<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
xmlns:rawvoice="http://www.rawvoice.com/rawvoiceRssModule/"
xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"

xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
>

<channel>
	<title>SecuraBit</title>
	<atom:link href="http://securabit.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://securabit.com</link>
	<description>Before It Bytes!</description>
	<lastBuildDate>Wed, 01 Apr 2015 21:57:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.2.3</generator>
<!-- podcast_generator="Blubrry PowerPress/8.0.1" mode="advanced" feedslug="feed" Blubrry PowerPress Podcasting plugin for WordPress (https://www.blubrry.com/powerpress/) -->
	<itunes:summary>Before It Bytes!</itunes:summary>
	<itunes:author>SecuraBit</itunes:author>
	<itunes:image href="http://securabit.com/wp-content/plugins/powerpress/itunes_default.jpg" />
	<itunes:subtitle>Before It Bytes!</itunes:subtitle>
	<image>
		<title>SecuraBit</title>
		<url>http://securabit.com/wp-content/plugins/powerpress/rss_default.jpg</url>
		<link>http://securabit.com</link>
	</image>
<site xmlns="com-wordpress:feed-additions:1">34328505</site>	<item>
		<title>SecuraBit Episode 130: Accelerating at MACH37!</title>
		<link>http://securabit.com/2015/01/02/securabit-episode-130-accelerating-at-mach37/</link>
				<comments>http://securabit.com/2015/01/02/securabit-episode-130-accelerating-at-mach37/#respond</comments>
				<pubDate>Fri, 02 Jan 2015 17:49:55 +0000</pubDate>
		<dc:creator><![CDATA[Chris]]></dc:creator>
				<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[accelerator]]></category>
		<category><![CDATA[funding]]></category>
		<category><![CDATA[mach37]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vc]]></category>
		<category><![CDATA[venture]]></category>

		<guid isPermaLink="false">http://securabit.com/?p=3459</guid>
				<description><![CDATA[Hosts Chris Gerling – @secbitchris Christopher Mills &#8211;@thechrisam Guests Robert Stratton III &#8211; @strat Topics Cybersecurity Startups and Accelerators featuring MACH37 (Twitter: https://twitter.com/mach37cyber) Northern Virginia based startup accelerator 3 cohorts thus far including 17 cohort companies How tough it can be to start your own product company Pitfalls and lessons learned through assisting cohorts through their founding&#8230;]]></description>
								<content:encoded><![CDATA[<p><b>Hosts</b></p>
<ul>
<li>Chris Gerling –<a href="http://twitter.com/secbitchris"> @secbitchris</a></li>
<li>Christopher Mills &#8211;<a href="https://twitter.com/thechrisam">@thechrisam</a></li>
</ul>
<p><b>Guests</b></p>
<ul>
<li>Robert Stratton III &#8211; <a href="https://twitter.com/strat">@strat</a></li>
</ul>
<p><b>Topics</b></p>
<ul>
<li>Cybersecurity Startups and Accelerators featuring <a href="https://www.mach37.com/">MACH37</a> (Twitter: https://twitter.com/mach37cyber)
<ul>
<li>Northern Virginia based startup accelerator</li>
<li>3 cohorts thus far including 17 cohort companies</li>
</ul>
</li>
<li>How tough it can be to start your own product company</li>
<li>Pitfalls and lessons learned through assisting cohorts through their founding stages</li>
</ul>
<p><b>Upcoming events</b></p>
<ul>
<li><a href="http://www.secore.info/">http://www.secore.info</a></li>
</ul>
<p><b>Links</b></p>
<ul>
<li><a href="http://www.gh0st.net/wiki">www.gh0st.net/wiki</a> &#8211; 24/7 Penetration Testing learning environment, FREE.
<ul>
<li>Volunteers sought to help maintain and build challenges. Local to RVA a plus!</li>
</ul>
</li>
</ul>
<p>Chat with us on IRC at irc.freenode.net #securabit</p>
<p>iTunes Podcast –<a href="http://itunes.apple.com/us/podcast/securabit/id280048405"> <i>http://itunes.apple.com/us/podcast/securabit/id280048405</i></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
							<wfw:commentRss>http://securabit.com/2015/01/02/securabit-episode-130-accelerating-at-mach37/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<enclosure url="http://traffic.libsyn.com/securabit/SecuraBit_EP130.mp3" length="79829785" type="audio/mpeg" />
			<itunes:subtitle>Hosts Chris Gerling – @secbitchris Christopher Mills –@thechrisam Guests Robert Stratton III – @strat Topics Cybersecurity Startups and Accelerators featuring MACH37 (Twitter: https://twitter.com/mach37cyber) Northern Virginia based startup accelerator...</itunes:subtitle>
		<itunes:summary>Hosts Chris Gerling – @secbitchris Christopher Mills –@thechrisam Guests Robert Stratton III – @strat Topics Cybersecurity Startups and Accelerators featuring MACH37 (Twitter: https://twitter.com/mach37cyber) Northern Virginia based startup accelerator 3 cohorts thus far including 17 cohort companies How tough it can be to start your own product company Pitfalls and lessons learned through assisting cohorts through their founding…</itunes:summary>
		<itunes:author>SecuraBit</itunes:author>
		<itunes:duration>1:23:09</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">3459</post-id>	</item>
		<item>
		<title>SecuraBit Episode 129: Bioinformatics and Infosec</title>
		<link>http://securabit.com/2014/10/03/securabit-episode-129-bioinformatics-and-infosec/</link>
				<comments>http://securabit.com/2014/10/03/securabit-episode-129-bioinformatics-and-infosec/#respond</comments>
				<pubDate>Fri, 03 Oct 2014 10:47:09 +0000</pubDate>
		<dc:creator><![CDATA[Chris]]></dc:creator>
				<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[analysis]]></category>
		<category><![CDATA[antivirus]]></category>
		<category><![CDATA[bioinformatics]]></category>
		<category><![CDATA[crisper/cas-9]]></category>
		<category><![CDATA[debugging]]></category>
		<category><![CDATA[immune systems]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[reverse engineering]]></category>

		<guid isPermaLink="false">http://securabit.com/?p=3441</guid>
				<description><![CDATA[Hosts Chris Gerling – @secbitchris Christopher Mills &#8211;@thechrisam Guests Patrick Thomas &#8211; @coffeetocode Krystal Thomas-White &#8211; @KrystalMicrobio Topics Bioinformatics Relation of information security tools and methodologies to biology, research into immune systems, bacteria, as well as how those relate to infosec, polymorphpic malware, and reverse engineering. BsidesChicago2014 Talk: https://www.youtube.com/watch?v=gsZWKj2aAgk Signatures akin to antivirus/whitelisting: http://www.wolfgreenfield.com/newsstand/700-crispr-cas&#8211;exciting-addition-genomic-editing https://www.youtube.com/watch?v=ZJ-ChS9roQ0 Reverse&#8230;]]></description>
								<content:encoded><![CDATA[<p><b>Hosts</b></p>
<ul>
<li>Chris Gerling –<a href="http://twitter.com/secbitchris"> @secbitchris</a></li>
<li>Christopher Mills &#8211;<a href="https://twitter.com/thechrisam">@thechrisam</a></li>
</ul>
<p><b>Guests</b></p>
<ul>
<li>Patrick Thomas &#8211; <a href="https://twitter.com/coffeetocode">@coffeetocode</a></li>
<li>Krystal Thomas-White &#8211; <a href="https://twitter.com/KrystalMicrobio">@KrystalMicrobio</a></li>
</ul>
<p><b>Topics</b></p>
<ul>
<li>Bioinformatics
<ul>
<li>Relation of information security tools and methodologies to biology, research into immune systems, bacteria, as well as how those relate to infosec, polymorphpic malware, and reverse engineering.
<ul>
<li>BsidesChicago2014 Talk: <a href="https://www.youtube.com/watch?v=gsZWKj2aAgk" target="_blank">https://www.<wbr />youtube.com/watch?v=<wbr />gsZWKj2aAgk</a></li>
</ul>
</li>
<li>Signatures akin to antivirus/whitelisting:
<ul>
<li><a href="http://www.wolfgreenfield.com/newsstand/700-crispr-cas--exciting-addition-genomic-editing" target="_blank">http://www.wolfgreenfield.com/<wbr />newsstand/700-crispr-cas&#8211;<wbr />exciting-addition-genomic-<wbr />editing</a></li>
<li><a href="https://www.youtube.com/watch?v=ZJ-ChS9roQ0" target="_blank">https://www.youtube.<wbr />com/watch?v=ZJ-ChS9roQ0</a></li>
</ul>
</li>
<li>Reverse Engineering/Debugging:
<ul>
<li><a href="http://en.wikipedia.org/wiki/Gene_knockout" target="_blank">http://en.wikipedia.org/<wbr />wiki/Gene_knockout</a></li>
<li><a href="http://en.wikipedia.org/wiki/Fluorescent_tag" target="_blank">http://en.wikipedia.org/<wbr />wiki/Fluorescent_tag</a></li>
</ul>
</li>
</ul>
</li>
</ul>
<p><b>Upcoming events</b></p>
<ul>
<li><a href="http://www.secore.info/">http://www.secore.info</a></li>
</ul>
<p><b>Links</b></p>
<ul>
<li><a href="http://www.gh0st.net/wiki">www.gh0st.net/wiki</a> &#8211; 24/7 Penetration Testing learning environment, FREE.
<ul>
<li>Volunteers sought to help maintain and build challenges. Local to RVA a plus!</li>
</ul>
</li>
</ul>
<p>Chat with us on IRC at irc.freenode.net #securabit</p>
<p>iTunes Podcast –<a href="http://itunes.apple.com/us/podcast/securabit/id280048405"> <i>http://itunes.apple.com/us/podcast/securabit/id280048405</i></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
							<wfw:commentRss>http://securabit.com/2014/10/03/securabit-episode-129-bioinformatics-and-infosec/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<enclosure url="http://traffic.libsyn.com/securabit/SecuraBit_EP129.mp3" length="47394062" type="audio/mpeg" />
			<itunes:subtitle>Hosts Chris Gerling – @secbitchris Christopher Mills –@thechrisam Guests Patrick Thomas – @coffeetocode Krystal Thomas-White – @KrystalMicrobio Topics Bioinformatics Relation of information security tools and methodologies to biology,</itunes:subtitle>
		<itunes:summary>Hosts Chris Gerling – @secbitchris Christopher Mills –@thechrisam Guests Patrick Thomas – @coffeetocode Krystal Thomas-White – @KrystalMicrobio Topics Bioinformatics Relation of information security tools and methodologies to biology, research into immune systems, bacteria, as well as how those relate to infosec, polymorphpic malware, and reverse engineering. BsidesChicago2014 Talk: https://www.youtube.com/watch?v=gsZWKj2aAgk Signatures akin to antivirus/whitelisting: http://www.wolfgreenfield.com/newsstand/700-crispr-cas–exciting-addition-genomic-editing https://www.youtube.com/watch?v=ZJ-ChS9roQ0 Reverse…</itunes:summary>
		<itunes:author>SecuraBit</itunes:author>
		<itunes:duration>49:22</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">3441</post-id>	</item>
		<item>
		<title>SecuraBit Episode 128: Podcast Collision</title>
		<link>http://securabit.com/2014/10/01/securabit-episode-128-podcast-collision/</link>
				<comments>http://securabit.com/2014/10/01/securabit-episode-128-podcast-collision/#respond</comments>
				<pubDate>Wed, 01 Oct 2014 00:44:55 +0000</pubDate>
		<dc:creator><![CDATA[Chris]]></dc:creator>
				<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[collabpodcast]]></category>
		<category><![CDATA[derbycon]]></category>
		<category><![CDATA[fire]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[shellshock]]></category>
		<category><![CDATA[vulnerabilities]]></category>

		<guid isPermaLink="false">http://securabit.com/?p=3435</guid>
				<description><![CDATA[Hosts Chris Gerling – @secbitchris Rafal Los – @Wh1t3Rabbit Andrew Kalat @Lerg Jerry Bell &#8211;@Maliciouslink Topics Chicago ATC Fire Scorpion Shellshock Upcoming events http://www.secore.info Links www.gh0st.net/wiki &#8211; 24/7 Penetration Testing learning environment, FREE. Volunteers sought to help maintain and build challenges. Local to RVA a plus! Chat with us on IRC at irc.freenode.net #securabit iTunes Podcast&#8230;]]></description>
								<content:encoded><![CDATA[<p><b>Hosts</b></p>
<ul>
<li>Chris Gerling –<a href="http://twitter.com/secbitchris"> @secbitchris</a></li>
<li>Rafal Los – <a href="https://twitter.com/Wh1t3Rabbit">@Wh1t3Rabbit</a></li>
<li>Andrew Kalat <a href="https://twitter.com/Lerg">@Lerg</a></li>
<li>Jerry Bell &#8211;<a href="https://twitter.com/Maliciouslink">@Maliciouslink</a></li>
</ul>
<p><b>Topics</b></p>
<ul>
<li>Chicago ATC Fire</li>
<li>Scorpion</li>
<li>Shellshock</li>
</ul>
<p><b>Upcoming events</b></p>
<ul>
<li><a href="http://www.secore.info/">http://www.secore.info</a></li>
</ul>
<p><b>Links</b></p>
<ul>
<li><a href="http://www.gh0st.net/wiki">www.gh0st.net/wiki</a> &#8211; 24/7 Penetration Testing learning environment, FREE.</li>
<li>Volunteers sought to help maintain and build challenges. Local to RVA a plus!</li>
</ul>
<p>Chat with us on IRC at irc.freenode.net #securabit</p>
<p>iTunes Podcast –<a href="http://itunes.apple.com/us/podcast/securabit/id280048405"> <i>http://itunes.apple.com/us/podcast/securabit/id280048405</i></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
							<wfw:commentRss>http://securabit.com/2014/10/01/securabit-episode-128-podcast-collision/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<enclosure url="http://traffic.libsyn.com/securabit/SecuraBit_EP128.mp3" length="29306043" type="audio/mpeg" />
			<itunes:subtitle>Hosts Chris Gerling – @secbitchris Rafal Los – @Wh1t3Rabbit Andrew Kalat @Lerg Jerry Bell –@Maliciouslink Topics Chicago ATC Fire Scorpion Shellshock Upcoming events http://www.secore.info Links www.gh0st.net/wiki – 24/7 Penetration Testing learning en...</itunes:subtitle>
		<itunes:summary>Hosts Chris Gerling – @secbitchris Rafal Los – @Wh1t3Rabbit Andrew Kalat @Lerg Jerry Bell –@Maliciouslink Topics Chicago ATC Fire Scorpion Shellshock Upcoming events http://www.secore.info Links www.gh0st.net/wiki – 24/7 Penetration Testing learning environment, FREE. Volunteers sought to help maintain and build challenges. Local to RVA a plus! Chat with us on IRC at irc.freenode.net #securabit iTunes Podcast…</itunes:summary>
		<itunes:author>SecuraBit</itunes:author>
		<itunes:duration>30:32</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">3435</post-id>	</item>
		<item>
		<title>SecuraByte Episode 08: ICS Security with Graham Speake</title>
		<link>http://securabit.com/2014/08/15/securabyte-episode-08-ics-security-with-graham-speake/</link>
				<comments>http://securabit.com/2014/08/15/securabyte-episode-08-ics-security-with-graham-speake/#respond</comments>
				<pubDate>Fri, 15 Aug 2014 20:47:01 +0000</pubDate>
		<dc:creator><![CDATA[Chris]]></dc:creator>
				<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[ics]]></category>
		<category><![CDATA[industrial]]></category>
		<category><![CDATA[nexdefense]]></category>
		<category><![CDATA[sans]]></category>
		<category><![CDATA[security]]></category>

		<guid isPermaLink="false">http://securabit.com/?p=3430</guid>
				<description><![CDATA[Join us on this special SecuraByte interview episode with Graham Speake as we discuss Industrial Control Systems and their security! Hosts Chris Gerling –@secbitchris Guests Graham Speake &#8211; SANS Affiliation &#8211; NexDefense Topics ICS systems and their criticality Security in ICS Examples of malicious campaigns Upcoming events http://www.secore.info Links www.gh0st.net/wiki &#8211; 24/7 Penetration Testing learning environment, FREE. Chat&#8230;]]></description>
								<content:encoded><![CDATA[<p>Join us on this special SecuraByte interview episode with Graham Speake as we discuss Industrial Control Systems and their security!</p>
<p><b>Hosts</b></p>
<ul>
<li>Chris Gerling –<a href="http://twitter.com/secbitchris">@secbitchris</a></li>
</ul>
<p><b>Guests</b></p>
<ul>
<li>Graham Speake &#8211; <a href="http://www.sans.org/instructors/graham-speake">SANS</a>
<ul>
<li>Affiliation &#8211; <a href="http://nexdefense.com/">NexDefense</a></li>
</ul>
</li>
</ul>
<p><b>Topics</b></p>
<ul>
<li>ICS systems and their criticality</li>
<li>Security in ICS</li>
<li>Examples of malicious campaigns</li>
</ul>
<p><b>Upcoming events</b></p>
<ul>
<li><a href="http://www.secore.info/">http://www.secore.info</a></li>
</ul>
<p><b>Links</b></p>
<ul>
<li><a href="http://www.gh0st.net/wiki">www.gh0st.net/wiki</a> &#8211; 24/7 Penetration Testing learning environment, FREE.</li>
</ul>
<p>Chat with us on IRC at irc.freenode.net #securabit</p>
<p>iTunes Podcast –<a href="http://itunes.apple.com/us/podcast/securabit/id280048405"><i>http://itunes.apple.com/us/podcast/securabit/id280048405</i></a></p>
<p>iPhone App Now Available –<a href="http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8"><i>http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8</i></a></p>
]]></content:encoded>
							<wfw:commentRss>http://securabit.com/2014/08/15/securabyte-episode-08-ics-security-with-graham-speake/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<enclosure url="http://traffic.libsyn.com/securabit/SecuraByte_EP08.mp3" length="33445092" type="audio/mpeg" />
			<itunes:subtitle>Join us on this special SecuraByte interview episode with Graham Speake as we discuss Industrial Control Systems and their security! Hosts Chris Gerling –@secbitchris Guests Graham Speake – SANS Affiliation – NexDefense Topics ICS systems and their cri...</itunes:subtitle>
		<itunes:summary>Join us on this special SecuraByte interview episode with Graham Speake as we discuss Industrial Control Systems and their security! Hosts Chris Gerling –@secbitchris Guests Graham Speake – SANS Affiliation – NexDefense Topics ICS systems and their criticality Security in ICS Examples of malicious campaigns Upcoming events http://www.secore.info Links www.gh0st.net/wiki – 24/7 Penetration Testing learning environment, FREE. Chat…</itunes:summary>
		<itunes:author>SecuraBit</itunes:author>
		<itunes:duration>34:50</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">3430</post-id>	</item>
		<item>
		<title>RVAs3c CTF Thank You &#038; Survey!</title>
		<link>http://securabit.com/2014/07/14/rvas3c-ctf-thank-you-survey/</link>
				<comments>http://securabit.com/2014/07/14/rvas3c-ctf-thank-you-survey/#respond</comments>
				<pubDate>Mon, 14 Jul 2014 14:51:56 +0000</pubDate>
		<dc:creator><![CDATA[Chris]]></dc:creator>
				<category><![CDATA[General]]></category>

		<guid isPermaLink="false">http://securabit.com/?p=3426</guid>
				<description><![CDATA[Dear RVAs3c CTF participants, First, apologies that it took me a month to get this out. Second, Thank you SO much for coming to the conference, and competing in our Capture the Flag contest this year! We hope you had as much fun playing as we did building it! There were 37 accounts in total,&#8230;]]></description>
								<content:encoded><![CDATA[<div>Dear RVAs3c CTF participants,</div>
<p>First, apologies that it took me a month to get this out.</p>
<p>Second,</p>
<p>Thank you SO much for coming to the conference, and competing in our Capture the Flag contest this year! We hope you had as much fun playing as we did building it!</p>
<p>There were 37 accounts in total, with 25 of them scoring points (some of the teams that scored nothing were made in error, were duplicates, or were admin accounts) and our perspective was that about half of the attendees were using individual accounts, with the other half using a shared team account for submissions.</p>
<p>6 out of 6 Tier 1 challenges were solved. 4 out of 5 Tier 2 challenges were solved, and 1 out of 4 Tier 3 challenges were solved.</p>
<p>We saw a very even progression of points from 25th all the way up to 1st place, which leads us to infer that we presented a very broad spectrum of challenges that catered to every experience level. Hopefully that was the case for you!</p>
<p><b>Below is a link to a short survey we&#8217;ve crafted</b>, and we would greatly appreciate your feedback about the event, to include how the registration process was, whether we had enough space, the quality of the challenges, and what you&#8217;d like to see next year.</p>
<p><a href="https://www.surveymonkey.com/s/F79NRPJ">https://www.surveymonkey.com/s/F79NRPJ</a></p>
]]></content:encoded>
							<wfw:commentRss>http://securabit.com/2014/07/14/rvas3c-ctf-thank-you-survey/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
						<post-id xmlns="com-wordpress:feed-additions:1">3426</post-id>	</item>
		<item>
		<title>SecuraBit Episode 127: Women IT Ninjas!</title>
		<link>http://securabit.com/2014/05/22/securabit-episode-127-women-it-ninjas/</link>
				<comments>http://securabit.com/2014/05/22/securabit-episode-127-women-it-ninjas/#respond</comments>
				<pubDate>Thu, 22 May 2014 19:32:44 +0000</pubDate>
		<dc:creator><![CDATA[Chris]]></dc:creator>
				<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[equality]]></category>
		<category><![CDATA[gender]]></category>
		<category><![CDATA[stem]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[women]]></category>

		<guid isPermaLink="false">http://securabit.com/?p=3422</guid>
				<description><![CDATA[May 21st, 2014 Hosts Chris Gerling –@secbitchris Christopher Mills –@TheChrisAM Guests Women&#8217;s Society of Cyberjutsu &#8211; http://womenscyberjutsu.org/ Facebook: https://www.facebook.com/WomensCyberjutsu Twitter &#38; Instagram: @womencyberjutsu Meetup: http://womenscyberjutsu.org/www.womenscyberjutsu.org/meetups Cyberjutsu Girls Academy http://www.cyberjutsugirls.org/ Facebook: https://www.facebook.com/cyberjutsugirls Twitter &#38; Instagram: @cyberjutsugirls Topics Lack of women in Cyber/IT fields. 11% of the cyber workforce consists of women. Addressing the pipeline issues with&#8230;]]></description>
								<content:encoded><![CDATA[<p>May 21st, 2014</p>
<p><b>Hosts</b></p>
<ul>
<li>Chris Gerling –<a href="http://twitter.com/secbitchris">@secbitchris</a></li>
</ul>
<ul>
<li>Christopher Mills –<a href="http://twitter.com/thechrisam">@TheChrisAM</a></li>
</ul>
<p><b>Guests</b></p>
<ul>
<li>Women&#8217;s Society of Cyberjutsu &#8211; <a href="http://womenscyberjutsu.org/">http://womenscyberjutsu.org/</a>
<ul>
<li>Facebook: <a href="https://www.facebook.com/WomensCyberjutsu">https://www.facebook.com/WomensCyberjutsu</a></li>
<li>Twitter &amp; Instagram: @womencyberjutsu</li>
<li>Meetup: <a href="http://womenscyberjutsu.org/www.womenscyberjutsu.org/meetups">http://womenscyberjutsu.org/www.womenscyberjutsu.org/meetups</a></li>
</ul>
</li>
<li>Cyberjutsu Girls Academy
<ul>
<ul>
<li><a href="http://www.cyberjutsugirls.org/">http://www.cyberjutsugirls.org/</a></li>
<li>Facebook: <a href="https://www.facebook.com/cyberjutsugirls">https://www.facebook.com/cyberjutsugirls</a></li>
<li>Twitter &amp; Instagram: @cyberjutsugirls</li>
</ul>
</ul>
</li>
</ul>
<p><b>Topics</b></p>
<ul>
<li>Lack of women in Cyber/IT fields. 11% of the cyber workforce consists of women.</li>
<li>Addressing the pipeline issues with getting more girls excited about STEM</li>
<li>Impostor Syndrome</li>
<li>Differences in perception between men and women from an interpersonal standpoint</li>
</ul>
<p><b>Upcoming events</b></p>
<ul>
<li><a href="http://www.secore.info/">http://www.secore.info</a></li>
</ul>
<p><b>Links</b></p>
<ul>
<li><a href="http://www.gh0st.net/wiki">www.gh0st.net/wiki</a> &#8211; 24/7 Penetration Testing learning environment, FREE.</li>
</ul>
<p>Chat with us on IRC at irc.freenode.net #securabit</p>
<p>iTunes Podcast –<a href="http://itunes.apple.com/us/podcast/securabit/id280048405"><i>http://itunes.apple.com/us/podcast/securabit/id280048405</i></a></p>
<p>iPhone App Now Available –<a href="http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8"><i>http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8</i></a></p>
]]></content:encoded>
							<wfw:commentRss>http://securabit.com/2014/05/22/securabit-episode-127-women-it-ninjas/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<enclosure url="http://traffic.libsyn.com/securabit/SecuraBit_EP127.mp3" length="38226202" type="audio/mpeg" />
			<itunes:subtitle>May 21st, 2014 Hosts Chris Gerling –@secbitchris Christopher Mills –@TheChrisAM Guests Women’s Society of Cyberjutsu – http://womenscyberjutsu.org/ Facebook: https://www.facebook.com/WomensCyberjutsu Twitter &amp; Instagram: @womencyberjutsu Meetup: http:/...</itunes:subtitle>
		<itunes:summary>May 21st, 2014 Hosts Chris Gerling –@secbitchris Christopher Mills –@TheChrisAM Guests Women’s Society of Cyberjutsu – http://womenscyberjutsu.org/ Facebook: https://www.facebook.com/WomensCyberjutsu Twitter &amp; Instagram: @womencyberjutsu Meetup: http://womenscyberjutsu.org/www.womenscyberjutsu.org/meetups Cyberjutsu Girls Academy http://www.cyberjutsugirls.org/ Facebook: https://www.facebook.com/cyberjutsugirls Twitter &amp; Instagram: @cyberjutsugirls Topics Lack of women in Cyber/IT fields. 11% of the cyber workforce consists of women. Addressing the pipeline issues with…</itunes:summary>
		<itunes:author>SecuraBit</itunes:author>
		<itunes:duration>39:49</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">3422</post-id>	</item>
		<item>
		<title>SecuraBit Episode 126: Holy Shnikeys, Drones, and ArchAssault!</title>
		<link>http://securabit.com/2014/05/01/securabit-episode-126-holy-shnikeys-drones-and-archassault/</link>
				<comments>http://securabit.com/2014/05/01/securabit-episode-126-holy-shnikeys-drones-and-archassault/#respond</comments>
				<pubDate>Thu, 01 May 2014 11:08:11 +0000</pubDate>
		<dc:creator><![CDATA[Chris]]></dc:creator>
				<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[archassault]]></category>
		<category><![CDATA[archlinux]]></category>
		<category><![CDATA[arm]]></category>
		<category><![CDATA[drones]]></category>
		<category><![CDATA[pentesting]]></category>
		<category><![CDATA[rvasec]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tools]]></category>

		<guid isPermaLink="false">http://securabit.com/?p=3417</guid>
				<description><![CDATA[Hosts Chris Gerling –@secbitchris Christopher Mills –@TheChrisAM Guests Jeremy Lynch and Tyler Bennett of ArchAssault Linux! Topics Drones and ARM fun! ArchAssault Linux Kali-like environment with the ability for heavy niche customization and swapping of environments. Modular. Can overlay any part of the distro onto your own Arch Linux installation Bleeding edge packages Great for&#8230;]]></description>
								<content:encoded><![CDATA[<p><b>Hosts</b></p>
<ul>
<li>Chris Gerling –<a href="http://twitter.com/secbitchris">@secbitchris</a></li>
</ul>
<ul>
<li>Christopher Mills –<a href="http://twitter.com/thechrisam">@TheChrisAM</a></li>
</ul>
<p><b>Guests</b></p>
<ul>
<li>Jeremy Lynch and Tyler Bennett of <a href="https://archassault.org/">ArchAssault Linux</a>!</li>
</ul>
<p><b>Topics</b></p>
<ul>
<li>Drones and ARM fun!</li>
<li>ArchAssault Linux
<ul>
<li>Kali-like environment with the ability for heavy niche customization and swapping of environments.</li>
<li>Modular. Can overlay any part of the distro onto your own Arch Linux installation</li>
<li>Bleeding edge packages</li>
<li>Great for setting up remote dropboxes via ARM devices</li>
</ul>
</li>
<li>IE Exploit</li>
<li>Heartbleed wrap-up</li>
<li>RVAsec CTF prizes! (Thanks Hak5!)</li>
<li>BsidesChicago Post-mortem</li>
<li>Upcoming guests!</li>
</ul>
<p><b>Upcoming events</b></p>
<ul>
<li><a href="http://www.secore.info/">http://www.secore.info</a></li>
</ul>
<p><b>Links</b></p>
<ul>
<li><a href="http://www.gh0st.net/wiki">www.gh0st.net/wiki</a> &#8211; 24/7 Penetration Testing learning environment, FREE.</li>
</ul>
<p>Chat with us on IRC at irc.freenode.net #securabit</p>
<p>iTunes Podcast –<a href="http://itunes.apple.com/us/podcast/securabit/id280048405"><i>http://itunes.apple.com/us/podcast/securabit/id280048405</i></a></p>
<p>iPhone App Now Available –<a href="http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8"><i>http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8</i></a></p>
]]></content:encoded>
							<wfw:commentRss>http://securabit.com/2014/05/01/securabit-episode-126-holy-shnikeys-drones-and-archassault/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<enclosure url="http://traffic.libsyn.com/securabit/SecuraBit_EP126.mp3" length="22487874" type="audio/mpeg" />
			<itunes:subtitle>Hosts Chris Gerling –@secbitchris Christopher Mills –@TheChrisAM Guests Jeremy Lynch and Tyler Bennett of ArchAssault Linux! Topics Drones and ARM fun! ArchAssault Linux Kali-like environment with the ability for heavy niche customization and swapping ...</itunes:subtitle>
		<itunes:summary>Hosts Chris Gerling –@secbitchris Christopher Mills –@TheChrisAM Guests Jeremy Lynch and Tyler Bennett of ArchAssault Linux! Topics Drones and ARM fun! ArchAssault Linux Kali-like environment with the ability for heavy niche customization and swapping of environments. Modular. Can overlay any part of the distro onto your own Arch Linux installation Bleeding edge packages Great for…</itunes:summary>
		<itunes:author>SecuraBit</itunes:author>
		<itunes:duration>46:51</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">3417</post-id>	</item>
		<item>
		<title>SecuraBit Episode 125: Mardi Gras Delight!</title>
		<link>http://securabit.com/2014/03/23/securabit-episode-125-mardi-gras-delight/</link>
				<comments>http://securabit.com/2014/03/23/securabit-episode-125-mardi-gras-delight/#respond</comments>
				<pubDate>Sun, 23 Mar 2014 21:42:05 +0000</pubDate>
		<dc:creator><![CDATA[Chris]]></dc:creator>
				<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[banter]]></category>
		<category><![CDATA[conferences]]></category>
		<category><![CDATA[ctf]]></category>
		<category><![CDATA[nolacon]]></category>
		<category><![CDATA[rvasec]]></category>
		<category><![CDATA[securabit]]></category>

		<guid isPermaLink="false">http://securabit.com/?p=3412</guid>
				<description><![CDATA[Hosts Chris Gerling – @secbitchris Christopher Mills – @TheChrisAM Guests Rob Andersen &#8212; @nola_con Topics NolaCon June 19-22, 2014 in New Orleans, LA RVAsec CTF Banter Upcoming events http://www.secore.info Links NolaCon &#8211; NolaCon 2014 Website www.gh0st.net/wiki &#8211; 24/7 Penetration Testing learning environment, FREE. Chat with us on IRC at irc.freenode.net #securabit iTunes Podcast – http://itunes.apple.com/us/podcast/securabit/id280048405]]></description>
								<content:encoded><![CDATA[<p dir="ltr">Hosts</p>
<ul>
<li dir="ltr">
<p dir="ltr">Chris Gerling – <a href="http://twitter.com/secbitchris">@secbitchris</a></p>
</li>
</ul>
<ul>
<li dir="ltr">
<p dir="ltr">Christopher Mills – <a href="http://twitter.com/thechrisam">@TheChrisAM</a></p>
</li>
</ul>
<p dir="ltr">Guests</p>
<ul>
<li dir="ltr">
<p dir="ltr">Rob Andersen &#8212; <a href="https://twitter.com/nola_con">@nola_con</a></p>
</li>
</ul>
<p dir="ltr">Topics</p>
<ul>
<li dir="ltr">
<p dir="ltr">NolaCon</p>
<ul>
<li dir="ltr">
<p dir="ltr">June 19-22, 2014 in New Orleans, LA</p>
</li>
</ul>
</li>
<li dir="ltr">
<p dir="ltr">RVAsec CTF</p>
</li>
<li dir="ltr">
<p dir="ltr">Banter</p>
</li>
</ul>
<p dir="ltr">Upcoming events</p>
<ul>
<li dir="ltr">
<p dir="ltr"><a href="http://www.secore.info/">http://www.secore.info</a></p>
</li>
</ul>
<p dir="ltr">Links</p>
<ul>
<li dir="ltr">
<p dir="ltr"><a href="http://www.nolacon.com">NolaCon</a> &#8211; NolaCon 2014 Website</p>
</li>
<li dir="ltr">
<p dir="ltr"><a href="http://www.gh0st.net/wiki">www.gh0st.net/wiki</a> &#8211; 24/7 Penetration Testing learning environment, FREE.</p>
</li>
</ul>
<p dir="ltr">Chat with us on IRC at irc.freenode.net #securabit</p>
<p dir="ltr">iTunes Podcast –<a href="http://itunes.apple.com/us/podcast/securabit/id280048405"> http://itunes.apple.com/us/podcast/securabit/id280048405</a></p>
]]></content:encoded>
							<wfw:commentRss>http://securabit.com/2014/03/23/securabit-episode-125-mardi-gras-delight/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<enclosure url="http://traffic.libsyn.com/securabit/SecuraBit_EP125.mp3" length="17454312" type="audio/mpeg" />
			<itunes:subtitle>Hosts Chris Gerling – @secbitchris Christopher Mills – @TheChrisAM Guests Rob Andersen — @nola_con Topics NolaCon June 19-22, 2014 in New Orleans, LA RVAsec CTF Banter Upcoming events http://www.secore.info Links NolaCon – NolaCon 2014 Website www.</itunes:subtitle>
		<itunes:summary>Hosts Chris Gerling – @secbitchris Christopher Mills – @TheChrisAM Guests Rob Andersen — @nola_con Topics NolaCon June 19-22, 2014 in New Orleans, LA RVAsec CTF Banter Upcoming events http://www.secore.info Links NolaCon – NolaCon 2014 Website www.gh0st.net/wiki – 24/7 Penetration Testing learning environment, FREE. Chat with us on IRC at irc.freenode.net #securabit iTunes Podcast – http://itunes.apple.com/us/podcast/securabit/id280048405</itunes:summary>
		<itunes:author>SecuraBit</itunes:author>
		<itunes:duration>36:18</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">3412</post-id>	</item>
		<item>
		<title>SecuraBit Episode 124: We are ALL The Cavalry!</title>
		<link>http://securabit.com/2014/02/22/securabit-episode-124-we-are-all-the-cavalry/</link>
				<comments>http://securabit.com/2014/02/22/securabit-episode-124-we-are-all-the-cavalry/#respond</comments>
				<pubDate>Sat, 22 Feb 2014 18:14:06 +0000</pubDate>
		<dc:creator><![CDATA[Chris]]></dc:creator>
				<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[cars]]></category>
		<category><![CDATA[cavalry]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[health]]></category>
		<category><![CDATA[ietf]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[ntp]]></category>
		<category><![CDATA[rsa]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[securabit]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[usb]]></category>

		<guid isPermaLink="false">http://securabit.com/?p=3405</guid>
				<description><![CDATA[February 19th, 2014 Hosts Chris Gerling – @secbitchris Christopher Mills – @TheChrisAM &#160; Guests Josh Corman- @joshcorman &#8211; I Am the Cavalry Joe Klein &#8211; @joeklein Joe Klein &#160; Topics I am the Cavalry Public Health &#38; Safety RSA presence &#8211; go visit and say hi! Twitter Discuss on Google Groups! Your USB is my&#8230;]]></description>
								<content:encoded><![CDATA[<p dir="ltr">February 19th, 2014</p>
<p dir="ltr">Hosts</p>
<ul>
<li dir="ltr">
<p dir="ltr">Chris Gerling – <a href="http://twitter.com/secbitchris">@secbitchris</a></p>
</li>
</ul>
<ul>
<li dir="ltr">
<p dir="ltr">Christopher Mills – <a href="http://twitter.com/thechrisam">@TheChrisAM</a></p>
<p>&nbsp;</li>
</ul>
<p dir="ltr">Guests</p>
<ul>
<li dir="ltr">
<p dir="ltr">Josh Corman- <a href="https://twitter.com/joshcorman">@joshcorman</a> &#8211; <a href="http://www.iamthecavalry.org/">I Am the Cavalry</a></p>
</li>
<li dir="ltr">
<p dir="ltr">Joe Klein &#8211; @joeklein <a href="https://twitter.com/joeklein">Joe Klein</a></p>
<p>&nbsp;</li>
</ul>
<p dir="ltr">Topics</p>
<ul>
<li dir="ltr">
<p dir="ltr">I am the Cavalry</p>
<ul>
<li dir="ltr">
<p dir="ltr">Public Health &amp; Safety</p>
</li>
<li dir="ltr">
<p dir="ltr">RSA presence &#8211; go visit and say hi!</p>
</li>
<li dir="ltr">
<p dir="ltr"><a href="https://twitter.com/iamthecavalry">Twitter</a></p>
</li>
<li dir="ltr">
<p dir="ltr"><a href="https://groups.google.com/forum/#!forum/iamthecavalry">Discuss on Google Groups!</a></p>
</li>
</ul>
</li>
<li dir="ltr">
<p dir="ltr">Your USB is my Network!</p>
<ul>
<li dir="ltr">
<p dir="ltr">No firewalls on networks created via USB/Firewire/Bluetooth/etc ports.</p>
</li>
</ul>
</li>
<li dir="ltr">
<p dir="ltr">NTP can be very dangerous and evil!</p>
<ul>
<li dir="ltr">
<p dir="ltr">Everything relies on timing.</p>
</li>
</ul>
</li>
</ul>
<p dir="ltr">Upcoming events</p>
<ul>
<li dir="ltr">
<p dir="ltr"><a href="http://www.secore.info/">http://www.secore.info</a></p>
</li>
</ul>
<p dir="ltr">Links</p>
<ul>
<li dir="ltr">
<p dir="ltr"><a href="http://tedxtalks.ted.com/video/Swimming-with-sharks-security-i;search%3Atag%3A%22TEDxNaperville%22">Swimming with Sharks (TEDx Talk)</a> &#8211; Josh Corman’s TEDx talk.</p>
</li>
<li dir="ltr">
<p dir="ltr"><a href="http://www.gh0st.net/wiki">www.gh0st.net/wiki</a> &#8211; 24/7 Penetration Testing learning environment, FREE.</p>
</li>
</ul>
<p dir="ltr">Chat with us on IRC at irc.freenode.net #securabit</p>
<p dir="ltr">iTunes Podcast –<a href="http://itunes.apple.com/us/podcast/securabit/id280048405"> http://itunes.apple.com/us/podcast/securabit/id280048405</a></p>
<p dir="ltr">iPhone App Now Available –<a href="http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8"> http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8</a></p>
]]></content:encoded>
							<wfw:commentRss>http://securabit.com/2014/02/22/securabit-episode-124-we-are-all-the-cavalry/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<enclosure url="http://traffic.libsyn.com/securabit/SecuraBit_EP124.mp3" length="32323393" type="audio/mpeg" />
			<itunes:subtitle>February 19th, 2014 Hosts Chris Gerling – @secbitchris Christopher Mills – @TheChrisAM   Guests Josh Corman- @joshcorman – I Am the Cavalry Joe Klein – @joeklein Joe Klein   Topics I am the Cavalry Public Health &amp; Safety RSA presence – go visit and say...</itunes:subtitle>
		<itunes:summary>February 19th, 2014 Hosts Chris Gerling – @secbitchris Christopher Mills – @TheChrisAM   Guests Josh Corman- @joshcorman – I Am the Cavalry Joe Klein – @joeklein Joe Klein   Topics I am the Cavalry Public Health &amp; Safety RSA presence – go visit and say hi! Twitter Discuss on Google Groups! Your USB is my…</itunes:summary>
		<itunes:author>SecuraBit</itunes:author>
		<itunes:duration>1:07:17</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">3405</post-id>	</item>
		<item>
		<title>SecuraBit Episode 123: Security Jedi 101</title>
		<link>http://securabit.com/2014/01/28/securabit-episode-123-security-jedi-101/</link>
				<comments>http://securabit.com/2014/01/28/securabit-episode-123-security-jedi-101/#respond</comments>
				<pubDate>Tue, 28 Jan 2014 01:48:14 +0000</pubDate>
		<dc:creator><![CDATA[Chris]]></dc:creator>
				<category><![CDATA[Podcasts]]></category>
		<category><![CDATA[basics]]></category>
		<category><![CDATA[insider threat]]></category>
		<category><![CDATA[java]]></category>
		<category><![CDATA[mitigation]]></category>
		<category><![CDATA[RISK]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security101]]></category>
		<category><![CDATA[Vulnerability]]></category>

		<guid isPermaLink="false">http://securabit.com/?p=3398</guid>
				<description><![CDATA[January 15th, 2013 Hosts Chris Gerling – @secbitchris Christopher Mills – @TheChrisAM Guests Jack Nichelson &#8211; @Jack0Lope Topics Reducing your attack surface The Java the Challenge – See how many weeks you can go without Java installed Get Focused! Identify: Find the root cause of your top problem Align: Build a project plan and get&#8230;]]></description>
								<content:encoded><![CDATA[<p dir="ltr"><span style="line-height: 1.5em;">January 15th, 2013</span></p>
<p dir="ltr">Hosts</p>
<ul>
<li dir="ltr">
<p dir="ltr">Chris Gerling – <a href="http://twitter.com/secbitchris">@secbitchris</a></p>
</li>
</ul>
<ul>
<li dir="ltr">
<p dir="ltr">Christopher Mills – <a href="http://twitter.com/thechrisam">@TheChrisAM</a></p>
</li>
</ul>
<p dir="ltr">Guests</p>
<ul>
<li dir="ltr">
<p dir="ltr">Jack Nichelson &#8211; <a href="https://twitter.com/Jack0Lope">@Jack0Lope</a></p>
</li>
</ul>
<p dir="ltr">Topics</p>
<ul>
<li dir="ltr">
<p dir="ltr">Reducing your attack surface</p>
<ul>
<li dir="ltr">
<p dir="ltr">The Java the Challenge – See how many weeks you can go without Java installed</p>
</li>
</ul>
</li>
<li dir="ltr">
<p dir="ltr">Get Focused!</p>
<ul>
<li dir="ltr">
<p dir="ltr">Identify: Find the root cause of your top problem</p>
</li>
<li dir="ltr">
<p dir="ltr">Align: Build a project plan and get sponsorship</p>
</li>
<li dir="ltr">
<p dir="ltr">Communicate: Build consensus through awareness</p>
</li>
<li dir="ltr">
<p dir="ltr">Report: Build a scorecard to show results</p>
</li>
</ul>
</li>
<li dir="ltr">
<p dir="ltr">Transition from ineffective processes and philosophies, make technology an enablement tool, not just another tool to misappropriate and be frustrated by.</p>
</li>
</ul>
<p dir="ltr">Upcoming events</p>
<ul>
<li dir="ltr">
<p dir="ltr"><a href="http://www.secore.info/">http://www.secore.info</a></p>
</li>
</ul>
<p dir="ltr">Links</p>
<ul>
<li dir="ltr">
<p dir="ltr"><a href="http://www.gh0st.net/">http://www.gh0st.net</a> &#8211; Gh0st Pentesting Lab</p>
</li>
</ul>
<p dir="ltr">Chat with us on IRC at irc.freenode.net #securabit</p>
<p dir="ltr">iTunes Podcast –<a href="http://itunes.apple.com/us/podcast/securabit/id280048405"> http://itunes.apple.com/us/podcast/securabit/id280048405</a></p>
<p dir="ltr">iPhone App Now Available –<a href="http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8"> http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8</a></p>
]]></content:encoded>
							<wfw:commentRss>http://securabit.com/2014/01/28/securabit-episode-123-security-jedi-101/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
				<enclosure url="http://traffic.libsyn.com/securabit/SecuraBit_EP123.mp3" length="34103210" type="audio/mpeg" />
			<itunes:subtitle>January 15th, 2013 Hosts Chris Gerling – @secbitchris Christopher Mills – @TheChrisAM Guests Jack Nichelson – @Jack0Lope Topics Reducing your attack surface The Java the Challenge – See how many weeks you can go without Java installed Get Focused!</itunes:subtitle>
		<itunes:summary>January 15th, 2013 Hosts Chris Gerling – @secbitchris Christopher Mills – @TheChrisAM Guests Jack Nichelson – @Jack0Lope Topics Reducing your attack surface The Java the Challenge – See how many weeks you can go without Java installed Get Focused! Identify: Find the root cause of your top problem Align: Build a project plan and get…</itunes:summary>
		<itunes:author>SecuraBit</itunes:author>
		<itunes:duration>46:21</itunes:duration>
<post-id xmlns="com-wordpress:feed-additions:1">3398</post-id>	</item>
	</channel>
</rss>
