, we talk through why geopolitical tension often leads to increased cyber activity. We break down real patterns, recent trends, and the warnings SOCs should be paying attention to right now ... plus practical defensive steps you can take to stay ahead of emerging threats. ⚠️💻</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode of the #SOCBrief, we dig into how world events can trigger cyber fallout that lands directly on the desks of security teams. From ransomware crews capitalizing on instability to hacktivists launching DDoS attacks and opportunistic actors going after vulnerable sectors, we talk through why geopolitical tension often leads to increased cyber activity. We break down real patterns, recent trends, and the warnings SOCs should be paying attention to right now ... plus practical defensive steps you can take to stay ahead of emerging threats. ⚠️💻</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18286372-u-s-venezuela-tensions-cyber-risks-for-american-socs.mp3" length="4733596" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/y4nmclhezfnwi11gu6q4gvr6u7t3?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18286372</guid>
    <pubDate>Wed, 03 Dec 2025 12:00:00 -0600</pubDate>
    <itunes:duration>392</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When People Think They’ve Been Hacked</itunes:title>
    <title>When People Think They’ve Been Hacked</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! 📱 This #SecureAF episode covers the everyday questions and concerns people have when they think something unusual is happening with their devices or accounts. Hickman and Peters talk through typical scenarios, common misunderstandings, and the foundational steps that help people regain control of their accounts. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcas...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>📱 This #SecureAF episode covers the everyday questions and concerns people have when they think something unusual is happening with their devices or accounts. Hickman and Peters talk through typical scenarios, common misunderstandings, and the foundational steps that help people regain control of their accounts.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>📱 This #SecureAF episode covers the everyday questions and concerns people have when they think something unusual is happening with their devices or accounts. Hickman and Peters talk through typical scenarios, common misunderstandings, and the foundational steps that help people regain control of their accounts.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18278717-when-people-think-they-ve-been-hacked.mp3" length="28671379" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tswihoo6vnna54nj0ej8vh467s5n?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18278717</guid>
    <pubDate>Tue, 02 Dec 2025 11:00:00 -0600</pubDate>
    <itunes:duration>2385</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>FortiWeb Zero-Day: Silent Patch and Firewall Wake-Up Call 🔥</itunes:title>
    <title>FortiWeb Zero-Day: Silent Patch and Firewall Wake-Up Call 🔥</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This week’s #SOCBrief dives into the FortiWeb zero-day that’s letting attackers create admin accounts with a single unauthenticated HTTP request. With exploitation spiking and Fortinet pushing out a quiet fix, SOC teams are under pressure to lock down configs, audit firewalls, and patch fast. We break down what happened, who’s affected, and how to defend before attackers pivot deeper into your network. Support the show Watch full episodes at youtube...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week’s #SOCBrief dives into the FortiWeb zero-day that’s letting attackers create admin accounts with a single unauthenticated HTTP request. With exploitation spiking and Fortinet pushing out a quiet fix, SOC teams are under pressure to lock down configs, audit firewalls, and patch fast. We break down what happened, who’s affected, and how to defend before attackers pivot deeper into your network.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week’s #SOCBrief dives into the FortiWeb zero-day that’s letting attackers create admin accounts with a single unauthenticated HTTP request. With exploitation spiking and Fortinet pushing out a quiet fix, SOC teams are under pressure to lock down configs, audit firewalls, and patch fast. We break down what happened, who’s affected, and how to defend before attackers pivot deeper into your network.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18224026-fortiweb-zero-day-silent-patch-and-firewall-wake-up-call.mp3" length="4775611" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3wnld9b2dztk5cn8q1u9p8hqsbku?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18224026</guid>
    <pubDate>Wed, 26 Nov 2025 12:00:00 -0600</pubDate>
    <itunes:duration>396</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Halls: 2025 Hacker Gift Guide 🎁💻</itunes:title>
    <title>The Halls: 2025 Hacker Gift Guide 🎁💻</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! We’re back with the Hacker Holiday Gift Guide, and this year’s lineup is stacked with RF gadgets, Wi-Fi tools, red-team essentials, and quirky cyber gifts Tanner swears by. Whether you’re shopping for a pentester, a tinkerer, or someone who just loves breaking things (legally), these picks won’t miss. Get ready to level up your holiday shopping. Read here ➡️ https://aliascybersecurity.com/blog/2025-ethical-hackers-holiday-gift-guide/ Support the sho...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>We’re back with the <b>Hacker Holiday Gift Guide</b>, and this year’s lineup is stacked with RF gadgets, Wi-Fi tools, red-team essentials, and quirky cyber gifts Tanner swears by. Whether you’re shopping for a pentester, a tinkerer, or someone who just loves breaking things (legally), these picks won’t miss. Get ready to level up your holiday shopping.</p><p>Read here ➡️ https://aliascybersecurity.com/blog/2025-ethical-hackers-holiday-gift-guide/</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>We’re back with the <b>Hacker Holiday Gift Guide</b>, and this year’s lineup is stacked with RF gadgets, Wi-Fi tools, red-team essentials, and quirky cyber gifts Tanner swears by. Whether you’re shopping for a pentester, a tinkerer, or someone who just loves breaking things (legally), these picks won’t miss. Get ready to level up your holiday shopping.</p><p>Read here ➡️ https://aliascybersecurity.com/blog/2025-ethical-hackers-holiday-gift-guide/</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18231161-the-halls-2025-hacker-gift-guide.mp3" length="18974080" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1i4y1fscjbi3mrkyzap8aolxhyxq?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18231161</guid>
    <pubDate>Tue, 25 Nov 2025 11:00:00 -0600</pubDate>
    <itunes:duration>1577</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>96</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Patch Tuesday: Zero-Day Alert and Patching Must-Dos ✅</itunes:title>
    <title>Patch Tuesday: Zero-Day Alert and Patching Must-Dos ✅</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! A new zero-day. 63 flaws. Endless patching chaos. This week’s #SOCBrief breaks down Microsoft’s November Patch Tuesday and what it means for your SOC. We’ll cover the top critical CVEs, patching priorities, and how to keep your systems resilient before attackers strike. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>A new zero-day. 63 flaws. Endless patching chaos. This week’s <b>#SOCBrief</b> breaks down Microsoft’s November Patch Tuesday and what it means for your SOC. We’ll cover the top critical CVEs, patching priorities, and how to keep your systems resilient before attackers strike.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>A new zero-day. 63 flaws. Endless patching chaos. This week’s <b>#SOCBrief</b> breaks down Microsoft’s November Patch Tuesday and what it means for your SOC. We’ll cover the top critical CVEs, patching priorities, and how to keep your systems resilient before attackers strike.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18190668-patch-tuesday-zero-day-alert-and-patching-must-dos.mp3" length="5199721" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/im16x5ilh7a25gn2o8lwoe5p4lba?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18190668</guid>
    <pubDate>Wed, 19 Nov 2025 12:00:00 -0600</pubDate>
    <itunes:duration>431</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>⚠️ Insider Threats ⚠️: Ransomware Negotiators Gone Rogue</itunes:title>
    <title>⚠️ Insider Threats ⚠️: Ransomware Negotiators Gone Rogue</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This week, we’re digging into a case where ransomware negotiators allegedly became the attackers themselves, leveraging insider access to hit organizations they were supposed to help. This one raises real questions about trust, vendor oversight, and the human element in incident response. We break down what happened and what SOC teams can take away from it. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podc...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week, we’re digging into a case where ransomware <em>negotiators</em> allegedly became the attackers themselves, leveraging insider access to hit organizations they were supposed to help. This one raises real questions about trust, vendor oversight, and the human element in incident response. We break down what happened and what SOC teams can take away from it.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week, we’re digging into a case where ransomware <em>negotiators</em> allegedly became the attackers themselves, leveraging insider access to hit organizations they were supposed to help. This one raises real questions about trust, vendor oversight, and the human element in incident response. We break down what happened and what SOC teams can take away from it.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18163075-insider-threats-ransomware-negotiators-gone-rogue.mp3" length="4491600" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/u591fojbxkbjiurj7a3e8wffg4xi?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18163075</guid>
    <pubDate>Wed, 12 Nov 2025 12:00:00 -0600</pubDate>
    <itunes:duration>372</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Art Of The Con (Cyber Edition) 🔐</itunes:title>
    <title>The Art Of The Con (Cyber Edition) 🔐</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In this episode, we break down the real mechanics of social engineering, from phishing emails and text scams to vishing calls and full-on physical pen tests. We share stories from the field, including how attackers build trust, why confidence is often more effective than technical skill, and what happens when social engineering meets the physical world.  If you’ve ever wondered how someone can just walk right in and blend into a company they do...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode, we break down the real mechanics of social engineering, from phishing emails and text scams to vishing calls and full-on physical pen tests. We share stories from the field, including how attackers build trust, why confidence is often more effective than technical skill, and what happens when social engineering meets the physical world. </p><p>If you’ve ever wondered how someone can just <em>walk right in</em> and blend into a company they don’t work for… this one’s for you. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode, we break down the real mechanics of social engineering, from phishing emails and text scams to vishing calls and full-on physical pen tests. We share stories from the field, including how attackers build trust, why confidence is often more effective than technical skill, and what happens when social engineering meets the physical world. </p><p>If you’ve ever wondered how someone can just <em>walk right in</em> and blend into a company they don’t work for… this one’s for you. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18162974-the-art-of-the-con-cyber-edition.mp3" length="33696529" type="audio/mpeg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18162974</guid>
    <pubDate>Tue, 11 Nov 2025 11:00:00 -0600</pubDate>
    <itunes:duration>2804</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>95</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Atroposia RAT: The Malware That Scans for Its Own Exploits</itunes:title>
    <title>Atroposia RAT: The Malware That Scans for Its Own Exploits</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! 🎙️ A new threat is making waves ... Atroposia RAT, a remote access trojan that doesn’t just infiltrate systems but scans them for vulnerabilities to exploit further. In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackers. Learn the detection cues, patching priorities, and defensive measures SOC teams need to stay ahead. Support the show Watch full episodes at youtu...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🎙️ A new threat is making waves ... <b>Atroposia RAT</b>, a remote access trojan that doesn’t just infiltrate systems but <em>scans them for vulnerabilities to exploit further.</em> In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackers. Learn the detection cues, patching priorities, and defensive measures SOC teams need to stay ahead.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🎙️ A new threat is making waves ... <b>Atroposia RAT</b>, a remote access trojan that doesn’t just infiltrate systems but <em>scans them for vulnerabilities to exploit further.</em> In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackers. Learn the detection cues, patching priorities, and defensive measures SOC teams need to stay ahead.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18124480-atroposia-rat-the-malware-that-scans-for-its-own-exploits.mp3" length="4482513" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dbq4wm8eme4wjbr9rqjas49v3ck9?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18124480</guid>
    <pubDate>Wed, 05 Nov 2025 12:00:00 -0600</pubDate>
    <itunes:duration>371</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CAPTCHA Con: Hackers&#39; Evolving ClickFix Malware Trap</itunes:title>
    <title>CAPTCHA Con: Hackers&#39; Evolving ClickFix Malware Trap</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! “I’m not a robot.” 🤖 Hackers are exploiting fake “I’m not a robot” CAPTCHA pages to deliver malware. Host Andrew Hickman breaks down how this ClickFix attack uses social engineering to steal data and evade detection. Tune in to learn key defense tactics and how to keep your team protected. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>“I’m not a robot.” 🤖</p><p>Hackers are exploiting fake “<em>I’m not a robot</em>” CAPTCHA pages to deliver malware. Host <b>Andrew Hickman</b> breaks down how this <b>ClickFix</b> attack uses social engineering to steal data and evade detection. Tune in to learn key defense tactics and how to keep your team protected.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>“I’m not a robot.” 🤖</p><p>Hackers are exploiting fake “<em>I’m not a robot</em>” CAPTCHA pages to deliver malware. Host <b>Andrew Hickman</b> breaks down how this <b>ClickFix</b> attack uses social engineering to steal data and evade detection. Tune in to learn key defense tactics and how to keep your team protected.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18082294-captcha-con-hackers-evolving-clickfix-malware-trap.mp3" length="5674939" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/q7bihnk2sakqhsl2ychyy0o7c0jm?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18082294</guid>
    <pubDate>Wed, 29 Oct 2025 12:00:00 -0500</pubDate>
    <itunes:duration>470</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>RondoDox Botnet Expansion: The Shotgun Approach to IoT Exploitation</itunes:title>
    <title>RondoDox Botnet Expansion: The Shotgun Approach to IoT Exploitation</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This week on the #SOCBrief, Andrew breaks down RondoDox, a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over 50 vulnerabilities across 30+ vendors, this “shotgun” exploitation strategy is fueling massive DDoS and crypto-mining attacks. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week on the #<b>SOCBrief</b>, Andrew breaks down <em>RondoDox, </em>a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over <b>50 vulnerabilities across 30+ vendors</b>, this “shotgun” exploitation strategy is fueling massive DDoS and crypto-mining attacks.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week on the #<b>SOCBrief</b>, Andrew breaks down <em>RondoDox, </em>a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over <b>50 vulnerabilities across 30+ vendors</b>, this “shotgun” exploitation strategy is fueling massive DDoS and crypto-mining attacks.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/18028302-rondodox-botnet-expansion-the-shotgun-approach-to-iot-exploitation.mp3" length="5293477" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/pvq5duxxs6c2e82ya1webnqhjx5y?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18028302</guid>
    <pubDate>Wed, 22 Oct 2025 12:00:00 -0500</pubDate>
    <itunes:duration>439</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Obscura Ransomware: Unmasking a Stealthy New Threat ⚠️</itunes:title>
    <title>Obscura Ransomware: Unmasking a Stealthy New Threat ⚠️</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In this week’s #SOCBrief, Hickman and Peters break down Obscura ... a new ransomware variant making waves with aggressive evasion tactics, process terminations, and domain controller targeting. We cover what’s known so far, the risks it poses to businesses, and the key defenses every SOC should prioritize. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this week’s #SOCBrief, Hickman and Peters break down <em>Obscura ... </em>a new ransomware variant making waves with aggressive evasion tactics, process terminations, and domain controller targeting. We cover what’s known so far, the risks it poses to businesses, and the key defenses every SOC should prioritize.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this week’s #SOCBrief, Hickman and Peters break down <em>Obscura ... </em>a new ransomware variant making waves with aggressive evasion tactics, process terminations, and domain controller targeting. We cover what’s known so far, the risks it poses to businesses, and the key defenses every SOC should prioritize.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17989484-obscura-ransomware-unmasking-a-stealthy-new-threat.mp3" length="8971074" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/a8f7otqzeack2aqlg8sjtfletin4?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17989484</guid>
    <pubDate>Wed, 15 Oct 2025 12:00:00 -0500</pubDate>
    <itunes:duration>745</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>🛡️ Pen Test Potential: How Organizations Are Missing Out on Fortifying the SOC 🛡️</itunes:title>
    <title>🛡️ Pen Test Potential: How Organizations Are Missing Out on Fortifying the SOC 🛡️</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! What’s the real difference between a penetration test and a red team engagement, and how can each benefit your SOC? In this episode, Andrew is joined by Tanner, to unpack how pentests uncover vulnerabilities, how red teams stress-test defenders, and why every organization should be leveraging these exercises. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>What’s the real difference between a <b>penetration test</b> and a <b>red team engagement,</b> and how can each benefit your SOC? In this episode, Andrew is joined by Tanner, to unpack how pentests uncover vulnerabilities, how red teams stress-test defenders, and why every organization should be leveraging these exercises.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>What’s the real difference between a <b>penetration test</b> and a <b>red team engagement,</b> and how can each benefit your SOC? In this episode, Andrew is joined by Tanner, to unpack how pentests uncover vulnerabilities, how red teams stress-test defenders, and why every organization should be leveraging these exercises.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17926810-pen-test-potential-how-organizations-are-missing-out-on-fortifying-the-soc.mp3" length="14520480" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/y7uxrdp1wvg41ealegnh85ud22fd?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17926810</guid>
    <pubDate>Wed, 08 Oct 2025 12:00:00 -0500</pubDate>
    <itunes:duration>1208</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>2025 SECCON Debrief</itunes:title>
    <title>2025 SECCON Debrief</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This week on #SecureAFPodcast, we’re recapping #SECCON 2025. From the keynote to the villages and everything in between, join us for a look back at the highlights, takeaways, and community moments that made this year’s conference our best yet. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week on #SecureAFPodcast, we’re recapping #<b>SECCON 2025</b>. From the keynote to the villages and everything in between, join us for a look back at the highlights, takeaways, and community moments that made this year’s conference our best yet.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week on #SecureAFPodcast, we’re recapping #<b>SECCON 2025</b>. From the keynote to the villages and everything in between, join us for a look back at the highlights, takeaways, and community moments that made this year’s conference our best yet.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17971036-2025-seccon-debrief.mp3" length="18448720" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/q10stak8i5tugqdnag8y7a0klbw5?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17971036</guid>
    <pubDate>Tue, 07 Oct 2025 10:00:00 -0500</pubDate>
    <itunes:duration>1533</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>🚨 Ransomware Rising: Variants, Tactics, and Defenses in 2025 🚨</itunes:title>
    <title>🚨 Ransomware Rising: Variants, Tactics, and Defenses in 2025 🚨</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Ransomware is evolving faster than ever, from double extortion tactics to lightning-fast attack chains. In this episode, we break down how these threats work, why every organization is a target, and the layered defenses SOCs can use to detect and stop attacks early.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Ransomware is evolving faster than ever, from double extortion tactics to lightning-fast attack chains. In this episode, we break down how these threats work, why every organization is a target, and the layered defenses SOCs can use to detect and stop attacks early. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Ransomware is evolving faster than ever, from double extortion tactics to lightning-fast attack chains. In this episode, we break down how these threats work, why every organization is a target, and the layered defenses SOCs can use to detect and stop attacks early. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17926874-ransomware-rising-variants-tactics-and-defenses-in-2025.mp3" length="5422934" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6vh9art01jzfx37ey5vtjw0nwoef?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17926874</guid>
    <pubDate>Wed, 01 Oct 2025 11:00:00 -0500</pubDate>
    <itunes:duration>449</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>💢 FileFix Fiasco 💢 Steganography&#39;s Stealthy StealC Drop</itunes:title>
    <title>💢 FileFix Fiasco 💢 Steganography&#39;s Stealthy StealC Drop</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proactive defenses SOCs can use to detect and contain these threats before they escalate into larger breaches. Support the show Watch full episodes at you...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode of <em>The #SOCBrief</em>, we break down the rising <b>FileFix attack</b>, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proactive defenses SOCs can use to detect and contain these threats before they escalate into larger breaches.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode of <em>The #SOCBrief</em>, we break down the rising <b>FileFix attack</b>, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proactive defenses SOCs can use to detect and contain these threats before they escalate into larger breaches.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17898304-filefix-fiasco-steganography-s-stealthy-stealc-drop.mp3" length="4270920" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0jzwxg0b97xms51cjvkqpib5t6v9?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17898304</guid>
    <pubDate>Wed, 24 Sep 2025 10:00:00 -0500</pubDate>
    <itunes:duration>353</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Monitoring the Dark Web for Leaked Data in DFIR</itunes:title>
    <title>Monitoring the Dark Web for Leaked Data in DFIR</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! 🔎 This episode of The #SOCBrief dives into the world of dark web monitoring in digital forensics and incident response. Learn why leaked credentials are a top threat, how to safely detect exposures, and what steps SOC teams can take to stay proactive. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🔎 This episode of <b>The #SOCBrief</b> dives into the world of dark web monitoring in digital forensics and incident response. Learn why leaked credentials are a top threat, how to safely detect exposures, and what steps SOC teams can take to stay proactive.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🔎 This episode of <b>The #SOCBrief</b> dives into the world of dark web monitoring in digital forensics and incident response. Learn why leaked credentials are a top threat, how to safely detect exposures, and what steps SOC teams can take to stay proactive.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17860055-monitoring-the-dark-web-for-leaked-data-in-dfir.mp3" length="4682171" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/x2sxoqg90ufw0c9zzddqkxcflain?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17860055</guid>
    <pubDate>Wed, 17 Sep 2025 10:00:00 -0500</pubDate>
    <itunes:duration>388</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mastering Incident Response: Essential for SOC Success</itunes:title>
    <title>Mastering Incident Response: Essential for SOC Success</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! 💡 This week on The SOC Brief, we’re breaking down incident response (IR) ... why it’s essential, how to build a strong plan, and what SOC teams can do to turn chaos into control. From preparation and containment to recovery and lessons learned, learn how a solid IR strategy saves time, money, and reputation.  👉 Tune in now at secureafpodcast.com Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, S...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>💡 This week on <b>The SOC Brief</b>, we’re breaking down <b>incident response (IR) ... </b>why it’s essential, how to build a strong plan, and what SOC teams can do to turn chaos into control. From preparation and containment to recovery and lessons learned, learn how a solid IR strategy saves time, money, and reputation. </p><p>👉 Tune in now at <a href='https://secureafpodcast.com'>secureafpodcast.com</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>💡 This week on <b>The SOC Brief</b>, we’re breaking down <b>incident response (IR) ... </b>why it’s essential, how to build a strong plan, and what SOC teams can do to turn chaos into control. From preparation and containment to recovery and lessons learned, learn how a solid IR strategy saves time, money, and reputation. </p><p>👉 Tune in now at <a href='https://secureafpodcast.com'>secureafpodcast.com</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17823719-mastering-incident-response-essential-for-soc-success.mp3" length="6278058" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/982svex0qwc87xd476k9t3azlezp?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17823719</guid>
    <pubDate>Wed, 10 Sep 2025 15:00:00 -0500</pubDate>
    <itunes:duration>521</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>DEF CON 33 Debrief</itunes:title>
    <title>DEF CON 33 Debrief</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Fresh off the chaos of DEF CON 33, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman’s clutch CTF victory and Will’s bold dive into the Social Engineering Community’s Vishing Competition. No sleep, all signal. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b>Fresh off the chaos of DEF CON 33</b>, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman’s clutch CTF victory and Will’s bold dive into the Social Engineering Community’s Vishing Competition. No sleep, all signal.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b>Fresh off the chaos of DEF CON 33</b>, Tanner, Hickman, and Will break down the four-day hacker conference, from the eye-opening hacker villages and mind-bending talks to Hickman’s clutch CTF victory and Will’s bold dive into the Social Engineering Community’s Vishing Competition. No sleep, all signal.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17737026-def-con-33-debrief.mp3" length="35146945" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/crpjkr2i775s0o70vtpyihwwjy56?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17737026</guid>
    <pubDate>Tue, 26 Aug 2025 11:00:00 -0500</pubDate>
    <itunes:duration>2925</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>⚠️ Crypto24 ⚠️ Ransomware: Bypassing EDR and Bolstering Defenses</itunes:title>
    <title>⚠️ Crypto24 ⚠️ Ransomware: Bypassing EDR and Bolstering Defenses</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In this episode, we break down the emerging Crypto24 ransomware attacks that use living-off-the-land techniques to bypass EDR. We’ll explore how these attacks unfold and the defensive strategies SOCs and organizations can use, like layered security, enhanced monitoring, and rapid response, to stay ahead of evolving threats. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode, we break down the emerging <b>Crypto24 ransomware</b> attacks that use living-off-the-land techniques to bypass EDR. We’ll explore how these attacks unfold and the defensive strategies SOCs and organizations can use, like layered security, enhanced monitoring, and rapid response, to stay ahead of evolving threats.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode, we break down the emerging <b>Crypto24 ransomware</b> attacks that use living-off-the-land techniques to bypass EDR. We’ll explore how these attacks unfold and the defensive strategies SOCs and organizations can use, like layered security, enhanced monitoring, and rapid response, to stay ahead of evolving threats.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17704831-crypto24-ransomware-bypassing-edr-and-bolstering-defenses.mp3" length="6054261" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fq6mnnpg7hohcsldxrm5jp5ufj2b?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17704831</guid>
    <pubDate>Wed, 20 Aug 2025 11:00:00 -0500</pubDate>
    <itunes:duration>502</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>🚨 Gone Vishing: The Recent Surge of Vishing Attacks</itunes:title>
    <title>🚨 Gone Vishing: The Recent Surge of Vishing Attacks</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This week, we’re unpacking the phishing wave hitting SaaS platforms ... from social engineering to OAuth abuse and AI voice spoofing. Learn why people remain the #1 attack vector and how to stay one step ahead. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week, we’re unpacking the phishing wave hitting SaaS platforms ... from social engineering to OAuth abuse and AI voice spoofing. Learn why people remain the<b> #1</b> attack vector and how to stay one step ahead.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week, we’re unpacking the phishing wave hitting SaaS platforms ... from social engineering to OAuth abuse and AI voice spoofing. Learn why people remain the<b> #1</b> attack vector and how to stay one step ahead.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17666230-gone-vishing-the-recent-surge-of-vishing-attacks.mp3" length="7835057" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yqxhy7v90ir1cz2aa7rzmm3pnoed?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17666230</guid>
    <pubDate>Wed, 13 Aug 2025 12:00:00 -0500</pubDate>
    <itunes:duration>650</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>🚨 SonicWall Firewall Ransomware Breakdown</itunes:title>
    <title>🚨 SonicWall Firewall Ransomware Breakdown</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>On this episode of the #SOCBrief, we break down attacks on SonicWall firewalls. A wave of ransomware, possibly exploiting zero-day vulnerabilities, is compromising even fully patched systems. Learn how SOCs can respond fast and stay ahead.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17625041-sonicwall-firewall-ransomware-breakdown.mp3" length="6732878" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yvsoqgee8k32p0jcxkdhhf8sadjh?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17625041</guid>
    <pubDate>Wed, 06 Aug 2025 11:00:00 -0500</pubDate>
    <itunes:duration>559</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Spilling the Tea: What Happens When Apps Launch Without Locking Down Security ☕</itunes:title>
    <title>Spilling the Tea: What Happens When Apps Launch Without Locking Down Security ☕</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This week’s SOC Brief unpacks how a misconfigured cloud bucket exposed 72,000+ user images from the Tea app, complete with geolocation metadata and real IDs. From national security risks to doxxing fallout, we break down what went wrong and what your security team must do to avoid the same mistakes. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week’s SOC Brief unpacks how a misconfigured cloud bucket exposed 72,000+ user images from the Tea app, complete with geolocation metadata and real IDs. From national security risks to doxxing fallout, we break down what went wrong and what your security team must do to avoid the same mistakes.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week’s SOC Brief unpacks how a misconfigured cloud bucket exposed 72,000+ user images from the Tea app, complete with geolocation metadata and real IDs. From national security risks to doxxing fallout, we break down what went wrong and what your security team must do to avoid the same mistakes.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17587898-spilling-the-tea-what-happens-when-apps-launch-without-locking-down-security.mp3" length="9663940" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/p095bwj6x0dg11qxuicg24ltm54c?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17587898</guid>
    <pubDate>Wed, 30 Jul 2025 11:00:00 -0500</pubDate>
    <itunes:duration>803</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>🚨⚠️ A Critical ZERO-DAY (CVE-2025-53770)</itunes:title>
    <title>🚨⚠️ A Critical ZERO-DAY (CVE-2025-53770)</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! A critical zero-day (CVE-2025-53770) is actively targeting on-premises SharePoint servers AND it’s already been used to compromise over 100 organizations. In this #SOCBrief, Andrew and Tanner break down how the exploit works and what steps your team should take now. If your SharePoint instance is public-facing and unpatched ... assume compromise. 🎧 Tune in for insights, mitigation tips, and what to look for in your logs.  Links:  https://m...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>A critical zero-day (CVE-2025-53770) is actively targeting on-premises SharePoint servers AND it’s already been used to compromise over 100 organizations. In this #SOCBrief, Andrew and Tanner break down how the exploit works and what steps your team should take now. If your SharePoint instance is public-facing and unpatched ... assume compromise.</p><p>🎧 Tune in for insights, mitigation tips, and what to look for in your logs. </p><p>Links: </p><ul><li><a href='https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/'>https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/</a></li><li><a href='https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-overview'>https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-overview</a></li><li><a href='https://www.cisa.gov/news-events/alerts/2025/07/20/update-microsoft-releases-guidance-exploitation-sharepoint-vulnerabilities'>https://www.cisa.gov/news-events/alerts/2025/07/20/update-microsoft-releases-guidance-exploitation-sharepoint-vulnerabilities</a></li></ul><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>A critical zero-day (CVE-2025-53770) is actively targeting on-premises SharePoint servers AND it’s already been used to compromise over 100 organizations. In this #SOCBrief, Andrew and Tanner break down how the exploit works and what steps your team should take now. If your SharePoint instance is public-facing and unpatched ... assume compromise.</p><p>🎧 Tune in for insights, mitigation tips, and what to look for in your logs. </p><p>Links: </p><ul><li><a href='https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/'>https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/</a></li><li><a href='https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-overview'>https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-overview</a></li><li><a href='https://www.cisa.gov/news-events/alerts/2025/07/20/update-microsoft-releases-guidance-exploitation-sharepoint-vulnerabilities'>https://www.cisa.gov/news-events/alerts/2025/07/20/update-microsoft-releases-guidance-exploitation-sharepoint-vulnerabilities</a></li></ul><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17564066-a-critical-zero-day-cve-2025-53770.mp3" length="12920184" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bjtiwom69akykv7jkuqm3senzh4i?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17564066</guid>
    <pubDate>Fri, 25 Jul 2025 12:00:00 -0500</pubDate>
    <itunes:duration>1074</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>🚪 Offboarding isn&#39;t just HR&#39;s job …</itunes:title>
    <title>🚪 Offboarding isn&#39;t just HR&#39;s job …</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In this week’s #SOCBrief, we break down why offboarding policies are ABSOLUTELY critical for security teams. Overlooked items from abandoned accounts to old VPN access can leave backdoors wide open. Learn how SOCs monitor, contain, and shut down lingering access, and why communication between HR, IT, and cybersecurity is essential. 🎙️ Tune in. secureafpodcast.com Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Appl...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this week’s #SOCBrief, we break down why offboarding policies are ABSOLUTELY critical for security teams. Overlooked items from abandoned accounts to old VPN access can leave backdoors wide open. Learn how SOCs monitor, contain, and shut down lingering access, and why communication between HR, IT, and cybersecurity is <em>essential</em>.</p><p>🎙️ Tune in. <a href='http://secureafpodcast.com'>secureafpodcast.com</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this week’s #SOCBrief, we break down why offboarding policies are ABSOLUTELY critical for security teams. Overlooked items from abandoned accounts to old VPN access can leave backdoors wide open. Learn how SOCs monitor, contain, and shut down lingering access, and why communication between HR, IT, and cybersecurity is <em>essential</em>.</p><p>🎙️ Tune in. <a href='http://secureafpodcast.com'>secureafpodcast.com</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17551661-offboarding-isn-t-just-hr-s-job.mp3" length="11394205" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/u8k6ec79w93vn1xvt4h8rslkpmej?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17551661</guid>
    <pubDate>Wed, 23 Jul 2025 11:00:00 -0500</pubDate>
    <itunes:duration>947</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Aligned by Design: CISO x Legal in Practice - Episode 92</itunes:title>
    <title>Aligned by Design: CISO x Legal in Practice - Episode 92</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! 🎙️ NEW! Aligned by Design: CISO x Legal Introducing! A fresh new series that explores the intersection of cybersecurity and legal strategy. Join Alias CISO Jonathan Kimmitt and privacy attorney Tom Vincent as they unpack what happens when technology, compliance, risk, and law collide.  From real-world experiences to the nuances of the term "breach", these two break down the how, why, and what now? behind every security decision and legal gray a...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🎙️ <b>NEW! Aligned by Design: CISO x Legal</b></p><p><b>Introducing!</b> A fresh new series that explores the intersection of cybersecurity and legal strategy. Join Alias CISO Jonathan Kimmitt and privacy attorney Tom Vincent as they unpack what happens when technology, compliance, risk, and law collide. </p><p>From real-world experiences to the nuances of the term &quot;breach&quot;, these two break down the <em>how</em>, <em>why</em>, and <em>what now?</em> behind every security decision and legal gray area. Whether you&apos;re in the trenches of infosec or just trying to keep your data clean, <em>CISO x Legal</em> is your go-to podcast for smarter, sharper, and more aligned security practices.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🎙️ <b>NEW! Aligned by Design: CISO x Legal</b></p><p><b>Introducing!</b> A fresh new series that explores the intersection of cybersecurity and legal strategy. Join Alias CISO Jonathan Kimmitt and privacy attorney Tom Vincent as they unpack what happens when technology, compliance, risk, and law collide. </p><p>From real-world experiences to the nuances of the term &quot;breach&quot;, these two break down the <em>how</em>, <em>why</em>, and <em>what now?</em> behind every security decision and legal gray area. Whether you&apos;re in the trenches of infosec or just trying to keep your data clean, <em>CISO x Legal</em> is your go-to podcast for smarter, sharper, and more aligned security practices.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17545612-aligned-by-design-ciso-x-legal-in-practice-episode-92.mp3" length="39409664" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/a8iwtxhd2ii1w0orwxwmlqiikzgb?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17545612</guid>
    <pubDate>Tue, 22 Jul 2025 09:00:00 -0500</pubDate>
    <itunes:duration>3280</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>🚨 Record-Shattering DDoS Attack Alert 🚨</itunes:title>
    <title>🚨 Record-Shattering DDoS Attack Alert 🚨</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Hackers just unleashed the largest DDoS attack in history, peaking at 7.3 Tbps and 4.8 billion packets per second. In just 45 seconds, it pummeled its target with the data equivalent of over 9,000 HD movies, a powerful reminder of how far attack capabilities have evolved. 🎧 Tune in to today’s SOC Brief for insights on DDoS attacks and how to up your defenses. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Po...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Hackers just unleashed the <b>largest DDoS attack in history</b>, peaking at <b>7.3 Tbps</b> and <b>4.8 billion packets per second</b>. In just <b>45 seconds</b>, it pummeled its target with the data equivalent of over <b>9,000 HD movies, </b>a powerful reminder of how far attack capabilities have evolved.</p><p>🎧 <b>Tune in to today’s SOC Brief</b> for insights on DDoS attacks and how to up your defenses.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Hackers just unleashed the <b>largest DDoS attack in history</b>, peaking at <b>7.3 Tbps</b> and <b>4.8 billion packets per second</b>. In just <b>45 seconds</b>, it pummeled its target with the data equivalent of over <b>9,000 HD movies, </b>a powerful reminder of how far attack capabilities have evolved.</p><p>🎧 <b>Tune in to today’s SOC Brief</b> for insights on DDoS attacks and how to up your defenses.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17515896-record-shattering-ddos-attack-alert.mp3" length="8435377" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/42uyt5iasesk7cd6pgk38fskt6jw?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17515896</guid>
    <pubDate>Wed, 16 Jul 2025 11:00:00 -0500</pubDate>
    <itunes:duration>701</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Secure AF SOC Brief #5 - Chrome CVE-2025-6554</itunes:title>
    <title>Secure AF SOC Brief #5 - Chrome CVE-2025-6554</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In this episode of The SOC Brief, the team unpacks a critical zero-day vulnerability in Google Chrome (CVE-2025-6554) that’s being actively exploited. Learn how attackers use type confusion bugs to hijack browser memory, what makes this exploit so dangerous, and why it’s targeting high-value organizations. Discover actionable steps for updating Chrome, securing endpoints, and training users to spot phishing attempts before they lead to compromise. 🎧...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode of <em>The SOC Brief</em>, the team unpacks a critical zero-day vulnerability in Google Chrome (CVE-2025-6554) that’s being actively exploited. Learn how attackers use type confusion bugs to hijack browser memory, what makes this exploit so dangerous, and why it’s targeting high-value organizations. Discover actionable steps for updating Chrome, securing endpoints, and training users to spot phishing attempts before they lead to compromise.</p><p>🎧 <b>Tune in and stay prepared.</b></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode of <em>The SOC Brief</em>, the team unpacks a critical zero-day vulnerability in Google Chrome (CVE-2025-6554) that’s being actively exploited. Learn how attackers use type confusion bugs to hijack browser memory, what makes this exploit so dangerous, and why it’s targeting high-value organizations. Discover actionable steps for updating Chrome, securing endpoints, and training users to spot phishing attempts before they lead to compromise.</p><p>🎧 <b>Tune in and stay prepared.</b></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17477884-secure-af-soc-brief-5-chrome-cve-2025-6554.mp3" length="6551434" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4bsn8s9tgsxlc6dky8g748b5jw63?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17477884</guid>
    <pubDate>Wed, 09 Jul 2025 11:00:00 -0500</pubDate>
    <itunes:duration>544</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ep 91: The Engineers React to Breach News</itunes:title>
    <title>Ep 91: The Engineers React to Breach News</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the “16 billion password” leak to the rise of hacker groups like Scattered Spider. 🕷️  We discuss how attackers bypass MFA, why exploited data keeps resurfacing, and what organizations can do to protect sensitive data. Plus, we dive into industrial control system risks and why basic cybersecurity hygiene matters more than ever. 🛡️ Suppor...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the “16 billion password” leak to the rise of hacker groups like Scattered Spider. 🕷️<br/><br/>We discuss how attackers bypass MFA, why exploited data keeps resurfacing, and what organizations can do to protect sensitive data. Plus, we dive into industrial control system risks and why basic cybersecurity hygiene matters more than ever. 🛡️</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the “16 billion password” leak to the rise of hacker groups like Scattered Spider. 🕷️<br/><br/>We discuss how attackers bypass MFA, why exploited data keeps resurfacing, and what organizations can do to protect sensitive data. Plus, we dive into industrial control system risks and why basic cybersecurity hygiene matters more than ever. 🛡️</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17472777-ep-91-the-engineers-react-to-breach-news.mp3" length="32775146" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mu6szjg4mpxzoxgaongtgw355ajv?.jpg" />
    <itunes:author>Alias Cybersecurity</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17472777</guid>
    <pubDate>Tue, 08 Jul 2025 16:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/660007/17472777/transcript" type="text/html" />
    <itunes:duration>2727</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Secure AF SOC Brief #4 - False Positives</itunes:title>
    <title>Secure AF SOC Brief #4 - False Positives</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In this episode of The SOC Brief, Andrew and Dax dive into the world of false positives – those misleading alerts that flood security teams with noise.  They discuss how misconfigurations, lack of context, and overly sensitive rules can lead to alert fatigue. With practical tips on investigation, tuning tools, and understanding your environment, they highlight how reducing false positives helps analysts stay sharp and focused on real threats ⚠️...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode of <em>The SOC Brief</em>, Andrew and Dax dive into the world of false positives – those misleading alerts that flood security teams with noise. </p><p>They discuss how misconfigurations, lack of context, and overly sensitive rules can lead to alert fatigue. With practical tips on investigation, tuning tools, and understanding your environment, they highlight how reducing false positives helps analysts stay sharp and focused on real threats ⚠️.</p><p>#SOCBrief #FalsePositives #SecureAF</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In this episode of <em>The SOC Brief</em>, Andrew and Dax dive into the world of false positives – those misleading alerts that flood security teams with noise. </p><p>They discuss how misconfigurations, lack of context, and overly sensitive rules can lead to alert fatigue. With practical tips on investigation, tuning tools, and understanding your environment, they highlight how reducing false positives helps analysts stay sharp and focused on real threats ⚠️.</p><p>#SOCBrief #FalsePositives #SecureAF</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17437265-secure-af-soc-brief-4-false-positives.mp3" length="8963492" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mzzif5bibgumm82u9o3o6wqjpqya?.jpg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17437265</guid>
    <pubDate>Wed, 02 Jul 2025 11:00:00 -0500</pubDate>
    <itunes:duration>745</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Secure AF SOC Brief #3 - IOCs</itunes:title>
    <title>Secure AF SOC Brief #3 - IOCs</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! 🔐 New SOC Brief Episode: Tracing the Breadcrumbs Cybercriminals always leave a trail, if you know where to look. In this episode, we break down Indicators of Compromise (IOCs) and how they help security teams detect and respond to threats faster. 🎯 What we cover: • Real-world incident reports &amp; proof of concept examples • Threat actor aliases &amp; ransomware group tactics • File hashes, EDR tools, and forensic breadcrumbs • Why “the moment you ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🔐 <b>New SOC Brief Episode: Tracing the Breadcrumbs</b></p><p>Cybercriminals always leave a trail, if you know where to look. In this episode, we break down <b>Indicators of Compromise (IOCs)</b> and how they help security teams detect and respond to threats faster.</p><p>🎯 What we cover:<br/>• Real-world incident reports &amp; proof of concept examples<br/>• Threat actor aliases &amp; ransomware group tactics<br/>• File hashes, EDR tools, and forensic breadcrumbs<br/>• Why <b>“the moment you feel most secure, you’re the most vulnerable”</b></p><p>Whether you&apos;re in threat intel, SOC operations, or just passionate about cybersecurity, this one’s for you.</p><p>👉 <b>Tune in now!</b><br/>#CyberSecurity #SOCBrief #ThreatIntel #EDR #IOC #InfoSec #Ransomware #IncidentResponse</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🔐 <b>New SOC Brief Episode: Tracing the Breadcrumbs</b></p><p>Cybercriminals always leave a trail, if you know where to look. In this episode, we break down <b>Indicators of Compromise (IOCs)</b> and how they help security teams detect and respond to threats faster.</p><p>🎯 What we cover:<br/>• Real-world incident reports &amp; proof of concept examples<br/>• Threat actor aliases &amp; ransomware group tactics<br/>• File hashes, EDR tools, and forensic breadcrumbs<br/>• Why <b>“the moment you feel most secure, you’re the most vulnerable”</b></p><p>Whether you&apos;re in threat intel, SOC operations, or just passionate about cybersecurity, this one’s for you.</p><p>👉 <b>Tune in now!</b><br/>#CyberSecurity #SOCBrief #ThreatIntel #EDR #IOC #InfoSec #Ransomware #IncidentResponse</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17397481-secure-af-soc-brief-3-iocs.mp3" length="10658086" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tp2bnuhwv7r4alxktjgktt1xk322?.jpg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17397481</guid>
    <pubDate>Wed, 25 Jun 2025 12:00:00 -0500</pubDate>
    <itunes:duration>886</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 90: Global Wars - Cyber Strikes Back</itunes:title>
    <title>Episode 90: Global Wars - Cyber Strikes Back</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! 🎙️ New Secure AF Episode: Global Wars: Cyber Strikes Back 🌐⚔️ How does global news shape cybersecurity operations? In this episode, we dig into how real-world events influence the threats we track, the way we respond, and the tools we use for social engineering/pentesting. 🔍 We talk threat intel, evolving attack methods, and what teams should be looking out for right now. 🎧 Tune in and stay Secure AF. #CyberSecurity #SecureAF #ThreatIntel #Podcast S...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🎙️ <b>New Secure AF Episode:</b> <em>Global Wars: Cyber Strikes Back</em> 🌐⚔️</p><p>How does global news shape cybersecurity operations? In this episode, we dig into how real-world events influence the threats we track, the way we respond, and the tools we use for social engineering/pentesting.</p><p>🔍 We talk threat intel, evolving attack methods, and what teams should be looking out for right now.</p><p>🎧 Tune in and stay Secure AF.</p><p>#CyberSecurity #SecureAF #ThreatIntel #Podcast</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>🎙️ <b>New Secure AF Episode:</b> <em>Global Wars: Cyber Strikes Back</em> 🌐⚔️</p><p>How does global news shape cybersecurity operations? In this episode, we dig into how real-world events influence the threats we track, the way we respond, and the tools we use for social engineering/pentesting.</p><p>🔍 We talk threat intel, evolving attack methods, and what teams should be looking out for right now.</p><p>🎧 Tune in and stay Secure AF.</p><p>#CyberSecurity #SecureAF #ThreatIntel #Podcast</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17392094-episode-90-global-wars-cyber-strikes-back.mp3" length="36179646" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5txfn49t5qigxavzqct0yq2t1y4j?.jpg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17392094</guid>
    <pubDate>Tue, 24 Jun 2025 14:00:00 -0500</pubDate>
    <itunes:duration>3011</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Secure AF SOC Brief #2 - SafePay</itunes:title>
    <title>Secure AF SOC Brief #2 - SafePay</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! 🎙️ This Week on the SOC Brief: Join Andrew and Dax as they dive into the emergence of a new threat actor known as SafePay 🕵️‍♂️💻. They break down the latest tactics, techniques, and procedures observed from this group, offering insights into how organizations can stay vigilant. From detection strategies 🔍 to proactive defense measures 🛡️, this episode is packed with actionable advice for keeping your company secure. Don’t miss it, tune in now! 🔊🎧 Su...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b>🎙️ This Week on the SOC Brief:</b></p><p>Join Andrew and Dax as they dive into the emergence of a new threat actor known as <b>SafePay</b> 🕵️‍♂️💻. They break down the latest tactics, techniques, and procedures observed from this group, offering insights into how organizations can stay vigilant. From detection strategies 🔍 to proactive defense measures 🛡️, this episode is packed with actionable advice for keeping your company secure.</p><p><b>Don’t miss it, tune in now! 🔊🎧</b></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b>🎙️ This Week on the SOC Brief:</b></p><p>Join Andrew and Dax as they dive into the emergence of a new threat actor known as <b>SafePay</b> 🕵️‍♂️💻. They break down the latest tactics, techniques, and procedures observed from this group, offering insights into how organizations can stay vigilant. From detection strategies 🔍 to proactive defense measures 🛡️, this episode is packed with actionable advice for keeping your company secure.</p><p><b>Don’t miss it, tune in now! 🔊🎧</b></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17330713-secure-af-soc-brief-2-safepay.mp3" length="7914294" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/egp47zz3nfr5urf49yc771pabclt?.jpg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17330713</guid>
    <pubDate>Wed, 18 Jun 2025 12:00:00 -0500</pubDate>
    <itunes:duration>657</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 89: Meet the Alias SOC - on the Battlefront of Cybersecurity</itunes:title>
    <title>Episode 89: Meet the Alias SOC - on the Battlefront of Cybersecurity</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! 🔐 Inside the SOC 🔐 Go behind the scenes with the Alias Security Operations Center (SOC) team to learn how they operate, collaborate, and tackle today’s top cyber threats ⚔️. Find out why a SOC matters, and how organizations can still leverage SOC insights and support, even without one in-house 💼. 🎧 Tap in and get cyber-smart with the experts. #CyberSecurity #SOC #ThreatIntel #Podcast Support the show Watch full episodes at youtube.com/@aliascybersec...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b>🔐 Inside the SOC 🔐</b></p><p>Go behind the scenes with the Alias Security Operations Center (SOC) team to learn how they operate, collaborate, and tackle today’s top cyber threats ⚔️.</p><p>Find out why a SOC matters, and how organizations can still leverage SOC insights and support, even without one in-house 💼.</p><p>🎧 Tap in and get cyber-smart with the experts.</p><p>#CyberSecurity #SOC #ThreatIntel #Podcast</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b>🔐 Inside the SOC 🔐</b></p><p>Go behind the scenes with the Alias Security Operations Center (SOC) team to learn how they operate, collaborate, and tackle today’s top cyber threats ⚔️.</p><p>Find out why a SOC matters, and how organizations can still leverage SOC insights and support, even without one in-house 💼.</p><p>🎧 Tap in and get cyber-smart with the experts.</p><p>#CyberSecurity #SOC #ThreatIntel #Podcast</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17331708-episode-89-meet-the-alias-soc-on-the-battlefront-of-cybersecurity.mp3" length="21616271" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zzhkyma0xn4dsaxrr4ax9482aj24?.jpg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17331708</guid>
    <pubDate>Fri, 13 Jun 2025 14:00:00 -0500</pubDate>
    <itunes:duration>1797</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Secure AF SOC Brief #1 - SOC Life</itunes:title>
    <title>Secure AF SOC Brief #1 - SOC Life</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Welcome to 🎙️The SOC Brief 🎙️our byte-sized mini series bringing you weekly updates straight from the Security Operations Center. In this episode, Andrew, Dax, and Dylan break down what life in the SOC looks like, the rise of malvertising, and the emerging threat known as Recipe Lister, discussing how it’s being tracked. Tune in for a quick, expert-led look into the latest in cybersecurity. 🔍🔐 Support the show Watch full episodes at youtube.com/@ali...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b>Welcome to </b>🎙️<b><em>The SOC Brief</em></b><b> </b>🎙️<b>our byte-sized mini series bringing you weekly updates straight from the Security Operations Center.</b></p><p>In this episode, Andrew, Dax, and Dylan break down what life in the SOC looks like, the rise of malvertising, and the emerging threat known as <em>Recipe Lister</em>, discussing how it’s being tracked.</p><p>Tune in for a quick, expert-led look into the latest in cybersecurity. 🔍🔐</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><b>Welcome to </b>🎙️<b><em>The SOC Brief</em></b><b> </b>🎙️<b>our byte-sized mini series bringing you weekly updates straight from the Security Operations Center.</b></p><p>In this episode, Andrew, Dax, and Dylan break down what life in the SOC looks like, the rise of malvertising, and the emerging threat known as <em>Recipe Lister</em>, discussing how it’s being tracked.</p><p>Tune in for a quick, expert-led look into the latest in cybersecurity. 🔍🔐</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17318778-secure-af-soc-brief-1-soc-life.mp3" length="8250022" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/k9e9to03n4h50ev1j8frvsy6kcy8?.jpg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17318778</guid>
    <pubDate>Wed, 11 Jun 2025 12:00:00 -0500</pubDate>
    <itunes:duration>685</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 88: Two-Time CISO Showdown Champion (and Chad)</itunes:title>
    <title>Episode 88: Two-Time CISO Showdown Champion (and Chad)</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Alias Cybersecurity Jonathan Kimmitt is joined by Chad Kliewer to discuss the exciting CISO Showdown competition between Chief Information Security Officers (CISOs) at BSidesOK. They delve into the history of the showdown, how it works, and highlight significance of the championship belt. Tune in as they share insights and fun facts about this unique event!    Don't miss out! Follow us for more updates, episodes, and all things cybersecuri...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Alias Cybersecurity Jonathan Kimmitt is joined by Chad Kliewer to discuss the exciting CISO Showdown competition between Chief Information Security Officers (CISOs) at BSidesOK. They delve into the history of the showdown, how it works, and highlight significance of the championship belt. Tune in as they share insights and fun facts about this unique event! <br/> <br/>Don&apos;t miss out! Follow us for more updates, episodes, and all things cybersecurity! <br/>Instagram: @alias_cybersecurity <br/>X: https://x.com/cyber_af <br/>LinkedIn: https://www.linkedin.com/company/aliascybersecurity/</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Alias Cybersecurity Jonathan Kimmitt is joined by Chad Kliewer to discuss the exciting CISO Showdown competition between Chief Information Security Officers (CISOs) at BSidesOK. They delve into the history of the showdown, how it works, and highlight significance of the championship belt. Tune in as they share insights and fun facts about this unique event! <br/> <br/>Don&apos;t miss out! Follow us for more updates, episodes, and all things cybersecurity! <br/>Instagram: @alias_cybersecurity <br/>X: https://x.com/cyber_af <br/>LinkedIn: https://www.linkedin.com/company/aliascybersecurity/</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/17145856-episode-88-two-time-ciso-showdown-champion-and-chad.mp3" length="33232942" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8rdnh3bpted5inbsssosv01uw9tp?.jpg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17145856</guid>
    <pubDate>Mon, 12 May 2025 12:00:00 -0500</pubDate>
    <itunes:duration>2765</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>88</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 87: Securing Patient Data with HIPAA&#39;s New Security Rules</itunes:title>
    <title>Episode 87: Securing Patient Data with HIPAA&#39;s New Security Rules</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Alias Cybersecurity CISO Jonathon Kimmitt is joined by Derrac Page to discuss the new changes to the HIPAA security rules being set in place this year. Listen as they go over many of the biggest points raised from the 660+ page guidelines and discuss ways that HIPAA Privacy Officers and HIPAA Security Officers can get ahead of compliance. Sponsored by Arrow Force, an MSP that puts Security First. https://www.arrowforce.com Support the show Watch ful...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Alias Cybersecurity CISO Jonathon Kimmitt is joined by Derrac Page to discuss the new changes to the HIPAA security rules being set in place this year. Listen as they go over many of the biggest points raised from the 660+ page guidelines and discuss ways that HIPAA Privacy Officers and HIPAA Security Officers can get ahead of compliance.</p><p>Sponsored by Arrow Force, an MSP that puts Security First. <a href='https://www.arrowforce.com'>https://www.arrowforce.com</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Alias Cybersecurity CISO Jonathon Kimmitt is joined by Derrac Page to discuss the new changes to the HIPAA security rules being set in place this year. Listen as they go over many of the biggest points raised from the 660+ page guidelines and discuss ways that HIPAA Privacy Officers and HIPAA Security Officers can get ahead of compliance.</p><p>Sponsored by Arrow Force, an MSP that puts Security First. <a href='https://www.arrowforce.com'>https://www.arrowforce.com</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/16989720-episode-87-securing-patient-data-with-hipaa-s-new-security-rules.mp3" length="38587468" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/s8vajyuxrn7bqe2ork2ot4i3lid5?.jpg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16989720</guid>
    <pubDate>Wed, 16 Apr 2025 10:00:00 -0500</pubDate>
    <itunes:duration>3211</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>87</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 86: How to make your pen test training not suck</itunes:title>
    <title>Episode 86: How to make your pen test training not suck</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Following BSides Oklahoma where Tanner gave an 8 hour training on the basics of penetration testing, Tanner and Keelan give advice on how to present red team/pen test training... specifically how to make the trainings not suck. Sponsored by AFCyberAcademy.com.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Following BSides Oklahoma where Tanner gave an 8 hour training on the basics of penetration testing, Tanner and Keelan give advice on how to present red team/pen test training... specifically how to make the trainings not suck. Sponsored by AFCyberAcademy.com. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Following BSides Oklahoma where Tanner gave an 8 hour training on the basics of penetration testing, Tanner and Keelan give advice on how to present red team/pen test training... specifically how to make the trainings not suck. Sponsored by AFCyberAcademy.com. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/16962309-episode-86-how-to-make-your-pen-test-training-not-suck.mp3" length="23879816" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dhlfg2xrxvopkdi95jqldupx616e?.jpg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16962309</guid>
    <pubDate>Fri, 11 Apr 2025 11:00:00 -0500</pubDate>
    <itunes:duration>1985</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>86</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 85: Is SANS the overpriced dinosaur of cybersecurity training?</itunes:title>
    <title>Episode 85: Is SANS the overpriced dinosaur of cybersecurity training?</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! On this week's Secure AF podcast, Tanner poses a controversial question: is SANS the overpriced dinosaur of cybersecurity training? The answer is not a simple one. Listen in as Tanner and CISO Jonathan Kimmitt go in depth on the pros and cons of different security certifications such as Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), Certified Ethical Hacker (CEH), and more. Support the show Watch full episodes at y...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>On this week&apos;s Secure AF podcast, Tanner poses a controversial question: is SANS the overpriced dinosaur of cybersecurity training? The answer is not a simple one. Listen in as Tanner and CISO Jonathan Kimmitt go in depth on the pros and cons of different security certifications such as Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), Certified Ethical Hacker (CEH), and more.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>On this week&apos;s Secure AF podcast, Tanner poses a controversial question: is SANS the overpriced dinosaur of cybersecurity training? The answer is not a simple one. Listen in as Tanner and CISO Jonathan Kimmitt go in depth on the pros and cons of different security certifications such as Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), Certified Ethical Hacker (CEH), and more.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/16775049-episode-85-is-sans-the-overpriced-dinosaur-of-cybersecurity-training.mp3" length="31308455" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9diat13w8mb13rw6n0zhk707dily?.jpg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16775049</guid>
    <pubDate>Tue, 11 Mar 2025 15:00:00 -0500</pubDate>
    <itunes:duration>2604</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>85</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 84: New Years Cyber Resolutions Part 2</itunes:title>
    <title>Episode 84: New Years Cyber Resolutions Part 2</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! As we step into the new year, it's essential to reinforce our defenses against cyber threats. Join Jonathan Kimmitt and Todd Wedel for part 2 of their discussion of cyberresolutions.  Their list includes:  - **Data Inventory**: Know your data—what, where, and who has access. Regular audits are a must! - **Backup Strategies**: Implement air-gapped backups and regularly test their effectiveness. - **Incident Response Playbooks**: Develop and regu...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>As we step into the new year, it&apos;s essential to reinforce our defenses against cyber threats. Join Jonathan Kimmitt and Todd Wedel for part 2 of their discussion of cyberresolutions.<br/><br/>Their list includes: <br/>- **Data Inventory**: Know your data—what, where, and who has access. Regular audits are a must!<br/>- **Backup Strategies**: Implement air-gapped backups and regularly test their effectiveness.<br/>- **Incident Response Playbooks**: Develop and regularly update clear procedures for handling breaches.<br/>-**And more!**</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>As we step into the new year, it&apos;s essential to reinforce our defenses against cyber threats. Join Jonathan Kimmitt and Todd Wedel for part 2 of their discussion of cyberresolutions.<br/><br/>Their list includes: <br/>- **Data Inventory**: Know your data—what, where, and who has access. Regular audits are a must!<br/>- **Backup Strategies**: Implement air-gapped backups and regularly test their effectiveness.<br/>- **Incident Response Playbooks**: Develop and regularly update clear procedures for handling breaches.<br/>-**And more!**</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/16490557-episode-84-new-years-cyber-resolutions-part-2.mp3" length="37931843" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16490557</guid>
    <pubDate>Thu, 23 Jan 2025 15:00:00 -0600</pubDate>
    <itunes:duration>3157</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 83: New Years Cyber Resolutions Part 1</itunes:title>
    <title>Episode 83: New Years Cyber Resolutions Part 1</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here!  🚀 Kickstart 2025 with Cybersecurity Resolutions! 🔐   In our latest podcast episode, Todd and Jonathan discuss crucial strategies for a secure year ahead.   Tune in for more insights and make this year your most secure yet! 🎧✨ #Cybersecurity #AI #Secure2025  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p> 🚀 Kickstart 2025 with Cybersecurity Resolutions! 🔐 <br/><br/>In our latest podcast episode, Todd and Jonathan discuss crucial strategies for a secure year ahead. <br/><br/>Tune in for more insights and make this year your most secure yet! 🎧✨ #Cybersecurity #AI #Secure2025 </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p> 🚀 Kickstart 2025 with Cybersecurity Resolutions! 🔐 <br/><br/>In our latest podcast episode, Todd and Jonathan discuss crucial strategies for a secure year ahead. <br/><br/>Tune in for more insights and make this year your most secure yet! 🎧✨ #Cybersecurity #AI #Secure2025 </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/16414224-episode-83-new-years-cyber-resolutions-part-1.mp3" length="27091131" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16414224</guid>
    <pubDate>Fri, 10 Jan 2025 10:00:00 -0600</pubDate>
    <itunes:duration>2254</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 82: Leaving It All On The Table - The What, How, and Why of Tabletop Exercises</itunes:title>
    <title>Episode 82: Leaving It All On The Table - The What, How, and Why of Tabletop Exercises</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Ready for an IR? You may have controls, policies, and procedures, but how do you know they exist? Are robust? Followed and adhered to? Join Jonathan Kimmitt and Alexandria Hendryx as they discuss what a tabletop is, how to conduct one effectively, and why they matter to your organization to prevent and prepare for the hoped never to appear IR. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Ready for an IR? You may have controls, policies, and procedures, but how do you know they exist? Are robust? Followed and adhered to? Join Jonathan Kimmitt and Alexandria Hendryx as they discuss what a tabletop is, how to conduct one effectively, and why they matter to your organization to prevent and prepare for the hoped never to appear IR.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Ready for an IR? You may have controls, policies, and procedures, but how do you know they exist? Are robust? Followed and adhered to? Join Jonathan Kimmitt and Alexandria Hendryx as they discuss what a tabletop is, how to conduct one effectively, and why they matter to your organization to prevent and prepare for the hoped never to appear IR.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/16226995-episode-82-leaving-it-all-on-the-table-the-what-how-and-why-of-tabletop-exercises.mp3" length="31445928" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16226995</guid>
    <pubDate>Thu, 05 Dec 2024 08:00:00 -0600</pubDate>
    <itunes:duration>2617</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 81: IR Aversion, Part 2</itunes:title>
    <title>Episode 81: IR Aversion, Part 2</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Join Jonathan Kimmitt and Todd Wedel as they continue discussing how to practice IR aversion tactics. 'Tis the season for IRs and best practice cybersecurity. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Join Jonathan Kimmitt and Todd Wedel as they continue discussing how to practice IR aversion tactics. &apos;Tis the season for IRs and best practice cybersecurity.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Join Jonathan Kimmitt and Todd Wedel as they continue discussing how to practice IR aversion tactics. &apos;Tis the season for IRs and best practice cybersecurity.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/16149122-episode-81-ir-aversion-part-2.mp3" length="28897939" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16149122</guid>
    <pubDate>Thu, 21 Nov 2024 14:00:00 -0600</pubDate>
    <itunes:duration>2405</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 80: IR Aversion, Part 1</itunes:title>
    <title>Episode 80: IR Aversion, Part 1</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here!  'Tis the holiday season! A time for family...and breaches. Want to be cyberprepared to spoil the hacker's celebration? Listen to our 2 part series where Jonathan Kimmitt ensures your festivities are without incident.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p> &apos;Tis the holiday season! A time for family...and breaches. Want to be cyberprepared to spoil the hacker&apos;s celebration? Listen to our 2 part series where Jonathan Kimmitt ensures your festivities are without incident. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p> &apos;Tis the holiday season! A time for family...and breaches. Want to be cyberprepared to spoil the hacker&apos;s celebration? Listen to our 2 part series where Jonathan Kimmitt ensures your festivities are without incident. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/16064444-episode-80-ir-aversion-part-1.mp3" length="19399189" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16064444</guid>
    <pubDate>Thu, 07 Nov 2024 09:00:00 -0600</pubDate>
    <itunes:duration>1613</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 79: Firewall Follies</itunes:title>
    <title>Episode 79: Firewall Follies</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Firewalls are an often overlooked or unmanaged part of a network infrastructure. Listen as Andrew Hickman and Keelan Knox discuss what they are, why you should pay attention to them, what we've seen on incident responses, and what you need to do to secure your network.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Firewalls are an often overlooked or unmanaged part of a network infrastructure. Listen as Andrew Hickman and Keelan Knox discuss what they are, why you should pay attention to them, what we&apos;ve seen on incident responses, and what you need to do to secure your network. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Firewalls are an often overlooked or unmanaged part of a network infrastructure. Listen as Andrew Hickman and Keelan Knox discuss what they are, why you should pay attention to them, what we&apos;ve seen on incident responses, and what you need to do to secure your network. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/15985985-episode-79-firewall-follies.mp3" length="40047098" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15985985</guid>
    <pubDate>Thu, 24 Oct 2024 12:00:00 -0500</pubDate>
    <itunes:duration>3334</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 78: S3CCON Debrief</itunes:title>
    <title>Episode 78: S3CCON Debrief</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Attend S3CCON? Enjoy experiencing the recap. Miss S3CCON? Hear what was awesome, what we learned, and what to look forward to in 2025! Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Attend S3CCON? Enjoy experiencing the recap. Miss S3CCON? Hear what was awesome, what we learned, and what to look forward to in 2025!</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Attend S3CCON? Enjoy experiencing the recap. Miss S3CCON? Hear what was awesome, what we learned, and what to look forward to in 2025!</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/15865509-episode-78-s3ccon-debrief.mp3" length="19093233" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15865509</guid>
    <pubDate>Fri, 04 Oct 2024 09:00:00 -0500</pubDate>
    <itunes:duration>1588</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 77: Defcon Debrief 2024</itunes:title>
    <title>Episode 77: Defcon Debrief 2024</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/15709073-episode-77-defcon-debrief-2024.mp3" length="48689142" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15709073</guid>
    <pubDate>Thu, 03 Oct 2024 16:00:00 -0500</pubDate>
    <itunes:duration>4054</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 76: Losing the Cyberwar Through Marketing, Part 2</itunes:title>
    <title>Episode 76: Losing the Cyberwar Through Marketing, Part 2</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Jonathan and Todd continue the conversation about how the way we talk about cybersecurity puts us in a deficit against the malicious actors and how we might reframe to better equip the defenders. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Jonathan and Todd continue the conversation about how the way we talk about cybersecurity puts us in a deficit against the malicious actors and how we might reframe to better equip the defenders.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Jonathan and Todd continue the conversation about how the way we talk about cybersecurity puts us in a deficit against the malicious actors and how we might reframe to better equip the defenders.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/15620063-episode-76-losing-the-cyberwar-through-marketing-part-2.mp3" length="39871927" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15620063</guid>
    <pubDate>Thu, 22 Aug 2024 08:00:00 -0500</pubDate>
    <itunes:duration>3319</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 75: Losing the Cyberwar Through Marketing, Part 1</itunes:title>
    <title>Episode 75: Losing the Cyberwar Through Marketing, Part 1</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Are hackers really as successful as they appear? Or is it that they have better messaging? Join us for a conversation about how marketing around cybersecurity might play a part in the hacker mystique. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Are hackers really as successful as they appear? Or is it that they have better messaging? Join us for a conversation about how marketing around cybersecurity might play a part in the hacker mystique.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Are hackers really as successful as they appear? Or is it that they have better messaging? Join us for a conversation about how marketing around cybersecurity might play a part in the hacker mystique.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/15552367-episode-75-losing-the-cyberwar-through-marketing-part-1.mp3" length="31599156" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15552367</guid>
    <pubDate>Thu, 08 Aug 2024 14:00:00 -0500</pubDate>
    <itunes:duration>2630</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 74: Internship Intrigue</itunes:title>
    <title>Episode 74: Internship Intrigue</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! On this episode of the SecureAF Podcast, Keelan Knox interviews our 2024 interns. They share insights on how they got in, what they are learning, and where this will take them. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>On this episode of the SecureAF Podcast, Keelan Knox interviews our 2024 interns. They share insights on how they got in, what they are learning, and where this will take them.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>On this episode of the SecureAF Podcast, Keelan Knox interviews our 2024 interns. They share insights on how they got in, what they are learning, and where this will take them.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/15398777-episode-74-internship-intrigue.mp3" length="22214144" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15398777</guid>
    <pubDate>Thu, 11 Jul 2024 10:00:00 -0500</pubDate>
    <itunes:duration>1848</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 73: Never Been Vished?</itunes:title>
    <title>Episode 73: Never Been Vished?</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Alias CEO Donovan Farrow and Business Development Coordinator Trey Allen talk the tips and tricks of the vishing trade. They're gearing up for the DEFCON social engineering village. Listen or watch to hear their tales and experiences to learn how they're going to bring the heat to Las Vegas.   Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Alias CEO Donovan Farrow and Business Development Coordinator Trey Allen talk the tips and tricks of the vishing trade. They&apos;re gearing up for the DEFCON social engineering village. Listen or watch to hear their tales and experiences to learn how they&apos;re going to bring the heat to Las Vegas.</p><p> </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Alias CEO Donovan Farrow and Business Development Coordinator Trey Allen talk the tips and tricks of the vishing trade. They&apos;re gearing up for the DEFCON social engineering village. Listen or watch to hear their tales and experiences to learn how they&apos;re going to bring the heat to Las Vegas.</p><p> </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/15318307-episode-73-never-been-vished.mp3" length="30173757" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15318307</guid>
    <pubDate>Thu, 27 Jun 2024 20:00:00 -0500</pubDate>
    <itunes:duration>2511</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 72: Security in Process</itunes:title>
    <title>Episode 72: Security in Process</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Bryan Filice of Trap Technologies joins Keelan Knox to talk about the current threat landscape and why security has to involve every system, host, and employee.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Bryan Filice of Trap Technologies joins Keelan Knox to talk about the current threat landscape and why security has to involve every system, host, and employee. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Bryan Filice of Trap Technologies joins Keelan Knox to talk about the current threat landscape and why security has to involve every system, host, and employee. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/15243326-episode-72-security-in-process.mp3" length="24009334" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15243326</guid>
    <pubDate>Thu, 13 Jun 2024 07:00:00 -0500</pubDate>
    <itunes:duration>1997</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 71: When the CISO Speaks Up</itunes:title>
    <title>Episode 71: When the CISO Speaks Up</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Ever wonder what your CISO (or CIO or anyone in IT security management) may be thinking? Are you’re the one in that position having those thoughts? Join Jonathan Kimmitt as he describes all the things CISOs wish they say but don't…and why and when they should.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Ever wonder what your CISO (or CIO or anyone in IT security management) may be thinking? Are you’re the one in that position having those thoughts? Join Jonathan Kimmitt as he describes all the things CISOs wish they say but don&apos;t…and why and when they should. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Ever wonder what your CISO (or CIO or anyone in IT security management) may be thinking? Are you’re the one in that position having those thoughts? Join Jonathan Kimmitt as he describes all the things CISOs wish they say but don&apos;t…and why and when they should. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/15162702-episode-71-when-the-ciso-speaks-up.mp3" length="41506890" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15162702</guid>
    <pubDate>Thu, 30 May 2024 08:00:00 -0500</pubDate>
    <itunes:duration>3455</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 70 - Boeing and Beyond</itunes:title>
    <title>Episode 70 - Boeing and Beyond</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Heard about the recent revelation of the Boeing breach? Join Alias CEO Donovan Farrow on the SecureAF Podcast as he lays out what we know, what we don't, what this means, and what we hope to learn to better protect our companies and communities, locally and nationally.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Heard about the recent revelation of the Boeing breach? Join Alias CEO Donovan Farrow on the SecureAF Podcast as he lays out what we know, what we don&apos;t, what this means, and what we hope to learn to better protect our companies and communities, locally and nationally. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Heard about the recent revelation of the Boeing breach? Join Alias CEO Donovan Farrow on the SecureAF Podcast as he lays out what we know, what we don&apos;t, what this means, and what we hope to learn to better protect our companies and communities, locally and nationally. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/15074389-episode-70-boeing-and-beyond.mp3" length="13183667" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15074389</guid>
    <pubDate>Wed, 15 May 2024 11:00:00 -0500</pubDate>
    <itunes:duration>1095</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 69 - AI or BS</itunes:title>
    <title>Episode 69 - AI or BS</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! AI is all the rage. Or AI having rage is the bigger fear. Doesn't matter where you go, it's a topic of attention. The potential uses and abuses are touted on every news station and from every pundit, whether proponent or naysayer. But what's true? Especially in the realm of cybersecurity?  Our engineers have on-the-ground knowledge of AI's capabilities, from the theoretical of how AI could be leveraged to the practical of how it actually is emp...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>AI is all the rage. Or AI having rage is the bigger fear. Doesn&apos;t matter where you go, it&apos;s a topic of attention. The potential uses and abuses are touted on every news station and from every pundit, whether proponent or naysayer. But what&apos;s true? Especially in the realm of cybersecurity?</p><p> Our engineers have on-the-ground knowledge of AI&apos;s capabilities, from the theoretical of how AI could be leveraged to the practical of how it actually is employed. Join CEO Donovan Farrow and Principal Security Engineer Tanner Shinn as they discuss the realities of AI to help you cut through the hype.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>AI is all the rage. Or AI having rage is the bigger fear. Doesn&apos;t matter where you go, it&apos;s a topic of attention. The potential uses and abuses are touted on every news station and from every pundit, whether proponent or naysayer. But what&apos;s true? Especially in the realm of cybersecurity?</p><p> Our engineers have on-the-ground knowledge of AI&apos;s capabilities, from the theoretical of how AI could be leveraged to the practical of how it actually is employed. Join CEO Donovan Farrow and Principal Security Engineer Tanner Shinn as they discuss the realities of AI to help you cut through the hype.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/14985570-episode-69-ai-or-bs.mp3" length="18568740" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14985570</guid>
    <pubDate>Thu, 02 May 2024 08:00:00 -0500</pubDate>
    <itunes:duration>1544</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 68 - It&#39;s Exploit O&#39;Clock</itunes:title>
    <title>Episode 68 - It&#39;s Exploit O&#39;Clock</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Seriously, do you know where your data is? It’s an often overlooked question in cybersecurity. In the case of an incident, without knowing where your data is, how do you know what’s been accessed? Where else that data might be? What’s needed to remediate? And what’s less crucial to restore? But even before an incident, how do you know what to protect if you don’t know where your critical and privileged information is? How do you best allocate time, ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Seriously, do you know where your data is? It’s an often overlooked question in cybersecurity. In the case of an incident, without knowing where your data is, how do you know what’s been accessed? Where else that data might be? What’s needed to remediate? And what’s less crucial to restore?</p><p>But even before an incident, how do you know what to protect if you don’t know where your critical and privileged information is? How do you best allocate time, manpower, and resources in the absence of knowing what needs most attention?</p><p>In this episode, we&apos;ll discuss how to answer these questions, from what a Data Inventory is to how to conduct one to why one is crucial to your organization’s overall cybersecurity preparation and maturity.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Seriously, do you know where your data is? It’s an often overlooked question in cybersecurity. In the case of an incident, without knowing where your data is, how do you know what’s been accessed? Where else that data might be? What’s needed to remediate? And what’s less crucial to restore?</p><p>But even before an incident, how do you know what to protect if you don’t know where your critical and privileged information is? How do you best allocate time, manpower, and resources in the absence of knowing what needs most attention?</p><p>In this episode, we&apos;ll discuss how to answer these questions, from what a Data Inventory is to how to conduct one to why one is crucial to your organization’s overall cybersecurity preparation and maturity.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/14912885-episode-68-it-s-exploit-o-clock.mp3" length="30921652" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14912885</guid>
    <pubDate>Thu, 18 Apr 2024 10:00:00 -0500</pubDate>
    <itunes:duration>2573</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 67 - The CISO Pen Test</itunes:title>
    <title>Episode 67 - The CISO Pen Test</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! What good is a Pen Test? There are a host of answers - knowing your environment, identifying dangers, implementing remediations, meeting compliance.   But how should a CISO view a Pen Test given their unique role in the organization? How do they best understand the need, the conduct, the reporting, and the follow through?   On this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt shares his experience and expertise both in...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>What good is a Pen Test? There are a host of answers - knowing your environment, identifying dangers, implementing remediations, meeting compliance. </p><p> But how should a CISO view a Pen Test given their unique role in the organization? How do they best understand the need, the conduct, the reporting, and the follow through? <br/><br/>On this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt shares his experience and expertise both in his years in the role and as a consultant for other organizations. </p><p> </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>What good is a Pen Test? There are a host of answers - knowing your environment, identifying dangers, implementing remediations, meeting compliance. </p><p> But how should a CISO view a Pen Test given their unique role in the organization? How do they best understand the need, the conduct, the reporting, and the follow through? <br/><br/>On this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt shares his experience and expertise both in his years in the role and as a consultant for other organizations. </p><p> </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/14817882-episode-67-the-ciso-pen-test.mp3" length="36715256" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14817882</guid>
    <pubDate>Thu, 04 Apr 2024 08:00:00 -0500</pubDate>
    <itunes:duration>3056</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 65 - Holistic Security</itunes:title>
    <title>Episode 65 - Holistic Security</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Cybersecurity is critical to an organization. But cybersecurity is only part of a robust security posture. It’s equally important, and in fact of first importance, to assess information security. You need to assess what privacy guidelines, compliance, and best practices entail what data you can have so you can determine the security needed to keep it safe. On this episode of the SecureAF Podcast, host Jonathan Kimmitt is joined by Andrew Hernandez, ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Cybersecurity is critical to an organization. But cybersecurity is only part of a robust security posture. It’s equally important, and in fact of first importance, to assess information security. You need to assess what privacy guidelines, compliance, and best practices entail what data you can have so you can determine the security needed to keep it safe.</p><p>On this episode of the SecureAF Podcast, host Jonathan Kimmitt is joined by Andrew Hernandez, Director of Risk Management at Trapp Technology to discuss why this framework matters and how to position your organization for secure information and cybersecurity.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Cybersecurity is critical to an organization. But cybersecurity is only part of a robust security posture. It’s equally important, and in fact of first importance, to assess information security. You need to assess what privacy guidelines, compliance, and best practices entail what data you can have so you can determine the security needed to keep it safe.</p><p>On this episode of the SecureAF Podcast, host Jonathan Kimmitt is joined by Andrew Hernandez, Director of Risk Management at Trapp Technology to discuss why this framework matters and how to position your organization for secure information and cybersecurity.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/14642305-episode-65-holistic-security.mp3" length="31404457" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14642305</guid>
    <pubDate>Thu, 07 Mar 2024 08:00:00 -0600</pubDate>
    <itunes:duration>2613</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 64: Rules of Engagement</itunes:title>
    <title>Episode 64: Rules of Engagement</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Scheduling a cybersecurity engagement can be stressful, for client and pentester alike. Both want the same thing - a well conducted, accurate assessment of the client infrastructure to provide the best value add to bolster cybersecurity.   It helps to start from a shared set of standard expectations and practices. On this episode of the SecureAF Podcast, Tanner Shinn and Keelan Knox discuss the 5 Rules of Engagement that every pentester an...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Scheduling a cybersecurity engagement can be stressful, for client and pentester alike. Both want the same thing - a well conducted, accurate assessment of the client infrastructure to provide the best value add to bolster cybersecurity. </p><p> It helps to start from a shared set of standard expectations and practices. On this episode of the SecureAF Podcast, Tanner Shinn and Keelan Knox discuss the 5 Rules of Engagement that every pentester and customer should know and commit to. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Scheduling a cybersecurity engagement can be stressful, for client and pentester alike. Both want the same thing - a well conducted, accurate assessment of the client infrastructure to provide the best value add to bolster cybersecurity. </p><p> It helps to start from a shared set of standard expectations and practices. On this episode of the SecureAF Podcast, Tanner Shinn and Keelan Knox discuss the 5 Rules of Engagement that every pentester and customer should know and commit to. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/14512607-episode-64-rules-of-engagement.mp3" length="18792959" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14512607</guid>
    <pubDate>Thu, 22 Feb 2024 08:00:00 -0600</pubDate>
    <itunes:duration>1562</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 63 - Critial Infrastructure: The Final Frontier</itunes:title>
    <title>Episode 63 - Critial Infrastructure: The Final Frontier</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! wWhat's the Final Frontier? For Trekkies, it's space. For cybersecurity, it's Critical Infrastructure. Might not sound exciting, but the risks from poor security and the rewards of strong controls might get you to sit up and take notice. Maybe even motivate you to boldly go where no ethical hacker has gone before.  On this episode of the SecureAF Podcast, Donovan Farro and Phillip Wylie discuss why Critical Infrastructure matters, where the vul...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>wWhat&apos;s the Final Frontier? For Trekkies, it&apos;s space. For cybersecurity, it&apos;s Critical Infrastructure. Might not sound exciting, but the risks from poor security and the rewards of strong controls might get you to sit up and take notice. Maybe even motivate you to boldly go where no ethical hacker has gone before.</p><p> On this episode of the SecureAF Podcast, Donovan Farro and Phillip Wylie discuss why Critical Infrastructure matters, where the vulnerabilities are (such as being 20 yrs behind in awareness and implementation), what Alias does to test, and what you can do to secure your environment. Hear stories ranging from the serious to the surprising. Listen to hear our favorite ICS story from the interwebs - the little known but infamous Turbopig.<br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>wWhat&apos;s the Final Frontier? For Trekkies, it&apos;s space. For cybersecurity, it&apos;s Critical Infrastructure. Might not sound exciting, but the risks from poor security and the rewards of strong controls might get you to sit up and take notice. Maybe even motivate you to boldly go where no ethical hacker has gone before.</p><p> On this episode of the SecureAF Podcast, Donovan Farro and Phillip Wylie discuss why Critical Infrastructure matters, where the vulnerabilities are (such as being 20 yrs behind in awareness and implementation), what Alias does to test, and what you can do to secure your environment. Hear stories ranging from the serious to the surprising. Listen to hear our favorite ICS story from the interwebs - the little known but infamous Turbopig.<br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/14423266-episode-63-critial-infrastructure-the-final-frontier.mp3" length="28608047" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14423266</guid>
    <pubDate>Thu, 01 Feb 2024 14:00:00 -0600</pubDate>
    <itunes:duration>2380</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 62 - Entering Cyber Sideways</itunes:title>
    <title>Episode 62 - Entering Cyber Sideways</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Wondering what the best path into cybersecurity is? Here's a hint: There's not one answer.  On this episode of the SecureAF Podcast, Tanner Shinn and Keelan Knox share very different stories of getting into the field. Even with different paths, they'll share what they have in common and what you should think about and do if you want to become an ethical hacker.  Spoiler alert - one of their recommendations is to find internships. Alias is currently ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Wondering what the best path into cybersecurity is? Here&apos;s a hint: There&apos;s not one answer.</p><p> On this episode of the SecureAF Podcast, Tanner Shinn and Keelan Knox share very different stories of getting into the field. Even with different paths, they&apos;ll share what they have in common and what you should think about and do if you want to become an ethical hacker.</p><p> Spoiler alert - one of their recommendations is to find internships. Alias is currently accepting applications here: <a href='https://bit.ly/3TMDWM0'>https://bit.ly/3TMDWM0</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Wondering what the best path into cybersecurity is? Here&apos;s a hint: There&apos;s not one answer.</p><p> On this episode of the SecureAF Podcast, Tanner Shinn and Keelan Knox share very different stories of getting into the field. Even with different paths, they&apos;ll share what they have in common and what you should think about and do if you want to become an ethical hacker.</p><p> Spoiler alert - one of their recommendations is to find internships. Alias is currently accepting applications here: <a href='https://bit.ly/3TMDWM0'>https://bit.ly/3TMDWM0</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/14372278-episode-62-entering-cyber-sideways.mp3" length="28875398" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14372278</guid>
    <pubDate>Thu, 25 Jan 2024 09:00:00 -0600</pubDate>
    <itunes:duration>2402</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 61 - Pen Test Types</itunes:title>
    <title>Episode 61 - Pen Test Types</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! You may have heard of Penetration Tests. You may know you need one. You may have had one or more. But do you know there's more than one type? More than one take? More than one test?  On this episode of the SecureAF Podcast, Alias Principal Security Engineer Tanner Shinn and CISO Jonathan Kimmitt discuss the types of Pen Tests, how they're conducted, what they measure, and why they are needed. You'll walk away more informed about this important cyber...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>You may have heard of Penetration Tests. You may know you need one. You may have had one or more. But do you know there&apos;s more than one type? More than one take? More than one test?</p><p> On this episode of the SecureAF Podcast, Alias Principal Security Engineer Tanner Shinn and CISO Jonathan Kimmitt discuss the types of Pen Tests, how they&apos;re conducted, what they measure, and why they are needed. You&apos;ll walk away more informed about this important cybersecurity topic and more ready to know what you need to secure your environment. </p><p> We&apos;re always here as a resource to educate, empower, and offer the best services to fit your needs.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>You may have heard of Penetration Tests. You may know you need one. You may have had one or more. But do you know there&apos;s more than one type? More than one take? More than one test?</p><p> On this episode of the SecureAF Podcast, Alias Principal Security Engineer Tanner Shinn and CISO Jonathan Kimmitt discuss the types of Pen Tests, how they&apos;re conducted, what they measure, and why they are needed. You&apos;ll walk away more informed about this important cybersecurity topic and more ready to know what you need to secure your environment. </p><p> We&apos;re always here as a resource to educate, empower, and offer the best services to fit your needs.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/14291895-episode-61-pen-test-types.mp3" length="37905806" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14291895</guid>
    <pubDate>Thu, 11 Jan 2024 09:00:00 -0600</pubDate>
    <itunes:duration>3155</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 60 - Integris&#39; Assumed Incident</itunes:title>
    <title>Episode 60 - Integris&#39; Assumed Incident</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! There has been a lot of news about the alleged incident experienced by Integris. Some of you may have even received emails from the threat actors revealing personal information to solicit money. This is not the first attack to leverage the threat of leaked data for monetary reward. It is among the first for the threat actors to directly appeal to the individual victims.    Join host Donovan Farrow and guest Chris Yates for a discussion abo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>There has been a lot of news about the alleged incident experienced by Integris. Some of you may have even received emails from the threat actors revealing personal information to solicit money. This is not the first attack to leverage the threat of leaked data for monetary reward. It is among the first for the threat actors to directly appeal to the individual victims. </p><p> </p><p>Join host Donovan Farrow and guest Chris Yates for a discussion about the cybersecurity backdrop to this assumed incident, what we know about what has happened, and what you can do to protect yourself. Whether you’re a victim in this or not, the podcast will help you better understand what you hear in the news and better protect yourself against attacks.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>There has been a lot of news about the alleged incident experienced by Integris. Some of you may have even received emails from the threat actors revealing personal information to solicit money. This is not the first attack to leverage the threat of leaked data for monetary reward. It is among the first for the threat actors to directly appeal to the individual victims. </p><p> </p><p>Join host Donovan Farrow and guest Chris Yates for a discussion about the cybersecurity backdrop to this assumed incident, what we know about what has happened, and what you can do to protect yourself. Whether you’re a victim in this or not, the podcast will help you better understand what you hear in the news and better protect yourself against attacks.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/14252840-episode-60-integris-assumed-incident.mp3" length="28921484" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14252840</guid>
    <pubDate>Fri, 05 Jan 2024 09:00:00 -0600</pubDate>
    <itunes:duration>2406</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 59 - Pen Test Gaps</itunes:title>
    <title>Episode 59 - Pen Test Gaps</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! You know you need regular penetration tests to ensure your network is secure. You know the steps to remediate the findings and take the recommended actions to continue on a path toward cybersecurity.  But what about what you don't know? What about what the penetration test doesn't cover or doesn't reveal? On this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt and Director of Security Phillip Wylie share their insights on what penetrati...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>You know you need regular penetration tests to ensure your network is secure. You know the steps to remediate the findings and take the recommended actions to continue on a path toward cybersecurity.</p><p> But what about what you don&apos;t know? What about what the penetration test doesn&apos;t cover or doesn&apos;t reveal?</p><p>On this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt and Director of Security Phillip Wylie share their insights on what penetration tests should cover, what they often don&apos;t, and how to verify you&apos;re getting what your organization needs. These two bring a holistic viewpoint, from policy and procedure to on-the-ground network testing. </p><p> Find out what you need to know and how to act on it.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>You know you need regular penetration tests to ensure your network is secure. You know the steps to remediate the findings and take the recommended actions to continue on a path toward cybersecurity.</p><p> But what about what you don&apos;t know? What about what the penetration test doesn&apos;t cover or doesn&apos;t reveal?</p><p>On this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt and Director of Security Phillip Wylie share their insights on what penetration tests should cover, what they often don&apos;t, and how to verify you&apos;re getting what your organization needs. These two bring a holistic viewpoint, from policy and procedure to on-the-ground network testing. </p><p> Find out what you need to know and how to act on it.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/14183290-episode-59-pen-test-gaps.mp3" length="23975852" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14183290</guid>
    <pubDate>Thu, 21 Dec 2023 05:00:00 -0600</pubDate>
    <itunes:duration>1994</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 58 - Solar Winds and Beyond</itunes:title>
    <title>Episode 58 - Solar Winds and Beyond</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! The Solar Winds breach is not news. The CISO being personally named in the investigation is. Although not the first CISO to be so identified, this is the most high profile.   This raises questions for the future of CISO role and responsibility and IT more generally. Should an individual be held responsible for an incident? What is their responsibility to monitor and report? Does this responsibility extend from C-Suite to SOC Analyst? What legal...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>The Solar Winds breach is not news. The CISO being personally named in the investigation is. Although not the first CISO to be so identified, this is the most high profile. </p><p> This raises questions for the future of CISO role and responsibility and IT more generally. Should an individual be held responsible for an incident? What is their responsibility to monitor and report? Does this responsibility extend from C-Suite to SOC Analyst? What legal precedent might this set?</p><p> On this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt and Principal Engineer Tanner Shinn discuss these questions. The conversation is far ranging, from the immediate Solar Winds event to the broader questions it poses.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>The Solar Winds breach is not news. The CISO being personally named in the investigation is. Although not the first CISO to be so identified, this is the most high profile. </p><p> This raises questions for the future of CISO role and responsibility and IT more generally. Should an individual be held responsible for an incident? What is their responsibility to monitor and report? Does this responsibility extend from C-Suite to SOC Analyst? What legal precedent might this set?</p><p> On this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt and Principal Engineer Tanner Shinn discuss these questions. The conversation is far ranging, from the immediate Solar Winds event to the broader questions it poses.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/14101205-episode-58-solar-winds-and-beyond.mp3" length="38676957" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14101205</guid>
    <pubDate>Thu, 07 Dec 2023 07:00:00 -0600</pubDate>
    <itunes:duration>3219</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 57 - Introducing Phillip Wylie</itunes:title>
    <title>Episode 57 - Introducing Phillip Wylie</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! If you follow our socials, you know Phillip Wylie recently joined the Alias crew! We’re excited to welcome him to help us build our team’s presence supporting organizations’ and individuals’ growth in cybermaturity.  Join Alias CISO Jonathan Kimmitt to hear his story of getting into cybersecurity, what’s brought him to Alias, and what's to come.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podca...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>If you follow our socials, you know Phillip Wylie recently joined the Alias crew! We’re excited to welcome him to help us build our team’s presence supporting organizations’ and individuals’ growth in cybermaturity. </p><p>Join Alias CISO Jonathan Kimmitt to hear his story of getting into cybersecurity, what’s brought him to Alias, and what&apos;s to come. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>If you follow our socials, you know Phillip Wylie recently joined the Alias crew! We’re excited to welcome him to help us build our team’s presence supporting organizations’ and individuals’ growth in cybermaturity. </p><p>Join Alias CISO Jonathan Kimmitt to hear his story of getting into cybersecurity, what’s brought him to Alias, and what&apos;s to come. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/13941813-episode-57-introducing-phillip-wylie.mp3" length="25667356" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13941813</guid>
    <pubDate>Thu, 09 Nov 2023 12:00:00 -0600</pubDate>
    <itunes:duration>2135</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 56 - The Human Incident Response</itunes:title>
    <title>Episode 56 - The Human Incident Response</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! It requires technical expertise to respond to a breach. It requires thinking like a hacker to know where to go, what to do, and what level of response is appropriate. It requires the human element. But humans aren't machines. Your staff and any outside experts require basic needs to be met: food, shelter (well, at least sleep), probably a lot of caffeine. In a crisis, it's easy to not attend to those. How much easier is it to not attend to the inter...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>It requires technical expertise to respond to a breach. It requires thinking like a hacker to know where to go, what to do, and what level of response is appropriate. It requires the human element. But humans aren&apos;t machines. Your staff and any outside experts require basic needs to be met: food, shelter (well, at least sleep), probably a lot of caffeine. In a crisis, it&apos;s easy to not attend to those. How much easier is it to not attend to the interpersonal dynamics both during and after an incident, to restore your people and not just your network to safety and stability.</p><p> On this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt and Communications Director Todd Wedel discuss the human side of incident response. They&apos;ll discuss principles and best practices from both a general perspective and from lessons learned in the trenches.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>It requires technical expertise to respond to a breach. It requires thinking like a hacker to know where to go, what to do, and what level of response is appropriate. It requires the human element. But humans aren&apos;t machines. Your staff and any outside experts require basic needs to be met: food, shelter (well, at least sleep), probably a lot of caffeine. In a crisis, it&apos;s easy to not attend to those. How much easier is it to not attend to the interpersonal dynamics both during and after an incident, to restore your people and not just your network to safety and stability.</p><p> On this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt and Communications Director Todd Wedel discuss the human side of incident response. They&apos;ll discuss principles and best practices from both a general perspective and from lessons learned in the trenches.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/13846651-episode-56-the-human-incident-response.mp3" length="42085633" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13846651</guid>
    <pubDate>Wed, 25 Oct 2023 15:00:00 -0500</pubDate>
    <itunes:duration>3503</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 55 - The Hacking Business</itunes:title>
    <title>Episode 55 - The Hacking Business</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Did you know some ransomware groups have customer support better than major businesses? That the negotiations might feel more like a regular corporate transaction than a back-alley holdup?  On this episode of the SecureAF Podcast, CEO Donovan Farrow and Security Team Lead Tanner Shinn share their experience working the business side of an Incident Response. You'll hear stories of every size and brand of company, lessons learned, and tips for how to ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Did you know some ransomware groups have customer support better than major businesses? That the negotiations might feel more like a regular corporate transaction than a back-alley holdup?<br/><br/>On this episode of the SecureAF Podcast, CEO Donovan Farrow and Security Team Lead Tanner Shinn share their experience working the business side of an Incident Response. You&apos;ll hear stories of every size and brand of company, lessons learned, and tips for how to respond. <br/><br/>It&apos;s a fitting topic to begin Cybersecurity Awareness Month - join us to become more aware and armed to protect yourself, your business, and your community!</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Did you know some ransomware groups have customer support better than major businesses? That the negotiations might feel more like a regular corporate transaction than a back-alley holdup?<br/><br/>On this episode of the SecureAF Podcast, CEO Donovan Farrow and Security Team Lead Tanner Shinn share their experience working the business side of an Incident Response. You&apos;ll hear stories of every size and brand of company, lessons learned, and tips for how to respond. <br/><br/>It&apos;s a fitting topic to begin Cybersecurity Awareness Month - join us to become more aware and armed to protect yourself, your business, and your community!</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/13699447-episode-55-the-hacking-business.mp3" length="26056362" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13699447</guid>
    <pubDate>Mon, 02 Oct 2023 09:00:00 -0500</pubDate>
    <itunes:duration>2167</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 54: Your Family Is The Target</itunes:title>
    <title>Episode 54: Your Family Is The Target</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! You know you may be a target. But what about your family? How could a hacker leverage those closest to you to gain advanced access to your work? Recently on the And Security For All podcast, Alias CISO Jonathan Kimmitt and Security Team Lead Tanner Shinn discussed this question. You can listen to their conversation here.  On this episode of the SecureAF Podcast, they turn a Blue Team eye to your family. Join us as they discuss steps they curren...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>You know you may be a target. But what about your family? How could a hacker leverage those closest to you to gain advanced access to your work? Recently on the <a href='https://www.voiceamerica.com/show/4002/and-security-for-all'>And Security For All</a> podcast, Alias CISO Jonathan Kimmitt and Security Team Lead Tanner Shinn discussed this question. You can listen to their conversation <a href='https://www.voiceamerica.com/episode/145948/when-families-arent-even-safe'>here</a>. </p><p>On this episode of the SecureAF Podcast, they turn a Blue Team eye to your family. Join us as they discuss steps they currently take or would take with their family to ensure bad actors won’t use them as avenues of attack. Listen for yourself to learn how to keep your family safe. Listen for (or even with!) your organization to learn how to support your employees and coworkers to build a secure company culture, starting at home.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>You know you may be a target. But what about your family? How could a hacker leverage those closest to you to gain advanced access to your work? Recently on the <a href='https://www.voiceamerica.com/show/4002/and-security-for-all'>And Security For All</a> podcast, Alias CISO Jonathan Kimmitt and Security Team Lead Tanner Shinn discussed this question. You can listen to their conversation <a href='https://www.voiceamerica.com/episode/145948/when-families-arent-even-safe'>here</a>. </p><p>On this episode of the SecureAF Podcast, they turn a Blue Team eye to your family. Join us as they discuss steps they currently take or would take with their family to ensure bad actors won’t use them as avenues of attack. Listen for yourself to learn how to keep your family safe. Listen for (or even with!) your organization to learn how to support your employees and coworkers to build a secure company culture, starting at home.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/13551252-episode-54-your-family-is-the-target.mp3" length="39267851" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13551252</guid>
    <pubDate>Thu, 07 Sep 2023 15:00:00 -0500</pubDate>
    <itunes:duration>3268</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 53 - DefCon Debrief 2023</itunes:title>
    <title>Episode 53 - DefCon Debrief 2023</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! What were the lessons from Defcon 31? What were the most noteworthy experiences of the conference (Hint: it's not all about the talks and villages). On this episode of the SecureAF Podcast, join Alias Security Team Lead Tanner Shinn and Security Engineer Keelan Knox to hear what they learned and what went down this year at Defcon.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and any...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>What were the lessons from Defcon 31? What were the most noteworthy experiences of the conference (Hint: it&apos;s not all about the talks and villages). On this episode of the SecureAF Podcast, join Alias Security Team Lead Tanner Shinn and Security Engineer Keelan Knox to hear what they learned and what went down this year at Defcon. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>What were the lessons from Defcon 31? What were the most noteworthy experiences of the conference (Hint: it&apos;s not all about the talks and villages). On this episode of the SecureAF Podcast, join Alias Security Team Lead Tanner Shinn and Security Engineer Keelan Knox to hear what they learned and what went down this year at Defcon. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/13464370-episode-53-defcon-debrief-2023.mp3" length="14703126" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13464370</guid>
    <pubDate>Thu, 24 Aug 2023 10:00:00 -0500</pubDate>
    <itunes:duration>1221</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 52 - DEF CON Preview 2023</itunes:title>
    <title>Episode 52 - DEF CON Preview 2023</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Headed to DEF CON? Want to know what you should know and where you should be? And most importantly, how to survive? On this episode of the SecureAF Podcast, host Donovan Farrow and guest Tanner Shinn talk all thing DEF CON. New to DEF CON? Learn from us how to make the most of the experience. Returning to DEF CON? Remember best talks and best places to go and people to meet (including our team!). Not attending this year? Get a sense of what you’re m...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Headed to DEF CON? Want to know what you should know and where you should be? And most importantly, how to survive? On this episode of the SecureAF Podcast, host Donovan Farrow and guest Tanner Shinn talk all thing DEF CON. New to DEF CON? Learn from us how to make the most of the experience. Returning to DEF CON? Remember best talks and best places to go and people to meet (including our team!). Not attending this year? Get a sense of what you’re missing and why you should attend next year.</p><p>Watch or listen, then hit us up in person. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Headed to DEF CON? Want to know what you should know and where you should be? And most importantly, how to survive? On this episode of the SecureAF Podcast, host Donovan Farrow and guest Tanner Shinn talk all thing DEF CON. New to DEF CON? Learn from us how to make the most of the experience. Returning to DEF CON? Remember best talks and best places to go and people to meet (including our team!). Not attending this year? Get a sense of what you’re missing and why you should attend next year.</p><p>Watch or listen, then hit us up in person. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/13376330-episode-52-def-con-preview-2023.mp3" length="17749110" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13376330</guid>
    <pubDate>Wed, 09 Aug 2023 09:00:00 -0500</pubDate>
    <itunes:duration>1475</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 51 - Digital Forensics</itunes:title>
    <title>Episode 51 - Digital Forensics</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Digital forensics may be something you don't think about. Or think about only after an incident or breach. But knowing what techniques and tools are used will help equip you to understand your potential vulnerabilities and strengthen your security posture. And you'll gain more insight into the work an Incident Response team does. In this episode of the SecureAF Podcast, Alias CEO and digital forensics expert, consultant, and expert witness will shar...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Digital forensics may be something you don&apos;t think about. Or think about only after an incident or breach. But knowing what techniques and tools are used will help equip you to understand your potential vulnerabilities and strengthen your security posture. And you&apos;ll gain more insight into the work an Incident Response team does. In this episode of the SecureAF Podcast, Alias CEO and digital forensics expert, consultant, and expert witness will share his experience and expertise. He&apos;ll share the technical techniques and tools, including in the video version a demonstration by our digital forensics engineer Andrew Peters, as well as stories of exploits and engagements. Listen to hear this important and interesting topic from our dynamic leader. </p><p><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Digital forensics may be something you don&apos;t think about. Or think about only after an incident or breach. But knowing what techniques and tools are used will help equip you to understand your potential vulnerabilities and strengthen your security posture. And you&apos;ll gain more insight into the work an Incident Response team does. In this episode of the SecureAF Podcast, Alias CEO and digital forensics expert, consultant, and expert witness will share his experience and expertise. He&apos;ll share the technical techniques and tools, including in the video version a demonstration by our digital forensics engineer Andrew Peters, as well as stories of exploits and engagements. Listen to hear this important and interesting topic from our dynamic leader. </p><p><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/13300772-episode-51-digital-forensics.mp3" length="32796888" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13300772</guid>
    <pubDate>Thu, 27 Jul 2023 10:00:00 -0500</pubDate>
    <itunes:duration>2729</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 50! - Targets of Opportunity</itunes:title>
    <title>Episode 50! - Targets of Opportunity</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! The SecureAF Podcast is 50! Listen this week as our hosts discuss a critical topic in cybersecurity.  Your environment may be unique. Your business may feel to small to be noticed. But to a hacker, everyone is a target of opportunity, and every target may yield to the same avenues of attack. On this episode of the SecureAF Podcast, Alias CEO Donovan Farrow and CISO Jonathan Kimmitt discuss how to view your environment from the perspective of th...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>The SecureAF Podcast is 50! Listen this week as our hosts discuss a critical topic in cybersecurity. </p><p>Your environment may be unique. Your business may feel to small to be noticed. But to a hacker, everyone is a target of opportunity, and every target may yield to the same avenues of attack. On this episode of the SecureAF Podcast, Alias CEO Donovan Farrow and CISO Jonathan Kimmitt discuss how to view your environment from the perspective of the attacker. And it’s not just your network. It’s your people. Our hosts will cover how to consider not just appropriate security controls but how to approach culture change so that your people become your first line of defense. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>The SecureAF Podcast is 50! Listen this week as our hosts discuss a critical topic in cybersecurity. </p><p>Your environment may be unique. Your business may feel to small to be noticed. But to a hacker, everyone is a target of opportunity, and every target may yield to the same avenues of attack. On this episode of the SecureAF Podcast, Alias CEO Donovan Farrow and CISO Jonathan Kimmitt discuss how to view your environment from the perspective of the attacker. And it’s not just your network. It’s your people. Our hosts will cover how to consider not just appropriate security controls but how to approach culture change so that your people become your first line of defense. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/13217808-episode-50-targets-of-opportunity.mp3" length="31002601" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13217808</guid>
    <pubDate>Thu, 13 Jul 2023 10:00:00 -0500</pubDate>
    <itunes:duration>2580</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 49 - Pentester vs. Thintester</itunes:title>
    <title>Episode 49 - Pentester vs. Thintester</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Want to become a Pentester rather than a Thintester? Want to find out what a Thintester even means?   In this episode of the SecureAF Podcast, Alias CEO Donovan Farrow and CISO Jonathan Kimmitt discuss one of our often-asked questions: What do I need to do to become a Pentester? They'll talk about what qualities and experiences prepare you for the role (you might be surprised!) and why knowing the why more than just the what of how to use tools...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Want to become a Pentester rather than a Thintester? Want to find out what a Thintester even means? <br/><br/>In this episode of the SecureAF Podcast, Alias CEO Donovan Farrow and CISO Jonathan Kimmitt discuss one of our often-asked questions: What do I need to do to become a Pentester? They&apos;ll talk about what qualities and experiences prepare you for the role (you might be surprised!) and why knowing the why more than just the what of how to use tools and leverage exploits matter. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Want to become a Pentester rather than a Thintester? Want to find out what a Thintester even means? <br/><br/>In this episode of the SecureAF Podcast, Alias CEO Donovan Farrow and CISO Jonathan Kimmitt discuss one of our often-asked questions: What do I need to do to become a Pentester? They&apos;ll talk about what qualities and experiences prepare you for the role (you might be surprised!) and why knowing the why more than just the what of how to use tools and leverage exploits matter. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/13091478-episode-49-pentester-vs-thintester.mp3" length="32748001" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13091478</guid>
    <pubDate>Thu, 22 Jun 2023 17:00:00 -0500</pubDate>
    <itunes:duration>2725</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 48 - Updates and Announcements - Secure AF</itunes:title>
    <title>Episode 48 - Updates and Announcements - Secure AF</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! SecureAF host Donovan Farrow shares news about transitions with the SecureAF Podcast and exciting announcements about what else is coming for the Alias podcast lineup. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>SecureAF host Donovan Farrow shares news about transitions with the SecureAF Podcast and exciting announcements about what else is coming for the Alias podcast lineup.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>SecureAF host Donovan Farrow shares news about transitions with the SecureAF Podcast and exciting announcements about what else is coming for the Alias podcast lineup.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/13002514-episode-48-updates-and-announcements-secure-af.mp3" length="1514564" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13002514</guid>
    <pubDate>Thu, 08 Jun 2023 09:00:00 -0500</pubDate>
    <itunes:duration>122</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 47 - IOT and XIOT Devices and Dangers</itunes:title>
    <title>Episode 47 - IOT and XIOT Devices and Dangers</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! The Internet of Things (IoT) and connection Operational Technology (OT) devices has opened up possibilities for extending interconnectivity and creating means of more immediate controls on crucial systems and everyday devices. These open opportunities for hackers to exploit their connections and leverage access for malicious and destructive ends.  On this episode of the SecureAF Podcast, special guest Brian Contos joins us to explore this new world ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>The Internet of Things (IoT) and connection Operational Technology (OT) devices has opened up possibilities for extending interconnectivity and creating means of more immediate controls on crucial systems and everyday devices. These open opportunities for hackers to exploit their connections and leverage access for malicious and destructive ends.<br/><br/>On this episode of the SecureAF Podcast, special guest Brian Contos joins us to explore this new world of devices and dangers. Discover how IoT, OT &amp; network devices are being hacked and by whom - Understand how these devices are being successfully leveraged for persistence and evasion - Explore war stories that illustrate the most vulnerable and compromised devices - Evaluate various tactics to take back control of your IoT, OT &amp; network devices.  <br/><br/>Join us for this engaging and crucial conversation.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>The Internet of Things (IoT) and connection Operational Technology (OT) devices has opened up possibilities for extending interconnectivity and creating means of more immediate controls on crucial systems and everyday devices. These open opportunities for hackers to exploit their connections and leverage access for malicious and destructive ends.<br/><br/>On this episode of the SecureAF Podcast, special guest Brian Contos joins us to explore this new world of devices and dangers. Discover how IoT, OT &amp; network devices are being hacked and by whom - Understand how these devices are being successfully leveraged for persistence and evasion - Explore war stories that illustrate the most vulnerable and compromised devices - Evaluate various tactics to take back control of your IoT, OT &amp; network devices.  <br/><br/>Join us for this engaging and crucial conversation.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/12913438-episode-47-iot-and-xiot-devices-and-dangers.mp3" length="38756575" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-12913438</guid>
    <pubDate>Wed, 24 May 2023 15:00:00 -0500</pubDate>
    <itunes:duration>3226</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 46 - Hacking a Cybersecurity Career</itunes:title>
    <title>Episode 46 - Hacking a Cybersecurity Career</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Building a cybersecurity career is a two-way street. There are the questions for those who do the hiring and those who are being hired - they're the same set of questions - What should and do employers look for? What education or certifications are needed? How do employers find and attract good talent?   In this episode of the SecureAF Podcast, Chad Kliewer with ISC(2) joins host Donovan Farrow to talk about best principles and practices. Hirin...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Building a cybersecurity career is a two-way street. There are the questions for those who do the hiring and those who are being hired - they&apos;re the same set of questions - What should and do employers look for? What education or certifications are needed? How do employers find and attract good talent? <br/><br/>In this episode of the SecureAF Podcast, Chad Kliewer with ISC(2) joins host Donovan Farrow to talk about best principles and practices. Hiring managers - Learn how to find the best cybersecurity staff. Career seekers - Learn what managers are looking for. Spoiler alert: Certifications don’t get jobs, people do.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Building a cybersecurity career is a two-way street. There are the questions for those who do the hiring and those who are being hired - they&apos;re the same set of questions - What should and do employers look for? What education or certifications are needed? How do employers find and attract good talent? <br/><br/>In this episode of the SecureAF Podcast, Chad Kliewer with ISC(2) joins host Donovan Farrow to talk about best principles and practices. Hiring managers - Learn how to find the best cybersecurity staff. Career seekers - Learn what managers are looking for. Spoiler alert: Certifications don’t get jobs, people do.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/12829579-episode-46-hacking-a-cybersecurity-career.mp3" length="36855402" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12829579</guid>
    <pubDate>Thu, 11 May 2023 09:00:00 -0500</pubDate>
    <itunes:duration>3067</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 45 - Code of Honor</itunes:title>
    <title>Episode 45 - Code of Honor</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Back the blue. Don’t start a fight; always finish one. Hold the door. Yes, ma’m. Don’t mess with Texas. From serious to seemingly frivolous, we’re steeped in ways to think, act, and believe. What if those are all expressions of a “code” that social engineers can use to leverage better exploits? On this episode of the SecureAF Podcast, Alias Cybersecurity Director of Communication Todd Wedel will share how this code works and how it can make you a be...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Back the blue. Don’t start a fight; always finish one. Hold the door. Yes, ma’m. Don’t mess with Texas. From serious to seemingly frivolous, we’re steeped in ways to think, act, and believe. What if those are all expressions of a “code” that social engineers can use to leverage better exploits? On this episode of the SecureAF Podcast, Alias Cybersecurity Director of Communication Todd Wedel will share how this code works and how it can make you a better social engineer. <a href='https://www.linkedin.com/feed/hashtag/?keywords=cybersecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7056345087793901568'>#cybersecurity</a> <a href='https://www.linkedin.com/feed/hashtag/?keywords=infosec&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7056345087793901568'>#infosec</a> <a href='https://www.linkedin.com/feed/hashtag/?keywords=socialengineering&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7056345087793901568'>#socialengineering</a> <a href='https://www.linkedin.com/feed/hashtag/?keywords=cultureofhonor&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7056345087793901568'>#cultureofhonor</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Back the blue. Don’t start a fight; always finish one. Hold the door. Yes, ma’m. Don’t mess with Texas. From serious to seemingly frivolous, we’re steeped in ways to think, act, and believe. What if those are all expressions of a “code” that social engineers can use to leverage better exploits? On this episode of the SecureAF Podcast, Alias Cybersecurity Director of Communication Todd Wedel will share how this code works and how it can make you a better social engineer. <a href='https://www.linkedin.com/feed/hashtag/?keywords=cybersecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7056345087793901568'>#cybersecurity</a> <a href='https://www.linkedin.com/feed/hashtag/?keywords=infosec&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7056345087793901568'>#infosec</a> <a href='https://www.linkedin.com/feed/hashtag/?keywords=socialengineering&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7056345087793901568'>#socialengineering</a> <a href='https://www.linkedin.com/feed/hashtag/?keywords=cultureofhonor&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7056345087793901568'>#cultureofhonor</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/12734617-episode-45-code-of-honor.mp3" length="30752119" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12734617</guid>
    <pubDate>Thu, 27 Apr 2023 08:00:00 -0500</pubDate>
    <itunes:duration>2559</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>45</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 44 - Vendor Due Diligence</itunes:title>
    <title>Episode 44 - Vendor Due Diligence</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! How do you work with vendors to ensure they are meeting your requirements for regulatory compliance? In this episode of the SecureAF Podcast, Alias CISO Jonathan Kimmitt will share his experience and expert tips on how to work with vendors to ensure a secure partnership.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>How do you work with vendors to ensure they are meeting your requirements for regulatory compliance? In this episode of the SecureAF Podcast, Alias CISO <a href='https://www.linkedin.com/in/ACoAACb1IN8BENva8drHCObM-jFtYzSVOa17vns'>J</a>onathan Kimmitt will share his experience and expert tips on how to work with vendors to ensure a secure partnership. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>How do you work with vendors to ensure they are meeting your requirements for regulatory compliance? In this episode of the SecureAF Podcast, Alias CISO <a href='https://www.linkedin.com/in/ACoAACb1IN8BENva8drHCObM-jFtYzSVOa17vns'>J</a>onathan Kimmitt will share his experience and expert tips on how to work with vendors to ensure a secure partnership. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/12642961-episode-44-vendor-due-diligence.mp3" length="42303480" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12642961</guid>
    <pubDate>Thu, 13 Apr 2023 08:00:00 -0500</pubDate>
    <itunes:duration>3521</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>44</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 43 - Cyber Training that Doesn&#39;t Suck</itunes:title>
    <title>Episode 43 - Cyber Training that Doesn&#39;t Suck</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! How do people really change their cyber behavior?   On this episode of Secure AF, Kevin Sesock met with us to discuss the challenges and pitfalls of traditional approaches to security training and his framework for training that doesn't suck. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>How do people really change their cyber behavior? <br/><br/>On this episode of Secure AF, Kevin Sesock met with us to discuss the challenges and pitfalls of traditional approaches to security training and his framework for training that doesn&apos;t suck.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>How do people really change their cyber behavior? <br/><br/>On this episode of Secure AF, Kevin Sesock met with us to discuss the challenges and pitfalls of traditional approaches to security training and his framework for training that doesn&apos;t suck.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/12542943-episode-43-cyber-training-that-doesn-t-suck.mp3" length="30583824" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12542943</guid>
    <pubDate>Thu, 30 Mar 2023 08:00:00 -0500</pubDate>
    <itunes:duration>2545</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#42 - SOC It To &#39;Em</itunes:title>
    <title>#42 - SOC It To &#39;Em</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! How do you build a Security Operations Center from the ground up?  On this episode of Secure AF, Gharrett Workun and Wade VanDeburgh met with us to discuss how they lead the development of a SOC, as well as strategized creative ways to keep their team engaged.    Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>How do you build a Security Operations Center from the ground up? </p><p>On this episode of Secure AF, Gharrett Workun and Wade VanDeburgh met with us to discuss how they lead the development of a SOC, as well as strategized creative ways to keep their team engaged. <br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>How do you build a Security Operations Center from the ground up? </p><p>On this episode of Secure AF, Gharrett Workun and Wade VanDeburgh met with us to discuss how they lead the development of a SOC, as well as strategized creative ways to keep their team engaged. <br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/12453634-42-soc-it-to-em.mp3" length="27158179" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12453634</guid>
    <pubDate>Thu, 16 Mar 2023 08:00:00 -0500</pubDate>
    <podcast:soundbite startTime="600.0" duration="30.0" />
    <itunes:duration>2259</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#41 APIs: More Risk Than You Think</itunes:title>
    <title>#41 APIs: More Risk Than You Think</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Why aren’t we paying more attention to API security? Application Programming Interfaces (APIs) offer a wide range of ever expanding capabilities, but cybersecurity needs to catch up to keep these attack surfaces secure.  On this episode of Secure AF, Phillip Wylie, Manager of Tech Evangelism &amp; Enablement at CyCognito met with us to discuss the topic of his article Securing APIs Through External Attack Surface Management. Support the show Watch f...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Why aren’t we paying more attention to API security? Application Programming Interfaces (APIs) offer a wide range of ever expanding capabilities, but cybersecurity needs to catch up to keep these attack surfaces secure.<br/><br/>On this episode of Secure AF, Phillip Wylie, Manager of Tech Evangelism &amp; Enablement at CyCognito met with us to discuss the topic of his article <a href='https://www.uscybersecurity.net/csmag/securing-apis-through-external-attack-surface-management-easm/'>Securing APIs Through External Attack Surface Management</a>.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Why aren’t we paying more attention to API security? Application Programming Interfaces (APIs) offer a wide range of ever expanding capabilities, but cybersecurity needs to catch up to keep these attack surfaces secure.<br/><br/>On this episode of Secure AF, Phillip Wylie, Manager of Tech Evangelism &amp; Enablement at CyCognito met with us to discuss the topic of his article <a href='https://www.uscybersecurity.net/csmag/securing-apis-through-external-attack-surface-management-easm/'>Securing APIs Through External Attack Surface Management</a>.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/12289403-41-apis-more-risk-than-you-think.mp3" length="26451335" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12289403</guid>
    <pubDate>Thu, 02 Mar 2023 08:00:00 -0600</pubDate>
    <itunes:duration>2200</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>41</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#40 Are The Hackers Winning?</itunes:title>
    <title>#40 Are The Hackers Winning?</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! How are cybersecurity professionals doing in the fight against hackers? Are the hackers winning?   This episode we chat with Donovan Farrow, CEO and Founder of Alias, as he breaks down the past present and future of cybersecurity. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>How are cybersecurity professionals doing in the fight against hackers? Are the hackers winning? <br/><br/>This episode we chat with Donovan Farrow, CEO and Founder of Alias, as he breaks down the past present and future of cybersecurity.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>How are cybersecurity professionals doing in the fight against hackers? Are the hackers winning? <br/><br/>This episode we chat with Donovan Farrow, CEO and Founder of Alias, as he breaks down the past present and future of cybersecurity.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/12197482-40-are-the-hackers-winning.mp3" length="33050481" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12197482</guid>
    <pubDate>Thu, 16 Feb 2023 08:00:00 -0600</pubDate>
    <itunes:duration>2750</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>40</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#39 IT vs Cybersecurity</itunes:title>
    <title>#39 IT vs Cybersecurity</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Knowing how to build something isn’t the same as knowing how to fix it. All too often, IT and Cybersecurity get lumped together and one is asked to do the other’s job. Though they may seem similar from the outside, both roles are uniquely important for sustaining your organization’s data and network infrastructure. Join us for this episode of the Secure AF Podcast where we spoke with technical writer Todd Wedel about the differences between IT and C...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Knowing how to build something isn’t the same as knowing how to fix it. All too often, IT and Cybersecurity get lumped together and one is asked to do the other’s job. Though they may seem similar from the outside, both roles are uniquely important for sustaining your organization’s data and network infrastructure.</p><p>Join us for this episode of the Secure AF Podcast where we spoke with technical writer Todd Wedel about the differences between IT and Cybersecurity and how to better utilize each skill set.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Knowing how to build something isn’t the same as knowing how to fix it. All too often, IT and Cybersecurity get lumped together and one is asked to do the other’s job. Though they may seem similar from the outside, both roles are uniquely important for sustaining your organization’s data and network infrastructure.</p><p>Join us for this episode of the Secure AF Podcast where we spoke with technical writer Todd Wedel about the differences between IT and Cybersecurity and how to better utilize each skill set.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/11877683-39-it-vs-cybersecurity.mp3" length="10663428" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11877683</guid>
    <pubDate>Thu, 15 Dec 2022 08:00:00 -0600</pubDate>
    <itunes:duration>885</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>39</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#38 Protecting Users From Themselves</itunes:title>
    <title>#38 Protecting Users From Themselves</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! We've talked about password security a lot on this podcast, and we’ll definitely keep talking about it. What we haven’t discussed enough is password security from the system administrator side.   What can admins do to better protect their users from themselves? Find out in this episode of the Secure AF podcast as we talk with security engineer, Robert Leasure. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Ap...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>We&apos;ve talked about password security a lot on this podcast, and we’ll definitely keep talking about it. What we haven’t discussed enough is password security from the system administrator side. <br/><br/>What can admins do to better protect their users from themselves? Find out in this episode of the Secure AF podcast as we talk with security engineer, Robert Leasure.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>We&apos;ve talked about password security a lot on this podcast, and we’ll definitely keep talking about it. What we haven’t discussed enough is password security from the system administrator side. <br/><br/>What can admins do to better protect their users from themselves? Find out in this episode of the Secure AF podcast as we talk with security engineer, Robert Leasure.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/11784453-38-protecting-users-from-themselves.mp3" length="12247414" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11784453</guid>
    <pubDate>Thu, 01 Dec 2022 07:00:00 -0600</pubDate>
    <itunes:duration>1017</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#37 Cybersecurity In Action</itunes:title>
    <title>#37 Cybersecurity In Action</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This week on the Secure AF Podcast, we spoke with cybersecurity professionals about their experiences in the industry. Join guest host Wes Malone as he explores three different points of view from inside the cyber world.   We were curious to find out how cyber pros felt about the industry. It was great hear from three individuals who got started and ended up on such different paths.  Support the show Watch full episodes at youtube.com/@ali...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week on the Secure AF Podcast, we spoke with cybersecurity professionals about their experiences in the industry. Join guest host Wes Malone as he explores three different points of view from inside the cyber world. <br/><br/>We were curious to find out how cyber pros felt about the industry. It was great hear from three individuals who got started and ended up on such different paths. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week on the Secure AF Podcast, we spoke with cybersecurity professionals about their experiences in the industry. Join guest host Wes Malone as he explores three different points of view from inside the cyber world. <br/><br/>We were curious to find out how cyber pros felt about the industry. It was great hear from three individuals who got started and ended up on such different paths. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/11712945-37-cybersecurity-in-action.mp3" length="14233852" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11712945</guid>
    <pubDate>Thu, 17 Nov 2022 07:00:00 -0600</pubDate>
    <itunes:duration>1182</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>36</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#36 Mental Health in Cybersecurity</itunes:title>
    <title>#36 Mental Health in Cybersecurity</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Mental health is one of those things that, while we’re getting better, we still often struggle to talk about and deal with. Our industry can be especially stressful and many cybersecurity professionals experience everything from imposter syndrome to burnout.  We spoke with security engineer, Kallen Curtis, to discuss some of the most common mental health issues we face in the cybersecurity industry, how to identify them, and how to combat them. Supp...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Mental health is one of those things that, while we’re getting better, we still often struggle to talk about and deal with. Our industry can be especially stressful and many cybersecurity professionals experience everything from imposter syndrome to burnout.<br/><br/>We spoke with security engineer, Kallen Curtis, to discuss some of the most common mental health issues we face in the cybersecurity industry, how to identify them, and how to combat them.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Mental health is one of those things that, while we’re getting better, we still often struggle to talk about and deal with. Our industry can be especially stressful and many cybersecurity professionals experience everything from imposter syndrome to burnout.<br/><br/>We spoke with security engineer, Kallen Curtis, to discuss some of the most common mental health issues we face in the cybersecurity industry, how to identify them, and how to combat them.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/11620554-36-mental-health-in-cybersecurity.mp3" length="15491819" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11620554</guid>
    <pubDate>Thu, 03 Nov 2022 07:00:00 -0500</pubDate>
    <itunes:duration>1287</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#35 Your Internet Identity</itunes:title>
    <title>#35 Your Internet Identity</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! As an internet user, your anonymity is not guaranteed.  Who has access to your information? Whose tracking your online habits? And how can you protect your privacy online? Find out in this Episode of the Secure AF Podcast!  We spoke with two of our security engineers here at Alias, Andrew Lemon and Tanner Shinn, about how to stay anonymous online.   Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcast...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>As an internet user, your anonymity is not guaranteed.  Who has access to your information? Whose tracking your online habits? And how can you protect your privacy online? Find out in this Episode of the Secure AF Podcast!<br/><br/>We spoke with two of our security engineers here at Alias, Andrew Lemon and Tanner Shinn, about how to stay anonymous online.<br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>As an internet user, your anonymity is not guaranteed.  Who has access to your information? Whose tracking your online habits? And how can you protect your privacy online? Find out in this Episode of the Secure AF Podcast!<br/><br/>We spoke with two of our security engineers here at Alias, Andrew Lemon and Tanner Shinn, about how to stay anonymous online.<br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/11534440-35-your-internet-identity.mp3" length="19609850" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11534440</guid>
    <pubDate>Thu, 20 Oct 2022 07:00:00 -0500</pubDate>
    <itunes:duration>1630</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#34 Password Security</itunes:title>
    <title>#34 Password Security</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! It’s Cybersecurity Awareness Month, are your passwords secure? Find out in this episode of the Secure AF Podcast!   We chatted with Technical Writer, Todd Wedel, to dive into why password security matters and how you can make stronger passwords.   Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>It’s Cybersecurity Awareness Month, are your passwords secure? Find out in this episode of the Secure AF Podcast! <br/><br/>We chatted with Technical Writer, Todd Wedel, to dive into why password security matters and how you can make stronger passwords.<br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>It’s Cybersecurity Awareness Month, are your passwords secure? Find out in this episode of the Secure AF Podcast! <br/><br/>We chatted with Technical Writer, Todd Wedel, to dive into why password security matters and how you can make stronger passwords.<br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/11446615-34-password-security.mp3" length="9932413" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11446615</guid>
    <pubDate>Thu, 06 Oct 2022 07:00:00 -0500</pubDate>
    <itunes:duration>824</itunes:duration>
    <itunes:keywords>#cybersecurity #infosec #passwords #cybersecurityawarenessmonth</itunes:keywords>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#33: Secure The Unexpected</itunes:title>
    <title>#33: Secure The Unexpected</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! On this episode of the Secure AF Podcast, we spoke with Robert Leasure, security engineer at Alias, to explore some of the most interesting things we have discovered on pen tests. As pentesters, we encounter a lot of surprising things you’d never expect to be vulnerable to cyberattacks. Even the smallest lapses in security can lead to a huge breach.     Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Pod...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>On this episode of the Secure AF Podcast, we spoke with Robert Leasure, security engineer at Alias, to explore some of the most interesting things we have discovered on pen tests.</p><p>As pentesters, we encounter a lot of surprising things you’d never expect to be vulnerable to cyberattacks. Even the smallest lapses in security can lead to a huge breach.  </p><p><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>On this episode of the Secure AF Podcast, we spoke with Robert Leasure, security engineer at Alias, to explore some of the most interesting things we have discovered on pen tests.</p><p>As pentesters, we encounter a lot of surprising things you’d never expect to be vulnerable to cyberattacks. Even the smallest lapses in security can lead to a huge breach.  </p><p><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/11321755-33-secure-the-unexpected.mp3" length="10952139" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11321755</guid>
    <pubDate>Thu, 22 Sep 2022 07:00:00 -0500</pubDate>
    <itunes:duration>909</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>32</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#32 Memory Forensics</itunes:title>
    <title>#32 Memory Forensics</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This week we spoke with our digital forensics expert, Andrew Peters, to highlight some important uses for memory forensics and how data can be recovered using computer memory.   Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week we spoke with our digital forensics expert, Andrew Peters, to highlight some important uses for memory forensics and how data can be recovered using computer memory.</p><p><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week we spoke with our digital forensics expert, Andrew Peters, to highlight some important uses for memory forensics and how data can be recovered using computer memory.</p><p><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/11279626-32-memory-forensics.mp3" length="5895866" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11279626</guid>
    <pubDate>Thu, 08 Sep 2022 07:00:00 -0500</pubDate>
    <itunes:duration>487</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#31 Bonus Episode - We Made the List: Inc. 5000&#39;s Fastest Growing Companies</itunes:title>
    <title>#31 Bonus Episode - We Made the List: Inc. 5000&#39;s Fastest Growing Companies</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! This week we have a special bonus episode of the Secure AF Podcast where we got to speak with CEO and Founder of Alias, Donovan Farrow, about his thoughts on our Inc. 5000 placement!  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week we have a special bonus episode of the Secure AF Podcast where we got to speak with CEO and Founder of Alias, Donovan Farrow, about his thoughts on our Inc. 5000 placement! </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>This week we have a special bonus episode of the Secure AF Podcast where we got to speak with CEO and Founder of Alias, Donovan Farrow, about his thoughts on our Inc. 5000 placement! </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/11232131-31-bonus-episode-we-made-the-list-inc-5000-s-fastest-growing-companies.mp3" length="7573350" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11232131</guid>
    <pubDate>Thu, 01 Sep 2022 07:00:00 -0500</pubDate>
    <itunes:duration>627</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>bonus</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#30: DEFCON Debrief 2022</itunes:title>
    <title>#30: DEFCON Debrief 2022</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Our engineers just got back from the largest hacker conference in the nation. So join us for this episode where we discuss all the stuff Principal Security Engineer, Andrew Lemon, and Security Engineering Lead, Tanner Shinn, learned from the many talks and villages at DEFCON!    Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Our engineers just got back from the largest hacker conference in the nation. So join us for this episode where we discuss all the stuff Principal Security Engineer, Andrew Lemon, and Security Engineering Lead, Tanner Shinn, learned from the many talks and villages at DEFCON!<br/><br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Our engineers just got back from the largest hacker conference in the nation. So join us for this episode where we discuss all the stuff Principal Security Engineer, Andrew Lemon, and Security Engineering Lead, Tanner Shinn, learned from the many talks and villages at DEFCON!<br/><br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/11201674-30-defcon-debrief-2022.mp3" length="16673890" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11201674</guid>
    <pubDate>Thu, 25 Aug 2022 07:00:00 -0500</pubDate>
    <itunes:duration>1386</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>30</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#29: Catch the Biggest Phish</itunes:title>
    <title>#29: Catch the Biggest Phish</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Join us this episode as we speak with Technical Writer, Todd Wedel, about how to improve your Red Team skills. Catch the biggest phish with these phishing tips! Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Join us this episode as we speak with Technical Writer, Todd Wedel, about how to improve your Red Team skills. Catch the biggest phish with these phishing tips!</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Join us this episode as we speak with Technical Writer, Todd Wedel, about how to improve your Red Team skills. Catch the biggest phish with these phishing tips!</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/11115739-29-catch-the-biggest-phish.mp3" length="12471214" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11115739</guid>
    <pubDate>Thu, 11 Aug 2022 07:00:00 -0500</pubDate>
    <itunes:duration>1035</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#28: SIEM for Small Business</itunes:title>
    <title>#28: SIEM for Small Business</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! As a small business, it's important you can still protect yourself and provide eyes on your network.   With this in mind, I invited Alias Security Engineering Lead Andrew Hickman as we discuss SIEM tools and why even small businesses need them.    Like our show? Subscribe wherever you're listening! Or if you're listening on our website, bookmark the page so you can easily return. Support the show Watch full episodes at youtube.com/@aliascy...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>As a small business, it&apos;s important you can still protect yourself and provide eyes on your network. <br/><br/>With this in mind, I invited Alias Security Engineering Lead Andrew Hickman as we discuss SIEM tools and why even small businesses need them.  <br/><br/>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>As a small business, it&apos;s important you can still protect yourself and provide eyes on your network. <br/><br/>With this in mind, I invited Alias Security Engineering Lead Andrew Hickman as we discuss SIEM tools and why even small businesses need them.  <br/><br/>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/11042462-28-siem-for-small-business.mp3" length="8495481" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11042462</guid>
    <pubDate>Thu, 28 Jul 2022 08:00:00 -0500</pubDate>
    <itunes:duration>704</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#27: Why You Need a Cybersecurity Homelab</itunes:title>
    <title>#27: Why You Need a Cybersecurity Homelab</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! In infosec, it's an intimidating task approaching new tools and exploits with the intent to determine how they work or if they'll break anything you didn't mean to break.   With this in mind, I invited Alias Security Engineering Lead Tanner Shinn as we discuss homelabs. Why you need them, how you set them up, and more.     Like our show? Subscribe wherever you're listening! Or if you're listening on our website, bookmark the page so y...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In infosec, it&apos;s an intimidating task approaching new tools and exploits with the intent to determine how they work or if they&apos;ll break anything you didn&apos;t mean to break. <br/><br/>With this in mind, I invited Alias Security Engineering Lead Tanner Shinn as we discuss homelabs. Why you need them, how you set them up, and more.   <br/><br/>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>In infosec, it&apos;s an intimidating task approaching new tools and exploits with the intent to determine how they work or if they&apos;ll break anything you didn&apos;t mean to break. <br/><br/>With this in mind, I invited Alias Security Engineering Lead Tanner Shinn as we discuss homelabs. Why you need them, how you set them up, and more.   <br/><br/>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/10955577-27-why-you-need-a-cybersecurity-homelab.mp3" length="8431560" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10955577</guid>
    <pubDate>Thu, 14 Jul 2022 08:00:00 -0500</pubDate>
    <itunes:duration>699</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#26: Password Cracking: An Overview</itunes:title>
    <title>#26: Password Cracking: An Overview</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! How secure is your password really? Well it's time to find out. On this episode of the Secure AF podcast, you'll leave with a high level look of what password cracking is as well as how you can use better passwords.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>How secure is your password really? Well it&apos;s time to find out. On this episode of the Secure AF podcast, you&apos;ll leave with a high level look of what password cracking is as well as how you can use better passwords. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>How secure is your password really? Well it&apos;s time to find out. On this episode of the Secure AF podcast, you&apos;ll leave with a high level look of what password cracking is as well as how you can use better passwords. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/10883879-26-password-cracking-an-overview.mp3" length="8804263" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10883879</guid>
    <pubDate>Thu, 30 Jun 2022 08:00:00 -0500</pubDate>
    <itunes:duration>730</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#25: World Backup Day</itunes:title>
    <title>#25: World Backup Day</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Learn practical tips on how you can backup your devices. Hard drive failure, weather, accidental deletion are just a few ways your data can be accidentally deleted.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Learn practical tips on how you can backup your devices. Hard drive failure, weather, accidental deletion are just a few ways your data can be accidentally deleted. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Learn practical tips on how you can backup your devices. Hard drive failure, weather, accidental deletion are just a few ways your data can be accidentally deleted. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/10348380-25-world-backup-day.mp3" length="8684891" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10348380</guid>
    <pubDate>Thu, 31 Mar 2022 06:00:00 -0500</pubDate>
    <itunes:duration>719</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#24: The Seven Steps of Digital Forensics</itunes:title>
    <title>#24: The Seven Steps of Digital Forensics</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Join our host Teddie as she sits down with Andrew Peters and talks about Digital Forensics. What is it? And why would I need it? Listen in to find out.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Join our host Teddie as she sits down with Andrew Peters and talks about Digital Forensics. What is it? And why would I need it? Listen in to find out. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Join our host Teddie as she sits down with Andrew Peters and talks about Digital Forensics. What is it? And why would I need it? Listen in to find out. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/10037501-24-the-seven-steps-of-digital-forensics.mp3" length="9507842" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10037501</guid>
    <pubDate>Wed, 09 Feb 2022 05:00:00 -0600</pubDate>
    <itunes:duration>781</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#23: L33T or Lame: A Hacker Tool Review</itunes:title>
    <title>#23: L33T or Lame: A Hacker Tool Review</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! "Top 10 Gifts for the Hacker in Your life" articles are incredibly common. But how do you know if some of the tools listed are actually worthwhile? On this episode, we went through a couple lists and categorized the tool as either l33t or lame based on real experience.   Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>&quot;Top 10 Gifts for the Hacker in Your life&quot; articles are incredibly common. But how do you know if some of the tools listed are actually worthwhile? On this episode, we went through a couple lists and categorized the tool as either l33t or lame based on real experience.  </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>&quot;Top 10 Gifts for the Hacker in Your life&quot; articles are incredibly common. But how do you know if some of the tools listed are actually worthwhile? On this episode, we went through a couple lists and categorized the tool as either l33t or lame based on real experience.  </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/9731412-23-l33t-or-lame-a-hacker-tool-review.mp3" length="18963500" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9731412</guid>
    <pubDate>Thu, 16 Dec 2021 08:00:00 -0600</pubDate>
    <itunes:duration>1576</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#22: Using OSINT: A Look at Open Source Intelligence</itunes:title>
    <title>#22: Using OSINT: A Look at Open Source Intelligence</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Open source intelligence (OSINT) is a way of gathering data that is entirely publicly available. Learn how red team engineers use OSINT when on an engagement, the tools they typically use, and how people use OSINT in their daily lives without even realizing it.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Open source intelligence (OSINT) is a way of gathering data that is entirely publicly available. Learn how red team engineers use OSINT when on an engagement, the tools they typically use, and how people use OSINT in their daily lives without even realizing it. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Open source intelligence (OSINT) is a way of gathering data that is entirely publicly available. Learn how red team engineers use OSINT when on an engagement, the tools they typically use, and how people use OSINT in their daily lives without even realizing it. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/9527526-22-using-osint-a-look-at-open-source-intelligence.mp3" length="19005844" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9527526</guid>
    <pubDate>Thu, 11 Nov 2021 07:00:00 -0600</pubDate>
    <itunes:duration>1580</itunes:duration>
    <itunes:keywords>cybersecurity, osint, red team, offensive security, physical security, open source intelligence</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#21: Conti Leak: A Look Inside</itunes:title>
    <title>#21: Conti Leak: A Look Inside</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/9167734-21-conti-leak-a-look-inside.mp3" length="11808543" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9167734</guid>
    <pubDate>Fri, 24 Sep 2021 08:00:00 -0500</pubDate>
    <itunes:duration>980</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#20: DEF CON 2021: The Alias Experience</itunes:title>
    <title>#20: DEF CON 2021: The Alias Experience</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Miss out on DEF CON this year? A few of the Alias team members went and got to experience the hybrid conference in-person. Learn what the conference was like from Andrew Lemon and Tanner Shinn, security engineers at Alias.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Miss out on DEF CON this year? A few of the Alias team members went and got to experience the hybrid conference in-person. Learn what the conference was like from Andrew Lemon and Tanner Shinn, security engineers at Alias. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Miss out on DEF CON this year? A few of the Alias team members went and got to experience the hybrid conference in-person. Learn what the conference was like from Andrew Lemon and Tanner Shinn, security engineers at Alias. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/9086209-20-def-con-2021-the-alias-experience.mp3" length="15307193" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9086209</guid>
    <pubDate>Thu, 26 Aug 2021 09:00:00 -0500</pubDate>
    <itunes:duration>1272</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, def con, dc2021</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#19: How Hackers Choose Who to Attack and Why Small Businesses Should Care</itunes:title>
    <title>#19: How Hackers Choose Who to Attack and Why Small Businesses Should Care</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Ever wonder how a hacker chooses what company to attack? I know I do. Which is why I brought Donovan Farrow, CEO of Alias, to join me on this episode of the Secure AF podcast.  Learn why he thinks hackers target or don’t target specific companies. And if you think “this would never happen to me, I’m too small a business” - well - don’t be so sure. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spot...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Ever wonder how a hacker chooses what company to attack? I know I do. Which is why I brought Donovan Farrow, CEO of Alias, to join me on this episode of the Secure AF podcast.<br/><br/>Learn why he thinks hackers target or don’t target specific companies. And if you think “this would never happen to me, I’m too small a business” - well - don’t be so sure.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Ever wonder how a hacker chooses what company to attack? I know I do. Which is why I brought Donovan Farrow, CEO of Alias, to join me on this episode of the Secure AF podcast.<br/><br/>Learn why he thinks hackers target or don’t target specific companies. And if you think “this would never happen to me, I’m too small a business” - well - don’t be so sure.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/8939725-19-how-hackers-choose-who-to-attack-and-why-small-businesses-should-care.mp3" length="9949444" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8939725</guid>
    <pubDate>Thu, 29 Jul 2021 10:00:00 -0500</pubDate>
    <itunes:duration>825</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#18: Pissing Off Your Pentesters: A Storytelling Episode</itunes:title>
    <title>#18: Pissing Off Your Pentesters: A Storytelling Episode</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Lately, I’ve wondered what happens on pen testing engagements when a client is so secure, the engineers aren’t able to get very far. What prevents them from moving? And how upset do the pen testers actually get?   So, with those questions in mind, I invited Alias engineers Andrew Lemon and Tanner Shinn for a little bit of story time.   Like our show? Subscribe wherever you're listening! Or if you're listening on our website, bookmark the p...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Lately, I’ve wondered what happens on pen testing engagements when a client is so secure, the engineers aren’t able to get very far. What prevents them from moving? And how upset do the pen testers actually get? <br/><br/>So, with those questions in mind, I invited Alias engineers Andrew Lemon and Tanner Shinn for a little bit of story time. <br/><br/>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Lately, I’ve wondered what happens on pen testing engagements when a client is so secure, the engineers aren’t able to get very far. What prevents them from moving? And how upset do the pen testers actually get? <br/><br/>So, with those questions in mind, I invited Alias engineers Andrew Lemon and Tanner Shinn for a little bit of story time. <br/><br/>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/8820234-18-pissing-off-your-pentesters-a-storytelling-episode.mp3" length="20994816" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8820234</guid>
    <pubDate>Wed, 07 Jul 2021 08:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/660007/8820234/transcript" type="text/html" />
    <itunes:duration>1746</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#17: Breaking Into Cybersecurity: How to Get Started in the Industry</itunes:title>
    <title>#17: Breaking Into Cybersecurity: How to Get Started in the Industry</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Learn how to break into the cybersecurity industry with these career tips. In this episode, we talk about what you need with experience, certificates, passion, and networking to kickstart your career in cybersecurity.   Like our show? Subscribe wherever you're listening! Or if you're listening on our website, bookmark the page so you can easily return. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podc...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Learn how to break into the cybersecurity industry with these career tips. In this episode, we talk about what you need with experience, certificates, passion, and networking to kickstart your career in cybersecurity. <br/><br/>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Learn how to break into the cybersecurity industry with these career tips. In this episode, we talk about what you need with experience, certificates, passion, and networking to kickstart your career in cybersecurity. <br/><br/>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/8725047-17-breaking-into-cybersecurity-how-to-get-started-in-the-industry.mp3" length="13817645" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8725047</guid>
    <pubDate>Tue, 22 Jun 2021 09:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/660007/8725047/transcript" type="text/html" />
    <itunes:duration>1148</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, cybersecurity careers</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#16: Rules of Engagement: Why You Gotta Have &#39;Em</itunes:title>
    <title>#16: Rules of Engagement: Why You Gotta Have &#39;Em</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Rules were made to be broken, right? Not these rules.   In this episode of the Secure AF podcast, get a high level look at rules of engagement. Learn why this document is critical to performing pen tests on a client.  Like our show? Subscribe wherever you're listening! Or if you're listening on our website, bookmark the page so you can easily return. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple P...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Rules were made to be broken, right? Not these rules. <br/><br/>In this episode of the Secure AF podcast, get a high level look at rules of engagement. Learn why this document is critical to performing pen tests on a client. </p><p>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Rules were made to be broken, right? Not these rules. <br/><br/>In this episode of the Secure AF podcast, get a high level look at rules of engagement. Learn why this document is critical to performing pen tests on a client. </p><p>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/7293433-16-rules-of-engagement-why-you-gotta-have-em.mp3" length="9995798" type="audio/mpeg" />
    <link>http://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7293433</guid>
    <pubDate>Thu, 14 Jan 2021 10:00:00 -0600</pubDate>
    <itunes:duration>829</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, rules of engagement, pen testing</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#15: Port Scanning and Why it Matters</itunes:title>
    <title>#15: Port Scanning and Why it Matters</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Port scanning. You've probably heard the phrase. But do you know what it means for your business? Should you port scan? What if somebody is scanning your company? In this episode of the Secure AF podcast learn more about port scanning. Get an understanding of what a port is, what happens when people port scan, and why it matters to you. Like our show? Subscribe wherever you're listening! Or if you're listening on our website, bookmark the page so yo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Port scanning. You&apos;ve probably heard the phrase. But do you know what it means for your business? Should you port scan? What if somebody is scanning your company?</p><p>In this episode of the Secure AF podcast learn more about port scanning. Get an understanding of what a port is, what happens when people port scan, and why it matters to you.</p><p>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Port scanning. You&apos;ve probably heard the phrase. But do you know what it means for your business? Should you port scan? What if somebody is scanning your company?</p><p>In this episode of the Secure AF podcast learn more about port scanning. Get an understanding of what a port is, what happens when people port scan, and why it matters to you.</p><p>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/6635872-15-port-scanning-and-why-it-matters.mp3" length="6921582" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6635872</guid>
    <pubDate>Tue, 01 Dec 2020 09:00:00 -0600</pubDate>
    <itunes:duration>573</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, port scanning</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#14: Cyber Security Insurance: What You Need to Know</itunes:title>
    <title>#14: Cyber Security Insurance: What You Need to Know</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Cyber security insurance is no joke.   And spoiler alert: everybody needs it.  In this episode of the Secure AF podcast learn more about cyber security insurance. Get an understanding of what it is, what it covers, what is doesn't cover, and more. Like our show? Subscribe wherever you're listening! Or if you're listening on our website, bookmark the page so you can easily return. Support the show Watch full episodes at youtube.com/@aliascy...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Cyber security insurance is no joke. <br/><br/>And spoiler alert: everybody needs it. </p><p>In this episode of the Secure AF podcast learn more about cyber security insurance. Get an understanding of what it is, what it covers, what is doesn&apos;t cover, and more.</p><p>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Cyber security insurance is no joke. <br/><br/>And spoiler alert: everybody needs it. </p><p>In this episode of the Secure AF podcast learn more about cyber security insurance. Get an understanding of what it is, what it covers, what is doesn&apos;t cover, and more.</p><p>Like our show? Subscribe wherever you&apos;re listening! Or if you&apos;re listening on our website, bookmark the page so you can easily return.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/6190390-14-cyber-security-insurance-what-you-need-to-know.mp3" length="6547643" type="audio/mpeg" />
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6190390</guid>
    <pubDate>Mon, 02 Nov 2020 13:00:00 -0600</pubDate>
    <itunes:duration>542</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, cyber security insurance, cyber insurance</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#13: Phishing: How to Avoid Being the Bait</itunes:title>
    <title>#13: Phishing: How to Avoid Being the Bait</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Phishing is one of the leading methods hackers use to get your information. So what should you do to protect yourself? Know how to spot a phishing attempt. In this episode of the Secure AF cyber security podcast, Teddie Underkoffler and Donovan Farrow of Alias talk about what phishing is, how you can spot it, and what you should do if you think you've been phished.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Phishing is one of the leading methods hackers use to get your information. So what should you do to protect yourself? Know how to spot a phishing attempt. In this episode of the Secure AF cyber security podcast, Teddie Underkoffler and Donovan Farrow of Alias talk about what phishing is, how you can spot it, and what you should do if you think you&apos;ve been phished. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Phishing is one of the leading methods hackers use to get your information. So what should you do to protect yourself? Know how to spot a phishing attempt. In this episode of the Secure AF cyber security podcast, Teddie Underkoffler and Donovan Farrow of Alias talk about what phishing is, how you can spot it, and what you should do if you think you&apos;ve been phished. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/5351542-13-phishing-how-to-avoid-being-the-bait.mp3" length="5323936" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5351542</guid>
    <pubDate>Tue, 08 Sep 2020 15:00:00 -0500</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/660007/5351542/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/5351542/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/5351542/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/660007/5351542/transcript.vtt" type="text/vtt" />
    <podcast:soundbite startTime="259.25" duration="52.0" />
    <podcast:chapters url="https://www.buzzsprout.com/660007/5351542/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="#13: Phishing: How to Avoid Being the Bait" />
  <psc:chapter start="0:41" title="What is phishing" />
  <psc:chapter start="1:35" title="How do you spot a phishing attempt" />
  <psc:chapter start="5:54" title="What should you do if you think you were phished" />
</psc:chapters>
    <itunes:duration>440</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, phishing</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#12: What You Need to Know About CMMC</itunes:title>
    <title>#12: What You Need to Know About CMMC</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Have you started to hear more and more about the new CMMC regulations?  The new CMMC framework is designed to assess and enhance the cyber security standing of government contractors. The primary purpose is to ensure any business handling controlled unclassified information is protected from digital attacks.   As with anything new, there's a lot of uncertainty and fear surrounding the framework. That's why we met with Fred Tschirgi of Broadmoor...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Have you started to hear more and more about the new CMMC regulations?<br/><br/>The new CMMC framework is designed to assess and enhance the cyber security standing of government contractors. The primary purpose is to ensure any business handling controlled unclassified information is protected from digital attacks. <br/><br/>As with anything new, there&apos;s a lot of uncertainty and fear surrounding the framework. That&apos;s why we met with Fred Tschirgi of Broadmoor Consulting to help people understand what to expect with the arrival of CMMC.<br/><br/>Spoiler alert: there&apos;s no reason to stress about it. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Have you started to hear more and more about the new CMMC regulations?<br/><br/>The new CMMC framework is designed to assess and enhance the cyber security standing of government contractors. The primary purpose is to ensure any business handling controlled unclassified information is protected from digital attacks. <br/><br/>As with anything new, there&apos;s a lot of uncertainty and fear surrounding the framework. That&apos;s why we met with Fred Tschirgi of Broadmoor Consulting to help people understand what to expect with the arrival of CMMC.<br/><br/>Spoiler alert: there&apos;s no reason to stress about it. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/5080871-12-what-you-need-to-know-about-cmmc.mp3" length="27698960" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5080871</guid>
    <pubDate>Thu, 20 Aug 2020 14:00:00 -0500</pubDate>
    <podcast:soundbite startTime="2099.958" duration="19.0" />
    <itunes:duration>2304</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, cmmc, cmmc framework</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#11: Network Monitoring and Tools</itunes:title>
    <title>#11: Network Monitoring and Tools</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! How can you protect a network if you don't know what's on it? That's what network monitoring is for. In this episode of the Secure AF podcast, the Alias team discusses network monitoring. How it's done, what it is, why you should have it, and more.     Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>How can you protect a network if you don&apos;t know what&apos;s on it? That&apos;s what network monitoring is for. In this episode of the Secure AF podcast, the Alias team discusses network monitoring. How it&apos;s done, what it is, why you should have it, and more. </p><p><br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>How can you protect a network if you don&apos;t know what&apos;s on it? That&apos;s what network monitoring is for. In this episode of the Secure AF podcast, the Alias team discusses network monitoring. How it&apos;s done, what it is, why you should have it, and more. </p><p><br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/4752989-11-network-monitoring-and-tools.mp3" length="22609776" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4752989</guid>
    <pubDate>Tue, 28 Jul 2020 14:00:00 -0500</pubDate>
    <itunes:duration>1880</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, network monitoring, cyber security, monitoring</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#10: Ransomware: What It Is and How to Avoid It</itunes:title>
    <title>#10: Ransomware: What It Is and How to Avoid It</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Ransomware. Just about everybody has heard of it. With all the recent attacks, it's hard to avoid it. In this episode of the SECURE AF podcast, the Alias team discusses ransomware, what it is, and how you can keep yourself safe from the threat.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Ransomware. Just about everybody has heard of it. With all the recent attacks, it&apos;s hard to avoid it. In this episode of the SECURE AF podcast, the Alias team discusses ransomware, what it is, and how you can keep yourself safe from the threat. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Ransomware. Just about everybody has heard of it. With all the recent attacks, it&apos;s hard to avoid it. In this episode of the SECURE AF podcast, the Alias team discusses ransomware, what it is, and how you can keep yourself safe from the threat. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/4417907-10-ransomware-what-it-is-and-how-to-avoid-it.mp3" length="19032491" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4417907</guid>
    <pubDate>Fri, 03 Jul 2020 07:00:00 -0500</pubDate>
    <itunes:duration>1582</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, cyber security, ransomware, hackers, hacking,</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#9: Meet the Alias Security Crew</itunes:title>
    <title>#9: Meet the Alias Security Crew</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! On this episode of SECURE AF podcast, get to knew three members of our security team! Wayne Kimberling, Andrew Lemon, and Jeff Bowie talk about their experiences with AF and how the three of them got their starts in information security.  Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>On this episode of SECURE AF podcast, get to knew three members of our security team! Wayne Kimberling, Andrew Lemon, and Jeff Bowie talk about their experiences with AF and how the three of them got their starts in information security. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>On this episode of SECURE AF podcast, get to knew three members of our security team! Wayne Kimberling, Andrew Lemon, and Jeff Bowie talk about their experiences with AF and how the three of them got their starts in information security. </p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/3661927-9-meet-the-alias-security-crew.mp3" length="18099890" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3661927</guid>
    <pubDate>Thu, 07 May 2020 13:00:00 -0500</pubDate>
    <itunes:duration>1504</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, secure af</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#8: Special Guest Interview: Chris Boykin of Future Com</itunes:title>
    <title>#8: Special Guest Interview: Chris Boykin of Future Com</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! On this episode of SECURE AF podcast, the AF team interviewed Chris Boykin with Future Com! Alias is proud to partner with Future Com. Check out this episode to learn more about them as well as hear some feats of social engineering we've pulled off together.   Learn more about Future Com: www.myfuturecom.com Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>On this episode of SECURE AF podcast, the AF team interviewed Chris Boykin with Future Com! Alias is proud to partner with Future Com. Check out this episode to learn more about them as well as hear some feats of social engineering we&apos;ve pulled off together. <br/><br/>Learn more about Future Com: <a href='https://www.myfuturecom.com/'>www.myfuturecom.com</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>On this episode of SECURE AF podcast, the AF team interviewed Chris Boykin with Future Com! Alias is proud to partner with Future Com. Check out this episode to learn more about them as well as hear some feats of social engineering we&apos;ve pulled off together. <br/><br/>Learn more about Future Com: <a href='https://www.myfuturecom.com/'>www.myfuturecom.com</a></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/3527218-8-special-guest-interview-chris-boykin-of-future-com.mp3" length="24888742" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3527218</guid>
    <pubDate>Mon, 27 Apr 2020 13:00:00 -0500</pubDate>
    <itunes:duration>2070</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, future com</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#7: Securing Against the Coronavirus and Computer Viruses</itunes:title>
    <title>#7: Securing Against the Coronavirus and Computer Viruses</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! We're not medical professionals so we can't give you coronavirus advice (besides, you've probably heard what you need to know by now); however, we CAN give you advice on how to be safe from a different kind of virus!  On this episode of SECURE AF podcast, the AF team went remote and recorded our first ever video podcast! Learn how you can protect your business, employees, and loved ones from falling victim to the latest string of cyber attacks ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>We&apos;re not medical professionals so we can&apos;t give you coronavirus advice (besides, you&apos;ve probably heard what you need to know by now); however, we CAN give you advice on how to be safe from a different kind of virus! </p><p>On this episode of SECURE AF podcast, the AF team went remote and recorded our first ever video podcast! Learn how you can protect your business, employees, and loved ones from falling victim to the latest string of cyber attacks praying on remote workplaces and COVID-19 fears.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>We&apos;re not medical professionals so we can&apos;t give you coronavirus advice (besides, you&apos;ve probably heard what you need to know by now); however, we CAN give you advice on how to be safe from a different kind of virus! </p><p>On this episode of SECURE AF podcast, the AF team went remote and recorded our first ever video podcast! Learn how you can protect your business, employees, and loved ones from falling victim to the latest string of cyber attacks praying on remote workplaces and COVID-19 fears.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/3166948-7-securing-against-the-coronavirus-and-computer-viruses.mp3" length="26812195" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3166948</guid>
    <pubDate>Mon, 30 Mar 2020 07:00:00 -0500</pubDate>
    <itunes:duration>2230</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, covid-19, coronavirus, remote</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#6: Special Guest Interview: Bonus</itunes:title>
    <title>#6: Special Guest Interview: Bonus</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Welcome to Secure AF! A podcast about all things information security. Join the AF team as we talk security trends and current AF happenings with our guest, Bonus! Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Welcome to Secure AF! A podcast about all things information security. Join the AF team as we talk security trends and current AF happenings with our guest, Bonus!</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Welcome to Secure AF! A podcast about all things information security. Join the AF team as we talk security trends and current AF happenings with our guest, Bonus!</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/2842882-6-special-guest-interview-bonus.mp3" length="23609432" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2842882</guid>
    <pubDate>Tue, 25 Feb 2020 17:00:00 -0600</pubDate>
    <itunes:duration>1964</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, </itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#5: Deepfakes: The Latest Trust Breaker </itunes:title>
    <title>#5: Deepfakes: The Latest Trust Breaker </title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Welcome to Secure AF! A podcast about all things information security. Deepfakes are only going to become more and more prevalent. Listen to this episode to learn what deepfakes are, how you can spot them, and how they'll change digital security. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Welcome to Secure AF! A podcast about all things information security. Deepfakes are only going to become more and more prevalent. Listen to this episode to learn what deepfakes are, how you can spot them, and how they&apos;ll change digital security.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Welcome to Secure AF! A podcast about all things information security. Deepfakes are only going to become more and more prevalent. Listen to this episode to learn what deepfakes are, how you can spot them, and how they&apos;ll change digital security.</p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/2562121-5-deepfakes-the-latest-trust-breaker.mp3" length="19453467" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2562121</guid>
    <pubDate>Thu, 23 Jan 2020 14:00:00 -0600</pubDate>
    <itunes:duration>1617</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, deepfakes</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#4: The Internet of Things. What Is It?</itunes:title>
    <title>#4: The Internet of Things. What Is It?</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Welcome to Secure AF! A podcast about all things information security. IoT or the Internet of Things is a hot topic in information security right now. Listen to this episode to learn what IoT is and how you can keep your data secure.     Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Welcome to Secure AF! A podcast about all things information security. IoT or the Internet of Things is a hot topic in information security right now. Listen to this episode to learn what IoT is and how you can keep your data secure. </p><p><br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Welcome to Secure AF! A podcast about all things information security. IoT or the Internet of Things is a hot topic in information security right now. Listen to this episode to learn what IoT is and how you can keep your data secure. </p><p><br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/2361545-4-the-internet-of-things-what-is-it.mp3" length="19549700" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2361545</guid>
    <pubDate>Fri, 27 Dec 2019 14:00:00 -0600</pubDate>
    <itunes:duration>1625</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, iot, internet of things</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#3: Don&#39;t Worry About the Recent VPN Breaches</itunes:title>
    <title>#3: Don&#39;t Worry About the Recent VPN Breaches</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Welcome to Secure AF! A podcast about all things information security. Recently, a few popular VPNs announced they were breached. Listen to this episode to find out what that means for consumers.     Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Welcome to Secure AF! A podcast about all things information security. Recently, a few popular VPNs announced they were breached. Listen to this episode to find out what that means for consumers. </p><p><br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Welcome to Secure AF! A podcast about all things information security. Recently, a few popular VPNs announced they were breached. Listen to this episode to find out what that means for consumers. </p><p><br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/2110908-3-don-t-worry-about-the-recent-vpn-breaches.mp3" length="25465506" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2110908</guid>
    <pubDate>Mon, 18 Nov 2019 14:00:00 -0600</pubDate>
    <itunes:duration>2118</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, informationsecurity, VPN, nordvpn</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#2: Practical Tips for Cyber Security Awareness Month</itunes:title>
    <title>#2: Practical Tips for Cyber Security Awareness Month</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Welcome to Secure AF! A podcast about all things information security. October is Cyber Security Awareness Month so the Alias team goes through some easy tips you can follow to keep yourself secure.     Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Welcome to Secure AF! A podcast about all things information security. October is Cyber Security Awareness Month so the Alias team goes through some easy tips you can follow to keep yourself secure. </p><p><br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Welcome to Secure AF! A podcast about all things information security. October is Cyber Security Awareness Month so the Alias team goes through some easy tips you can follow to keep yourself secure. </p><p><br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/1878686-2-practical-tips-for-cyber-security-awareness-month.mp3" length="23647713" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1878686</guid>
    <pubDate>Wed, 16 Oct 2019 10:00:00 -0500</pubDate>
    <podcast:soundbite startTime="268.833" duration="15.0" />
    <itunes:duration>1967</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, information security, </itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>#1: Our DEFCON 2019 Experience</itunes:title>
    <title>#1: Our DEFCON 2019 Experience</title>
    <itunes:summary><![CDATA[Got a question or comment? Message us here! Welcome to Secure AF! A podcast about all things information security. DEFCON is one of the largest hacker conventions in the world, and the Alias Forensics team got to take it on. Listen for our insight on the DEFCON experience.        Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Welcome to Secure AF! A podcast about all things information security. DEFCON is one of the largest hacker conventions in the world, and the Alias Forensics team got to take it on. Listen for our insight on the DEFCON experience.</p><p><br/></p><p><br/></p><p><br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/660007/fan_mail/new">Got a question or comment? Message us here!</a></p><p>Welcome to Secure AF! A podcast about all things information security. DEFCON is one of the largest hacker conventions in the world, and the Alias Forensics team got to take it on. Listen for our insight on the DEFCON experience.</p><p><br/></p><p><br/></p><p><br/><br/></p><p><a rel="payment" href="https://www.buzzsprout.com/660007/support">Support the show</a></p><p><b>Watch full episodes at youtube.com/@aliascybersecurity.<br/>Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.</b></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/660007/episodes/1848073-1-our-defcon-2019-experience.mp3" length="19001110" type="audio/mpeg" />
    <link>https://aliasinfosec.com/secure-af</link>
    <itunes:author>Alias</itunes:author>
    <guid isPermaLink="false">Buzzsprout-1848073</guid>
    <pubDate>Thu, 10 Oct 2019 15:00:00 -0500</pubDate>
    <itunes:duration>1580</itunes:duration>
    <itunes:keywords>technology, cybersecurity, infosec, informationsecurity, defcon</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
