<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</title>
	<atom:link href="https://www.cigital.com/feed/podcasts/" rel="self" type="application/rss+xml" />
	<link>https://www.cigital.com</link>
	<description>Building Security In</description>
	<lastBuildDate>Wed, 30 Aug 2017 20:33:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9</generator>

<image>
	<url>https://www.cigital.com/wp-content/uploads/2015/09/cropped-cigital-icon-32x32.png</url>
	<title>Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</title>
	<link>https://www.cigital.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<copyright>Copyright © Cigital 2016 </copyright>
	<managingEditor>webmaster@cigital.com (Gary McGraw)</managingEditor>
	<webMaster>webmaster@cigital.com (Gary McGraw)</webMaster>
	<ttl>1440</ttl>
	<image>
		<url>https://www.cigital.com/wp-content/uploads/2016/12/silver-bullet-update-v02-small.png</url>
		<title>Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</title>
		<link>https://www.cigital.com</link>
		<width>144</width>
		<height>144</height>
	</image>
	<itunes:subtitle></itunes:subtitle>
	<itunes:summary></itunes:summary>
	<itunes:keywords></itunes:keywords>
	<itunes:category text="Technology" />
	<itunes:author>Gary McGraw</itunes:author>
	<itunes:owner>
		<itunes:name>Gary McGraw</itunes:name>
		<itunes:email>webmaster@cigital.com</itunes:email>
	</itunes:owner>
	<itunes:block>no</itunes:block>
	<itunes:explicit>no</itunes:explicit>
	<itunes:image href="https://www.cigital.com/wp-content/uploads/2016/12/silver-bullet-update-v02-med.png" />
	<item>
		<title>Show 137: Wafaa Mamilli Discusses Cultural Differences in Technology Management</title>
		<link>https://www.cigital.com/podcasts/show-137/</link>
		<pubDate>Wed, 30 Aug 2017 20:31:47 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[enterprise security]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=13722</guid>
		<description><![CDATA[<p>Wafaa Mamilli is Vice President, Chief Information Security Officer (CISO) at Eli Lilly and Company where she leads a global, enterprise-wide information and product security organization. She started her career consulting in Paris prior to joining Lilly France in 1995. Before being named CISO, Wafaa held several international leadership responsibilities across Lilly, including a stint &#8230; <a href="https://www.cigital.com/podcasts/show-137/" class="more-link">Continue reading <span class="screen-reader-text">Show 137: Wafaa Mamilli Discusses Cultural Differences in Technology Management</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-137/">Show 137: Wafaa Mamilli Discusses Cultural Differences in Technology Management</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-13723" src="https://www.cigital.com/wp-content/uploads/2017/08/wafaa-wp-final.jpg" align="right" srcset="https://www.cigital.com/wp-content/uploads/2017/08/wafaa-wp-final.jpg 260w, https://www.cigital.com/wp-content/uploads/2017/08/wafaa-wp-final-150x150.jpg 150w" sizes="(max-width: 260px) 100vw, 260px" />Wafaa Mamilli is Vice President, Chief Information Security Officer (CISO) at Eli Lilly and Company where she leads a global, <a href="https://www.synopsys.com/software-integrity/resources/case-studies/security-in-healthcare.html" target="_blank" rel="noopener">enterprise-wide information and product security</a> organization. She started her career consulting in Paris prior to joining Lilly France in 1995. Before being named CISO, Wafaa held several international leadership responsibilities across Lilly, including a stint as Information Officer of their diabetes division.</p>
<p>Born and raised in Morocco, Wafaa also lived in the UK, France, and the Middle East before relocating to Indianapolis, Indiana in 2008. She holds a Master’s in Computer Science from INSEA in Rabat, Morocco. She holds another Master’s in Business Applications of Information and Technology from Université Rennes 2 in Rennes, France. Additionally, Wafaa holds a General Management Certificate from the London Business School. Most recently, in 2015, she graduated from the Harvard Business School Advanced Management program.</p>
<p>Listen as Gary and Wafaa cover cultural differences in technology management, CISO education, organizational hierarchy, and more.</p>
<ul>
<li><a href="https://www.linkedin.com/in/wafaamamilli/" target="_blank" rel="noopener">Connect with Wafaa Mamilli on LinkedIn</a></li>
<li><a href="https://twitter.com/mamwaf?lang=en" target="_blank" rel="noopener">Follow Wafaa Mamilli on Twitter</a></li>
<li><a href="http://www.ewf-usa.com/news/344600/Executive-Womens-Forum-Hosts-First-Ever-Cybersecurity-Women-on-Capitol-Hill-Event.htm" target="_blank" rel="noopener">“Executive Women’s Forum Hosts First-Ever Cybersecurity Women on Capitol Hill Event”</a></li>
</ul>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-137/">Show 137: Wafaa Mamilli Discusses Cultural Differences in Technology Management</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/13722/0/silverbullet-137.mp3" length="46337394" type="audio/mpeg" />
		<itunes:duration>0:31:56</itunes:duration>
		<itunes:subtitle>Wafaa Mamilli is Vice President, Chief Information Security Officer (CISO) at Eli Lilly and Company where she leads a global, enterprise-wide information and product security organization. She started her career consulting in Paris prior to joining [...]</itunes:subtitle>
		<itunes:summary>Wafaa Mamilli is Vice President, Chief Information Security Officer (CISO) at Eli Lilly and Company where she leads a global, enterprise-wide information and product security organization. She started her career consulting in Paris prior to joining Lilly France in 1995. Before being named CISO, Wafaa held several international leadership responsibilities across Lilly, including a stint as Information Officer of their diabetes division.
Born and raised in Morocco, Wafaa also lived in the UK, France, and the Middle East before relocating to Indianapolis, Indiana in 2008. She holds a Master’s in Computer Science from INSEA in Rabat, Morocco. She holds another Master’s in Business Applications of Information and Technology from Université Rennes 2 in Rennes, France. Additionally, Wafaa holds a General Management Certificate from the London Business School. Most recently, in 2015, she graduated from the Harvard Business School Advanced Management program.
Listen as Gary and Wafaa cover cultural differences in technology management, CISO education, organizational hierarchy, and more.

Connect with Wafaa Mamilli on LinkedIn
Follow Wafaa Mamilli on Twitter
“Executive Women’s Forum Hosts First-Ever Cybersecurity Women on Capitol Hill Event”

&#160;
The post Show 137: Wafaa Mamilli Discusses Cultural Differences in Technology Management appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 137: Wafaa Mamilli Discusses Cultural Differences in Technology Management appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>CISO</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 136: Pavi Ramamurthy discusses the relationship between development and software security</title>
		<link>https://www.cigital.com/podcasts/show-136/</link>
		<pubDate>Mon, 31 Jul 2017 15:55:31 +0000</pubDate>
		<dc:creator><![CDATA[Liz Samet]]></dc:creator>
				<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Secure Development]]></category>
		<category><![CDATA[Security Training]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=13717</guid>
		<description><![CDATA[<p>Pavi Ramamurthy manages the security ecosystem at LinkedIn as a Senior Information Security Manager. The Security Ecosystem team holds much of the responsibility for software security at the firm, including: software security training, awareness, bug herding, application vulnerability response, program management, and security positioning for partners and customers. Pavi has over 20 years of experience &#8230; <a href="https://www.cigital.com/podcasts/show-136/" class="more-link">Continue reading <span class="screen-reader-text">Show 136: Pavi Ramamurthy discusses the relationship between development and software security</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-136/">Show 136: Pavi Ramamurthy discusses the relationship between development and software security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-13719" src="https://www.cigital.com/wp-content/uploads/2017/07/pavi-wp-1.jpg" align="right" srcset="https://www.cigital.com/wp-content/uploads/2017/07/pavi-wp-1.jpg 260w, https://www.cigital.com/wp-content/uploads/2017/07/pavi-wp-1-150x150.jpg 150w" sizes="(max-width: 260px) 100vw, 260px" />Pavi Ramamurthy manages the security ecosystem at LinkedIn as a Senior Information Security Manager. The Security Ecosystem team holds much of the responsibility for software security at the firm, including: software security training, awareness, bug herding, <a href="https://www.synopsys.com/software-integrity/resources/knowledge-database/vulnerability-assessment.html" target="_blank" rel="noopener">application vulnerability response</a>, program management, and security positioning for partners and customers. Pavi has over 20 years of experience in software engineering and development, coupled with 10 years of hands on security experience. She has also worked in various capacities at VMware, Determina, Vitria Technology, and 3Com. Pavi holds an MS in Computer Engineering from Santa Clara University and she lives in Silicon Valley with her family.</p>
<p>Listen as Pavi and Gary discuss whether a background in development makes you a better software security resource, CI/CD, security testing, the role that office hours play in software security awareness, and more.</p>
<ul>
<li><a href="https://twitter.com/4ponnae" target="_blank" rel="noopener">Follow Pavi Ramamurthy on Twitter</a></li>
<li><a href="https://www.linkedin.com/in/4pavi" target="_blank" rel="noopener">Connect with Pavi Ramamurthy on LinkedIn</a></li>
<li><em><a href="https://www.amazon.com/Doubters-Almanac-Novel-Ethan-Canin/dp/0812980263/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1501509890&amp;sr=1-1&amp;keywords=the+doubter%27s+almanac" target="_blank" rel="noopener">A Doubter’s Almanac: A Novel</a></em></li>
<li><em><a href="https://www.amazon.com/Twentieth-Wife-Novel-Indu-Sundaresan/dp/0743428188/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1501509933&amp;sr=1-1&amp;keywords=the+twentieth+wife" target="_blank" rel="noopener">The Twentieth Wife: A Novel</a></em></li>
</ul>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-136/">Show 136: Pavi Ramamurthy discusses the relationship between development and software security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/13717/0/silverbullet-136.mp3" length="46232564" type="audio/mpeg" />
		<itunes:duration>0:31:51</itunes:duration>
		<itunes:subtitle>Pavi Ramamurthy manages the security ecosystem at LinkedIn as a Senior Information Security Manager. The Security Ecosystem team holds much of the responsibility for software security at the firm, including: software security training, awareness, bu[...]</itunes:subtitle>
		<itunes:summary>Pavi Ramamurthy manages the security ecosystem at LinkedIn as a Senior Information Security Manager. The Security Ecosystem team holds much of the responsibility for software security at the firm, including: software security training, awareness, bug herding, application vulnerability response, program management, and security positioning for partners and customers. Pavi has over 20 years of experience in software engineering and development, coupled with 10 years of hands on security experience. She has also worked in various capacities at VMware, Determina, Vitria Technology, and 3Com. Pavi holds an MS in Computer Engineering from Santa Clara University and she lives in Silicon Valley with her family.
Listen as Pavi and Gary discuss whether a background in development makes you a better software security resource, CI/CD, security testing, the role that office hours play in software security awareness, and more.

Follow Pavi Ramamurthy on Twitter
Connect with Pavi Ramamurthy on LinkedIn
A Doubter’s Almanac: A Novel
The Twentieth Wife: A Novel

&#160;
The post Show 136: Pavi Ramamurthy discusses the relationship between development and software security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 136: Pavi Ramamurthy discusses the relationship between development and software security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 135: Ksenia Dmitrieva-Peguero discusses software security and AngularJS</title>
		<link>https://www.cigital.com/podcasts/show-135/</link>
		<pubDate>Thu, 29 Jun 2017 16:08:40 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Threat Modeling]]></category>
		<category><![CDATA[JavaScript]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=13711</guid>
		<description><![CDATA[<p>Ksenia Dmitrieva-Peguero is a Principal Consultant within Synopsys’ Software Integrity Group. She is a subject matter expert in a variety of software security practices including static analysis tool design and execution, customization, and deployment. She is also an expert in the areas of penetration testing and threat modeling. Throughout her career as a consultant, Ksenia &#8230; <a href="https://www.cigital.com/podcasts/show-135/" class="more-link">Continue reading <span class="screen-reader-text">Show 135: Ksenia Dmitrieva-Peguero discusses software security and AngularJS</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-135/">Show 135: Ksenia Dmitrieva-Peguero discusses software security and AngularJS</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-13712" src="https://www.cigital.com/wp-content/uploads/2017/06/ksenia-wp.jpg" alt="Show 135: Ksenia Dmitrieva-Peguero discusses security awareness and AngularJS" align="right" srcset="https://www.cigital.com/wp-content/uploads/2017/06/ksenia-wp.jpg 260w, https://www.cigital.com/wp-content/uploads/2017/06/ksenia-wp-150x150.jpg 150w" sizes="(max-width: 260px) 100vw, 260px" />Ksenia Dmitrieva-Peguero is a Principal Consultant within Synopsys’ Software Integrity Group. She is a subject matter expert in a variety of software security practices including <a href="https://www.synopsys.com/software-integrity/security-testing/static-analysis-sast.html" target="_blank" rel="noopener">static analysis tool design</a> and execution, customization, and deployment. She is also an expert in the areas of <a href="https://www.synopsys.com/software-integrity/security-testing/penetration-testing.html" target="_blank" rel="noopener">penetration testing</a> and <a href="https://www.synopsys.com/software-integrity/software-security-services/software-architecture-design/threat-modeling.html" target="_blank" rel="noopener">threat modeling</a>. Throughout her career as a consultant, Ksenia has established and evolved secure coding guidance and best practices for many different firms, and has delivered numerous software security training sessions. She speaks regularly at events around the world on topics such as HTML5, CSP, and JavaScript. Ksenia holds degrees in Education and Computer Science from Clemson University, and an MS in Computer Science from George Washington University. She lives in Virginia with her husband and newborn daughter.</p>
<p>Listen as Gary and Ksenia discuss software security awareness, AngularJS, security conferences, and more.</p>
<ul>
<li><a href="https://twitter.com/KseniaDmitrieva?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor" target="_blank" rel="noopener">Follow Ksenia on Twitter</a></li>
<li><a href="https://www.linkedin.com/in/kseniadmitrieva/" target="_blank" rel="noopener">Connect with Ksenia on Linkedin</a></li>
<li><a href="https://www.synopsys.com/blogs/software-security/how-secure-is-angularjs/" target="_blank" rel="noopener">“How secure is AngularJS?”</a></li>
<li><a href="https://www.youtube.com/watch?v=7ksZ4szi0WY" target="_blank" rel="noopener">BSides DC 2015: Fixing XSS with a content security policy</a></li>
<li>
<div id="watch7-user-header" class=" spf-link "><a href="https://www.youtube.com/watch?v=kq_fxVnX9GY" target="_blank" rel="noopener">Ballroom dancing</a></div>
</li>
</ul>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-135/">Show 135: Ksenia Dmitrieva-Peguero discusses software security and AngularJS</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/13711/0/silverbullet-135.mp3" length="37683581" type="audio/mpeg" />
		<itunes:duration>0:25:55</itunes:duration>
		<itunes:subtitle>Ksenia Dmitrieva-Peguero is a Principal Consultant within Synopsys’ Software Integrity Group. She is a subject matter expert in a variety of software security practices including static analysis tool design and execution, customization, and deployme[...]</itunes:subtitle>
		<itunes:summary>Ksenia Dmitrieva-Peguero is a Principal Consultant within Synopsys’ Software Integrity Group. She is a subject matter expert in a variety of software security practices including static analysis tool design and execution, customization, and deployment. She is also an expert in the areas of penetration testing and threat modeling. Throughout her career as a consultant, Ksenia has established and evolved secure coding guidance and best practices for many different firms, and has delivered numerous software security training sessions. She speaks regularly at events around the world on topics such as HTML5, CSP, and JavaScript. Ksenia holds degrees in Education and Computer Science from Clemson University, and an MS in Computer Science from George Washington University. She lives in Virginia with her husband and newborn daughter.
Listen as Gary and Ksenia discuss software security awareness, AngularJS, security conferences, and more.

Follow Ksenia on Twitter
Connect with Ksenia on Linkedin
“How secure is AngularJS?”
BSides DC 2015: Fixing XSS with a content security policy

Ballroom dancing


&#160;
&#160;
The post Show 135: Ksenia Dmitrieva-Peguero discusses software security and AngularJS appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 135: Ksenia Dmitrieva-Peguero discusses software security and AngularJS appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 134: Kelly Jackson Higgins Discusses Cyber Security Journalism</title>
		<link>https://www.cigital.com/podcasts/show-134/</link>
		<pubDate>Wed, 24 May 2017 19:05:38 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=13702</guid>
		<description><![CDATA[<p>Kelly Jackson Higgins is the Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with over 20 years of experience as a reporter and editor. Publications that Kelly has been associated with include Network Computing, Secure Enterprise Magazine, Communications Week, and more. Kelly’s coverage of computer (i.e., cyber) security has led &#8230; <a href="https://www.cigital.com/podcasts/show-134/" class="more-link">Continue reading <span class="screen-reader-text">Show 134: Kelly Jackson Higgins Discusses Cyber Security Journalism</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-134/">Show 134: Kelly Jackson Higgins Discusses Cyber Security Journalism</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-13703" src="https://www.cigital.com/wp-content/uploads/2017/05/kjh_wp.png" alt="Show 134: Kelly Jackson Higgins Discusses Cyber Security Journalism" align="right" srcset="https://www.cigital.com/wp-content/uploads/2017/05/kjh_wp.png 260w, https://www.cigital.com/wp-content/uploads/2017/05/kjh_wp-150x150.png 150w" sizes="(max-width: 260px) 100vw, 260px" />Kelly Jackson Higgins is the Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with over 20 years of experience as a reporter and editor. Publications that Kelly has been associated with include Network Computing, Secure Enterprise Magazine, Communications Week, and more. Kelly’s coverage of computer (i.e., cyber) security has led her to be selected as one of the top 10 cybersecurity journalists in the U.S. She holds a BA from the College of William and Mary where she also played on the women’s soccer team. She currently lives near Charlottesville, VA.</p>
<p>Listen as Gary and Kelly discuss how to separate fact from fiction when it comes to news in security, changes in security-focused journalism in recent years, social media, security politics, and more.</p>
<ul>
<li><a href="https://twitter.com/kjhiggins?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor" target="_blank" rel="noopener noreferrer">Follow Kelly Jackson Higgins on Twitter</a></li>
<li><a href="https://www.linkedin.com/in/kellyj2/" target="_blank" rel="noopener noreferrer">Connect with Kelly Jackson Higgins on LinkedIn</a></li>
<li><a href="http://www.darkreading.com/author-bio.asp?author_id=322" target="_blank" rel="noopener noreferrer">Articles by Kelly Jackson Higgins on DarkReading.com</a></li>
<li><a href="https://threatpost.com/how-i-got-here-kelly-jackson-higgins/109384/" target="_blank" rel="noopener noreferrer">“How I Got Here: Kelly Jackson Higgins” Threat Post interview</a></li>
<li><a href="https://books.google.com/books/about/Conversations_with_Toni_Morrison.html?id=iYvE9-i_g9AC" target="_blank" rel="noopener noreferrer">Conversations with Toni Morrison</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-134/">Show 134: Kelly Jackson Higgins Discusses Cyber Security Journalism</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/13702/0/silverbullet-134.mp3" length="36226874" type="audio/mpeg" />
		<itunes:duration>0:24:54</itunes:duration>
		<itunes:subtitle>Kelly Jackson Higgins is the Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with over 20 years of experience as a reporter and editor. Publications that Kelly has been associated with include [...]</itunes:subtitle>
		<itunes:summary>Kelly Jackson Higgins is the Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with over 20 years of experience as a reporter and editor. Publications that Kelly has been associated with include Network Computing, Secure Enterprise Magazine, Communications Week, and more. Kelly’s coverage of computer (i.e., cyber) security has led her to be selected as one of the top 10 cybersecurity journalists in the U.S. She holds a BA from the College of William and Mary where she also played on the women’s soccer team. She currently lives near Charlottesville, VA.
Listen as Gary and Kelly discuss how to separate fact from fiction when it comes to news in security, changes in security-focused journalism in recent years, social media, security politics, and more.

Follow Kelly Jackson Higgins on Twitter
Connect with Kelly Jackson Higgins on LinkedIn
Articles by Kelly Jackson Higgins on DarkReading.com
“How I Got Here: Kelly Jackson Higgins” Threat Post interview
Conversations with Toni Morrison

The post Show 134: Kelly Jackson Higgins Discusses Cyber Security Journalism appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 134: Kelly Jackson Higgins Discusses Cyber Security Journalism appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 133: Cheryl Biswas Discusses the Politicization of Cyber Security</title>
		<link>https://www.cigital.com/podcasts/show-133/</link>
		<pubDate>Thu, 27 Apr 2017 13:57:37 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[conferences]]></category>
		<category><![CDATA[enterprise security]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=13695</guid>
		<description><![CDATA[<p>Cheryl Biswas is a Cyber Security Consultant focusing on threat intelligence at KPMG Canada. Her IT career began over 20 years ago at CP Rail’s helpdesk, with further roles in vendor management and change management. She went on to work as an InfoSec researcher at JIG Technologies where she advised her team and clients on &#8230; <a href="https://www.cigital.com/podcasts/show-133/" class="more-link">Continue reading <span class="screen-reader-text">Show 133: Cheryl Biswas Discusses the Politicization of Cyber Security</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-133/">Show 133: Cheryl Biswas Discusses the Politicization of Cyber Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-13696" src="https://www.cigital.com/wp-content/uploads/2017/04/cb1.png" alt="Show 133: Cheryl Biswas Discusses the Politicization of Cyber Security" align="right" srcset="https://www.cigital.com/wp-content/uploads/2017/04/cb1.png 260w, https://www.cigital.com/wp-content/uploads/2017/04/cb1-150x150.png 150w" sizes="(max-width: 260px) 100vw, 260px" />Cheryl Biswas is a Cyber Security Consultant focusing on <a href="https://www.synopsys.com/software-integrity/resources/datasheets/cyber-threat-intelligence.html" target="_blank">threat intelligence</a> at KPMG Canada. Her IT career began over 20 years ago at CP Rail’s helpdesk, with further roles in vendor management and change management. She went on to work as an InfoSec researcher at JIG Technologies where she advised her team and clients on security matters and weekly threat intel updates. Cheryl strives to connect people within information security, with a focus on end users. She shares a passion for learning and security by blogging, speaking at conferences, and through her social media presence. Cheryl holds a B.A. in Political Science from York University. She lives in Toronto, Canada with her three kids.</p>
<p>Listen as Gary and Cheryl discuss aligning security to work as a service for the business rather than an imposition for employees, trending cyber security political topics, work-life balance, and more.</p>
<ul>
<li><a href="https://twitter.com/3ncr1pt3d" target="_blank">Follow Cheryl Biswas on Twitter</a></li>
<li><a href="https://www.linkedin.com/in/cherylbiswas/" target="_blank">Connect with Cheryl Biswas on LinkedIn</a></li>
<li><a href="https://whitehatcheryl.wordpress.com/" target="_blank">Cheryl’s CyberWatch blog</a></li>
<li><a href="https://cherylbiswas.wordpress.com" target="_blank">Cheryl’s Mom’s the Word blog</a></li>
<li><a href="https://tiaracon.org/" target="_blank">TiaraCon</a></li>
<li>“<a href="https://www.linkedin.com/pulse/ransomware-databases-mongo-problem-cheryl-biswas" target="_blank">Ransomware and Databases: A Mongo Problem</a>”</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-133/">Show 133: Cheryl Biswas Discusses the Politicization of Cyber Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/13695/0/silverbullet-133.mp3" length="42275442" type="audio/mpeg" />
		<itunes:duration>0:29:06</itunes:duration>
		<itunes:subtitle>Cheryl Biswas is a Cyber Security Consultant focusing on threat intelligence at KPMG Canada. Her IT career began over 20 years ago at CP Rail’s helpdesk, with further roles in vendor management and change management. She went on to work as an InfoSe[...]</itunes:subtitle>
		<itunes:summary>Cheryl Biswas is a Cyber Security Consultant focusing on threat intelligence at KPMG Canada. Her IT career began over 20 years ago at CP Rail’s helpdesk, with further roles in vendor management and change management. She went on to work as an InfoSec researcher at JIG Technologies where she advised her team and clients on security matters and weekly threat intel updates. Cheryl strives to connect people within information security, with a focus on end users. She shares a passion for learning and security by blogging, speaking at conferences, and through her social media presence. Cheryl holds a B.A. in Political Science from York University. She lives in Toronto, Canada with her three kids.
Listen as Gary and Cheryl discuss aligning security to work as a service for the business rather than an imposition for employees, trending cyber security political topics, work-life balance, and more.

Follow Cheryl Biswas on Twitter
Connect with Cheryl Biswas on LinkedIn
Cheryl’s CyberWatch blog
Cheryl’s Mom’s the Word blog
TiaraCon
“Ransomware and Databases: A Mongo Problem”

The post Show 133: Cheryl Biswas Discusses the Politicization of Cyber Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 133: Cheryl Biswas Discusses the Politicization of Cyber Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 132: Chenxi Wang Discusses DevOps and Diversity in Tech</title>
		<link>https://www.cigital.com/podcasts/show-132/</link>
		<pubDate>Wed, 29 Mar 2017 15:19:13 +0000</pubDate>
		<dc:creator><![CDATA[Liz Samet]]></dc:creator>
				<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=13670</guid>
		<description><![CDATA[<p>Dr. Chenxi Wang is the founder of the Jane Bond Project. She has built an illustrious security career with experience at Forrester Research, Intel Security, CipherCloud, and Twistlock. Dr. Wang started her career as a computer security faculty member at Carnegie Mellon University. She holds a Ph.D. in Computer Science from the University of Virginia &#8230; <a href="https://www.cigital.com/podcasts/show-132/" class="more-link">Continue reading <span class="screen-reader-text">Show 132: Chenxi Wang Discusses DevOps and Diversity in Tech</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-132/">Show 132: Chenxi Wang Discusses DevOps and Diversity in Tech</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-13671" src="https://www.cigital.com/wp-content/uploads/2017/03/chenxi-wp.jpg" alt="Show 132: Chenxi Wang Discusses DevOps and Diversity in Tech " align="right" srcset="https://www.cigital.com/wp-content/uploads/2017/03/chenxi-wp.jpg 260w, https://www.cigital.com/wp-content/uploads/2017/03/chenxi-wp-150x150.jpg 150w" sizes="(max-width: 260px) 100vw, 260px" /></p>
<p>Dr. Chenxi Wang is the founder of the Jane Bond Project. She has built an illustrious security career with experience at Forrester Research, Intel Security, CipherCloud, and Twistlock. Dr. Wang started her career as a computer security faculty member at Carnegie Mellon University. She holds a Ph.D. in Computer Science from the University of Virginia and currently lives in Silicon Valley with her family.</p>
<p>Listen as Gary and Chenxi discuss the life of Professor John C. Knight, the Jane Bond Project, the Grace Hopper Conference, <a href="https://www.synopsys.com/software-integrity.html" target="_blank">the state of software security</a>, <a href="https://www.synopsys.com/software-integrity/solutions/by-security-need/devops.html" target="_blank">DevOps</a>, fixing the diversity in tech issue, and more.</p>
<ul>
<li><a href="https://twitter.com/chenxiwang?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor" target="_blank">Follow Chenxi Wang on Twitter</a></li>
<li><a href="https://www.linkedin.com/in/chenxiwang88/" target="_blank">Connect with Chenxi Wang on LinkedIn</a></li>
<li><a href="https://securityledger.com/2017/02/interview-chenxi-wang-twistlock-information-security-mr-robot-problem-and-iot-standards/" target="_blank">”Interview: Chenxi Wang on Information Security’s Mr. Robot Problem and Enforcing IoT Standards”</a></li>
<li><a href="https://www.cs.virginia.edu/~jck/publications/wangthesis.pdf" target="_blank"><em>A Security Architecture for Survivability Mechanisms</em></a></li>
<li><a href="https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555/ref=sr_1_1?ie=UTF8&amp;qid=1490122505&amp;sr=8-1&amp;keywords=fast+think+slow+think" target="_blank"><em>Thinking, Fast and Slow</em> by Daniel Kahneman</a></li>
<li><a href="https://itspmagazine.com/from-the-newsroom/dont-talk-diversity-live-it-panel-at-rsa-2017" target="_blank">”Don&#8217;t Talk Diversity, Live It!” Panel at RSA 2017</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-132/">Show 132: Chenxi Wang Discusses DevOps and Diversity in Tech</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/13670/0/silverbullet-132.mp3" length="46838512" type="audio/mpeg" />
		<itunes:duration>0:32:16</itunes:duration>
		<itunes:subtitle>
Dr. Chenxi Wang is the founder of the Jane Bond Project. She has built an illustrious security career with experience at Forrester Research, Intel Security, CipherCloud, and Twistlock. Dr. Wang started her career as a computer security faculty memb[...]</itunes:subtitle>
		<itunes:summary>
Dr. Chenxi Wang is the founder of the Jane Bond Project. She has built an illustrious security career with experience at Forrester Research, Intel Security, CipherCloud, and Twistlock. Dr. Wang started her career as a computer security faculty member at Carnegie Mellon University. She holds a Ph.D. in Computer Science from the University of Virginia and currently lives in Silicon Valley with her family.
Listen as Gary and Chenxi discuss the life of Professor John C. Knight, the Jane Bond Project, the Grace Hopper Conference, the state of software security, DevOps, fixing the diversity in tech issue, and more.

Follow Chenxi Wang on Twitter
Connect with Chenxi Wang on LinkedIn
”Interview: Chenxi Wang on Information Security’s Mr. Robot Problem and Enforcing IoT Standards”
A Security Architecture for Survivability Mechanisms
Thinking, Fast and Slow by Daniel Kahneman
”Don&#8217;t Talk Diversity, Live It!” Panel at RSA 2017

The post Show 132: Chenxi Wang Discusses DevOps and Diversity in Tech appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 132: Chenxi Wang Discusses DevOps and Diversity in Tech appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 131: Kate Pearce Discusses the Relationship Between Biology and Security</title>
		<link>https://www.cigital.com/podcasts/show-131/</link>
		<pubDate>Tue, 28 Feb 2017 13:27:54 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=13652</guid>
		<description><![CDATA[<p>Kate Pearce is a Senior Security Consultant at Cisco within the Customer Solutions division. In her career, Kate approaches security from diverse perspectives encompassing defenders, builders, assessors, and attackers. Her approach blends business, academic, and assessment contexts with a clear focus on evidence-driven security approaches. Kate holds an MSc and a BSc in Computer Science &#8230; <a href="https://www.cigital.com/podcasts/show-131/" class="more-link">Continue reading <span class="screen-reader-text">Show 131: Kate Pearce Discusses the Relationship Between Biology and Security</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-131/">Show 131: Kate Pearce Discusses the Relationship Between Biology and Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-13653" src="https://www.cigital.com/wp-content/uploads/2017/02/kate-pearce-wp.jpg" alt="Kate Pearce Discusses the Relationship Between Biology and Security" align="right" srcset="https://www.cigital.com/wp-content/uploads/2017/02/kate-pearce-wp.jpg 260w, https://www.cigital.com/wp-content/uploads/2017/02/kate-pearce-wp-150x150.jpg 150w" sizes="(max-width: 260px) 100vw, 260px" />Kate Pearce is a Senior Security Consultant at Cisco within the Customer Solutions division. In her career, Kate approaches security from diverse perspectives encompassing defenders, builders, assessors, and attackers. Her approach blends business, academic, and assessment contexts with a clear focus on <a href="https://www.synopsys.com/software-integrity/software-security-strategy/metrics.html" target="_blank" rel="noopener">evidence-driven security approaches</a>. Kate holds an MSc and a BSc in Computer Science from the University of Canterbury. A repatriated Kiwi, she currently lives in Wellington, New Zealand with her wife and cat.</p>
<p>Listen as Gary and Kate discuss the state of the software security industry, gender perspectives in the security space, the relationship between biology and security, and more.</p>
<ul>
<li><a href="http://secvalve.com/" target="_blank" rel="noopener">Visit Kate Pearce’s website</a></li>
<li><a href="https://www.linkedin.com/in/securitykate/" target="_blank" rel="noopener">Connect with Kate Pearce on LinkedIn</a></li>
<li><a href="https://twitter.com/secvalve?lang=en" target="_blank" rel="noopener">Follow Kate Pearce on Twitter</a></li>
<li><a href="https://www.blackhat.com/us-16/speakers/Catherine-(Kate)-Pearce.html" target="_blank" rel="noopener">What did Kate present at Black Hat 2016?</a></li>
<li><a href="https://blogs.synopsys.com/software-integrity/2017/02/02/gary-mcgraws-shmoocon-keynote-recaps-security-career-with-advice/" target="_blank" rel="noopener">“Researchers” versus Researchers: Gary’s ShmooCon talk</a></li>
<li><a href="https://www.amazon.com/Short-History-Nearly-Everything/dp/076790818X/ref=sr_1_1?ie=UTF8&amp;qid=1488222725&amp;sr=8-1&amp;keywords=bill+bryson" target="_blank" rel="noopener">Bill Bryson’s <em>A Short History of Almost Everything</em></a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-131/">Show 131: Kate Pearce Discusses the Relationship Between Biology and Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/13652/0/silverbullet-131.mp3" length="46122544" type="audio/mpeg" />
		<itunes:duration>0:31:47</itunes:duration>
		<itunes:subtitle>Kate Pearce is a Senior Security Consultant at Cisco within the Customer Solutions division. In her career, Kate approaches security from diverse perspectives encompassing defenders, builders, assessors, and attackers. Her approach blends business, [...]</itunes:subtitle>
		<itunes:summary>Kate Pearce is a Senior Security Consultant at Cisco within the Customer Solutions division. In her career, Kate approaches security from diverse perspectives encompassing defenders, builders, assessors, and attackers. Her approach blends business, academic, and assessment contexts with a clear focus on evidence-driven security approaches. Kate holds an MSc and a BSc in Computer Science from the University of Canterbury. A repatriated Kiwi, she currently lives in Wellington, New Zealand with her wife and cat.
Listen as Gary and Kate discuss the state of the software security industry, gender perspectives in the security space, the relationship between biology and security, and more.

Visit Kate Pearce’s website
Connect with Kate Pearce on LinkedIn
Follow Kate Pearce on Twitter
What did Kate present at Black Hat 2016?
“Researchers” versus Researchers: Gary’s ShmooCon talk
Bill Bryson’s A Short History of Almost Everything

The post Show 131: Kate Pearce Discusses the Relationship Between Biology and Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 131: Kate Pearce Discusses the Relationship Between Biology and Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 130: Jessy Irwin Discusses How to Make Security and Privacy Accessible</title>
		<link>https://www.cigital.com/podcasts/show-130/</link>
		<pubDate>Mon, 23 Jan 2017 18:35:17 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Training]]></category>
		<category><![CDATA[aspiring achiever]]></category>
		<category><![CDATA[evolving explorer]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[resolute rookie]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=13625</guid>
		<description><![CDATA[<p>Jessy Irwin is Vice President of Security and Privacy at Mercury Public Affairs. Her work focuses on human-centric technology and security. Jessy works tirelessly to make security and privacy accessible to the average person through education and awareness. As an outspoken advocate, she writes and speaks publicly about security research, strong crypto, and security education. &#8230; <a href="https://www.cigital.com/podcasts/show-130/" class="more-link">Continue reading <span class="screen-reader-text">Show 130: Jessy Irwin Discusses How to Make Security and Privacy Accessible</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-130/">Show 130: Jessy Irwin Discusses How to Make Security and Privacy Accessible</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-13627" src="https://www.cigital.com/wp-content/uploads/2017/01/ji-wp.jpg" alt="Jessy Irwin Discusses How to Make Security and Privacy Accessible" align="right" srcset="https://www.cigital.com/wp-content/uploads/2017/01/ji-wp.jpg 260w, https://www.cigital.com/wp-content/uploads/2017/01/ji-wp-150x150.jpg 150w" sizes="(max-width: 260px) 100vw, 260px" />Jessy Irwin is Vice President of Security and Privacy at Mercury Public Affairs. Her work focuses on human-centric technology and security. Jessy works tirelessly to make security and privacy accessible to the average person through education and awareness. As an outspoken advocate, she writes and speaks publicly about security research, <a href="https://www.cigital.com/knowledge-database/cryptography/" target="_blank">strong crypto</a>, and <a href="https://www.cigital.com/services/training/" target="_blank">security education</a>. She studied Art History and French at Virginia Tech and is now based in San Francisco.</p>
<p>Listen as Gary and Jessy discuss social engineering, security research, and security education and accessibility.</p>
<ul>
<li><a href="https://www.linkedin.com/in/jessyirwin" target="_blank">Connect with Jessy Irwin on LinkedIn</a></li>
<li><a href="https://twitter.com/jessysaurusrex" target="_blank">Follow Jessy Irwin on Twitter</a></li>
<li><a href="https://jessysaurusrex.com/" target="_blank">Visit Jessy’s Jessysaurusrex blog</a></li>
<li><a href="https://modelviewculture.com/pieces/grooming-students-for-a-lifetime-of-surveillance" target="_blank">“Grooming Students for A Lifetime of Surveillance”</a></li>
<li><a href="https://www.rsaconference.com/videos/cryptoparty-an-introduction-to-secure-usable-encryption-tools-for-all" target="_blank">“Cryptoparty: An Introduction to Secure, Usable Encryption Tools for All”</a></li>
<li><a href="https://www.cigital.com/podcasts/show-112/" target="_blank">Steve Bellovin and Matt Green discuss the crypto wars in Show 112</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-130/">Show 130: Jessy Irwin Discusses How to Make Security and Privacy Accessible</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/13625/0/silverbullet-130.mp3" length="45112816" type="audio/mpeg" />
		<itunes:duration>0:31:05</itunes:duration>
		<itunes:subtitle>Jessy Irwin is Vice President of Security and Privacy at Mercury Public Affairs. Her work focuses on human-centric technology and security. Jessy works tirelessly to make security and privacy accessible to the average person through education and aw[...]</itunes:subtitle>
		<itunes:summary>Jessy Irwin is Vice President of Security and Privacy at Mercury Public Affairs. Her work focuses on human-centric technology and security. Jessy works tirelessly to make security and privacy accessible to the average person through education and awareness. As an outspoken advocate, she writes and speaks publicly about security research, strong crypto, and security education. She studied Art History and French at Virginia Tech and is now based in San Francisco.
Listen as Gary and Jessy discuss social engineering, security research, and security education and accessibility.

Connect with Jessy Irwin on LinkedIn
Follow Jessy Irwin on Twitter
Visit Jessy’s Jessysaurusrex blog
“Grooming Students for A Lifetime of Surveillance”
“Cryptoparty: An Introduction to Secure, Usable Encryption Tools for All”
Steve Bellovin and Matt Green discuss the crypto wars in Show 112

The post Show 130: Jessy Irwin Discusses How to Make Security and Privacy Accessible appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 130: Jessy Irwin Discusses How to Make Security and Privacy Accessible appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 129: Kelly Lum Discusses Bug Hunting and a Unique Analytical Outlook on Security</title>
		<link>https://www.cigital.com/podcasts/show-129/</link>
		<pubDate>Tue, 27 Dec 2016 17:01:30 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[Code Review]]></category>
		<category><![CDATA[Defects, Bugs, and Flaws]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[aspiring achiever]]></category>
		<category><![CDATA[evolving explorer]]></category>
		<category><![CDATA[networking]]></category>
		<category><![CDATA[resolute rookie]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=13609</guid>
		<description><![CDATA[<p>Kelly Lum, a.k.a. Aloria, is a Security Engineer at Tumblr and an Adjunct Professor of Graduate Computer Networking and Application Security at NYU. She has 13 years of experience in computer security, having previously worked in both the government and financial services spaces. Kelly is also a frequent speaker on the Black Hat SummerCon Countermeasure &#8230; <a href="https://www.cigital.com/podcasts/show-129/" class="more-link">Continue reading <span class="screen-reader-text">Show 129: Kelly Lum Discusses Bug Hunting and a Unique Analytical Outlook on Security</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-129/">Show 129: Kelly Lum Discusses Bug Hunting and a Unique Analytical Outlook on Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-13611" src="https://www.cigital.com/wp-content/uploads/2016/12/kelly-lum-wp.jpg" alt="Kelly Lum Discusses Bug Hunting and a Unique Analytical Outlook on Security" align="right" srcset="https://www.cigital.com/wp-content/uploads/2016/12/kelly-lum-wp.jpg 260w, https://www.cigital.com/wp-content/uploads/2016/12/kelly-lum-wp-150x150.jpg 150w" sizes="(max-width: 260px) 100vw, 260px" />Kelly Lum, a.k.a. Aloria, is a Security Engineer at Tumblr and an Adjunct Professor of Graduate <a href="https://www.synopsys.com/software-integrity/solutions/solutions-by-industry/computer-and-networking-systems.html" target="_blank" rel="noopener noreferrer">Computer Networking</a> and Application Security at NYU. She has 13 years of experience in computer security, having previously worked in both the government and <a href="https://www.synopsys.com/software-integrity/solutions/solutions-by-industry/fsi-enterprise.html" target="_blank" rel="noopener noreferrer">financial services</a> spaces. Kelly is also a frequent speaker on the Black Hat SummerCon Countermeasure circuit where she often focuses on data loss prevention (DLP) and bug hunting.</p>
<p>Listen as Gary and Kelly discuss the differences between application security and software security, finding bugs versus fixing bugs, improving code review tools, and how mental illness affects her analytical security outlook.</p>
<ul>
<li><a href="https://www.instagram.com/aloriaaa/" target="_blank" rel="noopener noreferrer">Follow Kelly Lum on Instagram</a></li>
<li><a href="https://twitter.com/aloria" target="_blank" rel="noopener noreferrer">Follow Kelly Lum on Twitter</a></li>
<li><a href="https://www.linkedin.com/in/tacotuesday" target="_blank" rel="noopener noreferrer">Connect with Kelly Lum on LinkedIn</a></li>
<li><a href="https://travers.al/" target="_blank" rel="noopener noreferrer">Travers.al blog</a></li>
<li><a href="https://aloria.exposure.co/shes-a-wreck" target="_blank" rel="noopener noreferrer">She’s A Wreck blog </a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-129/">Show 129: Kelly Lum Discusses Bug Hunting and a Unique Analytical Outlook on Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/13609/0/silverbullet-129.mp3" length="48226094" type="audio/mpeg" />
		<itunes:duration>0:33:14</itunes:duration>
		<itunes:subtitle>Kelly Lum, a.k.a. Aloria, is a Security Engineer at Tumblr and an Adjunct Professor of Graduate Computer Networking and Application Security at NYU. She has 13 years of experience in computer security, having previously worked in both the government[...]</itunes:subtitle>
		<itunes:summary>Kelly Lum, a.k.a. Aloria, is a Security Engineer at Tumblr and an Adjunct Professor of Graduate Computer Networking and Application Security at NYU. She has 13 years of experience in computer security, having previously worked in both the government and financial services spaces. Kelly is also a frequent speaker on the Black Hat SummerCon Countermeasure circuit where she often focuses on data loss prevention (DLP) and bug hunting.
Listen as Gary and Kelly discuss the differences between application security and software security, finding bugs versus fixing bugs, improving code review tools, and how mental illness affects her analytical security outlook.

Follow Kelly Lum on Instagram
Follow Kelly Lum on Twitter
Connect with Kelly Lum on LinkedIn
Travers.al blog
She’s A Wreck blog 

The post Show 129: Kelly Lum Discusses Bug Hunting and a Unique Analytical Outlook on Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 129: Kelly Lum Discusses Bug Hunting and a Unique Analytical Outlook on Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 128: Lesley Carhart Discusses Incident Response and Digital Forensics</title>
		<link>https://www.cigital.com/podcasts/show-128/</link>
		<pubDate>Tue, 29 Nov 2016 20:40:32 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[aspiring achiever]]></category>
		<category><![CDATA[evolving explorer]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[resolute rookie]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=13345</guid>
		<description><![CDATA[<p>Lesley Carhart is the Security Incident Response Lead at a large corporation in the Chicagoland area where she and her team work with digital theft, misconfiguration, and hacking issues. She has 17 years of experience in the IT industry, eight of which focus on incident response and digital forensics. Lesley holds a BS in Network &#8230; <a href="https://www.cigital.com/podcasts/show-128/" class="more-link">Continue reading <span class="screen-reader-text">Show 128: Lesley Carhart Discusses Incident Response and Digital Forensics</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-128/">Show 128: Lesley Carhart Discusses Incident Response and Digital Forensics</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-13346" src="https://www.cigital.com/wp-content/uploads/2016/11/lc-wp.jpg" alt="Lesley Carhart Discusses Incident Response and Digital Forensics" align="right" srcset="https://www.cigital.com/wp-content/uploads/2016/11/lc-wp.jpg 260w, https://www.cigital.com/wp-content/uploads/2016/11/lc-wp-150x150.jpg 150w" sizes="(max-width: 260px) 100vw, 260px" />Lesley Carhart is the Security Incident Response Lead at a large corporation in the Chicagoland area where she and her team work with digital theft, misconfiguration, and hacking issues. She has 17 years of experience in the IT industry, eight of which focus on incident response and digital forensics. Lesley holds a BS in Network Technologies from DePaul University. She is an active writer, speaker, and works as a member of <a href="https://circlecitycon.com/tickets/" target="_blank" rel="noopener">CircleCityCon</a> staff.</p>
<p>Listen as Gary and Lesley discuss the evolution of computer security, incident response, <a href="https://www.cigital.com/blog/4-skills-every-application-security-expert-ought-to-have/" target="_blank" rel="noopener">digital forensics</a>, security engineering, security certifications, and more.</p>
<ul>
<li><a href="https://twitter.com/hacks4pancakes?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor" target="_blank" rel="noopener">Follow Lesley Carhart on Twitter</a></li>
<li><a href="https://www.linkedin.com/in/lcarhart" target="_blank" rel="noopener">Connect with Lesley Carhart on LinkedIn</a></li>
<li>“<a href="http://www.csoonline.com/article/2149900/infosec-careers/avoiding-burnout-ten-tips-for-hackers-working-incident-response.html?utm_source=twitterfeed&amp;utm_medium=twitter" target="_blank" rel="noopener">Avoiding burnout: Ten tips for hackers working incident response</a>”</li>
<li>“<a href="http://www.irongeek.com/i.php?page=videos/bsideshuntsville2016/202-threat-modeling-the-minecraft-way-jarred-white" target="_blank" rel="noopener">Threat Modeling the Minecraft Way</a>”</li>
<li><a href="https://en.wikipedia.org/wiki/Ruger_MK_III" target="_blank" rel="noopener">Ruger MK III</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-128/">Show 128: Lesley Carhart Discusses Incident Response and Digital Forensics</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/13345/0/silverbullet-128.mp3" length="40312084" type="audio/mpeg" />
		<itunes:duration>0:27:49</itunes:duration>
		<itunes:subtitle>Lesley Carhart is the Security Incident Response Lead at a large corporation in the Chicagoland area where she and her team work with digital theft, misconfiguration, and hacking issues. She has 17 years of experience in the IT industry, eight of wh[...]</itunes:subtitle>
		<itunes:summary>Lesley Carhart is the Security Incident Response Lead at a large corporation in the Chicagoland area where she and her team work with digital theft, misconfiguration, and hacking issues. She has 17 years of experience in the IT industry, eight of which focus on incident response and digital forensics. Lesley holds a BS in Network Technologies from DePaul University. She is an active writer, speaker, and works as a member of CircleCityCon staff.
Listen as Gary and Lesley discuss the evolution of computer security, incident response, digital forensics, security engineering, security certifications, and more.

Follow Lesley Carhart on Twitter
Connect with Lesley Carhart on LinkedIn
“Avoiding burnout: Ten tips for hackers working incident response”
“Threat Modeling the Minecraft Way”
Ruger MK III

The post Show 128: Lesley Carhart Discusses Incident Response and Digital Forensics appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 128: Lesley Carhart Discusses Incident Response and Digital Forensics appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 127: Dr. Marie Moe Discusses Medical Device Security</title>
		<link>https://www.cigital.com/podcasts/show-127/</link>
		<pubDate>Tue, 25 Oct 2016 19:08:45 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[aspiring achiever]]></category>
		<category><![CDATA[evolving explorer]]></category>
		<category><![CDATA[medical devices]]></category>
		<category><![CDATA[resolute rookie]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=12859</guid>
		<description><![CDATA[<p>Dr. Marie Moe is a Security Researcher at SINTEF and an Associate Professor at the Norwegian University of Science and Technology. She was previously a Team Leader at NorCERT, the Norwegian national CERT, where she managed incident response to cyberattacks against national critical infrastructure. Marie’s recent work focuses on public safety and security systems that &#8230; <a href="https://www.cigital.com/podcasts/show-127/" class="more-link">Continue reading <span class="screen-reader-text">Show 127: Dr. Marie Moe Discusses Medical Device Security</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-127/">Show 127: Dr. Marie Moe Discusses Medical Device Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-12889" src="https://www.cigital.com/wp-content/uploads/2016/10/marie-moe-wp.jpg" alt="Marie Moe Discusses Medical Device Security" align="right" srcset="https://www.cigital.com/wp-content/uploads/2016/10/marie-moe-wp.jpg 260w, https://www.cigital.com/wp-content/uploads/2016/10/marie-moe-wp-150x150.jpg 150w" sizes="(max-width: 260px) 100vw, 260px" />Dr. Marie Moe is a Security Researcher at SINTEF and an Associate Professor at the Norwegian University of Science and Technology. She was previously a Team Leader at NorCERT, the Norwegian national CERT, where she managed incident response to cyberattacks against national critical infrastructure. Marie’s recent work focuses on public safety and security systems that impact human life. She is renowned for her work in <a href="https://www.cigital.com/resources/datasheets/medical-device-security/" target="_blank" rel="noopener">medical device security</a>; in fact, her own life depends on a pacemaker. She holds a PhD in Information Security and an MSc in Industrial Mathematics from NTNU. She lives in Trondheim, Norway with her family.</p>
<p>Listen as Gary and Marie discuss her research and the future of medical device security.</p>
<ul>
<li><a href="https://twitter.com/MarieGMoe" target="_blank" rel="noopener">Follow Marie Moe on Twitter</a></li>
<li><a href="http://infosec.sintef.no/" target="_blank" rel="noopener">SINTEF</a></li>
<li>&#8220;<a href="https://www.youtube.com/watch?v=ffpkFvRZWB8" target="_blank" rel="noopener">Living with a vulnerable implanted device</a>&#8220;</li>
<li>&#8220;<a href="https://www.wired.com/2016/03/go-ahead-hackers-break-heart/" target="_blank" rel="noopener">Go Ahead, Hackers, Break My Heart</a>&#8220;</li>
<li>&#8220;<a href="http://motherboard.vice.com/read/why-we-should-worry-about-hackable-hearts" target="_blank" rel="noopener">Why We Should Worry About Hackable Hearts</a>&#8220;</li>
<li>&#8220;<a href="http://www.bbc.com/news/technology-34899713" target="_blank" rel="noopener">Could hackers break my heart via my pacemaker?</a>&#8220;</li>
<li>&#8220;<a href="http://www.cnbc.com/2016/03/04/how-the-internet-of-things-could-be-fatal.html" target="_blank" rel="noopener">How the ‘Internet of Things’ could be fatal</a>&#8220;</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-127/">Show 127: Dr. Marie Moe Discusses Medical Device Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/12859/0/silverbullet-127.mp3" length="47075547" type="audio/mpeg" />
		<itunes:duration>0:32:31</itunes:duration>
		<itunes:subtitle>Dr. Marie Moe is a Security Researcher at SINTEF and an Associate Professor at the Norwegian University of Science and Technology. She was previously a Team Leader at NorCERT, the Norwegian national CERT, where she managed incident response to cyber[...]</itunes:subtitle>
		<itunes:summary>Dr. Marie Moe is a Security Researcher at SINTEF and an Associate Professor at the Norwegian University of Science and Technology. She was previously a Team Leader at NorCERT, the Norwegian national CERT, where she managed incident response to cyberattacks against national critical infrastructure. Marie’s recent work focuses on public safety and security systems that impact human life. She is renowned for her work in medical device security; in fact, her own life depends on a pacemaker. She holds a PhD in Information Security and an MSc in Industrial Mathematics from NTNU. She lives in Trondheim, Norway with her family.
Listen as Gary and Marie discuss her research and the future of medical device security.

Follow Marie Moe on Twitter
SINTEF
&#8220;Living with a vulnerable implanted device&#8220;
&#8220;Go Ahead, Hackers, Break My Heart&#8220;
&#8220;Why We Should Worry About Hackable Hearts&#8220;
&#8220;Could hackers break my heart via my pacemaker?&#8220;
&#8220;How the ‘Internet of Things’ could be fatal&#8220;

The post Show 127: Dr. Marie Moe Discusses Medical Device Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 127: Dr. Marie Moe Discusses Medical Device Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Healthcare, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 126: Mike Pittenger Discusses Open Source Software Security</title>
		<link>https://www.cigital.com/podcasts/show-126/</link>
		<pubDate>Thu, 29 Sep 2016 18:29:18 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[containerization]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[openssl]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=12170</guid>
		<description><![CDATA[<p>Mike Pittenger is the VP of Security Strategy at Black Duck Software where he is responsible for strategic leadership of security solutions, including product direction and strategic alliances. He has 30 years of experience in technology and business, more than 25 years of management experience, and has spent the past 15 years focusing on security. &#8230; <a href="https://www.cigital.com/podcasts/show-126/" class="more-link">Continue reading <span class="screen-reader-text">Show 126: Mike Pittenger Discusses Open Source Software Security</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-126/">Show 126: Mike Pittenger Discusses Open Source Software Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-12176" src="https://www.cigital.com/wp-content/uploads/2016/09/mp-wp.jpg" alt="open source software security" align="right" srcset="https://www.cigital.com/wp-content/uploads/2016/09/mp-wp.jpg 260w, https://www.cigital.com/wp-content/uploads/2016/09/mp-wp-150x150.jpg 150w" sizes="(max-width: 260px) 100vw, 260px" />Mike Pittenger is the VP of Security Strategy at <a href="https://www.cigital.com/blog/cigital-black-duck-secure-enterprise-software/" target="_blank">Black Duck Software</a> where he is responsible for strategic leadership of security solutions, including product direction and strategic alliances. He has 30 years of experience in technology and business, more than 25 years of management experience, and has spent the past 15 years focusing on security. Mike previously served as VP and General Manager of the product division of @stake. After @stake’s acquisition, he led the spin-out of his team to form Veracode. He later served as VP of the product and training division of Cigital. Mike also works as an independent consultant helping security companies identify, define, and prioritize their security product approaches.</p>
<p>Listen as Gary and Mike discuss <a href="https://www.cigital.com/solutions/by-security-need/open-source-security/" target="_blank">open source security</a> including OpenSSL, containerization, and progress being made in the industry.</p>
<ul>
<li><a href="https://www.blackducksoftware.com/" target="_blank">Black Duck Software</a></li>
<li><a href="https://www.linkedin.com/in/mike-pittenger-19360?authType=NAME_SEARCH&amp;authToken=TZ_p&amp;locale=en_US&amp;srchid=1631988131475161752287&amp;srchindex=1&amp;srchtotal=22&amp;trk=vsrp_people_res_name&amp;trkInfo=VSRPsearchId%3A1631988131475161752287%2CVSRPtargetId%3A124671%2CVSRPcmpt%3Aprimary%2CVSRPnm%3Atrue%2CauthType%3ANAME_SEARCH" target="_blank">Connect with Mike Pittenger on LinkedIn</a></li>
<li><a href="https://en.wikipedia.org/wiki/GNU_General_Public_License" target="_blank">GNU General Public License</a></li>
<li><a href="http://www.ghostofpaulrevere.com/" target="_blank">Ghost of Paul Revere</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-126/">Show 126: Mike Pittenger Discusses Open Source Software Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/12170/0/silverbullet-126.mp3" length="45299668" type="audio/mpeg" />
		<itunes:duration>0:31:17</itunes:duration>
		<itunes:subtitle>Mike Pittenger is the VP of Security Strategy at Black Duck Software where he is responsible for strategic leadership of security solutions, including product direction and strategic alliances. He has 30 years of experience in technology and busines[...]</itunes:subtitle>
		<itunes:summary>Mike Pittenger is the VP of Security Strategy at Black Duck Software where he is responsible for strategic leadership of security solutions, including product direction and strategic alliances. He has 30 years of experience in technology and business, more than 25 years of management experience, and has spent the past 15 years focusing on security. Mike previously served as VP and General Manager of the product division of @stake. After @stake’s acquisition, he led the spin-out of his team to form Veracode. He later served as VP of the product and training division of Cigital. Mike also works as an independent consultant helping security companies identify, define, and prioritize their security product approaches.
Listen as Gary and Mike discuss open source security including OpenSSL, containerization, and progress being made in the industry.

Black Duck Software
Connect with Mike Pittenger on LinkedIn
GNU General Public License
Ghost of Paul Revere

The post Show 126: Mike Pittenger Discusses Open Source Software Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 126: Mike Pittenger Discusses Open Source Software Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 125: Jim Manico Discusses Static Analysis, Open Source, and Developer Training</title>
		<link>https://www.cigital.com/podcasts/show-125/</link>
		<pubDate>Tue, 30 Aug 2016 15:15:30 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Training]]></category>
		<category><![CDATA[aspiring achiever]]></category>
		<category><![CDATA[evolving explorer]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[OWASP]]></category>
		<category><![CDATA[resolute rookie]]></category>
		<category><![CDATA[static analysis]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=11443</guid>
		<description><![CDATA[<p>Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and secure engineering. He is also the founder of Brakeman Security which produces a Ruby on Rails security scanner. He is a volunteer and Former Global Board Member of the Open Web Application Security Project (OWASP) and the author &#8230; <a href="https://www.cigital.com/podcasts/show-125/" class="more-link">Continue reading <span class="screen-reader-text">Show 125: Jim Manico Discusses Static Analysis, Open Source, and Developer Training</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-125/">Show 125: Jim Manico Discusses Static Analysis, Open Source, and Developer Training</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-11446" src="https://www.cigital.com/wp-content/uploads/2016/08/jim-manico3.jpg" alt="recent developments with static analysis" align="right" srcset="https://www.cigital.com/wp-content/uploads/2016/08/jim-manico3.jpg 260w, https://www.cigital.com/wp-content/uploads/2016/08/jim-manico3-150x150.jpg 150w" sizes="(max-width: 260px) 100vw, 260px" />Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and secure engineering. He is also the founder of Brakeman Security which produces a Ruby on Rails security scanner. He is a volunteer and Former Global Board Member of the <a href="https://www.owasp.org/index.php/Main_Page" target="_blank">Open Web Application Security Project (OWASP)</a> and the author of <em>Iron-Clad Java: Building Secure Web Applications</em>. With nearly 20 years of software development experience, and over 10 years of application security experience, Jim is a highly sought after speaker on security practices specializing in the notion of building as opposed to breaking.</p>
<p>Listen as Gary and Jim discuss recent developments with <a href="https://www.cigital.com/services/application-security-testing/static-analysis-sast/" target="_blank">static analysis</a>, the relationship between <a href="https://www.cigital.com/solutions/by-security-need/open-source-security/" target="_blank">open source and security</a>, programming languages frameworks and how they impact tools, <a href="https://www.cigital.com/services/training/" target="_blank">developer training</a>, <a href="https://www.cigital.com/solutions/by-security-need/cloud-security/" target="_blank">enterprises moving to the cloud</a>, and island life.</p>
<ul>
<li><a href="https://www.linkedin.com/in/jmanico" target="_blank">Connect with Jim Manico on LinkedIn</a></li>
<li><a href="https://twitter.com/manicode" target="_blank">Follow Jim Manico on Twitter</a></li>
<li><a href="https://manicode.com/" target="_blank">Manicode</a></li>
<li><a href="http://manicode.blogspot.com/" target="_blank">Manicode blog</a></li>
<li><a href="http://brakemanscanner.org/" target="_blank">Brakeman Security</a></li>
<li><a href="https://www.owasp.org/index.php/ASVS" target="_blank">OWASP Application Security Verification Standard Project</a></li>
<li><a href="https://www.amazon.com/Iron-Clad-Java-Building-Secure-Applications/dp/0071835881" target="_blank"><em>Iron-Clad Java: Building Secure Web Applications</em></a></li>
</ul>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-125/">Show 125: Jim Manico Discusses Static Analysis, Open Source, and Developer Training</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/11443/0/silverbullet-125.mp3" length="46119888" type="audio/mpeg" />
		<itunes:duration>0:31:51</itunes:duration>
		<itunes:subtitle>Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and secure engineering. He is also the founder of Brakeman Security which produces a Ruby on Rails security scanner. He is a volunteer and Former Glo[...]</itunes:subtitle>
		<itunes:summary>Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and secure engineering. He is also the founder of Brakeman Security which produces a Ruby on Rails security scanner. He is a volunteer and Former Global Board Member of the Open Web Application Security Project (OWASP) and the author of Iron-Clad Java: Building Secure Web Applications. With nearly 20 years of software development experience, and over 10 years of application security experience, Jim is a highly sought after speaker on security practices specializing in the notion of building as opposed to breaking.
Listen as Gary and Jim discuss recent developments with static analysis, the relationship between open source and security, programming languages frameworks and how they impact tools, developer training, enterprises moving to the cloud, and island life.

Connect with Jim Manico on LinkedIn
Follow Jim Manico on Twitter
Manicode
Manicode blog
Brakeman Security
OWASP Application Security Verification Standard Project
Iron-Clad Java: Building Secure Web Applications

&#160;
The post Show 125: Jim Manico Discusses Static Analysis, Open Source, and Developer Training appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 125: Jim Manico Discusses Static Analysis, Open Source, and Developer Training appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 124: Lance Cottrell Discusses Anonymity and Privacy</title>
		<link>https://www.cigital.com/podcasts/show-124/</link>
		<pubDate>Thu, 28 Jul 2016 16:27:41 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[aspiring achiever]]></category>
		<category><![CDATA[evolving explorer]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[resolute rookie]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=11183</guid>
		<description><![CDATA[<p>Lance Cottrell is the Chief Scientist at Ntrepid where he works on the Passages product. He founded Anonymizer, Inc. in 1995, which was later acquired in 2008. Lance has been at the cutting edge of Internet privacy, anonymity, and security for over 20 years. He is on the board of the North Bay Angels and &#8230; <a href="https://www.cigital.com/podcasts/show-124/" class="more-link">Continue reading <span class="screen-reader-text">Show 124: Lance Cottrell Discusses Anonymity and Privacy</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-124/">Show 124: Lance Cottrell Discusses Anonymity and Privacy</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-11187" src="https://www.cigital.com/wp-content/uploads/2016/07/lcottrell-wp1.jpg" alt="Internet privacy" align="right" srcset="https://www.cigital.com/wp-content/uploads/2016/07/lcottrell-wp1.jpg 260w, https://www.cigital.com/wp-content/uploads/2016/07/lcottrell-wp1-150x150.jpg 150w" sizes="(max-width: 260px) 100vw, 260px" />Lance Cottrell is the Chief Scientist at <a href="http://www.ntrepidcorp.com/" target="_blank">Ntrepid</a> where he works on the <a href="http://www.ntrepidcorp.com/passages/" target="_blank">Passages</a> product. He founded Anonymizer, Inc. in 1995, which was later acquired in 2008. Lance has been at the cutting edge of Internet privacy, anonymity, and security for over 20 years. He is on the board of the North Bay Angels and is a mentor for SoCo Nexus Sprout. He lives in Sonoma County, California where he also dabbles in winemaking. Listen as Gary and Lance discuss privacy, anonymity, Tor, <a href="https://www.cigital.com/blog/cybercrime-attribution/" target="_blank">attribution issues</a>, browser security, <a href="https://www.cigital.com/blog/connected-cars-driving-greater-security-concerns/" target="_blank">geolocation</a>, anonymity tools, and more.</p>
<ul>
<li><a href="https://www.linkedin.com/in/lancecottrell" target="_blank">Connect to Lance Cottrell on LinkedIn</a></li>
<li><a href="https://twitter.com/LanceCottrell" target="_blank">Follow Lance Cottrell on Twitter</a></li>
<li><a href="http://www.ntrepidcorp.com/" target="_blank">Ntrepid</a></li>
<li><a href="https://en.wikipedia.org/wiki/Anonymizer_(company)" target="_blank">Anonymizer, Inc.</a></li>
<li><a href="http://www.northbayangels.com/" target="_blank">North Bay Angels</a></li>
<li><a href="http://soconexus.org/sprout/" target="_blank">SoCo Nexus Sprout</a></li>
<li>“<a href="https://ridt.co/cryptopolitik/" target="_blank">Cryptopolitik and the Darknet</a>” by Thomas Rid</li>
<li><a href="http://theprivacyblog.com/" target="_blank">Lance Cottrell’s blog</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-124/">Show 124: Lance Cottrell Discusses Anonymity and Privacy</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/11183/0/silverbullet-124.mp3" length="47457986" type="audio/mpeg" />
		<itunes:duration>0:32:47</itunes:duration>
		<itunes:subtitle>Lance Cottrell is the Chief Scientist at Ntrepid where he works on the Passages product. He founded Anonymizer, Inc. in 1995, which was later acquired in 2008. Lance has been at the cutting edge of Internet privacy, anonymity, and security for over [...]</itunes:subtitle>
		<itunes:summary>Lance Cottrell is the Chief Scientist at Ntrepid where he works on the Passages product. He founded Anonymizer, Inc. in 1995, which was later acquired in 2008. Lance has been at the cutting edge of Internet privacy, anonymity, and security for over 20 years. He is on the board of the North Bay Angels and is a mentor for SoCo Nexus Sprout. He lives in Sonoma County, California where he also dabbles in winemaking. Listen as Gary and Lance discuss privacy, anonymity, Tor, attribution issues, browser security, geolocation, anonymity tools, and more.

Connect to Lance Cottrell on LinkedIn
Follow Lance Cottrell on Twitter
Ntrepid
Anonymizer, Inc.
North Bay Angels
SoCo Nexus Sprout
“Cryptopolitik and the Darknet” by Thomas Rid
Lance Cottrell’s blog

The post Show 124: Lance Cottrell Discusses Anonymity and Privacy appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 124: Lance Cottrell Discusses Anonymity and Privacy appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 123: Yanek Korff Discusses How to Build a Successful Technical Team</title>
		<link>https://www.cigital.com/podcasts/show-123/</link>
		<pubDate>Tue, 28 Jun 2016 13:11:25 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[aspiring achiever]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[evolving explorer]]></category>
		<category><![CDATA[resolute rookie]]></category>
		<category><![CDATA[security operations center]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=10918</guid>
		<description><![CDATA[<p>Yanek Korff is the owner of Korff Consulting, LLC where he is a strategic consultant advising firms on information security topics. Having worked at Bell Atlantic, Cigital, AOL, and Mandiant, Yanek has well over a decade of experience in security operations, development, and infrastructure. Listen as Gary and Yanek discuss outsourcing, people vs. automation, incident &#8230; <a href="https://www.cigital.com/podcasts/show-123/" class="more-link">Continue reading <span class="screen-reader-text">Show 123: Yanek Korff Discusses How to Build a Successful Technical Team</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-123/">Show 123: Yanek Korff Discusses How to Build a Successful Technical Team</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-10920" src="https://www.cigital.com/wp-content/uploads/2016/06/yanek-wp1.jpg" alt="successful technical team" align="right" srcset="https://www.cigital.com/wp-content/uploads/2016/06/yanek-wp1.jpg 250w, https://www.cigital.com/wp-content/uploads/2016/06/yanek-wp1-150x150.jpg 150w" sizes="(max-width: 250px) 100vw, 250px" />Yanek Korff is the owner of Korff Consulting, LLC where he is a strategic consultant advising firms on <a href="https://www.cigital.com/services/training/elearning/courses/information-security-awareness-training/" target="_blank">information security</a> topics. Having worked at Bell Atlantic, Cigital, AOL, and Mandiant, Yanek has well over a decade of experience in security operations, development, and infrastructure. Listen as Gary and Yanek discuss <a href="https://www.cigital.com/solutions/by-security-need/managed-services/" target="_blank">outsourcing</a>, people vs. automation, incident response, and what he has learned about building and maintaining a successful technical team.</p>
<ul>
<li><a href="https://www.linkedin.com/in/yanek" target="_blank">Connect to Yanek Korff on LinkedIn</a></li>
<li><em><a href="https://www.cigital.com/resources/books/mastering-freebsd-and-openbsd-security/" target="_blank">Mastering FreeBSD and OpenBSD Security</a> </em></li>
<li><a href="http://www.ntrepidcorp.com/" target="_blank">Ntrepid</a></li>
<li><a href="https://medium.com/manager-mint/building-trust-6544fdb8407#.mcq8m48ru" target="_blank">“Building Trust in Four Steps”</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-123/">Show 123: Yanek Korff Discusses How to Build a Successful Technical Team</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/10918/0/silverbullet-123.mp3" length="40083093" type="audio/mpeg" />
		<itunes:duration>0:27:40</itunes:duration>
		<itunes:subtitle>Yanek Korff is the owner of Korff Consulting, LLC where he is a strategic consultant advising firms on information security topics. Having worked at Bell Atlantic, Cigital, AOL, and Mandiant, Yanek has well over a decade of experience in security op[...]</itunes:subtitle>
		<itunes:summary>Yanek Korff is the owner of Korff Consulting, LLC where he is a strategic consultant advising firms on information security topics. Having worked at Bell Atlantic, Cigital, AOL, and Mandiant, Yanek has well over a decade of experience in security operations, development, and infrastructure. Listen as Gary and Yanek discuss outsourcing, people vs. automation, incident response, and what he has learned about building and maintaining a successful technical team.

Connect to Yanek Korff on LinkedIn
Mastering FreeBSD and OpenBSD Security 
Ntrepid
“Building Trust in Four Steps”

The post Show 123: Yanek Korff Discusses How to Build a Successful Technical Team appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 123: Yanek Korff Discusses How to Build a Successful Technical Team appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 122: David Nathans Discusses Security Operations Centers and Medical Device Security</title>
		<link>https://www.cigital.com/podcasts/david-nathans-discusses-medical-device-security/</link>
		<pubDate>Tue, 31 May 2016 18:22:51 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[aspiring achiever]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[evolving explorer]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[medical devices]]></category>
		<category><![CDATA[security operations center]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=10631</guid>
		<description><![CDATA[<p>David Nathans is a security professional with Siemens Healthcare where he specializes in medical device security. He has extensive experience in building security operations centers (SOCs) and cyber security programs. As the author of Designing and Building Security Operations Center and an original member of the first cyber squadron of the Air National Guard, he &#8230; <a href="https://www.cigital.com/podcasts/david-nathans-discusses-medical-device-security/" class="more-link">Continue reading <span class="screen-reader-text">Show 122: David Nathans Discusses Security Operations Centers and Medical Device Security</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/david-nathans-discusses-medical-device-security/">Show 122: David Nathans Discusses Security Operations Centers and Medical Device Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-10637" src="https://www.cigital.com/wp-content/uploads/2016/05/dnathans2.jpg" alt="security in medical devices" align="right" srcset="https://www.cigital.com/wp-content/uploads/2016/05/dnathans2.jpg 250w, https://www.cigital.com/wp-content/uploads/2016/05/dnathans2-150x150.jpg 150w" sizes="(max-width: 250px) 100vw, 250px" />David Nathans is a security professional with Siemens Healthcare where he specializes in <a href="https://www.cigital.com/resources/datasheets/medical-device-security/" target="_blank">medical device security</a>. He has extensive experience in building security operations centers (SOCs) and cyber security programs. As the author of <em>Designing and Building Security Operations Center</em> and an original member of the first cyber squadron of the Air National Guard, he has established his place as a leader in the security field. Listen as Gary and David discuss security considerations when designing and building SOCs, the emergence of DevOps, and the progress that’s been made between data and security in medical devices over the past decade.</p>
<ul>
<li><a href="https://www.linkedin.com/in/zourick" target="_blank">Connect with David Nathans on LinkedIn</a></li>
<li><a href="http://searchsecurity.techtarget.com/feature/Designing-and-Building-Security-Operations-center" target="_blank"><em>Designing and Building Security Operations Center</em></a></li>
<li><a href="http://pennekamppark.com/" target="_blank">John Pennekamp Coral Reef State Park</a></li>
<li><a href="https://en.wikipedia.org/wiki/How_to_Win_Friends_and_Influence_People" target="_blank"><em>How to Win Friends and Influence People</em></a></li>
<li><a href="http://www.thefineartscompany.com/store2/" target="_blank">The Fine Arts Company</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/david-nathans-discusses-medical-device-security/">Show 122: David Nathans Discusses Security Operations Centers and Medical Device Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/10631/0/silverbullet-122.mp3" length="43088202" type="audio/mpeg" />
		<itunes:duration>0:29:45</itunes:duration>
		<itunes:subtitle>David Nathans is a security professional with Siemens Healthcare where he specializes in medical device security. He has extensive experience in building security operations centers (SOCs) and cyber security programs. As the author of Designing and [...]</itunes:subtitle>
		<itunes:summary>David Nathans is a security professional with Siemens Healthcare where he specializes in medical device security. He has extensive experience in building security operations centers (SOCs) and cyber security programs. As the author of Designing and Building Security Operations Center and an original member of the first cyber squadron of the Air National Guard, he has established his place as a leader in the security field. Listen as Gary and David discuss security considerations when designing and building SOCs, the emergence of DevOps, and the progress that’s been made between data and security in medical devices over the past decade.

Connect with David Nathans on LinkedIn
Designing and Building Security Operations Center
John Pennekamp Coral Reef State Park
How to Win Friends and Influence People
The Fine Arts Company

The post Show 122: David Nathans Discusses Security Operations Centers and Medical Device Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 122: David Nathans Discusses Security Operations Centers and Medical Device Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Healthcare, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 121: Marty Hellman Discusses Cryptography and Nuclear Non-Proliferation</title>
		<link>https://www.cigital.com/podcasts/show-121/</link>
		<pubDate>Tue, 26 Apr 2016 15:01:25 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[aspiring achiever]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[security risks]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=10191</guid>
		<description><![CDATA[<p>Martin E. Hellman is Professor Emeritus of Electrical Engineering at Stanford University. A graduate of New York University, Martin went on to earn both a Master’s degree and Ph.D. in Electrical Engineering from Stanford. He is the author of over 70 technical papers, holder of 12 U.S. patents, co-inventor of public key cryptography, and the &#8230; <a href="https://www.cigital.com/podcasts/show-121/" class="more-link">Continue reading <span class="screen-reader-text">Show 121: Marty Hellman Discusses Cryptography and Nuclear Non-Proliferation</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-121/">Show 121: Marty Hellman Discusses Cryptography and Nuclear Non-Proliferation</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-10194" src="https://www.cigital.com/wp-content/uploads/2016/04/mhellman-wp.png" alt="Marty Hellman Discusses Cryptography and Nuclear Non-Proliferation" align="right" srcset="https://www.cigital.com/wp-content/uploads/2016/04/mhellman-wp.png 270w, https://www.cigital.com/wp-content/uploads/2016/04/mhellman-wp-150x150.png 150w" sizes="(max-width: 270px) 100vw, 270px" /><a href="https://www-ee.stanford.edu/~hellman/" target="_blank">Martin E. Hellman</a> is Professor Emeritus of Electrical Engineering at Stanford University. A graduate of New York University, Martin went on to earn both a Master’s degree and Ph.D. in Electrical Engineering from Stanford. He is the author of over 70 technical papers, holder of 12 U.S. patents, co-inventor of public key cryptography, and the <a href="http://amturing.acm.org/" target="_blank">2015 Turing Award</a> recipient. Listen as Gary interviews Martin about his cutting-edge career, involvement in the crypto wars, and his work with nuclear non-proliferation and risk management.</p>
<ul>
<li><a href="https://en.wikipedia.org/wiki/Horst_Feistel" target="_blank">Horst Feistel</a></li>
<li><a href="http://worrydream.com/refs/Shannon%20-%20A%20Mathematical%20Theory%20of%20Communication.pdf" target="_blank"><em>A Mathematical Theory of Communication</em></a></li>
<li><a href="https://nuclearrisk.wordpress.com/" target="_blank">Defusing the Nuclear Threat</a> (blog)</li>
<li><a href="https://en.wikipedia.org/wiki/The_Codebreakers" target="_blank"><em>The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet</em></a></li>
<li><a href="http://www.nytimes.com/2016/03/02/technology/cryptography-pioneers-to-win-turing-award.html?_r=0" target="_blank">“Cryptography Pioneers Win Turing Award”</a></li>
<li><a href="https://www-ee.stanford.edu/~hellman/soaring.html" target="_blank">Soaring</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-121/">Show 121: Marty Hellman Discusses Cryptography and Nuclear Non-Proliferation</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/10191/0/silverbullet-121.mp3" length="61081728" type="audio/mpeg" />
		<itunes:duration>0:42:15</itunes:duration>
		<itunes:subtitle>Martin E. Hellman is Professor Emeritus of Electrical Engineering at Stanford University. A graduate of New York University, Martin went on to earn both a Master’s degree and Ph.D. in Electrical Engineering from Stanford. He is the author of over 70[...]</itunes:subtitle>
		<itunes:summary>Martin E. Hellman is Professor Emeritus of Electrical Engineering at Stanford University. A graduate of New York University, Martin went on to earn both a Master’s degree and Ph.D. in Electrical Engineering from Stanford. He is the author of over 70 technical papers, holder of 12 U.S. patents, co-inventor of public key cryptography, and the 2015 Turing Award recipient. Listen as Gary interviews Martin about his cutting-edge career, involvement in the crypto wars, and his work with nuclear non-proliferation and risk management.

Horst Feistel
A Mathematical Theory of Communication
Defusing the Nuclear Threat (blog)
The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet
“Cryptography Pioneers Win Turing Award”
Soaring

The post Show 121: Marty Hellman Discusses Cryptography and Nuclear Non-Proliferation appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 121: Marty Hellman Discusses Cryptography and Nuclear Non-Proliferation appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 120: Silver Bullet Celebrates 10 Years! Marcus Ranum Interviews Gary McGraw</title>
		<link>https://www.cigital.com/podcasts/show-120/</link>
		<pubDate>Wed, 30 Mar 2016 16:38:24 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[Business Leader]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[cyber war]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[java]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=9772</guid>
		<description><![CDATA[<p>To celebrate 10 straight years of the monthly Silver Bullet Security Podcast, we’re flipping the mic. During the past decade, Dr. Gary McGraw has interviewed some of the security industry’s most influential gurus. A globally recognized authority on security and software, he is the CTO of Cigital and the author of eight bestselling books on &#8230; <a href="https://www.cigital.com/podcasts/show-120/" class="more-link">Continue reading <span class="screen-reader-text">Show 120: Silver Bullet Celebrates 10 Years! Marcus Ranum Interviews Gary McGraw</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-120/">Show 120: Silver Bullet Celebrates 10 Years! Marcus Ranum Interviews Gary McGraw</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><iframe width="560" height="315" src="https://www.youtube.com/embed/LIvYFaNlCiA?rel=0" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<p style="text-align: left;">To celebrate 10 straight years of the monthly Silver Bullet Security Podcast, we’re flipping the mic. During the past decade, <a href="https://www.garymcgraw.com/" target="_blank">Dr. Gary McGraw</a> has interviewed some of the security industry’s most influential gurus. A globally recognized authority on security and software, he is the CTO of Cigital and the author of eight bestselling books on software security—and for the 120<sup>th</sup> Silver Bullet interview, he’s not the one asking the questions. In this landmark episode, firewall inventor <a href="http://www.ranum.com/" target="_blank">Marcus Ranum</a> takes on the role of Silver Bullet host to interview Gary on a variety of topics including evolutionary biology and security, the Internet of Things, hard core cyber insurgency, <a href="https://www.garymcgraw.com/technology/business/" target="_blank">advisory board work</a>, software security, tinfoil hats, the surveillance state, and more. Watch Marcus and Gary celebrate a decade of Silver Bullet in this special video edition.</p>
<ul>
<li style="text-align: left;"><a href="https://www.garymcgraw.com/" target="_blank">Gary McGraw</a></li>
<li style="text-align: left;"><a href="https://www.garymcgraw.com/technology/business/" target="_blank">Boards and Advisory Boards</a></li>
<li style="text-align: left;"><a href="http://www.ranum.com/" target="_blank">Marcus Ranum</a></li>
<li><a href="https://en.wikipedia.org/wiki/Normal_Accidents" target="_blank">Charles Perrow’s Normal Accident Theory</a></li>
<li><em><a href="https://www.nytimes.com/2015/07/12/books/review/among-the-ten-thousand-things-by-julia-pierpont.html?_r=0" target="_blank">Among the Ten Thousand Things</a></em></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-120/">Show 120: Silver Bullet Celebrates 10 Years! Marcus Ranum Interviews Gary McGraw</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/9772/0/silverbullet-120.m4a" length="22365746" type="audio/x-m4a" />
		<itunes:duration>0:25:33</itunes:duration>
		<itunes:subtitle>
To celebrate 10 straight years of the monthly Silver Bullet Security Podcast, we’re flipping the mic. During the past decade, Dr. Gary McGraw has interviewed some of the security industry’s most influential gurus. A globally recognized authority on[...]</itunes:subtitle>
		<itunes:summary>
To celebrate 10 straight years of the monthly Silver Bullet Security Podcast, we’re flipping the mic. During the past decade, Dr. Gary McGraw has interviewed some of the security industry’s most influential gurus. A globally recognized authority on security and software, he is the CTO of Cigital and the author of eight bestselling books on software security—and for the 120th Silver Bullet interview, he’s not the one asking the questions. In this landmark episode, firewall inventor Marcus Ranum takes on the role of Silver Bullet host to interview Gary on a variety of topics including evolutionary biology and security, the Internet of Things, hard core cyber insurgency, advisory board work, software security, tinfoil hats, the surveillance state, and more. Watch Marcus and Gary celebrate a decade of Silver Bullet in this special video edition.

Gary McGraw
Boards and Advisory Boards
Marcus Ranum
Charles Perrow’s Normal Accident Theory
Among the Ten Thousand Things

The post Show 120: Silver Bullet Celebrates 10 Years! Marcus Ranum Interviews Gary McGraw appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 120: Silver Bullet Celebrates 10 Years! Marcus Ranum Interviews Gary McGraw appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 119: Jacob West Discusses the IEEE CSD, Bugs, Flaws, And Wearable Devices</title>
		<link>https://www.cigital.com/podcasts/show-119/</link>
		<pubDate>Mon, 29 Feb 2016 15:28:19 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Secure Design]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[bugs]]></category>
		<category><![CDATA[flaws]]></category>
		<category><![CDATA[Internet of Things]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=9365</guid>
		<description><![CDATA[<p>As the Chief Architect for Security Products at NetSuite, Jacob West leads research and development for technology to identify and mitigate security threats. West has over a decade of experience developing, delivering, and monetizing innovative security solutions. Prior to his role at NetSuite, he served as the CTO for Enterprise Security Products (ESP) at HP &#8230; <a href="https://www.cigital.com/podcasts/show-119/" class="more-link">Continue reading <span class="screen-reader-text">Show 119: Jacob West Discusses the IEEE CSD, Bugs, Flaws, And Wearable Devices</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-119/">Show 119: Jacob West Discusses the IEEE CSD, Bugs, Flaws, And Wearable Devices</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-9366" src="https://www.cigital.com/wp-content/uploads/2016/02/jacob-west.jpg" alt="Jacob West" align="right" srcset="https://www.cigital.com/wp-content/uploads/2016/02/jacob-west.jpg 250w, https://www.cigital.com/wp-content/uploads/2016/02/jacob-west-150x150.jpg 150w" sizes="(max-width: 250px) 100vw, 250px" /></p>
<p>As the Chief Architect for Security Products at <a href="http://www.netsuite.com/portal/home.shtml" target="_blank">NetSuite</a>, Jacob West leads research and development for technology to identify and mitigate security threats. West has over a decade of experience developing, delivering, and monetizing innovative security solutions. Prior to his role at NetSuite, he served as the CTO for Enterprise Security Products (ESP) at HP where he founded and led HP Security Research. West is the co-author of <em>Secure Programming with Static Analysis, </em>and is a founding member of the <a href="http://cybersecurity.ieee.org/" target="_blank">IEEE Center for Secure Design</a>. Listen as Gary and Jacob discuss secure design, the critical difference between bugs and flaws, and wearable device security.</p>
<ul>
<li><a href="https://www.linkedin.com/in/jacobwest" target="_blank">Connect with Jacob West on LinkedIn</a></li>
<li><a href="https://www.cigital.com/podcasts/show-078/" target="_blank">SB Show 78: An Interview with Jacob West</a></li>
<li><a href="https://www.bsimm.com/about/membership/" target="_blank">BSIMM Community</a></li>
<li><a href="http://cybersecurity.ieee.org/2016/02/17/software-security-analysis-for-wearables-with-jacob-west/" target="_blank">Software Security Analysis for Wearables with Jacob West</a></li>
<li><a href="http://www.amazon.com/Secure-Programming-Static-Analysis-Brian/dp/0321424778" target="_blank"><em>Secure Programming with Static Analysis</em></a></li>
<li><a href="https://www.cigital.com/podcasts/show-101/" target="_blank">SB Show 101: Software Security with the Founders of the Center for Secure Design</a></li>
<li><a href="http://coirestaurant.com/" target="_blank">Coi</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-119/">Show 119: Jacob West Discusses the IEEE CSD, Bugs, Flaws, And Wearable Devices</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/9365/0/silverbullet-119.mp3" length="40732800" type="audio/mpeg" />
		<itunes:duration>0:28:07</itunes:duration>
		<itunes:subtitle>
As the Chief Architect for Security Products at NetSuite, Jacob West leads research and development for technology to identify and mitigate security threats. West has over a decade of experience developing, delivering, and monetizing innovative sec[...]</itunes:subtitle>
		<itunes:summary>
As the Chief Architect for Security Products at NetSuite, Jacob West leads research and development for technology to identify and mitigate security threats. West has over a decade of experience developing, delivering, and monetizing innovative security solutions. Prior to his role at NetSuite, he served as the CTO for Enterprise Security Products (ESP) at HP where he founded and led HP Security Research. West is the co-author of Secure Programming with Static Analysis, and is a founding member of the IEEE Center for Secure Design. Listen as Gary and Jacob discuss secure design, the critical difference between bugs and flaws, and wearable device security.

Connect with Jacob West on LinkedIn
SB Show 78: An Interview with Jacob West
BSIMM Community
Software Security Analysis for Wearables with Jacob West
Secure Programming with Static Analysis
SB Show 101: Software Security with the Founders of the Center for Secure Design
Coi

The post Show 119: Jacob West Discusses the IEEE CSD, Bugs, Flaws, And Wearable Devices appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 119: Jacob West Discusses the IEEE CSD, Bugs, Flaws, And Wearable Devices appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 118: Jack Daniel Discusses Security BSides, Communities, and the Big Picture of Security</title>
		<link>https://www.cigital.com/podcasts/show-118/</link>
		<pubDate>Fri, 29 Jan 2016 18:53:17 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=9096</guid>
		<description><![CDATA[<p>Gary talks to Jack Daniel, a leading technology community activist, about the evolution of the community-driven BSides Con, changes in the security field over the last decade, and his thoughts on where good security people come from. Jack is currently a Strategist for Tenable Network Security, and has over twenty years of experience in network &#8230; <a href="https://www.cigital.com/podcasts/show-118/" class="more-link">Continue reading <span class="screen-reader-text">Show 118: Jack Daniel Discusses Security BSides, Communities, and the Big Picture of Security</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-118/">Show 118: Jack Daniel Discusses Security BSides, Communities, and the Big Picture of Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-9103" src="https://www.cigital.com/wp-content/uploads/2016/01/jack-daniel.jpg" alt="Jack Daniel" width="250" height="250" align="right" srcset="https://www.cigital.com/wp-content/uploads/2016/01/jack-daniel.jpg 520w, https://www.cigital.com/wp-content/uploads/2016/01/jack-daniel-150x150.jpg 150w, https://www.cigital.com/wp-content/uploads/2016/01/jack-daniel-300x300.jpg 300w" sizes="(max-width: 250px) 100vw, 250px" /></p>
<p>Gary talks to Jack Daniel, a leading technology community activist, about the evolution of the community-driven BSides Con, changes in the security field over the last decade, and his thoughts on where good security people come from. Jack is currently a Strategist for Tenable Network Security, and has over twenty years of experience in network and system administration and security. He also has twenty years of mechanical experience in the automotive domain. Jack co-hosts the Security Weekly podcast and produces the Uncommon Sense Security blog. Listen as Gary and Jack kick things off with the topic of the importance of diverse security communities.</p>
<ul>
<li><a href="https://www.linkedin.com/in/jackadaniel" target="_blank">Connect with Jack Daniel on LinkedIn</a></li>
<li><a href="https://twitter.com/jack_daniel?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor" target="_blank">Follow Jack Daniel on Twitter</a></li>
<li><a href="http://securityweekly.com/" target="_blank">Security Weekly</a></li>
<li><a href="http://blog.uncommonsensesecurity.com/" target="_blank">Uncommon Sense Security</a></li>
<li><a href="http://www.securitybsides.com/w/page/12194156/FrontPage" target="_blank">Security BSides</a></li>
<li><a href="https://www.cigital.com/podcasts/show-003/" target="_blank">Show 3: The Computer Security Plateau with Marcus Ranum</a></li>
<li><a href="https://www.cigital.com/podcasts/show-111-an-interview-with-marcus-ranum/" target="_blank">Show 111: An Interview with Marcus Ranum</a></li>
<li><a href="http://threedotschicago.com/" target="_blank">Three Dots and a Dash</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-118/">Show 118: Jack Daniel Discusses Security BSides, Communities, and the Big Picture of Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/9096/0/silverbullet-118.mp3" length="57100416" type="audio/mpeg" />
		<itunes:duration>0:39:29</itunes:duration>
		<itunes:subtitle>
Gary talks to Jack Daniel, a leading technology community activist, about the evolution of the community-driven BSides Con, changes in the security field over the last decade, and his thoughts on where good security people come from. Jack is curren[...]</itunes:subtitle>
		<itunes:summary>
Gary talks to Jack Daniel, a leading technology community activist, about the evolution of the community-driven BSides Con, changes in the security field over the last decade, and his thoughts on where good security people come from. Jack is currently a Strategist for Tenable Network Security, and has over twenty years of experience in network and system administration and security. He also has twenty years of mechanical experience in the automotive domain. Jack co-hosts the Security Weekly podcast and produces the Uncommon Sense Security blog. Listen as Gary and Jack kick things off with the topic of the importance of diverse security communities.

Connect with Jack Daniel on LinkedIn
Follow Jack Daniel on Twitter
Security Weekly
Uncommon Sense Security
Security BSides
Show 3: The Computer Security Plateau with Marcus Ranum
Show 111: An Interview with Marcus Ranum
Three Dots and a Dash

The post Show 118: Jack Daniel Discusses Security BSides, Communities, and the Big Picture of Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 118: Jack Daniel Discusses Security BSides, Communities, and the Big Picture of Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 117: Jamie Butler Discusses Security Research, Thinking Like a Hacker, And Rootkit Development</title>
		<link>https://www.cigital.com/podcasts/show-117/</link>
		<pubDate>Tue, 22 Dec 2015 16:46:03 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Software Security Strategy]]></category>
		<category><![CDATA[attack patterns]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[vulnerabilities]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=8743</guid>
		<description><![CDATA[<p>Gary talks to Jamie Butler, a self-proclaimed “coder at heart,” about the importance of an offensive security approach, attack patterns, and his specialization in rootkit development. Jamie is currently the CTO and Chief Scientist at Endgame where he leads research on advanced threats, vulnerabilities, and attack patterns. He has directed vulnerability research teams at a &#8230; <a href="https://www.cigital.com/podcasts/show-117/" class="more-link">Continue reading <span class="screen-reader-text">Show 117: Jamie Butler Discusses Security Research, Thinking Like a Hacker, And Rootkit Development</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-117/">Show 117: Jamie Butler Discusses Security Research, Thinking Like a Hacker, And Rootkit Development</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignnone wp-image-8744" src="https://www.cigital.com/wp-content/uploads/2015/12/jamie-butler-wp.jpg" alt="Jamie Butler" width="250" height="250" align="right" srcset="https://www.cigital.com/wp-content/uploads/2015/12/jamie-butler-wp.jpg 250w, https://www.cigital.com/wp-content/uploads/2015/12/jamie-butler-wp-150x150.jpg 150w" sizes="(max-width: 250px) 100vw, 250px" /></p>
<p>Gary talks to Jamie Butler, a self-proclaimed “coder at heart,” about the importance of an offensive security approach, attack patterns, and his specialization in rootkit development. Jamie is currently the CTO and Chief Scientist at Endgame where he leads research on advanced threats, vulnerabilities, and attack patterns. He has directed vulnerability research teams at a number of prominent companies. Jamie holds a MS in Computer Science and has over 17 years of operating system security experience in the government and private sectors. Listen as Gary and Jamie discuss the attribution problem and his research focusing on how to think like a hacker in an effort to turn their work against them with an offensive security stance.</p>
<ul>
<li><a href="https://www.linkedin.com/in/butlerjamie" target="_blank">Connect With Jamie Butler On LinkedIn</a></li>
<li><a href="https://twitter.com/jamierbutler" target="_blank">Follow Jamie Butler On Twitter</a></li>
<li><a href="https://www.amazon.com/Rootkits-Subverting-Windows-Greg-Hoglund/dp/0321294319" target="_blank">Rootkits: Subverting the Windows Kernel</a></li>
<li><a href="https://www.cigital.com/podcasts/show-096/" target="_blank">Show 96: An Interview With Nate Fick</a></li>
<li><a href="https://www.amazon.com/Exploiting-Software-How-Break-Code/dp/0201786958" target="_blank">Exploiting Software: How To Break Code</a></li>
<li><a href="https://www.blackhat.com/review-board.html" target="_blank">Black Hat Review Board</a></li>
<li><a href="http://www.hackersforcharity.org/" target="_blank">Hackers For Charity</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-117/">Show 117: Jamie Butler Discusses Security Research, Thinking Like a Hacker, And Rootkit Development</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/8743/0/silverbullet-117.mp3" length="54081664" type="audio/mpeg" />
		<itunes:duration>0:37:23</itunes:duration>
		<itunes:subtitle>
Gary talks to Jamie Butler, a self-proclaimed “coder at heart,” about the importance of an offensive security approach, attack patterns, and his specialization in rootkit development. Jamie is currently the CTO and Chief Scientist at Endgame where [...]</itunes:subtitle>
		<itunes:summary>
Gary talks to Jamie Butler, a self-proclaimed “coder at heart,” about the importance of an offensive security approach, attack patterns, and his specialization in rootkit development. Jamie is currently the CTO and Chief Scientist at Endgame where he leads research on advanced threats, vulnerabilities, and attack patterns. He has directed vulnerability research teams at a number of prominent companies. Jamie holds a MS in Computer Science and has over 17 years of operating system security experience in the government and private sectors. Listen as Gary and Jamie discuss the attribution problem and his research focusing on how to think like a hacker in an effort to turn their work against them with an offensive security stance.

Connect With Jamie Butler On LinkedIn
Follow Jamie Butler On Twitter
Rootkits: Subverting the Windows Kernel
Show 96: An Interview With Nate Fick
Exploiting Software: How To Break Code
Black Hat Review Board
Hackers For Charity

The post Show 117: Jamie Butler Discusses Security Research, Thinking Like a Hacker, And Rootkit Development appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 117: Jamie Butler Discusses Security Research, Thinking Like a Hacker, And Rootkit Development appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 116: Doug Maughan Discusses the Current State Of Cyber Security In the U.S. Department Of Homeland Security</title>
		<link>https://www.cigital.com/podcasts/show-116/</link>
		<pubDate>Tue, 01 Dec 2015 02:34:00 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[security policy]]></category>
		<category><![CDATA[security risks]]></category>
		<category><![CDATA[security standards]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=8424</guid>
		<description><![CDATA[<p>Gary talks to Dr. Doug Maughan about scientific research in computer security and its relationship to wider government efforts in security.  Maughan is currently the Cyber Security Division (CSD) Director for the Homeland Security Advanced Research Projects Agency. With a Ph.D. in Computer Science and over 10 years of experience working with the Department of Homeland &#8230; <a href="https://www.cigital.com/podcasts/show-116/" class="more-link">Continue reading <span class="screen-reader-text">Show 116: Doug Maughan Discusses the Current State Of Cyber Security In the U.S. Department Of Homeland Security</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-116/">Show 116: Doug Maughan Discusses the Current State Of Cyber Security In the U.S. Department Of Homeland Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Gary talks to Dr. Doug Maughan about scientific research in computer security and its relationship to wider government efforts in security.  Maughan is currently the <a href="http://www.dhs.gov/science-and-technology/dr-douglas-maughan-csd-director" target="_blank">Cyber Security Division (CSD) Director for the Homeland Security Advanced Research Projects Agency</a>. With a Ph.D. in Computer Science and over 10 years of experience working with the Department of Homeland Security (DHS), Maughan focuses his expertise on advancing the state of security technology through the research “valley of death.&#8221; Listen as Gary and Doug discuss tech transfer, the relationship between scientific research and government funding, and the widening gap between scientific computer security results and the insufficient computer security measures attempted by the government today.</p>
<ul>
<li><a href="https://www.linkedin.com/in/douglas-maughan-9bb2076" target="_blank">Connect with Doug Maughan on LinkedIn</a></li>
<li><a href="http://www.infoq.com/presentations/security-technology-transfer" target="_blank">Tech transfer</a></li>
<li><a href="https://www.cigital.com/papers/download/09-11_Software0511.pdf" target="_blank">A case study from the lab to the world</a></li>
<li><a href="https://fcw.com/articles/2014/11/12/dhs-technology-transfer.aspx" target="_blank">Maughan on tech transfer </a></li>
<li><a href="https://en.wikipedia.org/wiki/Cal_Ripken,_Jr." target="_blank">Cal Ripkin, Jr.</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-116/">Show 116: Doug Maughan Discusses the Current State Of Cyber Security In the U.S. Department Of Homeland Security</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/8424/0/silverbullet-116.mp3" length="42989696" type="audio/mpeg" />
		<itunes:duration>0:29:41</itunes:duration>
		<itunes:subtitle>Gary talks to Dr. Doug Maughan about scientific research in computer security and its relationship to wider government efforts in security.  Maughan is currently the Cyber Security Division (CSD) Director for the Homeland Security Advanced Research [...]</itunes:subtitle>
		<itunes:summary>Gary talks to Dr. Doug Maughan about scientific research in computer security and its relationship to wider government efforts in security.  Maughan is currently the Cyber Security Division (CSD) Director for the Homeland Security Advanced Research Projects Agency. With a Ph.D. in Computer Science and over 10 years of experience working with the Department of Homeland Security (DHS), Maughan focuses his expertise on advancing the state of security technology through the research “valley of death.&#8221; Listen as Gary and Doug discuss tech transfer, the relationship between scientific research and government funding, and the widening gap between scientific computer security results and the insufficient computer security measures attempted by the government today.

Connect with Doug Maughan on LinkedIn
Tech transfer
A case study from the lab to the world
Maughan on tech transfer 
Cal Ripkin, Jr.

The post Show 116: Doug Maughan Discusses the Current State Of Cyber Security In the U.S. Department Of Homeland Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 116: Doug Maughan Discusses the Current State Of Cyber Security In the U.S. Department Of Homeland Security appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 115: Peiter “mudge&#8221; Zatko Discusses the L0pht and Government Influence</title>
		<link>https://www.cigital.com/podcasts/show-115-peiter-mudge-zatko/</link>
		<pubDate>Wed, 28 Oct 2015 14:09:50 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=7799</guid>
		<description><![CDATA[<p>Gary talks to Peiter Zatko, better known as “mudge&#8221; in hacker and security circles, about the evolution of the L0pht hacker collective and how his work in security influenced key agencies within the U.S. government to ramp up their cybersecurity efforts. During his time as a Program Manager with DARPA, mudge worked to fund much needed &#8230; <a href="https://www.cigital.com/podcasts/show-115-peiter-mudge-zatko/" class="more-link">Continue reading <span class="screen-reader-text">Show 115: Peiter “mudge&#8221; Zatko Discusses the L0pht and Government Influence</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-115-peiter-mudge-zatko/">Show 115: Peiter “mudge&#8221; Zatko Discusses the L0pht and Government Influence</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-full wp-image-7800" src="https://www.cigital.com/wp-content/uploads/2015/10/Peiter-Zatko-WP.jpg" alt="Peiter Mudge Zatko" width="250" height="235" align="right" />Gary talks to Peiter Zatko, better known as “mudge&#8221; in hacker and security circles, about the evolution of the L0pht hacker collective and how his work in security influenced key agencies within the U.S. government to ramp up their cybersecurity efforts. During his time as a Program Manager with DARPA, mudge worked to fund much needed research for the speedy development of technology that would allow the government to protect against cyberattacks. From his experience with the L0pht and the Cult of the Dead Cow, to federal and commercial tech-industry giants including Google, mudge shares his experience and lessons learned along the way.</p>
<ul>
<li><a href="https://www.linkedin.com/profile/view?id=AAkAAAChNpIBZIJKmncrT-AthiN1v1eBLEqpNBg&amp;authType=NAME_SEARCH&amp;authToken=DtEv&amp;locale=en_US&amp;trk=tyah&amp;trkInfo=clickedVertical%3Amynetwork%2CclickedEntityId%3A10565266%2CauthType%3ANAME_SEARCH%2Cidx%3A1-1-1%2CtarId%3A1446035663407%2Ctas%3Amudge%20zat" target="_blank">Connect with Peiter &#8220;mudge&#8221; Zatko on LinkedIn</a></li>
<li><a href="http://www.cnet.com/news/hacker-mudge-gets-darpa-job/" target="_blank">Hacker &#8216;mudge&#8217; gets DARPA job</a></li>
<li><a href="http://www.washingtonpost.com/sf/business/2015/06/22/net-of-insecurity-part-3/" target="_blank">A Disaster Foretold—And Ignored</a></li>
<li><a href="https://www.cigital.com/papers/download/09-11_Software0511.pdf" target="_blank">Technology Transfer</a></li>
<li><a href="https://www.cigital.com/podcasts/show-050/" target="_blank">Silver Bullet Episode 50 (Richard Clarke)</a></li>
<li><a href="https://youtu.be/DRJHZ6q-xJc" target="_blank">Frank Zappa &#8211; Inca Roads</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-115-peiter-mudge-zatko/">Show 115: Peiter “mudge&#8221; Zatko Discusses the L0pht and Government Influence</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/7799/0/silverbullet-115.mp3" length="55754880" type="audio/mpeg" />
		<itunes:duration>0:38:33</itunes:duration>
		<itunes:subtitle>Gary talks to Peiter Zatko, better known as “mudge&#8221; in hacker and security circles, about the evolution of the L0pht hacker collective and how his work in security influenced key agencies within the U.S. government to ramp up their cybersecuri[...]</itunes:subtitle>
		<itunes:summary>Gary talks to Peiter Zatko, better known as “mudge&#8221; in hacker and security circles, about the evolution of the L0pht hacker collective and how his work in security influenced key agencies within the U.S. government to ramp up their cybersecurity efforts. During his time as a Program Manager with DARPA, mudge worked to fund much needed research for the speedy development of technology that would allow the government to protect against cyberattacks. From his experience with the L0pht and the Cult of the Dead Cow, to federal and commercial tech-industry giants including Google, mudge shares his experience and lessons learned along the way.

Connect with Peiter &#8220;mudge&#8221; Zatko on LinkedIn
Hacker &#8216;mudge&#8217; gets DARPA job
A Disaster Foretold—And Ignored
Technology Transfer
Silver Bullet Episode 50 (Richard Clarke)
Frank Zappa &#8211; Inca Roads

The post Show 115: Peiter “mudge&#8221; Zatko Discusses the L0pht and Government Influence appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 115: Peiter “mudge&#8221; Zatko Discusses the L0pht and Government Influence appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 114: Peter Clay Discusses the Evolution of the CISO Role</title>
		<link>https://www.cigital.com/podcasts/show-114/</link>
		<pubDate>Tue, 29 Sep 2015 14:39:27 +0000</pubDate>
		<dc:creator><![CDATA[Cigital Editorial Team]]></dc:creator>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[cyber war]]></category>
		<category><![CDATA[start-up]]></category>
		<category><![CDATA[supply chain]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=7359</guid>
		<description><![CDATA[<p>Gary talks to the Chief Information Security Officer of Qlik, Peter “Pete” Clay, who holds 20+ years of experience in technology growth and its relationship to security from a risk management perspective.  Pete brings federal, public, private and start-up insight into the global security space. He shares personal lessons he has learned as a consultant &#8230; <a href="https://www.cigital.com/podcasts/show-114/" class="more-link">Continue reading <span class="screen-reader-text">Show 114: Peter Clay Discusses the Evolution of the CISO Role</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-114/">Show 114: Peter Clay Discusses the Evolution of the CISO Role</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-full wp-image-7360" src="https://www.cigital.com/wp-content/uploads/2015/09/Peter-Clay-Opt.jpg" alt="Peter Clay Opt" width="250" height="235" align="right" /></p>
<p>Gary talks to the Chief Information Security Officer of <a href="http://www.qlik.com/" target="_blank">Qlik</a>, Peter “Pete” Clay, who holds 20+ years of experience in technology growth and its relationship to security from a risk management perspective.  Pete brings federal, public, private and start-up insight into the global security space. He shares personal lessons he has learned as a consultant and CISO, and gaps he has identified within the ever-changing security industry. Listen as Gary and Pete discuss the evolution of the CISO role, reactive approaches to security and the potential for cyber warfare.</p>
<ul>
<li><a href="https://www.linkedin.com/pulse/onlyseemsimpossible-peter-clay" target="_blank">Connect with Peter Clay on LinkedIn</a></li>
<li><a href="http://www.scmagazine.com/leveraging-innovation-to-boost-security/article/364242/" target="_blank">Leveraging innovation to boost security</a></li>
<li><a href="http://www.nxtbook.com/nxtbooks/kmd/hst_20141011/#/36" target="_blank">The New Rules of Cyber Warfare</a> by Peter Clay</li>
<li><a href="http://gcn.com/Articles/2014/10/02/Security-playbook.aspx?Page=1" target="_blank">Beyond compliance: Protecting data with automated security playbooks</a></li>
<li><a href="http://www.amazon.com/World-Lit-Only-Fire-Renaissance/dp/0316545562/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1443530928&amp;sr=1-1&amp;keywords=a+world+lit+only+by+fire" target="_blank">A World Lit Only by Fire</a> by William Manchester</li>
<li><a href="http://www.amazon.com/The-Last-Lion-Churchill-1874-1932/dp/0385313489" target="_blank">The Last Lion: Winston Spencer Churchill</a> by William Manchester</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-114/">Show 114: Peter Clay Discusses the Evolution of the CISO Role</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/7359/0/silverbullet-114.mp3" length="45508736" type="audio/mpeg" />
		<itunes:duration>0:31:26</itunes:duration>
		<itunes:subtitle>
Gary talks to the Chief Information Security Officer of Qlik, Peter “Pete” Clay, who holds 20+ years of experience in technology growth and its relationship to security from a risk management perspective.  Pete brings federal, public, private and s[...]</itunes:subtitle>
		<itunes:summary>
Gary talks to the Chief Information Security Officer of Qlik, Peter “Pete” Clay, who holds 20+ years of experience in technology growth and its relationship to security from a risk management perspective.  Pete brings federal, public, private and start-up insight into the global security space. He shares personal lessons he has learned as a consultant and CISO, and gaps he has identified within the ever-changing security industry. Listen as Gary and Pete discuss the evolution of the CISO role, reactive approaches to security and the potential for cyber warfare.

Connect with Peter Clay on LinkedIn
Leveraging innovation to boost security
The New Rules of Cyber Warfare by Peter Clay
Beyond compliance: Protecting data with automated security playbooks
A World Lit Only by Fire by William Manchester
The Last Lion: Winston Spencer Churchill by William Manchester

The post Show 114: Peter Clay Discusses the Evolution of the CISO Role appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 114: Peter Clay Discusses the Evolution of the CISO Role appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>CISO, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 113: Chandu Ketkar Discusses Software Security Best Practices</title>
		<link>https://www.cigital.com/podcasts/show-113-software-security-best-practices/</link>
		<pubDate>Mon, 31 Aug 2015 15:58:03 +0000</pubDate>
		<dc:creator><![CDATA[Gary McGraw]]></dc:creator>
				<category><![CDATA[Architecture Risk Analysis]]></category>
		<category><![CDATA[Code Review]]></category>
		<category><![CDATA[Developer]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Threat Modeling]]></category>
		<category><![CDATA[design flaws]]></category>
		<category><![CDATA[medical devices]]></category>
		<category><![CDATA[risk analysis]]></category>
		<category><![CDATA[software development]]></category>
		<category><![CDATA[touchpoints]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=6934</guid>
		<description><![CDATA[<p>Gary talks to Cigital’s Chandu Ketkar. With 20+ years of experience as a developer prior to getting into security, Chandu brings a unique and enlightened view to software security. Chandu shares his insight into why developers and security experts struggle to get along, and offers a solution from the world of economics. He also provides &#8230; <a href="https://www.cigital.com/podcasts/show-113-software-security-best-practices/" class="more-link">Continue reading <span class="screen-reader-text">Show 113: Chandu Ketkar Discusses Software Security Best Practices</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-113-software-security-best-practices/">Show 113: Chandu Ketkar Discusses Software Security Best Practices</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-full wp-image-6941" src="https://www.cigital.com/wp-content/uploads/2015/08/CKetkar_250x235.jpg" alt="CKetkar_250x235" width="250" height="235" align="right" />Gary talks to Cigital’s Chandu Ketkar. With 20+ years of experience as a developer prior to getting into security, Chandu brings a unique and enlightened view to software security. Chandu shares his insight into why developers and security experts struggle to get along, and offers a solution from the world of economics. He also provides lessons from the healthcare industry and aviation that he believes can improve security processes, particularly when it comes to threat modeling and architecture risk analysis. Listen in for Gary and Chandu’s take on threat modeling, risk analysis, the principal-agent paradox, the checklist manifesto and more.</p>
<p><strong>Related Links</strong></p>
<ul>
<li><a href="http://searchsecurity.techtarget.com/opinion/McGraw-Software-insecurity-and-scaling-architecture-risk-analysis">Software [in]security and scaling architecture risk analysis</a></li>
<li><a href="http://bit.ly/1pPH56p">McGraw on assessing medical devices: Security in a new domain</a></li>
<li><a href="http://www.investopedia.com/terms/p/principal-agent-problem.asp">Principal-agent problem</a></li>
<li><a href="http://www.amazon.com/The-Checklist-Manifesto-Things-Right/dp/0312430000">The Checklist Manifesto: How to Get Things Right</a></li>
<li><a href="http://www.britannica.com/biography/Kishori-Amonkar"> Kishori Amonkar</a>, Jaipur Gharana singer</li>
<li><a href="https://www.youtube.com/watch?v=VylhIJF50sI">Raga Rageshree</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-113-software-security-best-practices/">Show 113: Chandu Ketkar Discusses Software Security Best Practices</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/6934/0/silverbullet-113.mp3" length="40296576" type="audio/mpeg" />
		<itunes:duration>0:27:51</itunes:duration>
		<itunes:subtitle>Gary talks to Cigital’s Chandu Ketkar. With 20+ years of experience as a developer prior to getting into security, Chandu brings a unique and enlightened view to software security. Chandu shares his insight into why developers and security experts s[...]</itunes:subtitle>
		<itunes:summary>Gary talks to Cigital’s Chandu Ketkar. With 20+ years of experience as a developer prior to getting into security, Chandu brings a unique and enlightened view to software security. Chandu shares his insight into why developers and security experts struggle to get along, and offers a solution from the world of economics. He also provides lessons from the healthcare industry and aviation that he believes can improve security processes, particularly when it comes to threat modeling and architecture risk analysis. Listen in for Gary and Chandu’s take on threat modeling, risk analysis, the principal-agent paradox, the checklist manifesto and more.
Related Links

Software [in]security and scaling architecture risk analysis
McGraw on assessing medical devices: Security in a new domain
Principal-agent problem
The Checklist Manifesto: How to Get Things Right
 Kishori Amonkar, Jaipur Gharana singer
Raga Rageshree

The post Show 113: Chandu Ketkar Discusses Software Security Best Practices appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 113: Chandu Ketkar Discusses Software Security Best Practices appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Developer, Healthcare, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 112: &#8220;Crypto Wars II&#8221; with Steve Bellovin and Matt Green</title>
		<link>https://www.cigital.com/podcasts/show-112/</link>
		<pubDate>Thu, 23 Jul 2015 15:33:45 +0000</pubDate>
		<dc:creator><![CDATA[Gary McGraw]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Developer]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[android]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[heartbleed]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[social media]]></category>

		<guid isPermaLink="false">https://www.cigital.com/?post_type=podcasts&#038;p=6378</guid>
		<description><![CDATA[<p>We thought the &#8220;crypto wars&#8221; were resolved in the late 1990s. But the introduction of encrypted devices­—specifically the release of iOS 8 and the growing number of available encrypted communication channels through public services such as Facebook and Snapchat&#8212;has resurfaced the debate. FBI Director Comey and other law enforcement groups are concerned about what they &#8230; <a href="https://www.cigital.com/podcasts/show-112/" class="more-link">Continue reading <span class="screen-reader-text">Show 112: &#8220;Crypto Wars II&#8221; with Steve Bellovin and Matt Green</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-112/">Show 112: &#8220;Crypto Wars II&#8221; with Steve Bellovin and Matt Green</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/wp-content/uploads/2015/06/mgreen-125.png" alt="mgreen-125.png" align="right" /><img style="padding-left: 7px;" src="https://www.cigital.com/wp-content/uploads/2015/06/sbellovin-125.png" alt="sbellovin-125.png" align="right" /></p>
<p>We thought the &#8220;crypto wars&#8221; were resolved in the late 1990s. But the introduction of encrypted devices­—specifically <a href="http://www.techradar.com/us/news/phone-and-communications/mobile-phones/ios-8-10-things-we-want-to-see-1166133">the release of iOS 8</a> and the growing number of available encrypted communication channels through public services such as Facebook and Snapchat&#8212;has resurfaced the debate. <a href="https://www.fbi.gov/about-us/executives/comey">FBI Director Comey</a> and other law enforcement groups are concerned about what they call &#8220;going dark&#8221; and are stressing the need for back door access (called extraordinary access). But is this really a good idea? Didn’t we already fight this battle during the first crypto wars? Matthew Green and Steve Bellovin, two authors of the recently released <a href="http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf?sequence=8%3e">Keys Under Doormats paper</a>, discuss the dangerous ramifications of this request.</p>
<ul>
<li><a href="http://dspace.mit.edu/bitstream/handle/1721.1/97690/MIT-CSAIL-TR-2015-026.pdf">Keys Under Doormats paper</a></li>
<li>Show 81: <a href="https://www.cigital.com/podcasts/show-081/">Interview with Steve Bellovin</a></li>
<li>Show 90: <a href="https://www.cigital.com/podcasts/show-090/">Interview with Matthew Green</a></li>
<li><a href="http://www.lawfareblog.com/thoughts-encryption-and-going-dark-counterpart%3e">Thoughts on Encryption and Going Dark: Counterpart </a></li>
<li><a href="https://www.dailydot.com/politics/encryption-crypto-war-james-comey-fbi-privacy/">The rise of the new Crypto War </a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-112/">Show 112: &#8220;Crypto Wars II&#8221; with Steve Bellovin and Matt Green</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/6378/0/silverbullet-112.mp3" length="48736384" type="audio/mpeg" />
		<itunes:duration>0:33:43</itunes:duration>
		<itunes:subtitle>
We thought the &#8220;crypto wars&#8221; were resolved in the late 1990s. But the introduction of encrypted devices­—specifically the release of iOS 8 and the growing number of available encrypted communication channels through public services such[...]</itunes:subtitle>
		<itunes:summary>
We thought the &#8220;crypto wars&#8221; were resolved in the late 1990s. But the introduction of encrypted devices­—specifically the release of iOS 8 and the growing number of available encrypted communication channels through public services such as Facebook and Snapchat&#8212;has resurfaced the debate. FBI Director Comey and other law enforcement groups are concerned about what they call &#8220;going dark&#8221; and are stressing the need for back door access (called extraordinary access). But is this really a good idea? Didn’t we already fight this battle during the first crypto wars? Matthew Green and Steve Bellovin, two authors of the recently released Keys Under Doormats paper, discuss the dangerous ramifications of this request.

Keys Under Doormats paper
Show 81: Interview with Steve Bellovin
Show 90: Interview with Matthew Green
Thoughts on Encryption and Going Dark: Counterpart 
The rise of the new Crypto War 

The post Show 112: &#8220;Crypto Wars II&#8221; with Steve Bellovin and Matt Green appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 112: &#8220;Crypto Wars II&#8221; with Steve Bellovin and Matt Green appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Developer, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 111 – An Interview with Marcus Ranum</title>
		<link>https://www.cigital.com/podcasts/show-111-an-interview-with-marcus-ranum/</link>
		<pubDate>Tue, 30 Jun 2015 16:03:06 +0000</pubDate>
		<dc:creator><![CDATA[Gary McGraw]]></dc:creator>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/?post_type=podcasts&#038;p=5319</guid>
		<description><![CDATA[<p>Has software security actually gotten worse? On the 111th episode of The Silver Bullet Security Podcast, Gary talks with Marcus Ranum, Chief Security Officer of Tenable Network Security. He is the inventor of both the proxy firewall and early-advanced intrusion systems. Gary and Marcus discuss the current state of software security, firewalls, de-perimeterization, and hackers. &#8230; <a href="https://www.cigital.com/podcasts/show-111-an-interview-with-marcus-ranum/" class="more-link">Continue reading <span class="screen-reader-text">Show 111 – An Interview with Marcus Ranum</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-111-an-interview-with-marcus-ranum/">Show 111 – An Interview with Marcus Ranum</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Has software security actually gotten worse? On the 111th episode of <em>The Silver Bullet Security Podcast</em>, Gary talks with Marcus Ranum, Chief Security Officer of Tenable Network Security. He is the inventor of both the proxy firewall and early-advanced intrusion systems. Gary and Marcus discuss the current state of software security, firewalls, de-perimeterization, and hackers. Marcus also shares how he stays on the cutting edge of security and who his biggest influences are. Gary closes the show with an unexpected “dirty, brilliant trick.”</p>
<ul>
<li><a href="http://ranum.com/" target="_blank">Marcus Ranum’s website</a></li>
<li><a href="https://www.cigital.com/podcasts/show-003/">Episode 3: Marcus Ranum</a></li>
<li><a href="http://www.ranum.com/security/computer_security/editorials/dumb/" target="_blank">6 Dumbest Things in Computer Security’</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-111-an-interview-with-marcus-ranum/">Show 111 – An Interview with Marcus Ranum</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/5319/0/silverbullet-111.mp3" length="49262720" type="audio/mpeg" />
		<itunes:duration>0:34:05</itunes:duration>
		<itunes:subtitle>Has software security actually gotten worse? On the 111th episode of The Silver Bullet Security Podcast, Gary talks with Marcus Ranum, Chief Security Officer of Tenable Network Security. He is the inventor of both the proxy firewall and early-advanc[...]</itunes:subtitle>
		<itunes:summary>Has software security actually gotten worse? On the 111th episode of The Silver Bullet Security Podcast, Gary talks with Marcus Ranum, Chief Security Officer of Tenable Network Security. He is the inventor of both the proxy firewall and early-advanced intrusion systems. Gary and Marcus discuss the current state of software security, firewalls, de-perimeterization, and hackers. Marcus also shares how he stays on the cutting edge of security and who his biggest influences are. Gary closes the show with an unexpected “dirty, brilliant trick.”

Marcus Ranum’s website
Episode 3: Marcus Ranum
6 Dumbest Things in Computer Security’

The post Show 111 – An Interview with Marcus Ranum appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 111 – An Interview with Marcus Ranum appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 110 &#8211; An Interview with Paul Dorey</title>
		<link>https://www.cigital.com/podcasts/show-110/</link>
		<pubDate>Sat, 30 May 2015 17:22:34 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-110-3/</guid>
		<description><![CDATA[<p>On the 110th episode of The Silver Bullet Security Podcast, Gary talks with Paul Dorey, founder of CSO Confidential and Visiting Professor at the University of London. Gary and Paul discuss the modern role of the CSO and the ideal background for a CSO, Paul&#8217;s biggest win and biggest mistake as a CSO, and the &#8230; <a href="https://www.cigital.com/podcasts/show-110/" class="more-link">Continue reading <span class="screen-reader-text">Show 110 &#8211; An Interview with Paul Dorey</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-110/">Show 110 &#8211; An Interview with Paul Dorey</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Paul Dorey" src="https://www.cigital.com/wp-content/uploads/2015/06/pdorey-125.png" align="right" /></p>
<p>On the 110th episode of <em>The Silver Bullet Security Podcast</em>, Gary talks with Paul Dorey, founder of CSO Confidential and Visiting Professor at the University of London. Gary and Paul discuss the modern role of the CSO and the ideal background for a CSO, Paul&#8217;s biggest win and biggest mistake as a CSO, and the role of building security in as part of a CSO&#8217;s strategy. They close out the episode with discussion of Paul&#8217;s favorite piece of humorous fiction.</p>
<ul>
<li><a href="http://www.csoconfidential.com/" target="_blank">CSO Confidential</a></li>
<li><a href="http://personal.rhul.ac.uk/vsai/149/" target="_blank">Prof. Paul Dorey</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-110/">Show 110 &#8211; An Interview with Paul Dorey</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2692/0/silverbullet-110.mp3" length="37429376" type="audio/mpeg" />
		<itunes:duration>0:25:52</itunes:duration>
		<itunes:subtitle>
On the 110th episode of The Silver Bullet Security Podcast, Gary talks with Paul Dorey, founder of CSO Confidential and Visiting Professor at the University of London. Gary and Paul discuss the modern role of the CSO and the ideal background for a [...]</itunes:subtitle>
		<itunes:summary>
On the 110th episode of The Silver Bullet Security Podcast, Gary talks with Paul Dorey, founder of CSO Confidential and Visiting Professor at the University of London. Gary and Paul discuss the modern role of the CSO and the ideal background for a CSO, Paul&#8217;s biggest win and biggest mistake as a CSO, and the role of building security in as part of a CSO&#8217;s strategy. They close out the episode with discussion of Paul&#8217;s favorite piece of humorous fiction.

CSO Confidential
Prof. Paul Dorey

The post Show 110 &#8211; An Interview with Paul Dorey appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 110 &#8211; An Interview with Paul Dorey appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>CISO, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 109 &#8211; An Interview with Bart Preneel</title>
		<link>https://www.cigital.com/podcasts/show-109/</link>
		<pubDate>Wed, 22 Apr 2015 18:10:20 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cryptography]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-109-3/</guid>
		<description><![CDATA[<p>On the 109th episode of The Silver Bullet Security Podcast, Gary is joined by Bart Preneel. Bart is a full professor at the KU Leuven, one of the oldest universities in the world. Gary and Bart discuss the differences in approaches to security between the EU and the US, what the picture of building security &#8230; <a href="https://www.cigital.com/podcasts/show-109/" class="more-link">Continue reading <span class="screen-reader-text">Show 109 &#8211; An Interview with Bart Preneel</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-109/">Show 109 &#8211; An Interview with Bart Preneel</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Bart Preneel" src="https://www.cigital.com/wp-content/uploads/2015/06/bpreneel-125.png" alt="Bart Preneel" align="right" /></p>
<p>On the 109th episode of <em>The Silver Bullet Security Podcast</em>, Gary is joined by Bart Preneel. Bart is a full professor at the KU Leuven, one of the oldest universities in the world. Gary and Bart discuss the differences in approaches to security between the EU and the US, what the picture of building security in looks like around the world, quantum cryptography, and the implications of the Snowden revelations on cryptography. They close out their chat discussing Bart&#8217;s Dixieland band.</p>
<ul>
<li><a href="http://homes.esat.kuleuven.be/~preneel/">Bart Preneel</a></li>
<li><a href="https://www.youtube.com/watch?v=xsdYYy48e2s">Prof. Dr. Bart Preneel, KU Leuven / iMinds</a> (video)</li>
<li><a href="http://scholar.google.com/citations?view_op=view_citation&amp;hl=en&amp;user=omio-RsAAAAJ&amp;sortby=pubdate&amp;citation_for_view=omio-RsAAAAJ:j6V8Syvup0UC">Mathematicians Discuss the Snowden Revelations</a></li>
<li><a href="http://www.anagram.com/jcrap/"><em>Journal of Craptology</em></a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-109/">Show 109 &#8211; An Interview with Bart Preneel</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2693/0/silverbullet-109.mp3" length="37331072" type="audio/mpeg" />
		<itunes:duration>0:25:48</itunes:duration>
		<itunes:subtitle>
On the 109th episode of The Silver Bullet Security Podcast, Gary is joined by Bart Preneel. Bart is a full professor at the KU Leuven, one of the oldest universities in the world. Gary and Bart discuss the differences in approaches to security betw[...]</itunes:subtitle>
		<itunes:summary>
On the 109th episode of The Silver Bullet Security Podcast, Gary is joined by Bart Preneel. Bart is a full professor at the KU Leuven, one of the oldest universities in the world. Gary and Bart discuss the differences in approaches to security between the EU and the US, what the picture of building security in looks like around the world, quantum cryptography, and the implications of the Snowden revelations on cryptography. They close out their chat discussing Bart&#8217;s Dixieland band.

Bart Preneel
Prof. Dr. Bart Preneel, KU Leuven / iMinds (video)
Mathematicians Discuss the Snowden Revelations
Journal of Craptology

The post Show 109 &#8211; An Interview with Bart Preneel appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 109 &#8211; An Interview with Bart Preneel appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>CISO, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 108 &#8211; An Interview with Katie Moussouris</title>
		<link>https://www.cigital.com/podcasts/show-108/</link>
		<pubDate>Fri, 27 Mar 2015 22:01:10 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[vulnerabilities]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-108/</guid>
		<description><![CDATA[<p>In the 108th episode of the Silver Bullet Security podcast, Gary talks with Katie Moussouris, Chief Policy Officer of HackerOne. Gary and Katie discuss her first program (a piece of interactive fiction in the Choose Your Own Adventure category written in Basic), bug bounty programs, how financial services and healthcare firms might approach vulnerability management, &#8230; <a href="https://www.cigital.com/podcasts/show-108/" class="more-link">Continue reading <span class="screen-reader-text">Show 108 &#8211; An Interview with Katie Moussouris</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-108/">Show 108 &#8211; An Interview with Katie Moussouris</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Katie Moussouris" src="https://www.cigital.com/wp-content/uploads/2015/06/kmoussouris-125.png" alt="Katie Moussouris" align="right" /></p>
<p>In the 108th episode of the Silver Bullet Security podcast, Gary talks with Katie Moussouris, Chief Policy Officer of HackerOne. Gary and Katie discuss her first program (a piece of interactive fiction in the Choose Your Own Adventure category written in Basic), bug bounty programs, how financial services and healthcare firms might approach vulnerability management, breaking versus building (and how to teach breakers to think more like builders), and the challenges of being a woman in security and why Katie dislikes being asked about it. They close out their discussion with some talk of various libations.</p>
<ul>
<li><a href="https://twitter.com/k8em0">Katie Moussouris</a></li>
<li><a href="https://hackerone.com/">HackerOne</a></li>
<li><a href="http://en.wikipedia.org/wiki/Choose_Your_Own_Adventure">Choose Your Own Adventure</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-108/">Show 108 &#8211; An Interview with Katie Moussouris</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2697/0/silverbullet-108.mp3" length="43833472" type="audio/mpeg" />
		<itunes:duration>0:30:19</itunes:duration>
		<itunes:subtitle>
In the 108th episode of the Silver Bullet Security podcast, Gary talks with Katie Moussouris, Chief Policy Officer of HackerOne. Gary and Katie discuss her first program (a piece of interactive fiction in the Choose Your Own Adventure category writ[...]</itunes:subtitle>
		<itunes:summary>
In the 108th episode of the Silver Bullet Security podcast, Gary talks with Katie Moussouris, Chief Policy Officer of HackerOne. Gary and Katie discuss her first program (a piece of interactive fiction in the Choose Your Own Adventure category written in Basic), bug bounty programs, how financial services and healthcare firms might approach vulnerability management, breaking versus building (and how to teach breakers to think more like builders), and the challenges of being a woman in security and why Katie dislikes being asked about it. They close out their discussion with some talk of various libations.

Katie Moussouris
HackerOne
Choose Your Own Adventure

The post Show 108 &#8211; An Interview with Katie Moussouris appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 108 &#8211; An Interview with Katie Moussouris appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 107 &#8211; An Interview with Jean Camp</title>
		<link>https://www.cigital.com/podcasts/show-107/</link>
		<pubDate>Sat, 28 Feb 2015 02:14:34 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Mobile Application Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[mobile]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-107/</guid>
		<description><![CDATA[<p>L. Jean Camp is a Professor at the Indiana University School of Informatics and Computing. Gary and Jean discuss usability and security, whether users&#8217; implicit expectations of security and privacy are enough to move the mobile market, and &#8220;old people&#8221; and security. They close out their discussion with the most surprising hangover cure and Jean&#8217;s &#8230; <a href="https://www.cigital.com/podcasts/show-107/" class="more-link">Continue reading <span class="screen-reader-text">Show 107 &#8211; An Interview with Jean Camp</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-107/">Show 107 &#8211; An Interview with Jean Camp</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Jean Camp" src="https://www.cigital.com/wp-content/uploads/2015/06/jcamp-1251.png" alt="Jean Camp" align="right" /></p>
<p>L. Jean Camp is a Professor at the Indiana University School of Informatics and Computing. Gary and Jean discuss usability and security, whether users&#8217; implicit expectations of security and privacy are enough to move the mobile market, and &#8220;old people&#8221; and security. They close out their discussion with the most surprising hangover cure and Jean&#8217;s favorite album of 2014.</p>
<ul>
<li><a href="http://www.ljean.com/">L. Jean Camp</a></li>
<li><a href="http://en.wikipedia.org/wiki/L._Jean_Camp">L. Jean Camp</a> (Wikipedia)</li>
<li><a href="http://scholar.google.com/citations?user=wJPGa2IAAAAJ&amp;hl=en">L. Jean Camp Google Scholar Citations</a></li>
<li><a href="http://www.sciencemag.org/content/347/6221/490.full">The End of Privacy</a>, <em>Science Magazine</em></li>
<li><a href="https://www.youtube.com/watch?v=F90Cw4l-8NY">Bastille: &#8220;Pompeii&#8221;</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-107/">Show 107 &#8211; An Interview with Jean Camp</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2695/0/silverbullet-107.mp3" length="48633984" type="audio/mpeg" />
		<itunes:duration>0:33:39</itunes:duration>
		<itunes:subtitle>
L. Jean Camp is a Professor at the Indiana University School of Informatics and Computing. Gary and Jean discuss usability and security, whether users&#8217; implicit expectations of security and privacy are enough to move the mobile market, and [...]</itunes:subtitle>
		<itunes:summary>
L. Jean Camp is a Professor at the Indiana University School of Informatics and Computing. Gary and Jean discuss usability and security, whether users&#8217; implicit expectations of security and privacy are enough to move the mobile market, and &#8220;old people&#8221; and security. They close out their discussion with the most surprising hangover cure and Jean&#8217;s favorite album of 2014.

L. Jean Camp
L. Jean Camp (Wikipedia)
L. Jean Camp Google Scholar Citations
The End of Privacy, Science Magazine
Bastille: &#8220;Pompeii&#8221;

The post Show 107 &#8211; An Interview with Jean Camp appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 107 &#8211; An Interview with Jean Camp appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 106 &#8211; An Interview with Steve Katz</title>
		<link>https://www.cigital.com/podcasts/show-106/</link>
		<pubDate>Sat, 31 Jan 2015 18:43:28 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[FS-ISAC]]></category>
		<category><![CDATA[network security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-106/</guid>
		<description><![CDATA[<p>Steve Katz is owner and founder of Security Risk Solutions and the &#8220;world&#8217;s first CISO.&#8221; Gary and Steve discuss the history and evolution of the CISO position, the difficulty of measuring risk in a realistic fashion, how to allocate resources between proactive security engineering and standard network security, triage, and incident response, what it means &#8230; <a href="https://www.cigital.com/podcasts/show-106/" class="more-link">Continue reading <span class="screen-reader-text">Show 106 &#8211; An Interview with Steve Katz</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-106/">Show 106 &#8211; An Interview with Steve Katz</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Steve Katz" src="https://www.cigital.com/wp-content/uploads/2015/06/skatz-125.png" alt="Steve Katz" align="right" /></p>
<p>Steve Katz is owner and founder of Security Risk Solutions and the &#8220;world&#8217;s first CISO.&#8221; Gary and Steve discuss the history and evolution of the CISO position, the difficulty of measuring risk in a realistic fashion, how to allocate resources between proactive security engineering and standard network security, triage, and incident response, what it means to be an executive, and the FS-ISAC.</p>
<ul>
<li><a href="http://www.securityrisksolutions.com/">Security Risk Solitions</a></li>
<li><a href="http://www.bankinfosecurity.com/influencers-steve-katz-a-2164">Steve Katz as banking executive</a></li>
<li><a href="https://www.fsisac.com/">FS-ISAC</a></li>
<li><a href="http://www.amazon.com/The-Patient-Will-See-You/dp/0465054749">The Patient will see you</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-106/">Show 106 &#8211; An Interview with Steve Katz</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2699/0/silverbullet-106.mp3" length="51036288" type="audio/mpeg" />
		<itunes:duration>0:35:19</itunes:duration>
		<itunes:subtitle>
Steve Katz is owner and founder of Security Risk Solutions and the &#8220;world&#8217;s first CISO.&#8221; Gary and Steve discuss the history and evolution of the CISO position, the difficulty of measuring risk in a realistic fashion, how to alloca[...]</itunes:subtitle>
		<itunes:summary>
Steve Katz is owner and founder of Security Risk Solutions and the &#8220;world&#8217;s first CISO.&#8221; Gary and Steve discuss the history and evolution of the CISO position, the difficulty of measuring risk in a realistic fashion, how to allocate resources between proactive security engineering and standard network security, triage, and incident response, what it means to be an executive, and the FS-ISAC.

Security Risk Solitions
Steve Katz as banking executive
FS-ISAC
The Patient will see you

The post Show 106 &#8211; An Interview with Steve Katz appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 106 &#8211; An Interview with Steve Katz appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>CISO, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The History of Public Key Cryptography with Whitfield Diffie</title>
		<link>https://www.cigital.com/podcasts/show-105/</link>
		<pubDate>Wed, 31 Dec 2014 16:55:49 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cryptography]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-105/</guid>
		<description><![CDATA[<p>On the 105th episode of the Silver Bullet Security Podcast, Gary talks with the legendary Whitfield Diffie, a pioneer of public-key cryptography. Gary and Whitfield discuss the history of public key cryptography, Diffie&#8217;s work on the &#8220;proof of correctness of programs,&#8221; and if backdoors into crypto systems are a bad idea. They close out by &#8230; <a href="https://www.cigital.com/podcasts/show-105/" class="more-link">Continue reading <span class="screen-reader-text">The History of Public Key Cryptography with Whitfield Diffie</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-105/">The History of Public Key Cryptography with Whitfield Diffie</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Whitfield Diffie" src="https://www.cigital.com/wp-content/uploads/2015/06/wdiffie-125.png" alt="Whitfield Diffie" align="right" /></p>
<p>On the 105th episode of the <a title="Podcast" href="https://www.cigital.com/podcast/">Silver Bullet Security Podcast</a>, Gary talks with the legendary Whitfield Diffie, a pioneer of public-key cryptography. Gary and Whitfield discuss the history of public key cryptography, Diffie&#8217;s work on the &#8220;proof of correctness of programs,&#8221; and if backdoors into crypto systems are a bad idea. They close out by discussing art.</p>
<ul>
<li><a href="https://cisac.fsi.stanford.edu/people/whitfield_diffie" target="_blank">Whitfield Diffie</a></li>
<li><a href="https://en.wikipedia.org/wiki/Whitfield_Diffie" target="_blank">Whitfield Diffie (Wikipedia)</a></li>
<li><a href="https://www-ee.stanford.edu/~hellman/publications/24.pdf" target="_blank">New Directions in Cryptography (1976)</a> [PDF]</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-105/">The History of Public Key Cryptography with Whitfield Diffie</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2712/0/silverbullet-105.mp3" length="63080576" type="audio/mpeg" />
		<itunes:duration>0:43:41</itunes:duration>
		<itunes:subtitle>
On the 105th episode of the Silver Bullet Security Podcast, Gary talks with the legendary Whitfield Diffie, a pioneer of public-key cryptography. Gary and Whitfield discuss the history of public key cryptography, Diffie&#8217;s work on the &#8220;p[...]</itunes:subtitle>
		<itunes:summary>
On the 105th episode of the Silver Bullet Security Podcast, Gary talks with the legendary Whitfield Diffie, a pioneer of public-key cryptography. Gary and Whitfield discuss the history of public key cryptography, Diffie&#8217;s work on the &#8220;proof of correctness of programs,&#8221; and if backdoors into crypto systems are a bad idea. They close out by discussing art.

Whitfield Diffie
Whitfield Diffie (Wikipedia)
New Directions in Cryptography (1976) [PDF]

The post The History of Public Key Cryptography with Whitfield Diffie appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The History of Public Key Cryptography with Whitfield Diffie appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 104 – An Interview with Rick Gordon</title>
		<link>https://www.cigital.com/podcasts/show-104/</link>
		<pubDate>Sun, 30 Nov 2014 12:01:45 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-104/</guid>
		<description><![CDATA[<p>On the 104th episode of the Silver Bullet Security Podcast, Gary chats with Rick Gordon, Managing Partner at MACH37. Gary and Rick discuss Rick&#8217;s time in the Navy and what it taught him about security, Rick&#8217;s lessons learned from his time as CEO of Tovaris, whether the government outside of DARPA understands security engineering, and &#8230; <a href="https://www.cigital.com/podcasts/show-104/" class="more-link">Continue reading <span class="screen-reader-text">Show 104 – An Interview with Rick Gordon</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-104/">Show 104 – An Interview with Rick Gordon</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Rick Gordon" src="https://www.cigital.com/wp-content/uploads/2015/06/rgordon-125.png" alt="Rick Gordon" align="right" /></p>
<p>On the 104th episode of the Silver Bullet Security Podcast, Gary chats with Rick Gordon, Managing Partner at MACH37. Gary and Rick discuss Rick&#8217;s time in the Navy and what it taught him about security, Rick&#8217;s lessons learned from his time as CEO of Tovaris, whether the government outside of DARPA understands security engineering, and the drive behind MACH37 the company&#8230; and the name. They close out by discussing if Rick is teaching his children to wrestle.</p>
<ul>
<li><a href="https://twitter.com/RichardGordon5">Rick on Twitter</a></li>
<li><a href="https://www.mach37.com">MACH37</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-104/">Show 104 – An Interview with Rick Gordon</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2770/0/silverbullet-104.mp3" length="49670272" type="audio/mpeg" />
		<itunes:duration>0:34:22</itunes:duration>
		<itunes:subtitle>
On the 104th episode of the Silver Bullet Security Podcast, Gary chats with Rick Gordon, Managing Partner at MACH37. Gary and Rick discuss Rick&#8217;s time in the Navy and what it taught him about security, Rick&#8217;s lessons learned from his ti[...]</itunes:subtitle>
		<itunes:summary>
On the 104th episode of the Silver Bullet Security Podcast, Gary chats with Rick Gordon, Managing Partner at MACH37. Gary and Rick discuss Rick&#8217;s time in the Navy and what it taught him about security, Rick&#8217;s lessons learned from his time as CEO of Tovaris, whether the government outside of DARPA understands security engineering, and the drive behind MACH37 the company&#8230; and the name. They close out by discussing if Rick is teaching his children to wrestle.

Rick on Twitter
MACH37

The post Show 104 – An Interview with Rick Gordon appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 104 – An Interview with Rick Gordon appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 103 &#8211; An Interview with Brian Krebs</title>
		<link>https://www.cigital.com/podcasts/show-103/</link>
		<pubDate>Fri, 31 Oct 2014 13:15:51 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-103/</guid>
		<description><![CDATA[<p>On the 103rd episode of the Silver Bullet Security Podcast, Gary talks with Brian Krebs, reporter and blogger at Krebs on Security. Gary and Brian discuss how growing up with a computer affected their future careers in security, MUD vs MAD, why &#8220;old media&#8221; can&#8217;t support in-depth security reporting, and why the government continues to &#8230; <a href="https://www.cigital.com/podcasts/show-103/" class="more-link">Continue reading <span class="screen-reader-text">Show 103 &#8211; An Interview with Brian Krebs</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-103/">Show 103 &#8211; An Interview with Brian Krebs</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Brian Krebs" src="https://www.cigital.com/wp-content/uploads/2015/06/bkrebs-125.png" alt="Brian Krebs" align="right" /></p>
<p>On the 103rd episode of the Silver Bullet Security Podcast, Gary talks with Brian Krebs, reporter and blogger at <em>Krebs on Security</em>. Gary and Brian discuss how growing up with a computer affected their future careers in security, MUD vs MAD, why &#8220;old media&#8221; can&#8217;t support in-depth security reporting, and why the government continues to be five years behind the security curve. They close out talking about Brian&#8217;s experience of writing <em>Spam Nation</em>.</p>
<ul>
<li><a href="http://krebsonsecurity.com/">Krebs on Security</a></li>
<li><a href="https://twitter.com/briankrebs">Brian on Twitter</a></li>
<li><a href="http://www.nytimes.com/2014/02/17/technology/reporting-from-the-webs-underbelly.html?_r=1">Reporting From the Web’s Underbelly</a>, <em>The New York Times</em></li>
<li><a href="https://www.cigital.com/podcasts/show-102/">Silver Bullet Security Podcast 102: Richard Danzig</a></li>
<li><a href="http://www.amazon.com/Spam-Nation-Organized-Cybercrime-Epidemic/dp/1402295618"><em>Spam Nation</em></a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-103/">Show 103 &#8211; An Interview with Brian Krebs</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2772/0/silverbullet-103.mp3" length="56150144" type="audio/mpeg" />
		<itunes:duration>0:38:52</itunes:duration>
		<itunes:subtitle>
On the 103rd episode of the Silver Bullet Security Podcast, Gary talks with Brian Krebs, reporter and blogger at Krebs on Security. Gary and Brian discuss how growing up with a computer affected their future careers in security, MUD vs MAD, why [...]</itunes:subtitle>
		<itunes:summary>
On the 103rd episode of the Silver Bullet Security Podcast, Gary talks with Brian Krebs, reporter and blogger at Krebs on Security. Gary and Brian discuss how growing up with a computer affected their future careers in security, MUD vs MAD, why &#8220;old media&#8221; can&#8217;t support in-depth security reporting, and why the government continues to be five years behind the security curve. They close out talking about Brian&#8217;s experience of writing Spam Nation.

Krebs on Security
Brian on Twitter
Reporting From the Web’s Underbelly, The New York Times
Silver Bullet Security Podcast 102: Richard Danzig
Spam Nation

The post Show 103 &#8211; An Interview with Brian Krebs appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 103 &#8211; An Interview with Brian Krebs appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 102 &#8211; An Interview with Richard Danzig</title>
		<link>https://www.cigital.com/podcasts/show-102/</link>
		<pubDate>Wed, 17 Sep 2014 13:15:58 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-102/</guid>
		<description><![CDATA[<p>On the 102nd episode of the Silver Bullet Security Podcast, Gary chats with Richard Danzig, one time Secretary of the Navy and Board member of the Center for New American Security (among several other things). Gary and Richard discuss Richard&#8217;s time at the Department of Defense, what he learned when running the US Navy that &#8230; <a href="https://www.cigital.com/podcasts/show-102/" class="more-link">Continue reading <span class="screen-reader-text">Show 102 &#8211; An Interview with Richard Danzig</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-102/">Show 102 &#8211; An Interview with Richard Danzig</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Richard Danzig" src="https://www.cigital.com/wp-content/uploads/2015/06/rdanzig-125.png" alt="Richard Danzig" align="right" /></p>
<p>On the 102nd episode of the Silver Bullet Security Podcast, Gary chats with Richard Danzig, one time Secretary of the Navy and Board member of the Center for New American Security (among several other things). Gary and Richard discuss Richard&#8217;s time at the Department of Defense, what he learned when running the US Navy that can be applied to computer security, Richard&#8217;s recommendations from his important new CNAS report, and how the report is designed to have an impact on policy. The close out their chat with a high-brow art discussion.</p>
<ul>
<li><a href="http://en.wikipedia.org/wiki/Richard_Danzig">Richard on Wikipedia</a></li>
<li><a href="http://www.navy.mil/navydata/people/secnav/danzig/danzigbi.html">Richard</a> @ <a href="http://www.navy.mil/">navy.mil</a></li>
<li><a href="http://www.cnas.org/danzigrichard">Richard @ CNAS</a></li>
<li><a href="http://www.amazon.com/National-Service-What-Would-Mean/dp/0669123749/ref=sr_1_2"><em>National Service: What Would It Mean?</em></a> by Richard Danzig</li>
<li><a href="http://www.cnas.org/surviving-diet-poisoned-fruit">Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America’s Cyber Dependencies</a> by Richard Danzig</li>
<li><a href="https://www.cigital.com/podcasts/show-002/">Silver Bullet Security Podcast Show 002: Dan Geer</a></li>
<li><a href="https://www.cigital.com/podcasts/show-007/">Silver Bullet Security Podcast Show 007: John Stewart</a></li>
<li><a href="http://www.abcgallery.com/T/tintoretto/tintoretto84.html">Jacopo Robusti, called Tintoretto. Crucifixion. 1565.</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-102/">Show 102 &#8211; An Interview with Richard Danzig</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2774/0/silverbullet-102.mp3" length="55130240" type="audio/mpeg" />
		<itunes:duration>0:38:09</itunes:duration>
		<itunes:subtitle>
On the 102nd episode of the Silver Bullet Security Podcast, Gary chats with Richard Danzig, one time Secretary of the Navy and Board member of the Center for New American Security (among several other things). Gary and Richard discuss Richard[...]</itunes:subtitle>
		<itunes:summary>
On the 102nd episode of the Silver Bullet Security Podcast, Gary chats with Richard Danzig, one time Secretary of the Navy and Board member of the Center for New American Security (among several other things). Gary and Richard discuss Richard&#8217;s time at the Department of Defense, what he learned when running the US Navy that can be applied to computer security, Richard&#8217;s recommendations from his important new CNAS report, and how the report is designed to have an impact on policy. The close out their chat with a high-brow art discussion.

Richard on Wikipedia
Richard @ navy.mil
Richard @ CNAS
National Service: What Would It Mean? by Richard Danzig
Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America’s Cyber Dependencies by Richard Danzig
Silver Bullet Security Podcast Show 002: Dan Geer
Silver Bullet Security Podcast Show 007: John Stewart
Jacopo Robusti, called Tintoretto. Crucifixion. 1565.

The post Show 102 &#8211; An Interview with Richard Danzig appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 102 &#8211; An Interview with Richard Danzig appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Software Security with the Founders of the Center for Secure Design</title>
		<link>https://www.cigital.com/podcasts/show-101/</link>
		<pubDate>Tue, 26 Aug 2014 13:35:32 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Architecture Analysis]]></category>
		<category><![CDATA[Defects, Bugs, and Flaws]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[bugs]]></category>
		<category><![CDATA[design flaws]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-101/</guid>
		<description><![CDATA[<p>On the 101st episode of the Silver Bullet Security Podcast, Gary talks with Jim Del Grosso (Cigital), Yoshi Kohno (University of Washington), and Christoph Kern (Google) in a roundtable devoted to the new IEEE Center for Secure Design. The participants discuss the origin of the Center, why design flaws are more difficult to fix than &#8230; <a href="https://www.cigital.com/podcasts/show-101/" class="more-link">Continue reading <span class="screen-reader-text">Software Security with the Founders of the Center for Secure Design</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-101/">Software Security with the Founders of the Center for Secure Design</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Center for Secure Design" src="https://www.cigital.com/wp-content/uploads/2015/06/csd-125.png" alt="Center for Secure Design" align="right" /></p>
<p>On the 101st episode of the Silver Bullet Security Podcast, Gary talks with Jim Del Grosso (Cigital), Yoshi Kohno (University of Washington), and Christoph Kern (Google) in a roundtable devoted to the new IEEE Center for Secure Design. The participants discuss the origin of the Center, why design flaws are more difficult to fix than implementation bugs, design flaws in automobile design, and how the top 10 most common flaws recently published by the Center for Secure Design were compiled.</p>
<ul>
<li><a href="http://cybersecurity.ieee.org/">Center for Secure Design</a></li>
<li><a href="https://www.cigital.com/podcasts/show-093/" target="_blank">Silver Bullet 93 &#8211; An Interview with Yoshi Kohno</a></li>
<li><a href="https://www.cigital.com/podcasts/show-099/" target="_blank">Silver Bullet 99 &#8211; An Interview with Michael Hicks</a></li>
<li><a href="https://www.cigital.com/podcasts/show-100/" target="_blank">Silver Bullet 100 &#8211; A Roundtable with Cigital&#8217;s Principals</a></li>
<li><a href="https://searchsecurity.techtarget.com/opinion/Opinion-Software-insecurity-software-flaws-in-application-architecture">Software [in]security &#8212; software flaws in application architecture</a></li>
<li><a href="http://searchsecurity.techtarget.com/opinion/McGraw-Software-insecurity-and-scaling-architecture-risk-analysis">Software [in]security and scaling architecture risk analysis</a></li>
<li><a href="http://swsec.com/">Software Security</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-101/">Software Security with the Founders of the Center for Secure Design</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2710/0/silverbullet-101.mp3" length="53952640" type="audio/mpeg" />
		<itunes:duration>0:37:20</itunes:duration>
		<itunes:subtitle>
On the 101st episode of the Silver Bullet Security Podcast, Gary talks with Jim Del Grosso (Cigital), Yoshi Kohno (University of Washington), and Christoph Kern (Google) in a roundtable devoted to the new IEEE Center for Secure Design. The particip[...]</itunes:subtitle>
		<itunes:summary>
On the 101st episode of the Silver Bullet Security Podcast, Gary talks with Jim Del Grosso (Cigital), Yoshi Kohno (University of Washington), and Christoph Kern (Google) in a roundtable devoted to the new IEEE Center for Secure Design. The participants discuss the origin of the Center, why design flaws are more difficult to fix than implementation bugs, design flaws in automobile design, and how the top 10 most common flaws recently published by the Center for Secure Design were compiled.

Center for Secure Design
Silver Bullet 93 &#8211; An Interview with Yoshi Kohno
Silver Bullet 99 &#8211; An Interview with Michael Hicks
Silver Bullet 100 &#8211; A Roundtable with Cigital&#8217;s Principals
Software [in]security &#8212; software flaws in application architecture
Software [in]security and scaling architecture risk analysis
Software Security

The post Software Security with the Founders of the Center for Secure Design appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Software Security with the Founders of the Center for Secure Design appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The State of Software Security with Cigital&#8217;s Principals</title>
		<link>https://www.cigital.com/podcasts/show-100/</link>
		<pubDate>Wed, 23 Jul 2014 13:30:31 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[BSIMM]]></category>
		<category><![CDATA[Mobile Application Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Cigital leadership]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-100/</guid>
		<description><![CDATA[<p>After 100 months in a row (over 8 years), the Silver Bullet Security Podcast with Gary McGraw hits its landmark 100th episode. In this episode Gary talks live on video with Cigital&#8217;s Principals: John Steven, Scott Matsumoto, Paco Hope, Jim DelGrosso and Sammy Migues. The group discusses the state of software security and how its &#8230; <a href="https://www.cigital.com/podcasts/show-100/" class="more-link">Continue reading <span class="screen-reader-text">The State of Software Security with Cigital&#8217;s Principals</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-100/">The State of Software Security with Cigital&#8217;s Principals</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>After 100 months in a row (over 8 years), the Silver Bullet Security Podcast with Gary McGraw hits its landmark 100th episode. In this episode Gary talks live on video with Cigital&#8217;s Principals: John Steven, Scott Matsumoto, Paco Hope, Jim DelGrosso and Sammy Migues. The group discusses the state of software security and how its evolved (or has it?) over the last decade. They talk Frameworks and code analysis, mobile security, software security in Europe, the forthcoming IEEE Center for Secure Design, and BSIMM. Finally we get to find out who thinks we’re making progress and who doesn&#8217;t.</p>
<div style="clear: both;"></div>
<p><iframe width="600" height="338" src="//www.youtube.com/embed/AW9INA_xceU" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<ul>
<li><a href="https://www.cigital.com">Cigital</a></li>
<li><a href="http://bsimm.com">BSIMM</a></li>
<li><a href="https://www.youtube.com/user/cigitalinc">Cigital on YouTube</a></li>
<li><a href="https://www.garymcgraw.com/">Gary McGraw</a></li>
<li><a href="http://paco.to/">Paco Hope</a></li>
<li><a href="https://www.cigital.com/podcasts/show-056/">Show 056 – An Interview with Sammy Migues</a></li>
<li><a href="https://www.cigital.com/podcasts/show-068/">Show 068 – An Interview with John Steven</a></li>
<li><a href="https://www.cigital.com/podcasts/show-085/">Show 085 – A Discussion with Jim Routh and Scott Matsumoto</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-100/">The State of Software Security with Cigital&#8217;s Principals</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2708/0/silverbullet-100.mp3" length="42061952" type="audio/mpeg" />
		<itunes:duration>0:29:05</itunes:duration>
		<itunes:subtitle>After 100 months in a row (over 8 years), the Silver Bullet Security Podcast with Gary McGraw hits its landmark 100th episode. In this episode Gary talks live on video with Cigital&#8217;s Principals: John Steven, Scott Matsumoto, Paco Hope, Jim Del[...]</itunes:subtitle>
		<itunes:summary>After 100 months in a row (over 8 years), the Silver Bullet Security Podcast with Gary McGraw hits its landmark 100th episode. In this episode Gary talks live on video with Cigital&#8217;s Principals: John Steven, Scott Matsumoto, Paco Hope, Jim DelGrosso and Sammy Migues. The group discusses the state of software security and how its evolved (or has it?) over the last decade. They talk Frameworks and code analysis, mobile security, software security in Europe, the forthcoming IEEE Center for Secure Design, and BSIMM. Finally we get to find out who thinks we’re making progress and who doesn&#8217;t.



Cigital
BSIMM
Cigital on YouTube
Gary McGraw
Paco Hope
Show 056 – An Interview with Sammy Migues
Show 068 – An Interview with John Steven
Show 085 – A Discussion with Jim Routh and Scott Matsumoto

The post The State of Software Security with Cigital&#8217;s Principals appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The State of Software Security with Cigital&#8217;s Principals appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>BSIMM, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>the PLDI and Software Security with Michael Hicks</title>
		<link>https://www.cigital.com/podcasts/show-099/</link>
		<pubDate>Tue, 01 Jul 2014 00:28:22 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Agile Development]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[java]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-099/</guid>
		<description><![CDATA[<p>On the 99th episode of the Silver Bullet Security Podcast, Gary talks with Michael Hicks, professor Computer Science at the University of Maryland. In this episode, they discuss the Programming Language Design and Implementation (PLDI) conference, type safety, closure, dynamic languages, why C is problematic, and how Javascript is dangerous. They go on to discuss &#8230; <a href="https://www.cigital.com/podcasts/show-099/" class="more-link">Continue reading <span class="screen-reader-text">the PLDI and Software Security with Michael Hicks</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-099/">the PLDI and Software Security with Michael Hicks</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Michael Hicks" src="https://www.cigital.com/wp-content/uploads/2015/06/mhicks-125.png" alt="Michael Hicks" align="right" /></p>
<p>On the 99th episode of the Silver Bullet Security Podcast, Gary talks with Michael Hicks, professor Computer Science at the University of Maryland. In this episode, they discuss the Programming Language Design and Implementation (PLDI) conference, type safety, closure, dynamic languages, why C is problematic, and how Javascript is dangerous. They go on to discuss the role that cryptography plays in security, how ideas from Scrum influence the way Michael runs his research group, CMSC 838G (that is, “Software Security”), and the Build-it, Break-it, Fix-it Programming Contest. They close out their discussion with talk about drums and drumming.</p>
<ul>
<li><a href="http://www.cs.umd.edu/~mwh/">Michael Hicks</a></li>
<li><a href="http://conferences.inf.ed.ac.uk/pldi2014/program.html">PLDI 2014</a></li>
<li><a href="https://www.youtube.com/watch?v=eF1NBkSKUzw">On-line patching &amp; security</a></li>
<li><a href="http://www.cs.umd.edu/class/spring2014/cmsc838g/">CMSC 838G</a></li>
<li><a href="https://builditbreakit.org/">Build-it, Break-it, Fix-it Programming Contest</a></li>
<li><a href="http://www.pl-enthusiast.net/?author=1">Michael @ Programming Languages Enthusiast</a></li>
<li><a href="http://www.ludwig-drums.com/">Ludwig Drums</a></li>
<li><a href="https://www.cigital.com/podcasts/show-047/" target="_blank">Silver Bullet Security Podcast: Greg Morrisett</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-099/">the PLDI and Software Security with Michael Hicks</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2706/0/silverbullet-099.mp3" length="50354304" type="audio/mpeg" />
		<itunes:duration>0:34:50</itunes:duration>
		<itunes:subtitle>
On the 99th episode of the Silver Bullet Security Podcast, Gary talks with Michael Hicks, professor Computer Science at the University of Maryland. In this episode, they discuss the Programming Language Design and Implementation (PLDI) conference, [...]</itunes:subtitle>
		<itunes:summary>
On the 99th episode of the Silver Bullet Security Podcast, Gary talks with Michael Hicks, professor Computer Science at the University of Maryland. In this episode, they discuss the Programming Language Design and Implementation (PLDI) conference, type safety, closure, dynamic languages, why C is problematic, and how Javascript is dangerous. They go on to discuss the role that cryptography plays in security, how ideas from Scrum influence the way Michael runs his research group, CMSC 838G (that is, “Software Security”), and the Build-it, Break-it, Fix-it Programming Contest. They close out their discussion with talk about drums and drumming.

Michael Hicks
PLDI 2014
On-line patching &#38; security
CMSC 838G
Build-it, Break-it, Fix-it Programming Contest
Michael @ Programming Languages Enthusiast
Ludwig Drums
Silver Bullet Security Podcast: Greg Morrisett

The post the PLDI and Software Security with Michael Hicks appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post the PLDI and Software Security with Michael Hicks appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Hype behind Heartbleed with Bart Miller</title>
		<link>https://www.cigital.com/podcasts/show-098/</link>
		<pubDate>Fri, 30 May 2014 01:22:44 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[heartbleed]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-098/</guid>
		<description><![CDATA[<p>On the 98th episode of the Silver Bullet Security Podcast, Gary chats with Bart Miller, Professor of Computer Science at the University of Wisconsin-Madison and Chief Scientist of the DHS Software Assurance Marketplace Research Facility. Gary and Bart discuss Heartbleed, fuzz testing, his work with Jeff Hollingsworth on dynamic instrumentation of binaries, and the SWAMP &#8230; <a href="https://www.cigital.com/podcasts/show-098/" class="more-link">Continue reading <span class="screen-reader-text">The Hype behind Heartbleed with Bart Miller</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-098/">The Hype behind Heartbleed with Bart Miller</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>On the 98th episode of the Silver Bullet Security Podcast, Gary chats with Bart Miller, Professor of Computer Science at the University of Wisconsin-Madison and Chief Scientist of the DHS Software Assurance Marketplace Research Facility. Gary and Bart discuss Heartbleed, fuzz testing, his work with Jeff Hollingsworth on dynamic instrumentation of binaries, and the SWAMP project. They close out their talk by deciding: SCUBA or skiing?</p>
<ul>
<li><a href="http://pages.cs.wisc.edu/~bart/">Professor Barton P. Miller</a></li>
<li><a href="https://continuousassurance.org/swamp/SWAMP-Heartbleed.pdf">Why Do Software Assurance Tools Have Problems Finding Bugs Like Heartbleed? (James A. Kupsch and Barton P. Miller)</a></li>
<li><a href="http://security.coverity.com/blog/2014/Apr/on-detecting-heartbleed-with-static-analysis.html">On Detecting Heartbleed with Static Analysis</a></li>
<li><a href="http://searchsecurity.techtarget.com/opinion/McGraw-on-Heartbleed-shock-and-awe-What-are-the-real-lessons">McGraw on Heartbleed shock and awe: What are the real lessons?</a></li>
<li><a href="http://en.wikipedia.org/wiki/Fuzz_testing">Fuzz Testing</a></li>
<li><a href="http://www.paradyn.org/html/publications-by-category.html#paradyn">Paradyn/Dyninst papers</a></li>
<li><a href="http://www.dyninst.org/" target="_blank">Dyninst</a></li>
<li><a href="http://www.amazon.com/Software-Fault-Injection-Jeffrey-Voas/dp/0471183814/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1401414173&amp;sr=1-1&amp;keywords=software+fault+injection"><em>Software Fault Injection</em></a></li>
<li><a href="https://www.cigital.com/podcasts/show-095/" target="_blank">Charlie Miller on Silver Bullet</a></li>
<li><a href="http://bsimm.com/">BSIMM</a></li>
<li><a href="https://continuousassurance.org/">Software Assurance Marketplace (SWAMP)</a></li>
<li><a href="http://en.wikipedia.org/wiki/Horst_Zuse">Zuse</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-098/">The Hype behind Heartbleed with Bart Miller</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2705/0/silverbullet-098.mp3" length="54773888" type="audio/mpeg" />
		<itunes:duration>0:37:55</itunes:duration>
		<itunes:subtitle>On the 98th episode of the Silver Bullet Security Podcast, Gary chats with Bart Miller, Professor of Computer Science at the University of Wisconsin-Madison and Chief Scientist of the DHS Software Assurance Marketplace Research Facility. Gary and Ba[...]</itunes:subtitle>
		<itunes:summary>On the 98th episode of the Silver Bullet Security Podcast, Gary chats with Bart Miller, Professor of Computer Science at the University of Wisconsin-Madison and Chief Scientist of the DHS Software Assurance Marketplace Research Facility. Gary and Bart discuss Heartbleed, fuzz testing, his work with Jeff Hollingsworth on dynamic instrumentation of binaries, and the SWAMP project. They close out their talk by deciding: SCUBA or skiing?

Professor Barton P. Miller
Why Do Software Assurance Tools Have Problems Finding Bugs Like Heartbleed? (James A. Kupsch and Barton P. Miller)
On Detecting Heartbleed with Static Analysis
McGraw on Heartbleed shock and awe: What are the real lessons?
Fuzz Testing
Paradyn/Dyninst papers
Dyninst
Software Fault Injection
Charlie Miller on Silver Bullet
BSIMM
Software Assurance Marketplace (SWAMP)
Zuse

The post The Hype behind Heartbleed with Bart Miller appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Hype behind Heartbleed with Bart Miller appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Development Side of Software Security with Aaron Bedra</title>
		<link>https://www.cigital.com/podcasts/show-097/</link>
		<pubDate>Thu, 01 May 2014 02:30:38 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Developer]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[software development]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-097/</guid>
		<description><![CDATA[<p>On the 97th episode of the Silver Bullet Security Podcast, Gary chats with Aaron Bedra, Senior Manager of Application Security at Groupon. Gary and Aaron discuss how security is viewed by development teams that Aaron has worked with, how a security person could transition into software security, the importance of developing a security culture, type &#8230; <a href="https://www.cigital.com/podcasts/show-097/" class="more-link">Continue reading <span class="screen-reader-text">The Development Side of Software Security with Aaron Bedra</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-097/">The Development Side of Software Security with Aaron Bedra</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>On the 97th episode of the Silver Bullet Security Podcast, Gary chats with Aaron Bedra, Senior Manager of Application Security at Groupon. Gary and Aaron discuss how security is viewed by development teams that Aaron has worked with, how a security person could transition into software security, the importance of developing a security culture, type safety and closure in programming, and the most recent non-fiction book that Aaron&#8217;s read.</p>
<ul>
<li><a href="http://www.aaronbedra.com/" target="_blank">AaronBedra.com</a></li>
<li><a href="https://www.linkedin.com/pub/aaron-bedra/2/770/911" target="_blank">Aaron at LinkedIn</a></li>
<li><a href="https://github.com/abedra" target="_blank">Aaron at Github</a></li>
<li><a href="https://twitter.com/abedra" target="_blank">@abedra at Twitter</a></li>
<li><a href="https://plus.google.com/112683971970758111520/posts" target="_blank">Aaron at Google+</a></li>
<li><a href="https://www.youtube.com/watch?v=CBL59w7fXw4" target="_blank">Aaron Bedra &#8211; clojure.web/with-security</a></li>
<li><a href="https://en.wikipedia.org/wiki/Closure_(computer_programming)" target="_blank">Closure in programming languages</a></li>
<li><a href="https://en.wikipedia.org/wiki/Dynamic_programming_language" target="_blank">Dynamic languages</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-097/">The Development Side of Software Security with Aaron Bedra</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2704/0/silverbullet-097.mp3" length="50962560" type="audio/mpeg" />
		<itunes:duration>0:35:16</itunes:duration>
		<itunes:subtitle>On the 97th episode of the Silver Bullet Security Podcast, Gary chats with Aaron Bedra, Senior Manager of Application Security at Groupon. Gary and Aaron discuss how security is viewed by development teams that Aaron has worked with, how a security [...]</itunes:subtitle>
		<itunes:summary>On the 97th episode of the Silver Bullet Security Podcast, Gary chats with Aaron Bedra, Senior Manager of Application Security at Groupon. Gary and Aaron discuss how security is viewed by development teams that Aaron has worked with, how a security person could transition into software security, the importance of developing a security culture, type safety and closure in programming, and the most recent non-fiction book that Aaron&#8217;s read.

AaronBedra.com
Aaron at LinkedIn
Aaron at Github
@abedra at Twitter
Aaron at Google+
Aaron Bedra &#8211; clojure.web/with-security
Closure in programming languages
Dynamic languages

The post The Development Side of Software Security with Aaron Bedra appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Development Side of Software Security with Aaron Bedra appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Developer, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 096 &#8211; An Interview with Nate Fick</title>
		<link>https://www.cigital.com/podcasts/show-096/</link>
		<pubDate>Tue, 01 Apr 2014 01:00:39 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cyber war]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-096/</guid>
		<description><![CDATA[<p>On the 96th episode of the Silver Bullet Security Podcast, Gary talks with Nate Fick, CEO of Endgame. Gary and Nate discuss the use of the term &#8220;cyber war&#8221; from the perspective of an ex-Marine, Nate&#8217;s time at the Center for a New American Security, the Estonia DDOS attack, and how Nate has turned around &#8230; <a href="https://www.cigital.com/podcasts/show-096/" class="more-link">Continue reading <span class="screen-reader-text">Show 096 &#8211; An Interview with Nate Fick</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-096/">Show 096 &#8211; An Interview with Nate Fick</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Nate Fick" src="https://www.cigital.com/wp-content/uploads/2015/06/nfick-125.png" alt="Nate Fick" align="right" /></p>
<p>On the 96th episode of the Silver Bullet Security Podcast, Gary talks with Nate Fick, CEO of Endgame. Gary and Nate discuss the use of the term &#8220;cyber war&#8221; from the perspective of an ex-Marine, Nate&#8217;s time at the Center for a New American Security, the Estonia DDOS attack, and how Nate has turned around the perception of End Game. They close out their chat with some Leukemia cup smack talking.</p>
<ul>
<li><a href="http://www.endgame.com/mgmt/nathaniel-fick.html">Nathanial Fick @ Endgame</a></li>
<li><a href="http://www.cnas.org/people/board-of-directors/nathaniel-c-fick">Nathanial Fick @ CNAS</a></li>
<li><a href="http://www.amazon.com/One-Bullet-Away-Making-Officer/dp/0618773436/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1395428070&amp;sr=1-1&amp;keywords=one+bullet+away"><em>One Bullet Away</em></a></li>
<li><a href="https://www.cigital.com/papers/download/mcgraw-fick-CNAS.pdf">Separating the Threat from the Hype: What Washington Needs to Know About Cyber Security in AMERICA&#8217;S CYBER FUTURE: SECURITY AND PROSPERITY IN THE INFORMATION AGE VOLUMES I AND II</a>, Center for a New Amercian Security (June 2011, PDF).</li>
<li><a href="http://www.poetryfoundation.org/bio/nathaniel-fick">Nathanial Fick @ Poetry Foundation</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-096/">Show 096 &#8211; An Interview with Nate Fick</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2797/0/silverbullet-096.mp3" length="50030592" type="audio/mpeg" />
		<itunes:duration>0:34:37</itunes:duration>
		<itunes:subtitle>
On the 96th episode of the Silver Bullet Security Podcast, Gary talks with Nate Fick, CEO of Endgame. Gary and Nate discuss the use of the term &#8220;cyber war&#8221; from the perspective of an ex-Marine, Nate&#8217;s time at the Center for a New [...]</itunes:subtitle>
		<itunes:summary>
On the 96th episode of the Silver Bullet Security Podcast, Gary talks with Nate Fick, CEO of Endgame. Gary and Nate discuss the use of the term &#8220;cyber war&#8221; from the perspective of an ex-Marine, Nate&#8217;s time at the Center for a New American Security, the Estonia DDOS attack, and how Nate has turned around the perception of End Game. They close out their chat with some Leukemia cup smack talking.

Nathanial Fick @ Endgame
Nathanial Fick @ CNAS
One Bullet Away
Separating the Threat from the Hype: What Washington Needs to Know About Cyber Security in AMERICA&#8217;S CYBER FUTURE: SECURITY AND PROSPERITY IN THE INFORMATION AGE VOLUMES I AND II, Center for a New Amercian Security (June 2011, PDF).
Nathanial Fick @ Poetry Foundation

The post Show 096 &#8211; An Interview with Nate Fick appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 096 &#8211; An Interview with Nate Fick appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 095 – An Interview with Charlie Miller</title>
		<link>https://www.cigital.com/podcasts/show-095/</link>
		<pubDate>Tue, 25 Feb 2014 03:12:07 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[design flaws]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[social media]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-095/</guid>
		<description><![CDATA[<p>On the 95th episode of the Silver Bullet Security Podcast, Gary talks with Charlie Miller, a computer security researcher with Twitter. They discuss Charlie&#8217;s history in finding security flaws in Apple products, hacking cars, and whether we&#8217;re past the bug whack-a-mole days. They close out their chat with Charlie&#8217;s official car hacking soundtrack. @0xcharlie Charlie &#8230; <a href="https://www.cigital.com/podcasts/show-095/" class="more-link">Continue reading <span class="screen-reader-text">Show 095 – An Interview with Charlie Miller</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-095/">Show 095 – An Interview with Charlie Miller</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Charlie Miller" src="https://www.cigital.com/wp-content/uploads/2015/06/cmiller-125.png" alt="Charlie Miller" align="right" /></p>
<p>On the 95th episode of the Silver Bullet Security Podcast, Gary talks with Charlie Miller, a computer security researcher with Twitter. They discuss Charlie&#8217;s history in finding security flaws in Apple products, hacking cars, and whether we&#8217;re past the bug whack-a-mole days. They close out their chat with Charlie&#8217;s official car hacking soundtrack.</p>
<ul>
<li><a href="https://twitter.com/0xcharlie">@0xcharlie</a></li>
<li><a href="http://en.wikipedia.org/wiki/Charlie_Miller_(security_researcher)">Charlie Miller</a> (Wikipedia)</li>
<li><a href="http://illmatics.com/car_hacking.pdf">Adventures in Automotive Networks and Control Units</a> [PDF]</li>
<li><a href="http://spectrum.ieee.org/riskfactor/telecom/security/us-gives-cybersecurity-advice-to-critical-infrastructure-operatorsbut-no-rules">U.S. Gives Cybersecurity Advice to Critical Infrastructure Operators—But No Rules</a></li>
<li><a href="https://threatpost.com/detecting-car-hacks/104190">Detecting Car Hacks</a></li>
<li><a href="http://www.youtube.com/watch?v=n70hIu9lcYo">DEF CON 21 &#8211; Charlie Miller and Chris Valasek &#8211; Adventures in Automotive Networks and Control Units</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-095/">Show 095 – An Interview with Charlie Miller</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2795/0/silverbullet-095.mp3" length="45781120" type="audio/mpeg" />
		<itunes:duration>0:31:40</itunes:duration>
		<itunes:subtitle>
On the 95th episode of the Silver Bullet Security Podcast, Gary talks with Charlie Miller, a computer security researcher with Twitter. They discuss Charlie&#8217;s history in finding security flaws in Apple products, hacking cars, and whether we[...]</itunes:subtitle>
		<itunes:summary>
On the 95th episode of the Silver Bullet Security Podcast, Gary talks with Charlie Miller, a computer security researcher with Twitter. They discuss Charlie&#8217;s history in finding security flaws in Apple products, hacking cars, and whether we&#8217;re past the bug whack-a-mole days. They close out their chat with Charlie&#8217;s official car hacking soundtrack.

@0xcharlie
Charlie Miller (Wikipedia)
Adventures in Automotive Networks and Control Units [PDF]
U.S. Gives Cybersecurity Advice to Critical Infrastructure Operators—But No Rules
Detecting Car Hacks
DEF CON 21 &#8211; Charlie Miller and Chris Valasek &#8211; Adventures in Automotive Networks and Control Units

The post Show 095 – An Interview with Charlie Miller appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 095 – An Interview with Charlie Miller appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 094 – An Interview with Ming Chow</title>
		<link>https://www.cigital.com/podcasts/show-094/</link>
		<pubDate>Fri, 31 Jan 2014 22:21:30 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Developer]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[software development]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-094/</guid>
		<description><![CDATA[<p>On the 94th episode of the Silver Bullet Security Podcast, Gary chats with Ming Chow, lecturer at Tufts University School of Engineering&#8217;s Department of Computer Science. Gary and Ming discuss whether it&#8217;s better to start with security people or people that know how to code already when building new software security professionals. They also talk &#8230; <a href="https://www.cigital.com/podcasts/show-094/" class="more-link">Continue reading <span class="screen-reader-text">Show 094 – An Interview with Ming Chow</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-094/">Show 094 – An Interview with Ming Chow</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Ming Chow" src="https://www.cigital.com/wp-content/uploads/2015/06/mchow-125.png" alt="Ming Chow" align="right" /></p>
<p>On the 94th episode of the Silver Bullet Security Podcast, Gary chats with Ming Chow, lecturer at Tufts University School of Engineering&#8217;s Department of Computer Science. Gary and Ming discuss whether it&#8217;s better to start with security people or people that know how to code already when building new software security professionals. They also talk about what developers currently think of software security, what would make developers more likely to take security seriously, how Ming uses games to teach security to his students. They close out their chat with talk of obscure and not-so-obscure music.</p>
<ul>
<li><a href="http://www.cs.tufts.edu/Faculty/ming-chow.html">Ming Chow</a></li>
<li><a href="http://en.wikipedia.org/wiki/Falling_into_You"><em>Falling Into You</em></a></li>
<li><a href="http://mchow01.github.io/">Ming on Github</a></li>
<li><a href="https://twitter.com/0xmchow">Ming on Twitter</a></li>
<li><a href="http://exploitingonlinegames.com/"><em>Exploiting Online Games</em></a></li>
<li><a href="https://www.cigital.com/papers/download/EOG-sandp-gem.pdf">Securing Online Games</a> (jointly authored) [PDF]</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-094/">Show 094 – An Interview with Ming Chow</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2799/0/silverbullet-094.mp3" length="48087168" type="audio/mpeg" />
		<itunes:duration>0:33:16</itunes:duration>
		<itunes:subtitle>
On the 94th episode of the Silver Bullet Security Podcast, Gary chats with Ming Chow, lecturer at Tufts University School of Engineering&#8217;s Department of Computer Science. Gary and Ming discuss whether it&#8217;s better to start with security [...]</itunes:subtitle>
		<itunes:summary>
On the 94th episode of the Silver Bullet Security Podcast, Gary chats with Ming Chow, lecturer at Tufts University School of Engineering&#8217;s Department of Computer Science. Gary and Ming discuss whether it&#8217;s better to start with security people or people that know how to code already when building new software security professionals. They also talk about what developers currently think of software security, what would make developers more likely to take security seriously, how Ming uses games to teach security to his students. They close out their chat with talk of obscure and not-so-obscure music.

Ming Chow
Falling Into You
Ming on Github
Ming on Twitter
Exploiting Online Games
Securing Online Games (jointly authored) [PDF]

The post Show 094 – An Interview with Ming Chow appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 094 – An Interview with Ming Chow appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Developer, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 093 – An Interview with Yoshi Kohno</title>
		<link>https://www.cigital.com/podcasts/show-093/</link>
		<pubDate>Tue, 24 Dec 2013 19:34:12 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Architecture Analysis]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-093/</guid>
		<description><![CDATA[<p>On the 93rd episode of the Silver Bullet Security Podcast, Gary chats with Yoshi Kohno, Associate Professor of Computer Science and Engineering at the University of Washington. Gary and Yoshi discuss how much impact academic security impacts commercial security, car hacking, whether it&#8217;s possible to get the media to cover good software security, and helping &#8230; <a href="https://www.cigital.com/podcasts/show-093/" class="more-link">Continue reading <span class="screen-reader-text">Show 093 – An Interview with Yoshi Kohno</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-093/">Show 093 – An Interview with Yoshi Kohno</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Yoshi Kohno" src="https://www.cigital.com/wp-content/uploads/2015/06/ykohno-125.png" alt="Yoshi Kohno" align="right" /></p>
<p>On the 93rd episode of the Silver Bullet Security Podcast, Gary chats with Yoshi Kohno, Associate Professor of Computer Science and Engineering at the University of Washington. Gary and Yoshi discuss how much impact academic security impacts commercial security, car hacking, whether it&#8217;s possible to get the media to cover good software security, and helping consumers understand privacy implications of popular products&#8217; security designs. They close out their discussion with a McGraw family secret about <em>The Night Before Christmas</em>.</p>
<ul>
<li><a href="http://homes.cs.washington.edu/~yoshi/">Tadayoshi Kohno (Yoshi Kohno)</a> at the University of Washington</li>
<li><a href="https://twitter.com/yoshi_kohno">@yoshi_kohno</a></li>
<li><a href="http://www.pbs.org/wgbh/nova/tech/tadayoshi-kohno.html">Profile: Tadayoshi Kohno</a>, NOVA scienceNOW</li>
<li><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/19/heres-the-scariest-part-about-the-internet-of-things">Here’s the scariest part about the Internet of Things</a>, <em>Washington Post</em></li>
<li><a href="http://homes.cs.washington.edu/~aczeskis/research/pubs/UW-CSE-13-08-02.PDF">DeadDrop/Strongbox Security Assessment</a> [pdf]</li>
<li><a href="http://www.securingjava.com/chapter-eight/">Java Card Security: How Smart Cards and Java Mix</a>, from <em>Securing Java</em></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-093/">Show 093 – An Interview with Yoshi Kohno</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2801/0/silverbullet-093.mp3" length="51331200" type="audio/mpeg" />
		<itunes:duration>0:35:31</itunes:duration>
		<itunes:subtitle>
On the 93rd episode of the Silver Bullet Security Podcast, Gary chats with Yoshi Kohno, Associate Professor of Computer Science and Engineering at the University of Washington. Gary and Yoshi discuss how much impact academic security impacts commer[...]</itunes:subtitle>
		<itunes:summary>
On the 93rd episode of the Silver Bullet Security Podcast, Gary chats with Yoshi Kohno, Associate Professor of Computer Science and Engineering at the University of Washington. Gary and Yoshi discuss how much impact academic security impacts commercial security, car hacking, whether it&#8217;s possible to get the media to cover good software security, and helping consumers understand privacy implications of popular products&#8217; security designs. They close out their discussion with a McGraw family secret about The Night Before Christmas.

Tadayoshi Kohno (Yoshi Kohno) at the University of Washington
@yoshi_kohno
Profile: Tadayoshi Kohno, NOVA scienceNOW
Here’s the scariest part about the Internet of Things, Washington Post
DeadDrop/Strongbox Security Assessment [pdf]
Java Card Security: How Smart Cards and Java Mix, from Securing Java

The post Show 093 – An Interview with Yoshi Kohno appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 093 – An Interview with Yoshi Kohno appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Early Days of Computing with Jon Callas</title>
		<link>https://www.cigital.com/podcasts/show-092-interview-jon-callas/</link>
		<pubDate>Wed, 27 Nov 2013 16:34:44 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Business Leader]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cryptography]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-092-interview-jon-callas/</guid>
		<description><![CDATA[<p>On the 92nd episode of the Silver Bullet Security Podcast, Gary chats with Jon Callas, Chief Technology Officer at Silent Circle and all around crypto freedom fighter. Gary and Jon talk about the early days of computing, insanely early computer security, nascent crypto, PGP, Lavabit, Snowden, and what Silent Circle is doing to make secure &#8230; <a href="https://www.cigital.com/podcasts/show-092-interview-jon-callas/" class="more-link">Continue reading <span class="screen-reader-text">The Early Days of Computing with Jon Callas</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-092-interview-jon-callas/">The Early Days of Computing with Jon Callas</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Jon Callas" src="https://www.cigital.com/wp-content/uploads/2015/06/Jon_Callas.png" alt="Jon Callas" align="right" /></p>
<p>On the 92nd episode of the Silver Bullet Security Podcast, Gary chats with Jon Callas, Chief Technology Officer at Silent Circle and all around crypto freedom fighter. Gary and Jon talk about the early days of computing, insanely early computer security, nascent crypto, PGP, Lavabit, Snowden, and what Silent Circle is doing to make secure comms actually work (rock on). Is that YOUR computer? They also chat briefly about software security and reality. Jon and Gary close out their discussion with some book talk.</p>
<ul>
<li><a href="http://en.wikipedia.org/wiki/ARPANET">ARPANET</a></li>
<li><a href="https://www.schneier.com/book-applied.html"><em>Applied Cryptography</em> by Bruce Schneier</a></li>
<li><a href="http://lavabit.com/">Lavabit</a></li>
<li><a href="https://silentcircle.com/">Silent Circle</a></li>
<li><a href="http://bsimm.com/">BSIMM-V</a></li>
<li><a href="http://en.wikipedia.org/wiki/Dandelion_Wine"><em>Dandelion Wine</em></a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-092-interview-jon-callas/">The Early Days of Computing with Jon Callas</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2734/0/silverbullet-092.mp3" length="54823040" type="audio/mpeg" />
		<itunes:duration>0:37:57</itunes:duration>
		<itunes:subtitle>
On the 92nd episode of the Silver Bullet Security Podcast, Gary chats with Jon Callas, Chief Technology Officer at Silent Circle and all around crypto freedom fighter. Gary and Jon talk about the early days of computing, insanely early computer sec[...]</itunes:subtitle>
		<itunes:summary>
On the 92nd episode of the Silver Bullet Security Podcast, Gary chats with Jon Callas, Chief Technology Officer at Silent Circle and all around crypto freedom fighter. Gary and Jon talk about the early days of computing, insanely early computer security, nascent crypto, PGP, Lavabit, Snowden, and what Silent Circle is doing to make secure comms actually work (rock on). Is that YOUR computer? They also chat briefly about software security and reality. Jon and Gary close out their discussion with some book talk.

ARPANET
Applied Cryptography by Bruce Schneier
Lavabit
Silent Circle
BSIMM-V
Dandelion Wine

The post The Early Days of Computing with Jon Callas appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Early Days of Computing with Jon Callas appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>A Breakdown of the BSIMM-V with Caroline Wong</title>
		<link>https://www.cigital.com/podcasts/show-091/</link>
		<pubDate>Wed, 30 Oct 2013 04:43:10 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Cigital leadership]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-091/</guid>
		<description><![CDATA[<p>On the 91st episode of the Silver Bullet Security Podcast, Gary talks with Caroline Wong, Cigital&#8217;s Director of Security Initiatives. Gary and Caroline discuss the newly-released BSIMM-V, the concept of &#8220;SSI (Software Security Initative) in a box,&#8221; the most successful metrics that Caroline has used throughout her career at eBay and other high-profile firms, and &#8230; <a href="https://www.cigital.com/podcasts/show-091/" class="more-link">Continue reading <span class="screen-reader-text">A Breakdown of the BSIMM-V with Caroline Wong</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-091/">A Breakdown of the BSIMM-V with Caroline Wong</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Caroline Wong" src="https://www.cigital.com/wp-content/uploads/2015/06/cwong-125.png" alt="Caroline Wong" align="right" /></p>
<p>On the 91st episode of the Silver Bullet Security Podcast, Gary talks with Caroline Wong, Cigital&#8217;s Director of Security Initiatives. Gary and Caroline discuss the newly-released BSIMM-V, the concept of &#8220;SSI (Software Security Initative) in a box,&#8221; the most successful metrics that Caroline has used throughout her career at eBay and other high-profile firms, and how to increase the number of women in computer science. They close out their discussion with talk of adult libations.</p>
<ul>
<li><a href="http://www.amazon.com/Security-Metrics-A-Beginners-Guide/dp/0071744002/ref=sr_sp-atf_title_1_1?ie=UTF8&amp;qid=1382450814&amp;sr=8-1&amp;keywords=caroline+wong"><em>Security Metrics: A Beginner’s Guide</em></a></li>
<li><a href="http://www.ewf-usa.com/">Executive Women’s Forum</a></li>
<li><a href="http://www.ewf-usa.com/?page=CSSC">Cyber Security School Challenge</a></li>
<li><a href="http://bsimm.com/">BSIMM-V</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-091/">A Breakdown of the BSIMM-V with Caroline Wong</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2732/0/silverbullet-091.mp3" length="48105600" type="audio/mpeg" />
		<itunes:duration>0:33:16</itunes:duration>
		<itunes:subtitle>
On the 91st episode of the Silver Bullet Security Podcast, Gary talks with Caroline Wong, Cigital&#8217;s Director of Security Initiatives. Gary and Caroline discuss the newly-released BSIMM-V, the concept of &#8220;SSI (Software Security Initative[...]</itunes:subtitle>
		<itunes:summary>
On the 91st episode of the Silver Bullet Security Podcast, Gary talks with Caroline Wong, Cigital&#8217;s Director of Security Initiatives. Gary and Caroline discuss the newly-released BSIMM-V, the concept of &#8220;SSI (Software Security Initative) in a box,&#8221; the most successful metrics that Caroline has used throughout her career at eBay and other high-profile firms, and how to increase the number of women in computer science. They close out their discussion with talk of adult libations.

Security Metrics: A Beginner’s Guide
Executive Women’s Forum
Cyber Security School Challenge
BSIMM-V

The post A Breakdown of the BSIMM-V with Caroline Wong appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post A Breakdown of the BSIMM-V with Caroline Wong appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Cryptography compared with Matthew Green</title>
		<link>https://www.cigital.com/podcasts/show-090/</link>
		<pubDate>Tue, 01 Oct 2013 02:39:00 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Developer]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[software development]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-090/</guid>
		<description><![CDATA[<p>On the 90th episode of the Silver Bullet Security Podcast, Gary talks with Matthew Green, Assistant Research Professor at the Johns Hopkins Information Security Institute. Gary and Matt discuss the difference between theoretical cryptography and applied cryptography, the &#8220;On the NSA&#8221; blog post takedown scare, and the allegedly &#8216;backdoored&#8217; Dual_EC_DRBG RSA/EMC random number generator. Gary &#8230; <a href="https://www.cigital.com/podcasts/show-090/" class="more-link">Continue reading <span class="screen-reader-text">Cryptography compared with Matthew Green</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-090/">Cryptography compared with Matthew Green</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Matthew Green" src="https://www.cigital.com/wp-content/uploads/2015/06/mgreen-125.png" alt="Matthew Green" align="right" /></p>
<p>On the 90th episode of the Silver Bullet Security Podcast, Gary talks with Matthew Green, Assistant Research Professor at the Johns Hopkins Information Security Institute. Gary and Matt discuss the difference between theoretical cryptography and applied cryptography, the &#8220;On the NSA&#8221; blog post takedown scare, and the allegedly &#8216;backdoored&#8217; Dual_EC_DRBG RSA/EMC random number generator. Gary ends by asking Matthew the same question he asked Avi Rubin back on the first episode.</p>
<ul>
<li><a href="http://spar.isi.jhu.edu/~mgreen">Matthew D. Green</a></li>
<li><a href="http://blog.cryptographyengineering.com/">A Few Thoughts on Cryptographic Engineering</a> (Matthew&#8217;s blog)</li>
<li><a href="http://blog.cryptographyengineering.com/2013/09/on-nsa.html">On the NSA</a></li>
<li><a href="http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html">RSA warns developers not to use RSA products</a></li>
<li><a href="http://bit.ly/1b2f5Zk">Software [in]security &#8212; software flaws in application architecture</a> (September 10, 2013)</li>
<li><a href=" https://www.cigital.com/podcasts/show-001/" target="_blank">Silver Bullet 001: Avi Rubin</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-090/">Cryptography compared with Matthew Green</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2730/0/silverbullet-090.mp3" length="38133888" type="audio/mpeg" />
		<itunes:duration>0:26:21</itunes:duration>
		<itunes:subtitle>
On the 90th episode of the Silver Bullet Security Podcast, Gary talks with Matthew Green, Assistant Research Professor at the Johns Hopkins Information Security Institute. Gary and Matt discuss the difference between theoretical cryptography and ap[...]</itunes:subtitle>
		<itunes:summary>
On the 90th episode of the Silver Bullet Security Podcast, Gary talks with Matthew Green, Assistant Research Professor at the Johns Hopkins Information Security Institute. Gary and Matt discuss the difference between theoretical cryptography and applied cryptography, the &#8220;On the NSA&#8221; blog post takedown scare, and the allegedly &#8216;backdoored&#8217; Dual_EC_DRBG RSA/EMC random number generator. Gary ends by asking Matthew the same question he asked Avi Rubin back on the first episode.

Matthew D. Green
A Few Thoughts on Cryptographic Engineering (Matthew&#8217;s blog)
On the NSA
RSA warns developers not to use RSA products
Software [in]security &#8212; software flaws in application architecture (September 10, 2013)
Silver Bullet 001: Avi Rubin

The post Cryptography compared with Matthew Green appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Cryptography compared with Matthew Green appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Developer, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Academic vs. Corporate research with Michael Reiter</title>
		<link>https://www.cigital.com/podcasts/show-089/</link>
		<pubDate>Sun, 01 Sep 2013 00:07:18 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Training]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-089/</guid>
		<description><![CDATA[<p>On the 89th episode of the Silver Bullet Security Podcast, Gary chats with Mike Reiter, Lawrence M. Slifkin Distinguished Professor in the Department of Computer Science at the University of North Carolina at Chapel Hill. Gary and Mike discuss the differences and similarities between academic research and corporate research, the challenges of teaching computer security, &#8230; <a href="https://www.cigital.com/podcasts/show-089/" class="more-link">Continue reading <span class="screen-reader-text">Academic vs. Corporate research with Michael Reiter</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-089/">Academic vs. Corporate research with Michael Reiter</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Michael Reiter" src="https://www.cigital.com/wp-content/uploads/2015/06/mreiter-125.png" alt="Michael Reiter" align="right" /></p>
<p>On the 89th episode of the Silver Bullet Security Podcast, Gary chats with Mike Reiter, Lawrence M. Slifkin Distinguished Professor in the Department of Computer Science at the University of North Carolina at Chapel Hill. Gary and Mike discuss the differences and similarities between academic research and corporate research, the challenges of teaching computer security, and how to attract more women to the field of software security. They close out their discussion with some talk about mixed martial arts.</p>
<ul>
<li><a href="http://www.cs.unc.edu/~reiter/">Mike Reiter</a></li>
<li><a href="https://www.cigital.com/papers/download/09-11_Software0511.pdf">McGraw on technology transfer Technology Transfer: A Software Security Marketplace Case Study</a> (IEEE Software, September/October 2011)</li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1403996">McGraw on lessons learned when a startup eats your life Startup Lessons</a> (October 22, 2009)</li>
<li><a href="http://www.cs.unc.edu/">UNC Computer Science</a></li>
<li><a href="http://findbugs.sourceforge.net/">The FindBugs static analysis tool</a></li>
<li><a href="http://www.womenintechnology.org/">Women in Technology</a></li>
<li><a href="http://www.cs.unc.edu/~reiter/students.html">Mike&#8217;s Ph.D. Students</a></li>
<li><a href="http://www.amazon.com/s/ref=nb_sb_ss_i_1_8?url=search-alias%3Dstripbooks&amp;field-keywords=tc%20boyle%20books&amp;sprefix=TC+Boyle%2Cstripbooks%2C175">TC Boyle&#8217;s fiction</a></li>
<li><a href="http://www.amazon.com/Distributed-Computing-Fundamentals-Simulations-Advanced/dp/0471453242/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1377888583&amp;sr=1-1&amp;keywords=welch+distributed+systems">Attiya and Welch on Distributed Systems</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-089/">Academic vs. Corporate research with Michael Reiter</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2736/0/silverbullet-089.mp3" length="43075712" type="audio/mpeg" />
		<itunes:duration>0:29:47</itunes:duration>
		<itunes:subtitle>
On the 89th episode of the Silver Bullet Security Podcast, Gary chats with Mike Reiter, Lawrence M. Slifkin Distinguished Professor in the Department of Computer Science at the University of North Carolina at Chapel Hill. Gary and Mike discuss the [...]</itunes:subtitle>
		<itunes:summary>
On the 89th episode of the Silver Bullet Security Podcast, Gary chats with Mike Reiter, Lawrence M. Slifkin Distinguished Professor in the Department of Computer Science at the University of North Carolina at Chapel Hill. Gary and Mike discuss the differences and similarities between academic research and corporate research, the challenges of teaching computer security, and how to attract more women to the field of software security. They close out their discussion with some talk about mixed martial arts.

Mike Reiter
McGraw on technology transfer Technology Transfer: A Software Security Marketplace Case Study (IEEE Software, September/October 2011)
McGraw on lessons learned when a startup eats your life Startup Lessons (October 22, 2009)
UNC Computer Science
The FindBugs static analysis tool
Women in Technology
Mike&#8217;s Ph.D. Students
TC Boyle&#8217;s fiction
Attiya and Welch on Distributed Systems

The post Academic vs. Corporate research with Michael Reiter appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Academic vs. Corporate research with Michael Reiter appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Teaching Security Globally with Christian Collberg</title>
		<link>https://www.cigital.com/podcasts/show-088/</link>
		<pubDate>Wed, 31 Jul 2013 20:02:18 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Mobile Application Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Training]]></category>
		<category><![CDATA[mobile]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-088/</guid>
		<description><![CDATA[<p>On the 88th episode of the Silver Bullet Security Podcast, Gary talks with Christian Collberg, Ph.D., Associate Professor of Computer Science at the University of Arizona. Gary and Christian discuss what drew Christian to teaching Computer Security in the United States after living in several other countries, Christian&#8217;s book Surreptitious Software, Christian&#8217;s opinions on products &#8230; <a href="https://www.cigital.com/podcasts/show-088/" class="more-link">Continue reading <span class="screen-reader-text">Teaching Security Globally with Christian Collberg</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-088/">Teaching Security Globally with Christian Collberg</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Christian Collberg" src="https://www.cigital.com/wp-content/uploads/2015/06/ccollberg-125.png" alt="Christian Collberg" align="right" /></p>
<p>On the 88th episode of the Silver Bullet Security Podcast, Gary talks with Christian Collberg, Ph.D., Associate Professor of Computer Science at the University of Arizona. Gary and Christian discuss what drew Christian to teaching Computer Security in the United States after living in several other countries, Christian&#8217;s book <em>Surreptitious Software</em>, Christian&#8217;s opinions on products that purport to offer software protection on mobile devices, and whether software security students should be taught to think like an attacker. They close out their talk with discussion of travel on planet Earth.</p>
<ul>
<li><a href="http://www.cs.arizona.edu/~collberg/">Christian Collberg</a></li>
<li><em><a href="http://www.amazon.com/Surreptitious-Software-Obfuscation-Watermarking-Tamperproofing/dp/0321549252">Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection</a></em></li>
<li><a href="http://buildingsecurityin.com">AWL Software Security Security Series</a> (edited by Gary McGraw)</li>
<li><a href="http://en.wikipedia.org/wiki/Hainan_Island_incident">China Forces down US Spy Plane (2001) </a></li>
<li><a href="http://exploitingsoftware.com"><em>Exploiting Software</em></a> (thinking like an attacker)</li>
<li><a href="http://www.cs.arizona.edu/~kobourov/undecidables.html">The Undecidables</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-088/">Teaching Security Globally with Christian Collberg</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2738/0/silverbullet-088.mp3" length="30843008" type="audio/mpeg" />
		<itunes:duration>0:21:17</itunes:duration>
		<itunes:subtitle>
On the 88th episode of the Silver Bullet Security Podcast, Gary talks with Christian Collberg, Ph.D., Associate Professor of Computer Science at the University of Arizona. Gary and Christian discuss what drew Christian to teaching Computer Security[...]</itunes:subtitle>
		<itunes:summary>
On the 88th episode of the Silver Bullet Security Podcast, Gary talks with Christian Collberg, Ph.D., Associate Professor of Computer Science at the University of Arizona. Gary and Christian discuss what drew Christian to teaching Computer Security in the United States after living in several other countries, Christian&#8217;s book Surreptitious Software, Christian&#8217;s opinions on products that purport to offer software protection on mobile devices, and whether software security students should be taught to think like an attacker. They close out their talk with discussion of travel on planet Earth.

Christian Collberg
Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection
AWL Software Security Security Series (edited by Gary McGraw)
China Forces down US Spy Plane (2001) 
Exploiting Software (thinking like an attacker)
The Undecidables

The post Teaching Security Globally with Christian Collberg appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Teaching Security Globally with Christian Collberg appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Progression of Software Security with James Walden</title>
		<link>https://www.cigital.com/podcasts/show-087/</link>
		<pubDate>Sun, 30 Jun 2013 20:16:24 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Defects, Bugs, and Flaws]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Security Training]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security metrics]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-087/</guid>
		<description><![CDATA[<p>On the 87th episode of the Silver Bullet Security Podcast, Gary chats with James Walden, Ph.D., Associate Professor of Computer Science at Northern Kentucky University. Gary and James discuss the progress being made in the field of software security, why there are plenty of top N lists for bugs but none for flaws, the difficulties &#8230; <a href="https://www.cigital.com/podcasts/show-087/" class="more-link">Continue reading <span class="screen-reader-text">Progression of Software Security with James Walden</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-087/">Progression of Software Security with James Walden</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="James Walden" src="https://www.cigital.com/wp-content/uploads/2015/06/jwalden-125.png" alt="James Walden" align="right" /></p>
<p>On the 87th episode of the Silver Bullet Security Podcast, Gary chats with James Walden, Ph.D., Associate Professor of Computer Science at Northern Kentucky University. Gary and James discuss the progress being made in the field of software security, why there are plenty of top N lists for bugs but none for flaws, the difficulties of teaching how to fix code, the current generation&#8217;s outlook on privacy, and security metrics and measurement.</p>
<ul>
<li><a href="http://faculty.cs.nku.edu/~waldenj/">James Walden, Ph.D.</a></li>
<li><a href="http://swsec.com"><em>Software Security</em></a></li>
<li><a href="http://bsimm.com/">BSIMM</a></li>
<li><a href="http://www.amazon.com/Random-Access-Memories-Daft-Punk/dp/B00C061I3K/ref=sr_1_1?s=music&amp;ie=UTF8&amp;qid=1371741535&amp;sr=1-1&amp;keywords=daft+punk">Daft Punk</a></li>
<li><a href="http://www.amazon.com/Trouble-Will-Find-Me-National/dp/B00BYISQTO/ref=sr_1_1?s=music&amp;ie=UTF8&amp;qid=1371741554&amp;sr=1-1&amp;keywords=the+national">The National</a></li>
<li><a href="http://www.amazon.com/Sun-Cat-Power/dp/B008CDPRIC/ref=sr_1_1?s=music&amp;ie=UTF8&amp;qid=1371741571&amp;sr=1-1&amp;keywords=cat+power">Cat Power</a></li>
<li><a href="http://www.dreamtheater.net/">Dream Theater</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-087/">Progression of Software Security with James Walden</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2741/0/silverbullet-087.mp3" length="41750656" type="audio/mpeg" />
		<itunes:duration>0:28:51</itunes:duration>
		<itunes:subtitle>
On the 87th episode of the Silver Bullet Security Podcast, Gary chats with James Walden, Ph.D., Associate Professor of Computer Science at Northern Kentucky University. Gary and James discuss the progress being made in the field of software securit[...]</itunes:subtitle>
		<itunes:summary>
On the 87th episode of the Silver Bullet Security Podcast, Gary chats with James Walden, Ph.D., Associate Professor of Computer Science at Northern Kentucky University. Gary and James discuss the progress being made in the field of software security, why there are plenty of top N lists for bugs but none for flaws, the difficulties of teaching how to fix code, the current generation&#8217;s outlook on privacy, and security metrics and measurement.

James Walden, Ph.D.
Software Security
BSIMM
Daft Punk
The National
Cat Power
Dream Theater

The post Progression of Software Security with James Walden appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Progression of Software Security with James Walden appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Technical Culture across the Pacific with Wenyuan Xu</title>
		<link>https://www.cigital.com/podcasts/show-086/</link>
		<pubDate>Fri, 31 May 2013 12:32:22 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Training]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-086/</guid>
		<description><![CDATA[<p>On the 86th episode of the Silver Bullet Security Podcast, Gary chats with Wenyuan Xu, Associate Professor in the Department of Computer Science and Engineering at the University of South Carolina. Gary and Wenyuan discuss the differences between American and Chinese technical culture, Wenyuan&#8217;s work on automatic meter reading systems, whether electrical engineering is more &#8230; <a href="https://www.cigital.com/podcasts/show-086/" class="more-link">Continue reading <span class="screen-reader-text">Technical Culture across the Pacific with Wenyuan Xu</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-086/">Technical Culture across the Pacific with Wenyuan Xu</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Wenyuan Xu" src="https://www.cigital.com/wp-content/uploads/2015/06/wxu-1251.png" alt="Wenyuan Xu" align="right" /></p>
<p>On the 86th episode of the Silver Bullet Security Podcast, Gary chats with Wenyuan Xu, Associate Professor in the Department of Computer Science and Engineering at the University of South Carolina. Gary and Wenyuan discuss the differences between American and Chinese technical culture, Wenyuan&#8217;s work on automatic meter reading systems, whether electrical engineering is more advanced in terms of design than computer science, and why there are so few women in engineering and computer science. They close out the episode with a discussion of tailgating.</p>
<ul>
<li><a href="http://www.cse.sc.edu/~wyxu">Wenyuan Xu</a></li>
<li><a href="http://www.datelinecarolina.org/story/17004323/hijacking-cars-is-a-thing-of-the-past-now-theyre-being-hacked-wirelessly">Car tires contain technology making you vulnerable</a></li>
<li><a href="http://www.youtube.com/watch?v=lxElFerHK0I">Security and Privacy Vulnerabilities of In-Car Wireless Networks</a></li>
<li><a href="http://www.technologyreview.com/news/429587/another-reason-for-smart-electric-meters/">Another Reason for &#8220;Smart&#8221; Electric Meters</a></li>
<li><a href="http://www.redorbit.com/news/health/1112850020/pacemakers-can-be-hacked-051713/">Pacemakers Could Be Hacked, Researchers Claim, But Not Easily</a></li>
<li><a href="http://www.amazon.com/Barbie-Can-Computer-Engineer-Doll/dp/B0042ESG9W">Barbie I Can Be Computer Engineer Barbie Doll</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-086/">Technical Culture across the Pacific with Wenyuan Xu</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2743/0/silverbullet-086.mp3" length="500" type="audio/mpeg" />
		<itunes:duration>0:26:36</itunes:duration>
		<itunes:subtitle>
On the 86th episode of the Silver Bullet Security Podcast, Gary chats with Wenyuan Xu, Associate Professor in the Department of Computer Science and Engineering at the University of South Carolina. Gary and Wenyuan discuss the differences between A[...]</itunes:subtitle>
		<itunes:summary>
On the 86th episode of the Silver Bullet Security Podcast, Gary chats with Wenyuan Xu, Associate Professor in the Department of Computer Science and Engineering at the University of South Carolina. Gary and Wenyuan discuss the differences between American and Chinese technical culture, Wenyuan&#8217;s work on automatic meter reading systems, whether electrical engineering is more advanced in terms of design than computer science, and why there are so few women in engineering and computer science. They close out the episode with a discussion of tailgating.

Wenyuan Xu
Car tires contain technology making you vulnerable
Security and Privacy Vulnerabilities of In-Car Wireless Networks
Another Reason for &#8220;Smart&#8221; Electric Meters
Pacemakers Could Be Hacked, Researchers Claim, But Not Easily
Barbie I Can Be Computer Engineer Barbie Doll

The post Technical Culture across the Pacific with Wenyuan Xu appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Technical Culture across the Pacific with Wenyuan Xu appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 085 &#8211; A Discussion with Jim Routh and Scott Matsumoto</title>
		<link>https://www.cigital.com/podcasts/show-085/</link>
		<pubDate>Tue, 30 Apr 2013 16:00:29 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Business Leader]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[Financial Services]]></category>
		<category><![CDATA[Mobile Application Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Web Application Security]]></category>
		<category><![CDATA[mobile]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-085/</guid>
		<description><![CDATA[<p>The 85th episode of the Silver Bullet Security Podcast is a double whammy. Gary talks mobile security with two guests &#8212;Jim Routh, former global head of application security at JP Morgan Chase (and newly-appointed CSO), and Scott Matusmoto, Principal Consultant and head of the mobile security practice at Cigital. All three discuss the challenges of &#8230; <a href="https://www.cigital.com/podcasts/show-085/" class="more-link">Continue reading <span class="screen-reader-text">Show 085 &#8211; A Discussion with Jim Routh and Scott Matsumoto</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-085/">Show 085 &#8211; A Discussion with Jim Routh and Scott Matsumoto</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>The 85th episode of the Silver Bullet Security Podcast is a double whammy. Gary talks mobile security with two guests &#8212;Jim Routh, former global head of application security at JP Morgan Chase (and newly-appointed CSO), and Scott Matusmoto, Principal Consultant and head of the mobile security practice at Cigital. All three discuss the challenges of mobile security and how these challenges are exactly the same as and utterly different than software security concerns from across the years. They discuss use of new technologies including accelerometers in enhancing security (or compromising privacy), and the effect that massive phone rooting has on security. Is mobile security the same old same old or a brand new day? Listen to this podcast and find out for yourself.</p>
<ul>
<li><a href="http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html">Trusted Computing and Computational Liberty</a></li>
<li><a href="https://www.cigital.com/blog/mobile-different-or-same-sht-different-day/" target="_blank">John Steven on Mobile Security</a></li>
<li><a href="http://www.securingjava.com/"><em>Securing Java</em> (dancing pigs and native code risk)</a></li>
<li><a href="http://www.exploitingonlinegames.com/"><em>Exploiting Online Games</em></a></li>
<li><a href="http://searchsecurity.techtarget.com/opinion/McGraws-mobile-app-security-strategy-Three-legs-of-trusted-on-busted">Trusted on Busted</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-085/">Show 085 &#8211; A Discussion with Jim Routh and Scott Matsumoto</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2817/0/silverbullet-085.mp3" length="52052096" type="audio/mpeg" />
		<itunes:duration>0:36:01</itunes:duration>
		<itunes:subtitle>The 85th episode of the Silver Bullet Security Podcast is a double whammy. Gary talks mobile security with two guests &#8212;Jim Routh, former global head of application security at JP Morgan Chase (and newly-appointed CSO), and Scott Matusmoto, Pri[...]</itunes:subtitle>
		<itunes:summary>The 85th episode of the Silver Bullet Security Podcast is a double whammy. Gary talks mobile security with two guests &#8212;Jim Routh, former global head of application security at JP Morgan Chase (and newly-appointed CSO), and Scott Matusmoto, Principal Consultant and head of the mobile security practice at Cigital. All three discuss the challenges of mobile security and how these challenges are exactly the same as and utterly different than software security concerns from across the years. They discuss use of new technologies including accelerometers in enhancing security (or compromising privacy), and the effect that massive phone rooting has on security. Is mobile security the same old same old or a brand new day? Listen to this podcast and find out for yourself.

Trusted Computing and Computational Liberty
John Steven on Mobile Security
Securing Java (dancing pigs and native code risk)
Exploiting Online Games
Trusted on Busted

The post Show 085 &#8211; A Discussion with Jim Routh and Scott Matsumoto appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 085 &#8211; A Discussion with Jim Routh and Scott Matsumoto appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>CISO, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Learning Science in the Country with Hord Tipton</title>
		<link>https://www.cigital.com/podcasts/show-084/</link>
		<pubDate>Mon, 01 Apr 2013 00:00:58 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Podcast]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-084/</guid>
		<description><![CDATA[<p>On the 84th episode of the Silver Bullet Security Podcast, Gary chats with W. Hord Tipton, Executive Director of (ISC)2. Gary and Hord discuss how one gets into science and engineering when growing up in rural Tennessee, what insight being nuclear and chemical engineer gives Hord about modern control systems, whether or not certification can &#8230; <a href="https://www.cigital.com/podcasts/show-084/" class="more-link">Continue reading <span class="screen-reader-text">Learning Science in the Country with Hord Tipton</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-084/">Learning Science in the Country with Hord Tipton</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Mark Graff" alt="Mark Graff" src="https://www.cigital.com/wp-content/uploads/2015/06/whtipton-125.png" align="right" /></p>
<p>On the 84th episode of the Silver Bullet Security Podcast, Gary chats with W. Hord Tipton, Executive Director of (ISC)<sup>2</sup>. Gary and Hord discuss how one gets into science and engineering when growing up in rural Tennessee, what insight being nuclear and chemical engineer gives Hord about modern control systems, whether or not certification can help advance software security, and the benefits of teaching software security to kids.</p>
<ul>
<li><a href="https://www.isc2.org/">(ISC)<sup>2</sup></a></li>
<li><a href="https://www.isc2.org/management-team.aspx">(ISC)</sup>2</sup> management team</a></li>
<li><a href="http://www.amazon.com/World-Flat-3-0-History-Twenty-first/dp/0312425074/"><em>The World Is Flat 3.0: A Brief History of the Twenty-first Century</em> by Thomas L. Friedman</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-084/">Learning Science in the Country with Hord Tipton</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2745/0/silverbullet-084.mp3" length="54077568" type="audio/mpeg" />
		<itunes:duration>0:37:25</itunes:duration>
		<itunes:subtitle>
On the 84th episode of the Silver Bullet Security Podcast, Gary chats with W. Hord Tipton, Executive Director of (ISC)2. Gary and Hord discuss how one gets into science and engineering when growing up in rural Tennessee, what insight being nuclear [...]</itunes:subtitle>
		<itunes:summary>
On the 84th episode of the Silver Bullet Security Podcast, Gary chats with W. Hord Tipton, Executive Director of (ISC)2. Gary and Hord discuss how one gets into science and engineering when growing up in rural Tennessee, what insight being nuclear and chemical engineer gives Hord about modern control systems, whether or not certification can help advance software security, and the benefits of teaching software security to kids.

(ISC)2
(ISC)2 management team
The World Is Flat 3.0: A Brief History of the Twenty-first Century by Thomas L. Friedman

The post Learning Science in the Country with Hord Tipton appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Learning Science in the Country with Hord Tipton appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 083 &#8211; An Interview with Mark Graff</title>
		<link>https://www.cigital.com/podcasts/show-083/</link>
		<pubDate>Thu, 28 Feb 2013 20:02:51 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Financial Services]]></category>
		<category><![CDATA[Podcast]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-083/</guid>
		<description><![CDATA[<p>On the 83rd episode of the Silver Bullet Security Podcast, Gary talks with Mark Graff, CISO at NASDAQ OMX. Gary and Mark discuss what exactly a CISO does all day, how corporate security posture at NASDAQ compares to the security posture at Lawrence Livermore National Laboratory, Enrico Fermi and the piano tuners (the &#8220;Fermi problem&#8221;) &#8230; <a href="https://www.cigital.com/podcasts/show-083/" class="more-link">Continue reading <span class="screen-reader-text">Show 083 &#8211; An Interview with Mark Graff</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-083/">Show 083 &#8211; An Interview with Mark Graff</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Mark Graff" src="https://www.cigital.com/wp-content/uploads/2015/06/mgraff-125.png" alt="Mark Graff" align="right" /></p>
<p>On the 83rd episode of the Silver Bullet Security Podcast, Gary talks with Mark Graff, CISO at NASDAQ OMX. Gary and Mark discuss what exactly a CISO does all day, how corporate security posture at NASDAQ compares to the security posture at Lawrence Livermore National Laboratory, Enrico Fermi and the piano tuners (the &#8220;Fermi problem&#8221;) and how it relates to estimation, and the most surprising cultural difference between the left and right coasts. They close out their conversation with talk about Mark&#8217;s favorite poem from the mid-19th century (and yet it still has a software security connection!).</p>
<ul>
<li><a href="http://www.nasdaqomx.com/">NASDAQ OMX</a></li>
<li><a href="https://www.llnl.gov/">Lawrence Livermore National Laboratory</a></li>
<li><a href="http://www.nasdaqomx.com/digitalAssets/83/83581_testimonyfsccybersecurity06012012.pdf">Congressional testimopny</a> (<a href="http://www.c-spanvideo.org/markgraff">video</a>)</li>
<li><a href="http://www.amazon.com/Secure-Coding-Principles-Mark-Graff/dp/0596002424"><em>Secure Coding: Principles and Practices</em></a></li>
<li><a href="http://bsimm.com">BSIMM</a></li>
<li><a href="https://www.youtube.com/watch?v=m8OXdEC0kpo">Video from LLNL</a></li>
<li><a href="http://en.wikipedia.org/wiki/Fermi_problem">Fermi problem</a></li>
<li><a href="https://www.cigital.com/blog/active-defense-is-irresponsible/">Cyber War and Active Defense</a></li>
<li><a href="http://www.eecs.harvard.edu/~keith/poems/dover.html">Dover Beach</a> (poem)</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-083/">Show 083 &#8211; An Interview with Mark Graff</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2821/0/silverbullet-083.mp3" length="53530752" type="audio/mpeg" />
		<itunes:duration>0:37:02</itunes:duration>
		<itunes:subtitle>
On the 83rd episode of the Silver Bullet Security Podcast, Gary talks with Mark Graff, CISO at NASDAQ OMX. Gary and Mark discuss what exactly a CISO does all day, how corporate security posture at NASDAQ compares to the security posture at Lawrence[...]</itunes:subtitle>
		<itunes:summary>
On the 83rd episode of the Silver Bullet Security Podcast, Gary talks with Mark Graff, CISO at NASDAQ OMX. Gary and Mark discuss what exactly a CISO does all day, how corporate security posture at NASDAQ compares to the security posture at Lawrence Livermore National Laboratory, Enrico Fermi and the piano tuners (the &#8220;Fermi problem&#8221;) and how it relates to estimation, and the most surprising cultural difference between the left and right coasts. They close out their conversation with talk about Mark&#8217;s favorite poem from the mid-19th century (and yet it still has a software security connection!).

NASDAQ OMX
Lawrence Livermore National Laboratory
Congressional testimopny (video)
Secure Coding: Principles and Practices
BSIMM
Video from LLNL
Fermi problem
Cyber War and Active Defense
Dover Beach (poem)

The post Show 083 &#8211; An Interview with Mark Graff appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 083 &#8211; An Interview with Mark Graff appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>CISO, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 082 &#8211; An Interview with Kevin Fu</title>
		<link>https://www.cigital.com/podcasts/show-082/</link>
		<pubDate>Fri, 18 Jan 2013 21:40:06 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Training]]></category>
		<category><![CDATA[medical devices]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-082/</guid>
		<description><![CDATA[<p>On the 82nd episode of the Silver Bullet Security Podcast, Gary talks with Kevin Fu, Associate Professor in the EECS Department at the University of Michigan. Gary and Kevin discuss finding advisors and picking a grad school, the security implications of embedded medical devices, malware in hospital systems, the consumer trend toward analyzing one&#8217;s own &#8230; <a href="https://www.cigital.com/podcasts/show-082/" class="more-link">Continue reading <span class="screen-reader-text">Show 082 &#8211; An Interview with Kevin Fu</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-082/">Show 082 &#8211; An Interview with Kevin Fu</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Kevin Fu" src="https://www.cigital.com/wp-content/uploads/2015/06/kfu-125.png" alt="Kevin Fu" align="right" /></p>
<p>On the 82nd episode of the Silver Bullet Security Podcast, Gary talks with Kevin Fu, Associate Professor in the EECS Department at the University of Michigan. Gary and Kevin discuss finding advisors and picking a grad school, the security implications of embedded medical devices, malware in hospital systems, the consumer trend toward analyzing one&#8217;s own health data, and the difficulty of teaching design analysis to other humans. They close out the episode discussing lobster bisque.</p>
<ul>
<li><a href="http://www.eecs.umich.edu/eecs/about/articles/2012/new_CSE_faculty.html">Kevin Fu and Grant Schoenebeck Join the Faculty of CSE @ Michigan</a></li>
<li><a href="http://blog.secure-medicine.org/">Medical Device Security Center blog</a></li>
<li><a href="http://www.washingtonpost.com/investigations/health-care-sector-vulnerable-to-hackers-researchers-say/2012/12/25/72933598-3e50-11e2-ae43-cf491b837f7b_story.html">Health-care sector vulnerable to hackers, researchers say</a>, <em>Washington Post</em>.</li>
<li><a href="http://blog.secure-medicine.org/2012/11/false-part-2-fda-does-not-allow.html">FDA Software Patch Poster</a></li>
<li><a href="http://www.thedoctorweighsin.com/hugo-campos-fights-to-get-his-defibrillator-data/">Hugo Campos fights to get his defibrillator data</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-082/">Show 082 &#8211; An Interview with Kevin Fu</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2819/0/silverbullet-082.mp3" length="39346176" type="audio/mpeg" />
		<itunes:duration>0:27:11</itunes:duration>
		<itunes:subtitle>
On the 82nd episode of the Silver Bullet Security Podcast, Gary talks with Kevin Fu, Associate Professor in the EECS Department at the University of Michigan. Gary and Kevin discuss finding advisors and picking a grad school, the security implicati[...]</itunes:subtitle>
		<itunes:summary>
On the 82nd episode of the Silver Bullet Security Podcast, Gary talks with Kevin Fu, Associate Professor in the EECS Department at the University of Michigan. Gary and Kevin discuss finding advisors and picking a grad school, the security implications of embedded medical devices, malware in hospital systems, the consumer trend toward analyzing one&#8217;s own health data, and the difficulty of teaching design analysis to other humans. They close out the episode discussing lobster bisque.

Kevin Fu and Grant Schoenebeck Join the Faculty of CSE @ Michigan
Medical Device Security Center blog
Health-care sector vulnerable to hackers, researchers say, Washington Post.
FDA Software Patch Poster
Hugo Campos fights to get his defibrillator data

The post Show 082 &#8211; An Interview with Kevin Fu appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 082 &#8211; An Interview with Kevin Fu appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Healthcare, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 081 &#8211; An Interview with Steve Bellovin</title>
		<link>https://www.cigital.com/podcasts/show-081/</link>
		<pubDate>Wed, 26 Dec 2012 14:01:48 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Mobile Application Security]]></category>
		<category><![CDATA[Podcast]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-081/</guid>
		<description><![CDATA[<p>On the 81st episode of the Silver Bullet Security Podcast, Gary talks with Steve Bellovin, Professor of Computer Science at Columbia University, currently on leave and acting as CTO of the Federal Trade Commission. Gary and Steve discuss how often academic research finds its way into the real world versus research that&#8217;s done in a &#8230; <a href="https://www.cigital.com/podcasts/show-081/" class="more-link">Continue reading <span class="screen-reader-text">Show 081 &#8211; An Interview with Steve Bellovin</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-081/">Show 081 &#8211; An Interview with Steve Bellovin</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Steve Bellovin" src="https://www.cigital.com/wp-content/uploads/2015/06/sbellovin-125.png" alt="Steve Bellovin" align="right" /></p>
<p>On the 81st episode of the Silver Bullet Security Podcast, Gary talks with Steve Bellovin, Professor of Computer Science at Columbia University, currently on leave and acting as CTO of the Federal Trade Commission. Gary and Steve discuss how often academic research finds its way into the real world versus research that&#8217;s done in a commercial lab, how code has gotten better overall but how the threat model has changed, whether mobile security is just a repackaging of the same security problem we&#8217;ve been dealing with for years, the state of computer security in the government, the very first days of Usenet and the famed Evil Bit.</p>
<ul>
<li><a href="https://www.cs.columbia.edu/~smb/">Steven M. Bellovin</a></li>
<li><a href="http://www.wilyhacker.com/"><em>Firewalls and Internet Security: Repelling the Wily Hacker</em></a> by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin</li>
<li><a href="http://en.wikipedia.org/wiki/Encrypted_key_exchange">Encrypted Key Exchange</a></li>
<li><a href="https://www.cigital.com/papers/download/09-11_Software0511.pdf">Technology Transfer: A Software Security Marketplace Case Study</a> (IEEE Software, September/October 2011) [PDF]</li>
<li><a href="http://noplasticshowers.com/2012/12/09/tsa-pre-does-not-suck/">TSA Pre</a></li>
<li><a href="http://www.ftc.gov/opa/2010/06/twitter.shtm">Twitter and the FTC</a></li>
<li><a href="http://en.wikipedia.org/wiki/Usenet">Usenet</a></li>
<li><a href="http://www.nndev.org/">nn</a></li>
<li><a href="http://www.ietf.org/rfc/rfc3514.txt">The Evil Bit RFC</a></li>
<li><a href="https://www.cs.columbia.edu/~smb/nsam-160/pal.html">Permissive Action Link</a></li>
<li><a href="https://www.cs.columbia.edu/~smb/frrm.html">Steve drives a train</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-081/">Show 081 &#8211; An Interview with Steve Bellovin</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2825/0/silverbullet-081.mp3" length="48620658" type="audio/mpeg" />
		<itunes:duration>0:33:45</itunes:duration>
		<itunes:subtitle>
On the 81st episode of the Silver Bullet Security Podcast, Gary talks with Steve Bellovin, Professor of Computer Science at Columbia University, currently on leave and acting as CTO of the Federal Trade Commission. Gary and Steve discuss how often [...]</itunes:subtitle>
		<itunes:summary>
On the 81st episode of the Silver Bullet Security Podcast, Gary talks with Steve Bellovin, Professor of Computer Science at Columbia University, currently on leave and acting as CTO of the Federal Trade Commission. Gary and Steve discuss how often academic research finds its way into the real world versus research that&#8217;s done in a commercial lab, how code has gotten better overall but how the threat model has changed, whether mobile security is just a repackaging of the same security problem we&#8217;ve been dealing with for years, the state of computer security in the government, the very first days of Usenet and the famed Evil Bit.

Steven M. Bellovin
Firewalls and Internet Security: Repelling the Wily Hacker by William R. Cheswick, Steven M. Bellovin, and Aviel D. Rubin
Encrypted Key Exchange
Technology Transfer: A Software Security Marketplace Case Study (IEEE Software, September/October 2011) [PDF]
TSA Pre
Twitter and the FTC
Usenet
nn
The Evil Bit RFC
Permissive Action Link
Steve drives a train

The post Show 081 &#8211; An Interview with Steve Bellovin appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 081 &#8211; An Interview with Steve Bellovin appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 080 &#8211; An Interview with Thomas Rid</title>
		<link>https://www.cigital.com/podcasts/show-080/</link>
		<pubDate>Fri, 30 Nov 2012 18:16:55 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[cyber war]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-080/</guid>
		<description><![CDATA[<p>On the 80th episode of the Silver Bullet Security Podcast, Gary talks with Thomas Rid, Reader in War Studies at King&#8217;s College London and a non-resident fellow at the Center for Transatlantic Relations in the School for Advanced International Studies, Johns Hopkins University, in Washington, DC. In this episode, Gary and Thomas discuss how Thomas&#8217; &#8230; <a href="https://www.cigital.com/podcasts/show-080/" class="more-link">Continue reading <span class="screen-reader-text">Show 080 &#8211; An Interview with Thomas Rid</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-080/">Show 080 &#8211; An Interview with Thomas Rid</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Thomas Rid" src="https://www.cigital.com/wp-content/uploads/2015/06/trid-125.png" alt="Thomas Rid" align="right" /></p>
<p>On the 80th episode of the Silver Bullet Security Podcast, Gary talks with Thomas Rid, Reader in War Studies at King&#8217;s College London and a non-resident fellow at the Center for Transatlantic Relations in the School for Advanced International Studies, Johns Hopkins University, in Washington, DC. In this episode, Gary and Thomas discuss how Thomas&#8217; life as a &#8220;wandering academic&#8221; influences his work at the War Studies Department, the inevitably (or otherwise) of cyber-war, attribution, and military dictionaries and the problem of jargon. They close out their chat talking about the Barbican cultural center.</p>
<ul>
<li><a href="http://thomasrid.org/">Thomas Rid</a></li>
<li><a href="http://www.amazon.co.uk/Cyber-War-Will-Take-Place/dp/1849042802/ref=sr_1_9?s=books&amp;ie=UTF8&amp;qid=1349845034&amp;sr=1-9"><em>Cyber War Will Not Take Place</em></a></li>
<li><a href="http://searchsecurity.techtarget.com/news/2240169976/Gary-McGraw-Proactive-defense-prudent-alternative-to-cyberwarfare">Proactive defense prudent alternative to cyberwarfare</a>, SearchSecurity.com.</li>
<li><a href="http://www.barbican.org.uk/">Barbican</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-080/">Show 080 &#8211; An Interview with Thomas Rid</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2823/0/silverbullet-080.mp3" length="46467200" type="audio/mpeg" />
		<itunes:duration>0:00:01</itunes:duration>
		<itunes:subtitle>
On the 80th episode of the Silver Bullet Security Podcast, Gary talks with Thomas Rid, Reader in War Studies at King&#8217;s College London and a non-resident fellow at the Center for Transatlantic Relations in the School for Advanced International[...]</itunes:subtitle>
		<itunes:summary>
On the 80th episode of the Silver Bullet Security Podcast, Gary talks with Thomas Rid, Reader in War Studies at King&#8217;s College London and a non-resident fellow at the Center for Transatlantic Relations in the School for Advanced International Studies, Johns Hopkins University, in Washington, DC. In this episode, Gary and Thomas discuss how Thomas&#8217; life as a &#8220;wandering academic&#8221; influences his work at the War Studies Department, the inevitably (or otherwise) of cyber-war, attribution, and military dictionaries and the problem of jargon. They close out their chat talking about the Barbican cultural center.

Thomas Rid
Cyber War Will Not Take Place
Proactive defense prudent alternative to cyberwarfare, SearchSecurity.com.
Barbican

The post Show 080 &#8211; An Interview with Thomas Rid appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 080 &#8211; An Interview with Thomas Rid appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 079 &#8211; Software Security Initiative at Sony with Per-Olof Persson</title>
		<link>https://www.cigital.com/podcasts/show-079/</link>
		<pubDate>Wed, 24 Oct 2012 20:42:48 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Business Leader]]></category>
		<category><![CDATA[Mobile Application Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Starting a Security Initiative]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-079/</guid>
		<description><![CDATA[<p>On the 79th episode of the Silver Bullet Security Podcast, Gary talks with Per-Olof Persson (a.k.a. Peo), head of Global Software Security Operations at Sony Mobile and Board member of Sony Corporation. Gary and Per-Olof discuss the importance of working different positions within the same company, Sony Mobile&#8217;s software security initiative, the political concerns of &#8230; <a href="https://www.cigital.com/podcasts/show-079/" class="more-link">Continue reading <span class="screen-reader-text">Show 079 &#8211; Software Security Initiative at Sony with Per-Olof Persson</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-079/">Show 079 &#8211; Software Security Initiative at Sony with Per-Olof Persson</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Per-Olof Persson" src="https://www.cigital.com/wp-content/uploads/2015/06/ppersson-125.png" alt="Per-Olof Persson" align="right" /></p>
<p>On the 79th episode of the Silver Bullet Security Podcast, Gary talks with Per-Olof Persson (a.k.a. Peo), head of Global Software Security Operations at Sony Mobile and Board member of Sony Corporation. Gary and Per-Olof discuss the importance of working different positions within the same company, Sony Mobile&#8217;s software security initiative, the political concerns of software security, and the cultural challenges of working with international teams. They close out the show with a discussion of American Presidential politics.</p>
<ul>
<li><a href="http://www.sonymobile.com/us/">Sony Mobile</a></li>
<li><a href="http://bsimm.com/">BSIMM4</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-079/">Show 079 &#8211; Software Security Initiative at Sony with Per-Olof Persson</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2803/0/silverbullet-079.mp3" length="40615237" type="audio/mpeg" />
		<itunes:duration>0:27:59</itunes:duration>
		<itunes:subtitle>
On the 79th episode of the Silver Bullet Security Podcast, Gary talks with Per-Olof Persson (a.k.a. Peo), head of Global Software Security Operations at Sony Mobile and Board member of Sony Corporation. Gary and Per-Olof discuss the importance of w[...]</itunes:subtitle>
		<itunes:summary>
On the 79th episode of the Silver Bullet Security Podcast, Gary talks with Per-Olof Persson (a.k.a. Peo), head of Global Software Security Operations at Sony Mobile and Board member of Sony Corporation. Gary and Per-Olof discuss the importance of working different positions within the same company, Sony Mobile&#8217;s software security initiative, the political concerns of software security, and the cultural challenges of working with international teams. They close out the show with a discussion of American Presidential politics.

Sony Mobile
BSIMM4

The post Show 079 &#8211; Software Security Initiative at Sony with Per-Olof Persson appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 079 &#8211; Software Security Initiative at Sony with Per-Olof Persson appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 078 &#8211; An Interview with Jacob West</title>
		<link>https://www.cigital.com/podcasts/show-078/</link>
		<pubDate>Sun, 30 Sep 2012 20:12:38 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[BSIMM]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Mobile Application Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[static code analysis tools]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-078/</guid>
		<description><![CDATA[<p>On the 78th episode of the Silver Bullet Security Podcast, Gary talks with Jacob West, Director, Software Security Research for the Enterprise Security Products division of Hewlett-Packard and newly minted CTO. Gary and Jacob discuss HP&#8217;s acquisition of Fortify, the technical trade-offs that have to be made to allow a tool become widely adopted, BSIMM4, &#8230; <a href="https://www.cigital.com/podcasts/show-078/" class="more-link">Continue reading <span class="screen-reader-text">Show 078 &#8211; An Interview with Jacob West</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-078/">Show 078 &#8211; An Interview with Jacob West</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Jacob West" src="https://www.cigital.com/wp-content/uploads/2015/06/jwest-125.png" alt="Jacob West" align="right" /></p>
<p>On the 78th episode of the Silver Bullet Security Podcast, Gary talks with Jacob West, Director, Software Security Research for the Enterprise Security Products division of Hewlett-Packard and newly minted CTO. Gary and Jacob discuss HP&#8217;s acquisition of Fortify, the technical trade-offs that have to be made to allow a tool become widely adopted, BSIMM4, and mobile security. They close out their discussion covering the impossibility of growing good tomatoes in San Francisco.</p>
<ul>
<li><a href="http://bsimm.com/">BSIMM4</a></li>
<li><a href="http://www.forbes.com/sites/andygreenberg/2010/08/18/hps-fortify-buyout-numbers-tell-lucrative-story-for-software-security/">Fortify acquired by HP</a></li>
<li><a href="http://www.cs.berkeley.edu/~daw/mops/">MOPS</a></li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1562220">On using data to drive a scientific model &#8211; Cargo Cult Computer Security</a> (January 28, 2010)</li>
<li><a href="http://bsimm.com/community/">BSIMM Community</a></li>
<li><a>Secure Programming with Static Analysis</a></li>
<li><a href="http://en.wikipedia.org/wiki/Dancing_pigs">Dancing Pigs and Security</a></li>
<li><a href="http://noplasticshowers.com/2012/06/04/dining-out-in-greater-nova/">Jacob and gem&#8217;s foodie adventures</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-078/">Show 078 &#8211; An Interview with Jacob West</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2827/0/silverbullet-078.mp3" length="1" type="audio/mpeg" />
		<itunes:duration>0:30:58</itunes:duration>
		<itunes:subtitle>
On the 78th episode of the Silver Bullet Security Podcast, Gary talks with Jacob West, Director, Software Security Research for the Enterprise Security Products division of Hewlett-Packard and newly minted CTO. Gary and Jacob discuss HP&#8217;s acq[...]</itunes:subtitle>
		<itunes:summary>
On the 78th episode of the Silver Bullet Security Podcast, Gary talks with Jacob West, Director, Software Security Research for the Enterprise Security Products division of Hewlett-Packard and newly minted CTO. Gary and Jacob discuss HP&#8217;s acquisition of Fortify, the technical trade-offs that have to be made to allow a tool become widely adopted, BSIMM4, and mobile security. They close out their discussion covering the impossibility of growing good tomatoes in San Francisco.

BSIMM4
Fortify acquired by HP
MOPS
On using data to drive a scientific model &#8211; Cargo Cult Computer Security (January 28, 2010)
BSIMM Community
Secure Programming with Static Analysis
Dancing Pigs and Security
Jacob and gem&#8217;s foodie adventures

The post Show 078 &#8211; An Interview with Jacob West appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 078 &#8211; An Interview with Jacob West appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>BSIMM, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 077 &#8211; An Interview with Gary Warzala</title>
		<link>https://www.cigital.com/podcasts/show-077/</link>
		<pubDate>Tue, 28 Aug 2012 16:05:40 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Financial Services]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[security measurement]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-077/</guid>
		<description><![CDATA[<p>On the 77th episode of the Silver Bullet Security Podcast, Gary talks with Gary Warzala, CISO of Visa International. The Garys discuss what a CISO&#8217;s day-to-day job looks like, how companies can attract and retain good security employees, whether consumers need to understand the difference between software security and security software, and how one can &#8230; <a href="https://www.cigital.com/podcasts/show-077/" class="more-link">Continue reading <span class="screen-reader-text">Show 077 &#8211; An Interview with Gary Warzala</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-077/">Show 077 &#8211; An Interview with Gary Warzala</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="David Evans" src="https://www.cigital.com/wp-content/uploads/2015/06/gwarzala.png" alt="Gary Warzala" align="right" /></p>
<p>On the 77th episode of the Silver Bullet Security Podcast, Gary talks with Gary Warzala, CISO of Visa International. The Garys discuss what a CISO&#8217;s day-to-day job looks like, how companies can attract and retain good security employees, whether consumers need to understand the difference between software security and security software, and how one can measure security and discuss the results with upper management.</p>
<ul>
<li><a href="http://searchsecurity.techtarget.com/opinion/Congress-should-encourage-bug-fixes-reward-secure-systems">Congress should encourage bug fixes, reward secure systems</a></li>
<li><a href="http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf">Verizon 2012 Data Breach Investigations Report</a> [PDF]</li>
<li><a href="http://www.amazon.com/The-Debt-Bomb-Washington-Bankrupting/dp/159555467X"><em>The Debt Bomb</em></a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-077/">Show 077 &#8211; An Interview with Gary Warzala</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2776/0/silverbullet-077.mp3" length="36085888" type="audio/mpeg" />
		<itunes:duration>0:24:55</itunes:duration>
		<itunes:subtitle>
On the 77th episode of the Silver Bullet Security Podcast, Gary talks with Gary Warzala, CISO of Visa International. The Garys discuss what a CISO&#8217;s day-to-day job looks like, how companies can attract and retain good security employees, whet[...]</itunes:subtitle>
		<itunes:summary>
On the 77th episode of the Silver Bullet Security Podcast, Gary talks with Gary Warzala, CISO of Visa International. The Garys discuss what a CISO&#8217;s day-to-day job looks like, how companies can attract and retain good security employees, whether consumers need to understand the difference between software security and security software, and how one can measure security and discuss the results with upper management.

Congress should encourage bug fixes, reward secure systems
Verizon 2012 Data Breach Investigations Report [PDF]
The Debt Bomb

The post Show 077 &#8211; An Interview with Gary Warzala appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 077 &#8211; An Interview with Gary Warzala appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>CISO, Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 076 &#8211; An Interview with David Evans</title>
		<link>https://www.cigital.com/podcasts/show-076/</link>
		<pubDate>Fri, 27 Jul 2012 17:10:03 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Mobile Application Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Security Training]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-076/</guid>
		<description><![CDATA[<p>On the 76th episode of the Silver Bullet Security Podcast, Gary chats with David Evans, Associate Professor of Computer Science at the University of Virginia. Gary and Dave discuss the founding of the Interdisciplinary Major in Computer Science (BA) at UVa and why a broad approach to Computer Science and Computer Security is a good &#8230; <a href="https://www.cigital.com/podcasts/show-076/" class="more-link">Continue reading <span class="screen-reader-text">Show 076 &#8211; An Interview with David Evans</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-076/">Show 076 &#8211; An Interview with David Evans</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="David Evans" src="https://www.cigital.com/wp-content/uploads/2015/06/devans.png" alt="David Evans" align="right" /></p>
<p>On the 76th episode of the Silver Bullet Security Podcast, Gary chats with David Evans, Associate Professor of Computer Science at the University of Virginia. Gary and Dave discuss the founding of the Interdisciplinary Major in Computer Science (BA) at UVa and why a broad approach to Computer Science and Computer Security is a good idea, why data privacy gets short shrift in the United States, why people think (for no apparent reason) that their mobile devices are secure, groceries, David&#8217;s research on Secure Computation, and the Udacity project. They close out their discussion with a story about David&#8217;s trip to the World Cup in Korea and a choice between GEB and scheme.</p>
<ul>
<li><a href="http://www.cs.virginia.edu/~evans/">David Evans</a></li>
<li><a href="http://www.jeffersonswheel.org/">Jefferson&#8217;s Wheel</a>, David&#8217;s blog</li>
<li><a href="http://www.cs.virginia.edu/ba/">Interdisciplinary Major in Computer Science</a></li>
<li><a href="http://www.udacity.com/">Udacity</a></li>
<li><a href="http://www.researchwithoutwalls.org/">Research Without Walls</a></li>
<li><a href="http://www.amazon.com/G%C3%B6del-Escher-Bach-Eternal-Golden/dp/0465026567/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1343412256&amp;sr=1-1&amp;keywords=GEB">GEB</a></li>
<li><a href="http://en.wikipedia.org/wiki/Scheme_(programming_language)">Scheme</a></li>
<li><a href="http://en.wikipedia.org/wiki/2002_FIFA_World_Cup">World Cup Korea</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-076/">Show 076 &#8211; An Interview with David Evans</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2829/0/silverbullet-076.mp3" length="47071360" type="audio/mpeg" />
		<itunes:duration>0:32:33</itunes:duration>
		<itunes:subtitle>
On the 76th episode of the Silver Bullet Security Podcast, Gary chats with David Evans, Associate Professor of Computer Science at the University of Virginia. Gary and Dave discuss the founding of the Interdisciplinary Major in Computer Science (BA[...]</itunes:subtitle>
		<itunes:summary>
On the 76th episode of the Silver Bullet Security Podcast, Gary chats with David Evans, Associate Professor of Computer Science at the University of Virginia. Gary and Dave discuss the founding of the Interdisciplinary Major in Computer Science (BA) at UVa and why a broad approach to Computer Science and Computer Security is a good idea, why data privacy gets short shrift in the United States, why people think (for no apparent reason) that their mobile devices are secure, groceries, David&#8217;s research on Secure Computation, and the Udacity project. They close out their discussion with a story about David&#8217;s trip to the World Cup in Korea and a choice between GEB and scheme.

David Evans
Jefferson&#8217;s Wheel, David&#8217;s blog
Interdisciplinary Major in Computer Science
Udacity
Research Without Walls
GEB
Scheme
World Cup Korea

The post Show 076 &#8211; An Interview with David Evans appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 076 &#8211; An Interview with David Evans appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 075 &#8211; An Interview with Howard Schmidt</title>
		<link>https://www.cigital.com/podcasts/show-075/</link>
		<pubDate>Sat, 30 Jun 2012 16:00:33 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-075/</guid>
		<description><![CDATA[<p>On the landmark 75th episode of Silver Bullet, Gary talks with Howard Schmidt, former Cybersecurity Coordinator for the Obama administration. In this episode, Gary and Howard discuss the differences between doing security work in the public and private sectors, the difficulties of establishing cybersecurity in the government (especially when it comes to software security), the &#8230; <a href="https://www.cigital.com/podcasts/show-075/" class="more-link">Continue reading <span class="screen-reader-text">Show 075 &#8211; An Interview with Howard Schmidt</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-075/">Show 075 &#8211; An Interview with Howard Schmidt</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Howard Schmidt" src="https://www.cigital.com/wp-content/uploads/2015/06/hschmidt-125.png" alt="" width="125" height="125" align="right" /></p>
<p>On the landmark 75th episode of Silver Bullet, Gary talks with Howard Schmidt, former Cybersecurity Coordinator for the Obama administration. In this episode, Gary and Howard discuss the differences between doing security work in the public and private sectors, the difficulties of establishing cybersecurity in the government (especially when it comes to software security), the government&#8217;s involvement in cyberespionage, and how the actions of Anonymous and Wikileaks square with the notion of free speech. They close the episode out with talk about Harleys.</p>
<p>This special edition of Silver Bullet was also captured on video. View the video below (for those on feed readers, go to <a href="https://www.cigital.com/podcasts/show-075/">this episode&#8217;s page</a> for the video):</p>
<p align="center"><iframe src="https://www.youtube.com/embed/6FbskX2uUYI?rel=0" width="500" height="281" frameborder="0"></iframe></p>
<ul>
<li><a href="http://en.wikipedia.org/wiki/Howard_Schmidt">Howard Schmidt</a> (Wikipedia)</li>
<li><a href="http://news.cnet.com/8301-1009_3-57436466-83/u.s-cybersecurity-chief-howard-schmidt-retiring/">U.S. cybersecurity chief Howard Schmidt retiring</a></li>
<li><a href="http://www.computerweekly.com/news/2240158763/White-House-cyber-security-coordinator-Howard-Schmidt-joins-Qualys">White House cyber security coordinator Howard Schmidt joins Qualys</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-075/">Show 075 &#8211; An Interview with Howard Schmidt</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2833/0/silverbullet-075.mp3" length="55378048" type="audio/mpeg" />
		<itunes:duration>0:00:01</itunes:duration>
		<itunes:subtitle>
On the landmark 75th episode of Silver Bullet, Gary talks with Howard Schmidt, former Cybersecurity Coordinator for the Obama administration. In this episode, Gary and Howard discuss the differences between doing security work in the public and pri[...]</itunes:subtitle>
		<itunes:summary>
On the landmark 75th episode of Silver Bullet, Gary talks with Howard Schmidt, former Cybersecurity Coordinator for the Obama administration. In this episode, Gary and Howard discuss the differences between doing security work in the public and private sectors, the difficulties of establishing cybersecurity in the government (especially when it comes to software security), the government&#8217;s involvement in cyberespionage, and how the actions of Anonymous and Wikileaks square with the notion of free speech. They close the episode out with talk about Harleys.
This special edition of Silver Bullet was also captured on video. View the video below (for those on feed readers, go to this episode&#8217;s page for the video):


Howard Schmidt (Wikipedia)
U.S. cybersecurity chief Howard Schmidt retiring
White House cyber security coordinator Howard Schmidt joins Qualys

The post Show 075 &#8211; An Interview with Howard Schmidt appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 075 &#8211; An Interview with Howard Schmidt appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 074 &#8211; An Interview with Bruce Schneier</title>
		<link>https://www.cigital.com/podcasts/show-074/</link>
		<pubDate>Wed, 30 May 2012 16:54:27 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Independent Software Vendors]]></category>
		<category><![CDATA[Podcast]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-074/</guid>
		<description><![CDATA[<p>On the 74th episode of The Silver Bullet Security Podcast, Gary talks for a second time with Bruce Schneier. They revisit Bruce&#8217;s prediction in episode 9 that insight into economics and security would help vendors sell their products more efficiently. In addition, they discuss Bruce&#8217;s new book Liars and Outliers: Enabling the Trust that Society &#8230; <a href="https://www.cigital.com/podcasts/show-074/" class="more-link">Continue reading <span class="screen-reader-text">Show 074 &#8211; An Interview with Bruce Schneier</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-074/">Show 074 &#8211; An Interview with Bruce Schneier</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" title="Bruce Schneier" src="https://www.cigital.com/wp-content/uploads/2015/06/bschneier.png" alt="" align="right" /></p>
<p>On the 74th episode of The Silver Bullet Security Podcast, Gary talks for a second time with Bruce Schneier. They revisit Bruce&#8217;s prediction in episode 9 that insight into economics and security would help vendors sell their products more efficiently. In addition, they discuss Bruce&#8217;s new book <em>Liars and Outliers: Enabling the Trust that Society Needs to Thrive</em>, how far behind the government is in terms of security, cloud computing, and Uncle Milton&#8217;s ant farm.</p>
<ul>
<li><a href="http://www.schneier.com/">Bruce Schneier</a></li>
<li><a href="http://www.schneier.com/book-applied.html"><em>Applied Cryptography</em></a></li>
<li><a href="http://www.schneier.com/book-lo.html"><em>Liars and Outliers</em></a></li>
<li><a href=" https://www.cigital.com/podcasts/show-009/" target="_blank">Silver Bullet Security Podcast, show 009 (December 2006)</a> &#8211; Gary&#8217;s first chat with Bruce Schneier</li>
<li><a href="http://blogs.msdn.com/b/tzink/archive/2012/05/21/us-cyber-czar-howard-schmidt-resigns.aspx">US cyber czar Howard Schmidt resigns</a></li>
<li><a href="http://weis2012.econinfosec.org/">Workshop on Economics and Information Security</a></li>
<li><a href="https://www.cigital.com/papers/download/mcgraw-fick-CNAS.pdf">Separating the Threat from the Hype: What Washington Needs to Know About Cyber Security</a> in <a href="http://www.cnas.rsvp1.com/node/6405?mgh=http%3A%2F%2Fwww.cnas.org&amp;mgf=1">AMERICA’S CYBER FUTURE: SECURITY AND PROSPERITY IN THE INFORMATION AGE VOLUMES I AND II</a>, Center for a New Amercian Security (June 2011).</li>
<li><a href="http://en.wikipedia.org/wiki/Iterated_prisoner%27s_dilemma#The_iterated_prisoner.27s_dilemma">Prisoner&#8217;s Dilemma</a> (Axelrod)</li>
<li><a href="http://unclemilton.com/ant_farm/">Uncle Milton&#8217;s Ant Farm</a></li>
<li><a href="http://www.uglysweaterstore.com/">The Ugly Sweater Store</a></li>
<li><a href="http://www.amazon.com/Vintage-Spirits-Forgotten-Cocktails-Alamagoozlum/dp/1592535615/ref=sr_1_1?s=books&amp;ie=UTF8&amp;qid=1338325646&amp;sr=1-1"><em>Vintage Spirits and Forgotten Cocktails: From the Alamagoozlum to the Zombie 100 Rediscovered Recipes and the Stories Behind Them</em></a> &#8211; Mixology</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-074/">Show 074 &#8211; An Interview with Bruce Schneier</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2831/0/silverbullet-074.mp3" length="43237504" type="audio/mpeg" />
		<itunes:duration>0:29:54</itunes:duration>
		<itunes:subtitle>
On the 74th episode of The Silver Bullet Security Podcast, Gary talks for a second time with Bruce Schneier. They revisit Bruce&#8217;s prediction in episode 9 that insight into economics and security would help vendors sell their products more eff[...]</itunes:subtitle>
		<itunes:summary>
On the 74th episode of The Silver Bullet Security Podcast, Gary talks for a second time with Bruce Schneier. They revisit Bruce&#8217;s prediction in episode 9 that insight into economics and security would help vendors sell their products more efficiently. In addition, they discuss Bruce&#8217;s new book Liars and Outliers: Enabling the Trust that Society Needs to Thrive, how far behind the government is in terms of security, cloud computing, and Uncle Milton&#8217;s ant farm.

Bruce Schneier
Applied Cryptography
Liars and Outliers
Silver Bullet Security Podcast, show 009 (December 2006) &#8211; Gary&#8217;s first chat with Bruce Schneier
US cyber czar Howard Schmidt resigns
Workshop on Economics and Information Security
Separating the Threat from the Hype: What Washington Needs to Know About Cyber Security in AMERICA’S CYBER FUTURE: SECURITY AND PROSPERITY IN THE INFORMATION AGE VOLUMES I AND II, Center for a New Amercian Security (June 2011).
Prisoner&#8217;s Dilemma (Axelrod)
Uncle Milton&#8217;s Ant Farm
The Ugly Sweater Store
Vintage Spirits and Forgotten Cocktails: From the Alamagoozlum to the Zombie 100 Rediscovered Recipes and the Stories Behind Them &#8211; Mixology

The post Show 074 &#8211; An Interview with Bruce Schneier appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 074 &#8211; An Interview with Bruce Schneier appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 073 &#8211; An Interview with Robert Vamosi</title>
		<link>https://www.cigital.com/podcasts/show-073/</link>
		<pubDate>Mon, 30 Apr 2012 12:00:46 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Architecture Analysis]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-073/</guid>
		<description><![CDATA[<p>On the 73rd episode of The Silver Bullet Security Podcast, Gary talks with Robert Vamosi, senior analyst with Mocana, freelance security reporter, and author of When Gadgets Betray Us. Gary and Robert discuss whether we&#8217;re doomed to idiocy as a species thanks to gadget dependency, why designers ignore security and privacy issues in gadget design. &#8230; <a href="https://www.cigital.com/podcasts/show-073/" class="more-link">Continue reading <span class="screen-reader-text">Show 073 &#8211; An Interview with Robert Vamosi</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-073/">Show 073 &#8211; An Interview with Robert Vamosi</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/wp-content/uploads/2015/06/rvamosi-125.png" alt="Robert Vamosi" align="right" /></p>
<p>On the 73rd episode of The Silver Bullet Security Podcast, Gary talks with Robert Vamosi, senior analyst with Mocana, freelance security reporter, and author of <em>When Gadgets Betray Us</em>. Gary and Robert discuss whether we&#8217;re doomed to idiocy as a species thanks to gadget dependency, why designers ignore security and privacy issues in gadget design. Finally, Gary and Robert discuss Robert&#8217;s use of the word &#8220;betray.&#8221;</p>
<ul>
<li><a href="https://www.amazon.com/When-Gadgets-Betray-Infatuation-Technologies/dp/0465031382" target="_blank"><em>When Gadgets Betray Us</em></a></li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1636983">Gary on Stuxnet</a></li>
<li><a href="http://www.doc88.com/p-94850699414.html">With Or Without You</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-073/">Show 073 &#8211; An Interview with Robert Vamosi</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2805/0/silverbullet-073.mp3" length="38475904" type="audio/mpeg" />
		<itunes:duration>0:26:35</itunes:duration>
		<itunes:subtitle>
On the 73rd episode of The Silver Bullet Security Podcast, Gary talks with Robert Vamosi, senior analyst with Mocana, freelance security reporter, and author of When Gadgets Betray Us. Gary and Robert discuss whether we&#8217;re doomed to idiocy as[...]</itunes:subtitle>
		<itunes:summary>
On the 73rd episode of The Silver Bullet Security Podcast, Gary talks with Robert Vamosi, senior analyst with Mocana, freelance security reporter, and author of When Gadgets Betray Us. Gary and Robert discuss whether we&#8217;re doomed to idiocy as a species thanks to gadget dependency, why designers ignore security and privacy issues in gadget design. Finally, Gary and Robert discuss Robert&#8217;s use of the word &#8220;betray.&#8221;

When Gadgets Betray Us
Gary on Stuxnet
With Or Without You

The post Show 073 &#8211; An Interview with Robert Vamosi appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 073 &#8211; An Interview with Robert Vamosi appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 072 &#8211; An Interview with Randy Sabett</title>
		<link>https://www.cigital.com/podcasts/show-072/</link>
		<pubDate>Fri, 30 Mar 2012 17:32:06 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-072/</guid>
		<description><![CDATA[<p>On the 72nd episode of The Silver Bullet Security Podcast, Gary talks with Randy Sabett, a lawyer with the ZwillGen cyber-law firm in Washington, DC. Gary and Randy discuss Microsoft&#8217;s Zeus Botnet raid, alleged AT&#38;T/NSA wiretapping, whether cyberlaw is full of loopholes, and if security always trades off against privacy and anonymity. They close out &#8230; <a href="https://www.cigital.com/podcasts/show-072/" class="more-link">Continue reading <span class="screen-reader-text">Show 072 &#8211; An Interview with Randy Sabett</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-072/">Show 072 &#8211; An Interview with Randy Sabett</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/wp-content/uploads/2015/06/rsabett-125.png" alt="Randy Sabett" align="right" /></p>
<p>On the 72nd episode of The Silver Bullet Security Podcast, Gary talks with Randy Sabett, a lawyer with the ZwillGen cyber-law firm in Washington, DC. Gary and Randy discuss Microsoft&#8217;s Zeus Botnet raid, alleged AT&amp;T/NSA wiretapping, whether cyberlaw is full of loopholes, and if security always trades off against privacy and anonymity. They close out their discussion discussing the book Randy is currently reading.</p>
<ul>
<li><a href="http://blogs.technet.com/b/microsoft_blog/archive/2012/03/25/microsoft-and-financial-services-industry-leaders-target-cybercriminal-operations-from-zeus-botnets.aspx">Microsoft and Financial Services Industry Leaders Target Cybercriminal Operations from Zeus Botnets</a>, The Official Microsoft Blog.</li>
<li><a href="http://www.nytimes.com/2012/03/26/technology/microsoft-raids-tackle-online-crime.html?_r=2&amp;pagewanted=all">Microsoft Raids Tackle Internet Crime</a>, <em>The New York Times</em>.</li>
<li><a href="http://blog.zwillgen.com/2012/02/28/court-upholds-5th-amendment-based-refusal-to-decrypt-hard-drive/">Court Upholds 5th Amendment-based Refusal to Decrypt Hard Drive</a></li>
<li><a href="https://www.cigital.com/papers/download/mcgraw-fick-CNAS.pdf">Separating the Threat from the Hype: What Washington Needs to Know About Cyber Security</a> in AMERICA&#8217;S CYBER FUTURE: SECURITY AND PROSPERITY IN THE INFORMATION AGE VOLUMES I AND II, Center for a New Amercian Security (June 2011).</li>
<li><a href="http://www.amazon.com/Cuckoos-Egg-Clifford-Stoll/dp/0671726889"><em>The Cuckoo&#8217;s Egg</em> by Clifford Stoll</a></li>
<li><a href="http://www.washingtonpost.com/business/capitalbusiness/is-time-running-out-on-the-billable-hour/2012/01/10/gIQAKUSU1P_story.html">Is time running out on the billable hour?</a></li>
<li><a href="http://www.singularity.com/"><em>The Singularity is Near</em> by Ray Kurzweil</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-072/">Show 072 &#8211; An Interview with Randy Sabett</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2837/0/silverbullet-072.mp3" length="53426304" type="audio/mpeg" />
		<itunes:duration>0:37:04</itunes:duration>
		<itunes:subtitle>
On the 72nd episode of The Silver Bullet Security Podcast, Gary talks with Randy Sabett, a lawyer with the ZwillGen cyber-law firm in Washington, DC. Gary and Randy discuss Microsoft&#8217;s Zeus Botnet raid, alleged AT&#38;T/NSA wiretapping, wheth[...]</itunes:subtitle>
		<itunes:summary>
On the 72nd episode of The Silver Bullet Security Podcast, Gary talks with Randy Sabett, a lawyer with the ZwillGen cyber-law firm in Washington, DC. Gary and Randy discuss Microsoft&#8217;s Zeus Botnet raid, alleged AT&#38;T/NSA wiretapping, whether cyberlaw is full of loopholes, and if security always trades off against privacy and anonymity. They close out their discussion discussing the book Randy is currently reading.

Microsoft and Financial Services Industry Leaders Target Cybercriminal Operations from Zeus Botnets, The Official Microsoft Blog.
Microsoft Raids Tackle Internet Crime, The New York Times.
Court Upholds 5th Amendment-based Refusal to Decrypt Hard Drive
Separating the Threat from the Hype: What Washington Needs to Know About Cyber Security in AMERICA&#8217;S CYBER FUTURE: SECURITY AND PROSPERITY IN THE INFORMATION AGE VOLUMES I AND II, Center for a New Amercian Security (June 2011).
The Cuckoo&#8217;s Egg by Clifford Stoll
Is time running out on the billable hour?
The Singularity is Near by Ray Kurzweil

The post Show 072 &#8211; An Interview with Randy Sabett appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 072 &#8211; An Interview with Randy Sabett appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 071 &#8211; An Interview with Bill Arbaugh</title>
		<link>https://www.cigital.com/podcasts/show-071/</link>
		<pubDate>Wed, 29 Feb 2012 15:45:18 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[malware]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-071/</guid>
		<description><![CDATA[<p>On the 71st episode of The Silver Bullet Security Podcast, Gary talks with Bill Arbaugh, Associate Professor of Computer Science at University of Maryland. Gary and Bill discuss how malware has evolved and changed over the last decade and how it&#8217;s affected software security practices, BIOS-based attacks, academia vs. startup, and why the NSA doesn&#8217;t &#8230; <a href="https://www.cigital.com/podcasts/show-071/" class="more-link">Continue reading <span class="screen-reader-text">Show 071 &#8211; An Interview with Bill Arbaugh</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-071/">Show 071 &#8211; An Interview with Bill Arbaugh</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/wp-content/uploads/2015/06/barbaugh-12521.png" alt="Bill Arbaugh" align="right" /></p>
<p>On the 71st episode of The Silver Bullet Security Podcast, Gary talks with Bill Arbaugh, Associate Professor of Computer Science at University of Maryland. Gary and Bill discuss how malware has evolved and changed over the last decade and how it&#8217;s affected software security practices, BIOS-based attacks, academia vs. startup, and why the NSA doesn&#8217;t play defense when it comes to cybersecurity.</p>
<ul>
<li><a href="http://www.cs.umd.edu/~waa/UMD/Home.html">Bill Arbaugh @ UMD</a></li>
<li><a href="http://www.microsoft.com/security/portal/komoku/">Microsoft Acquires Komoku</a></li>
<li>Silver Bullet: Ross Anderson, <a href="https://www.cigital.com/silver-bullet/show-013/">show 13</a>, <a href="https://www.cigital.com/silver-bullet/show-070/">show 70</a></li>
<li><a href="http://ictf.cs.ucsb.edu/">International Capture the Flag</a></li>
<li><a href="https://www.cigital.com/papers/download/mcgraw-fick-CNAS.pdf">Separating the Threat from the Hype: What Washington Needs to Know About Cyber Security</a> in AMERICA&#8217;S CYBER FUTURE: SECURITY AND PROSPERITY IN THE INFORMATION AGE VOLUMES I AND II, Center for a New Amercian Security (June 2011).</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-071/">Show 071 &#8211; An Interview with Bill Arbaugh</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2840/0/silverbullet-071.mp3" length="42516608" type="audio/mpeg" />
		<itunes:duration>0:00:01</itunes:duration>
		<itunes:subtitle>
On the 71st episode of The Silver Bullet Security Podcast, Gary talks with Bill Arbaugh, Associate Professor of Computer Science at University of Maryland. Gary and Bill discuss how malware has evolved and changed over the last decade and how it[...]</itunes:subtitle>
		<itunes:summary>
On the 71st episode of The Silver Bullet Security Podcast, Gary talks with Bill Arbaugh, Associate Professor of Computer Science at University of Maryland. Gary and Bill discuss how malware has evolved and changed over the last decade and how it&#8217;s affected software security practices, BIOS-based attacks, academia vs. startup, and why the NSA doesn&#8217;t play defense when it comes to cybersecurity.

Bill Arbaugh @ UMD
Microsoft Acquires Komoku
Silver Bullet: Ross Anderson, show 13, show 70
International Capture the Flag
Separating the Threat from the Hype: What Washington Needs to Know About Cyber Security in AMERICA&#8217;S CYBER FUTURE: SECURITY AND PROSPERITY IN THE INFORMATION AGE VOLUMES I AND II, Center for a New Amercian Security (June 2011).

The post Show 071 &#8211; An Interview with Bill Arbaugh appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 071 &#8211; An Interview with Bill Arbaugh appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 070 &#8211; An Interview with Ross Anderson</title>
		<link>https://www.cigital.com/podcasts/show-070/</link>
		<pubDate>Tue, 31 Jan 2012 21:05:03 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cyber war]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-070/</guid>
		<description><![CDATA[<p>The 70th episode of The Silver Bullet Security Podcast is our first repeat performance. Gary chats a second time with Ross Anderson, Professor of Security Engineering at the Computer Laboratory at Cambridge University and author of the book Security Engineering. Ross was a guest on episode 13 of The Silver Bullet Security Podcast and is &#8230; <a href="https://www.cigital.com/podcasts/show-070/" class="more-link">Continue reading <span class="screen-reader-text">Show 070 &#8211; An Interview with Ross Anderson</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-070/">Show 070 &#8211; An Interview with Ross Anderson</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class=" size-full wp-image-2836 alignright" src="https://www.cigital.com/wp-content/uploads/2015/06/randerson.png" alt="" width="125" height="125" /></p>
<p>The 70th episode of The Silver Bullet Security Podcast is our first repeat performance. Gary chats a second time with Ross Anderson, Professor of Security Engineering at the Computer Laboratory at Cambridge University and author of the book <em>Security Engineering</em>. Ross was a guest on episode 13 of The Silver Bullet Security Podcast and is our first return guest. Gary and Ross discuss the latest developments in Trusted Computing, the iterated &#8220;Prisoner&#8217;s Dilemma&#8221; as an economic model and its relevance to computer security, information compartmentalization and Wikileaks, time and security, cyberwar versus cybercrime, and Stuxnet.</p>
<ul>
<li><a href="https://www.cigital.com/podcasts/show-013/">Silver Bullet Show 013: Ross Anderson</a></li>
<li><a href="https://www.cigital.com/silver-bullet-files/shows/silverbullet-013-randerson.pdf">Transcript of episode 13</a> [PDF]</li>
<li><a href="http://www.ross-anderson.com/">Ross Anderson</a></li>
<li><a href="http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html">Trusted Computing FAQ</a></li>
<li><em>Security Engineering</em> &#8211; Ross&#8217; groundbreaking book <a href="http://www.amazon.com/exec/obidos/ASIN/0471389226/rossandersshomep">in print</a> and <a href="http://www.cl.cam.ac.uk/~rja14/book.html">online</a></li>
<li><a href="https://www.cigital.com/papers/download/mcgraw-fick-CNAS.pdf">Separating the Threat from the Hype: What Washington Needs to Know About Cyber Security</a> in AMERICA&#8217;S CYBER FUTURE: SECURITY AND PROSPERITY IN THE INFORMATION AGE VOLUMES I AND II, Center for a New Amercian Security (June 2011).</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-070/">Show 070 &#8211; An Interview with Ross Anderson</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2835/0/silverbullet-070.mp3" length="49351625" type="audio/mpeg" />
		<itunes:duration>0:00:01</itunes:duration>
		<itunes:subtitle>
The 70th episode of The Silver Bullet Security Podcast is our first repeat performance. Gary chats a second time with Ross Anderson, Professor of Security Engineering at the Computer Laboratory at Cambridge University and author of the book Securit[...]</itunes:subtitle>
		<itunes:summary>
The 70th episode of The Silver Bullet Security Podcast is our first repeat performance. Gary chats a second time with Ross Anderson, Professor of Security Engineering at the Computer Laboratory at Cambridge University and author of the book Security Engineering. Ross was a guest on episode 13 of The Silver Bullet Security Podcast and is our first return guest. Gary and Ross discuss the latest developments in Trusted Computing, the iterated &#8220;Prisoner&#8217;s Dilemma&#8221; as an economic model and its relevance to computer security, information compartmentalization and Wikileaks, time and security, cyberwar versus cybercrime, and Stuxnet.

Silver Bullet Show 013: Ross Anderson
Transcript of episode 13 [PDF]
Ross Anderson
Trusted Computing FAQ
Security Engineering &#8211; Ross&#8217; groundbreaking book in print and online
Separating the Threat from the Hype: What Washington Needs to Know About Cyber Security in AMERICA&#8217;S CYBER FUTURE: SECURITY AND PROSPERITY IN THE INFORMATION AGE VOLUMES I AND II, Center for a New Amercian Security (June 2011).

The post Show 070 &#8211; An Interview with Ross Anderson appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 070 &#8211; An Interview with Ross Anderson appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 069 &#8211; An Interview with Steve Myers</title>
		<link>https://www.cigital.com/podcasts/show-069/</link>
		<pubDate>Thu, 29 Dec 2011 15:01:37 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cryptography]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-069/</guid>
		<description><![CDATA[<p>On the 69th episode of The Silver Bullet Security Podcast, Gary talks with Steve Myers, Assistant Professor of Informatics and Computing in the School of Informatics at Indiana University and a member of the Center for Applied Cybersecurity. During this show, Gary and Steve discuss the gap between &#8220;real world&#8221; computer security and &#8220;academic&#8221; computer &#8230; <a href="https://www.cigital.com/podcasts/show-069/" class="more-link">Continue reading <span class="screen-reader-text">Show 069 &#8211; An Interview with Steve Myers</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-069/">Show 069 &#8211; An Interview with Steve Myers</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/wp-content/uploads/2015/06/smyers-125.png" alt="Steve Myers" align="right" /></p>
<p>On the 69th episode of The Silver Bullet Security Podcast, Gary talks with Steve Myers, Assistant Professor of Informatics and Computing in the School of Informatics at Indiana University and a member of the Center for Applied Cybersecurity. During this show, Gary and Steve discuss the gap between &#8220;real world&#8221; computer security and &#8220;academic&#8221; computer security, the problem of cryptography, whether it&#8217;s OK to use &#8220;the NASCAR effect&#8221; to draw students into security, and spear phishing.</p>
<ul>
<li><a href="http://www.informatics.indiana.edu/samyers/">Steve Myers</a></li>
<li><a href="http://cacr.iu.edu/">Center for Applied Cybersecurity</a></li>
<li><a href="http://www.cis.syr.edu/~wedu/seed/">The SEED Project</a> (Developing Instructional Laboratories for Computer SEcurity EDucation)</li>
<li><a href="http://www.usenix.org/event/leet11/tech/slides/husted.pdf">Why Mobile to Mobile Malware Won&#8217;t Cause a Storm</a> [PDF], paper for USENIX &#8217;11, with Nathaniel Husted</li>
<li><a href="http://www.cc.gatech.edu/~traynor/">Patrick Traynor</a></li>
<li><a href="https://www.cigital.com/podcasts/show-020/" target="_blank">Silver Bullet Show 020:­ An Interview with Markus Jakobsson</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0471782459.html"><em>Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft</em></a>, edited by Steve Myers and Markus Jakobsson</li>
<li><a href="http://www.fbi.gov/news/stories/2009/april/spearphishing_040109">&#8220;Spear phishing&#8221;</a></li>
<li><a href="http://sotw.ca/">Spirit of the West</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-069/">Show 069 &#8211; An Interview with Steve Myers</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2843/0/silverbullet-069.mp3" length="42492032" type="audio/mpeg" />
		<itunes:duration>0:29:22</itunes:duration>
		<itunes:subtitle>
On the 69th episode of The Silver Bullet Security Podcast, Gary talks with Steve Myers, Assistant Professor of Informatics and Computing in the School of Informatics at Indiana University and a member of the Center for Applied Cybersecurity. During[...]</itunes:subtitle>
		<itunes:summary>
On the 69th episode of The Silver Bullet Security Podcast, Gary talks with Steve Myers, Assistant Professor of Informatics and Computing in the School of Informatics at Indiana University and a member of the Center for Applied Cybersecurity. During this show, Gary and Steve discuss the gap between &#8220;real world&#8221; computer security and &#8220;academic&#8221; computer security, the problem of cryptography, whether it&#8217;s OK to use &#8220;the NASCAR effect&#8221; to draw students into security, and spear phishing.

Steve Myers
Center for Applied Cybersecurity
The SEED Project (Developing Instructional Laboratories for Computer SEcurity EDucation)
Why Mobile to Mobile Malware Won&#8217;t Cause a Storm [PDF], paper for USENIX &#8217;11, with Nathaniel Husted
Patrick Traynor
Silver Bullet Show 020:­ An Interview with Markus Jakobsson
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, edited by Steve Myers and Markus Jakobsson
&#8220;Spear phishing&#8221;
Spirit of the West

The post Show 069 &#8211; An Interview with Steve Myers appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 069 &#8211; An Interview with Steve Myers appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Podcast</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 068 &#8211; An Interview with John Steven</title>
		<link>https://www.cigital.com/podcasts/show-068/</link>
		<pubDate>Wed, 30 Nov 2011 11:50:00 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Architecture Risk Analysis]]></category>
		<category><![CDATA[Financial Services]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Cigital leadership]]></category>
		<category><![CDATA[enterprise security]]></category>
		<category><![CDATA[security architecture]]></category>
		<category><![CDATA[static analysis]]></category>
		<category><![CDATA[touchpoints]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-068/</guid>
		<description><![CDATA[<p>On the 68th episode of The Silver Bullet Security Podcast, Gary is joined in the studio by John Steven, internal CTO at Cigital. Gary and John discuss how software architecture is being pulled by financial services instead of being pushed by technology firms, why architecture risk analysis is so important (and so hard to automate), &#8230; <a href="https://www.cigital.com/podcasts/show-068/" class="more-link">Continue reading <span class="screen-reader-text">Show 068 &#8211; An Interview with John Steven</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-068/">Show 068 &#8211; An Interview with John Steven</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/wp-content/uploads/2015/05/john-steven-250x235.jpg" alt="john steven" width="250" height="235" align="right" />On the 68th episode of The Silver Bullet Security Podcast, Gary is joined in the studio by John Steven, internal CTO at Cigital. Gary and John discuss how software architecture is being pulled by financial services instead of being pushed by technology firms, why architecture risk analysis is so important (and so hard to automate), the bias that developers and security practitioners show towards security features rather than software security Touchpoints, and enterprise use of static analysis tools. They close out the show discussing mixology.</p>
<p>&nbsp;</p>
<ul>
<li><a href="https://www.cigital.com/blog/author/jsteven/">John Steven Articles</a></li>
<li><a href="https://www.owasp.org/index.php/Virginia">OWASP NoVA</a></li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1680863">Software [In]security: Comparing Apples, Oranges, and Aardvarks (or, All Static Analysis Tools Are Not Created Equal)</a>, InformIT.</li>
<li><a href="https://www.bsimm.com/">BSIMM</a></li>
<li><a href="http://noplasticshowers.com/2011/04/09/return-to-philly-palomar-philadelphia/">&#8220;The Liberal&#8221;</a></li>
<li><a href="http://prohibitioneracocktails.blogspot.com/2010/07/prohibition-era-cocktails-whiskey-old.html">&#8220;The Old Fashioned&#8221;</a></li>
<li><a href="https://www.cigital.com/podcasts/show-057/" target="_blank">Silver Bullet: Elinor Mills</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-068/">Show 068 &#8211; An Interview with John Steven</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2845/0/silverbullet-068.mp3" length="49463424" type="audio/mpeg" />
		<itunes:duration>0:34:19</itunes:duration>
		<itunes:subtitle>On the 68th episode of The Silver Bullet Security Podcast, Gary is joined in the studio by John Steven, internal CTO at Cigital. Gary and John discuss how software architecture is being pulled by financial services instead of being pushed by technol[...]</itunes:subtitle>
		<itunes:summary>On the 68th episode of The Silver Bullet Security Podcast, Gary is joined in the studio by John Steven, internal CTO at Cigital. Gary and John discuss how software architecture is being pulled by financial services instead of being pushed by technology firms, why architecture risk analysis is so important (and so hard to automate), the bias that developers and security practitioners show towards security features rather than software security Touchpoints, and enterprise use of static analysis tools. They close out the show discussing mixology.
&#160;

John Steven Articles
OWASP NoVA
Software [In]security: Comparing Apples, Oranges, and Aardvarks (or, All Static Analysis Tools Are Not Created Equal), InformIT.
BSIMM
&#8220;The Liberal&#8221;
&#8220;The Old Fashioned&#8221;
Silver Bullet: Elinor Mills

The post Show 068 &#8211; An Interview with John Steven appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 068 &#8211; An Interview with John Steven appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 067 &#8211; An Interview with Bill Pugh</title>
		<link>https://www.cigital.com/podcasts/show-067/</link>
		<pubDate>Fri, 28 Oct 2011 13:55:17 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Code Review]]></category>
		<category><![CDATA[Defects, Bugs, and Flaws]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[bugs]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-067/</guid>
		<description><![CDATA[<p>On the 67th episode of The Silver Bullet Security Podcast, Gary talks with Bill Pugh, professor at the University of Maryland College Park. Gary and Bill discuss the Marmoset and FindBugs projects, how to teach kids to code and whether coding is an innate ability or is something that can be taught. They also geek &#8230; <a href="https://www.cigital.com/podcasts/show-067/" class="more-link">Continue reading <span class="screen-reader-text">Show 067 &#8211; An Interview with Bill Pugh</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-067/">Show 067 &#8211; An Interview with Bill Pugh</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/wp-content/uploads/2015/06/bpugh.png" alt="Bill Pugh" align="right" /></p>
<p>On the 67th episode of The Silver Bullet Security Podcast, Gary talks with Bill Pugh, professor at the University of Maryland College Park. Gary and Bill discuss the Marmoset and FindBugs projects, how to teach kids to code and whether coding is an innate ability or is something that can be taught. They also geek out regarding Bill&#8217;s favorite programming languages for coding and teaching about coding. They also discuss the relationship between coding and fire eating.</p>
<ul>
<li><a href="http://www.cs.umd.edu/~pugh/">Bill Pugh</a></li>
<li><a href="http://marmoset.cs.umd.edu/">Marmoset</a></li>
<li><a href="http://dilbert.com/strips/comic/1995-11-13/">Dilbert minivan strip</a></li>
<li><a href="http://findbugs.sourceforge.net/">Find Bugs</a></li>
<li><a href="http://goose.ycp.edu/~dhovemey/">David Hovemeyer</a></li>
<li><a href="http://www.azulsystems.com/blog/">Cliff Click</a></li>
<li><a href="http://www.cs.umd.edu/class/fall2011/cmsc433/">UMD: Fall 2011 CMSC 433 &#8211; Programming Language Technologies and Paradigms</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-067/">Show 067 &#8211; An Interview with Bill Pugh</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2853/0/silverbullet-067.mp3" length="58126464" type="audio/mpeg" />
		<itunes:duration>0:40:20</itunes:duration>
		<itunes:subtitle>
On the 67th episode of The Silver Bullet Security Podcast, Gary talks with Bill Pugh, professor at the University of Maryland College Park. Gary and Bill discuss the Marmoset and FindBugs projects, how to teach kids to code and whether coding is an[...]</itunes:subtitle>
		<itunes:summary>
On the 67th episode of The Silver Bullet Security Podcast, Gary talks with Bill Pugh, professor at the University of Maryland College Park. Gary and Bill discuss the Marmoset and FindBugs projects, how to teach kids to code and whether coding is an innate ability or is something that can be taught. They also geek out regarding Bill&#8217;s favorite programming languages for coding and teaching about coding. They also discuss the relationship between coding and fire eating.

Bill Pugh
Marmoset
Dilbert minivan strip
Find Bugs
David Hovemeyer
Cliff Click
UMD: Fall 2011 CMSC 433 &#8211; Programming Language Technologies and Paradigms

The post Show 067 &#8211; An Interview with Bill Pugh appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 067 &#8211; An Interview with Bill Pugh appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 066 &#8211; An Interview with Shari Lawrence Pfleeger</title>
		<link>https://www.cigital.com/podcasts/show-066-3/</link>
		<pubDate>Thu, 29 Sep 2011 14:44:32 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-066-3/</guid>
		<description><![CDATA[<p>On the 66th episode of The Silver Bullet Security Podcast, Gary chats with Shari Lawrence Pfleeger, Director of Research for the Institute for Information Infrastructure Protection at Dartmouth College. Gary and Shari discuss the difference between safety-critical software and security-critical software, why measuring software is hard (security notwithstanding), how to speed up tech transfer, and &#8230; <a href="https://www.cigital.com/podcasts/show-066-3/" class="more-link">Continue reading <span class="screen-reader-text">Show 066 &#8211; An Interview with Shari Lawrence Pfleeger</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-066-3/">Show 066 &#8211; An Interview with Shari Lawrence Pfleeger</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/wp-content/uploads/2015/06/slpfleeger.png" alt="Shari Lawrence Pfleeger" align="right" /></p>
<p>On the 66th episode of The Silver Bullet Security Podcast, Gary chats with Shari Lawrence Pfleeger, Director of Research for the Institute for Information Infrastructure Protection at Dartmouth College. Gary and Shari discuss the difference between safety-critical software and security-critical software, why measuring software is hard (security notwithstanding), how to speed up tech transfer, and why there are so few women in computer science.</p>
<ul>
<li><a href="http://www.amazon.com/Software-Engineering-Theory-Practice-4th/dp/0136061699/ref=ntt_at_ep_dpt_1"><em>Software Engineering: Theory and Practice</em></a>, 4th edition</li>
<li><a href="http://www.washingtonpost.com/lifestyle/style/many-media-types-live-in-the-land-of-twitter-but-most-regular-people-dont/2011/09/01/gIQARfaUdK_story.html">Many media types live in the land of Twitter, but most regular people don’t</a> by Monica Hesse in the <em>Washington Post</em></li>
<li><a href="http://www.youtube.com/watch?v=kAG39jKi0lI">My Blackberry&#8217;s Not Working!</a>, <em>The One Ronnie</em></li>
<li><a href="http://en.wikipedia.org/wiki/The_Hours_(novel)"><em>The Hours</em></a> by Michael Cunningham</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-066-3/">Show 066 &#8211; An Interview with Shari Lawrence Pfleeger</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2694/0/silverbullet-066.mp3" length="39577728" type="audio/mpeg" />
		<itunes:duration>0:27:27</itunes:duration>
		<itunes:subtitle>
On the 66th episode of The Silver Bullet Security Podcast, Gary chats with Shari Lawrence Pfleeger, Director of Research for the Institute for Information Infrastructure Protection at Dartmouth College. Gary and Shari discuss the difference between[...]</itunes:subtitle>
		<itunes:summary>
On the 66th episode of The Silver Bullet Security Podcast, Gary chats with Shari Lawrence Pfleeger, Director of Research for the Institute for Information Infrastructure Protection at Dartmouth College. Gary and Shari discuss the difference between safety-critical software and security-critical software, why measuring software is hard (security notwithstanding), how to speed up tech transfer, and why there are so few women in computer science.

Software Engineering: Theory and Practice, 4th edition
Many media types live in the land of Twitter, but most regular people don’t by Monica Hesse in the Washington Post
My Blackberry&#8217;s Not Working!, The One Ronnie
The Hours by Michael Cunningham

The post Show 066 &#8211; An Interview with Shari Lawrence Pfleeger appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 066 &#8211; An Interview with Shari Lawrence Pfleeger appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 065 &#8211; An Interview with Giovanni Vigna</title>
		<link>https://www.cigital.com/podcasts/show-065/</link>
		<pubDate>Mon, 29 Aug 2011 10:49:54 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Security Training]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[black box]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-065/</guid>
		<description><![CDATA[<p>On the 65th episode of The Silver Bullet Security Podcast, Gary is joined by Giovanni Vigna, professor of Computer Science at UC Santa Barbara. They discuss DEFCON&#8217;s classic Capture the Flag contest as well as UCSB&#8217;s international version. They ponder how the notion of &#8220;build security in&#8221; might be integrated into a CTF-type contest. Gary &#8230; <a href="https://www.cigital.com/podcasts/show-065/" class="more-link">Continue reading <span class="screen-reader-text">Show 065 &#8211; An Interview with Giovanni Vigna</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-065/">Show 065 &#8211; An Interview with Giovanni Vigna</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/wp-content/uploads/2015/06/gvigna.png" alt="Giovanni Vigna" align="right" /></p>
<p>On the 65th episode of The Silver Bullet Security Podcast, Gary is joined by Giovanni Vigna, professor of Computer Science at UC Santa Barbara. They discuss DEFCON&#8217;s classic Capture the Flag contest as well as UCSB&#8217;s international version. They ponder how the notion of &#8220;build security in&#8221; might be integrated into a CTF-type contest. Gary and Giovanni also talk about Giovanni&#8217;s favorite course to teach, the challenge of communicating security issues with non-technical people, and the role of blackbox testing in security. They close out the show discussing how to teach a toddler to pick locks.</p>
<ul>
<li><a href="http://www.cs.ucsb.edu/~vigna/">Giovanni at UCSB</a></li>
<li><a href="http://ictf.cs.ucsb.edu/">Internatonal Capture the Flag</a></li>
<li><a href="https://www.cigital.com/blog/building-versus-breaking-a-white-hat-goes-to-blackhat/">Building Versus Breaking: A White Hat goes to Blackhat</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-065/">Show 065 &#8211; An Interview with Giovanni Vigna</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2807/0/silverbullet-065.mp3" length="44277888" type="audio/mpeg" />
		<itunes:duration>0:30:43</itunes:duration>
		<itunes:subtitle>
On the 65th episode of The Silver Bullet Security Podcast, Gary is joined by Giovanni Vigna, professor of Computer Science at UC Santa Barbara. They discuss DEFCON&#8217;s classic Capture the Flag contest as well as UCSB&#8217;s international versi[...]</itunes:subtitle>
		<itunes:summary>
On the 65th episode of The Silver Bullet Security Podcast, Gary is joined by Giovanni Vigna, professor of Computer Science at UC Santa Barbara. They discuss DEFCON&#8217;s classic Capture the Flag contest as well as UCSB&#8217;s international version. They ponder how the notion of &#8220;build security in&#8221; might be integrated into a CTF-type contest. Gary and Giovanni also talk about Giovanni&#8217;s favorite course to teach, the challenge of communicating security issues with non-technical people, and the role of blackbox testing in security. They close out the show discussing how to teach a toddler to pick locks.

Giovanni at UCSB
Internatonal Capture the Flag
Building Versus Breaking: A White Hat goes to Blackhat

The post Show 065 &#8211; An Interview with Giovanni Vigna appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 065 &#8211; An Interview with Giovanni Vigna appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 064 &#8211; An Interview with Markus Schumacher</title>
		<link>https://www.cigital.com/podcasts/show-064/</link>
		<pubDate>Fri, 29 Jul 2011 13:42:21 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[SMB]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-064/</guid>
		<description><![CDATA[<p>On the 64th episode of The Silver Bullet Security Podcast, Gary chats with Markus Schumacher, co-founder and CEO of Virtual Forge. Gary and Markus discuss the difference between working for a large corporate and a startup, why Virtual Forge built a code scanning tool for SAP&#8217;s ABAP code, whether security people understand the notion of &#8230; <a href="https://www.cigital.com/podcasts/show-064/" class="more-link">Continue reading <span class="screen-reader-text">Show 064 &#8211; An Interview with Markus Schumacher</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-064/">Show 064 &#8211; An Interview with Markus Schumacher</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/wp-content/uploads/2015/06/mschumacher.png" alt="Markus Schumacher" align="right" /></p>
<p>On the 64th episode of The Silver Bullet Security Podcast, Gary chats with Markus Schumacher, co-founder and CEO of Virtual Forge. Gary and Markus discuss the difference between working for a large corporate and a startup, why Virtual Forge built a code scanning tool for SAP&#8217;s ABAP code, whether security people understand the notion of security patterns, and Markus&#8217; favorite beverage in Heidelberg.</p>
<ul>
<li><a href="http://virtualforge.com/">Virtual Forge</a></li>
<li><a href="http://www.securitypatterns.org/">Security Patterns</a>, the site</li>
<li><a href="http://www.amazon.com/gp/product/0470858842"><em>Security Patterns</em></a>, the book</li>
<li><a href="https://www.cigital.com/papers/download/09-11_Software0511.pdf">Technology Transfer: A Software Security Marketplace Case Study</a>, (<em>IEEE Software</em>, September/October 2011)</li>
<li><a href="http://www.printmedialounge.de/">Print Media Lounge</a></li>
<li><a href="http://noplasticshowers.com/2011/04/09/return-to-philly-palomar-philadelphia/">Recipe for a Liberal (the drink)</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-064/">Show 064 &#8211; An Interview with Markus Schumacher</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2851/0/silverbullet-064.mp3" length="31412352" type="audio/mpeg" />
		<itunes:duration>0:21:47</itunes:duration>
		<itunes:subtitle>
On the 64th episode of The Silver Bullet Security Podcast, Gary chats with Markus Schumacher, co-founder and CEO of Virtual Forge. Gary and Markus discuss the difference between working for a large corporate and a startup, why Virtual Forge built a[...]</itunes:subtitle>
		<itunes:summary>
On the 64th episode of The Silver Bullet Security Podcast, Gary chats with Markus Schumacher, co-founder and CEO of Virtual Forge. Gary and Markus discuss the difference between working for a large corporate and a startup, why Virtual Forge built a code scanning tool for SAP&#8217;s ABAP code, whether security people understand the notion of security patterns, and Markus&#8217; favorite beverage in Heidelberg.

Virtual Forge
Security Patterns, the site
Security Patterns, the book
Technology Transfer: A Software Security Marketplace Case Study, (IEEE Software, September/October 2011)
Print Media Lounge
Recipe for a Liberal (the drink)

The post Show 064 &#8211; An Interview with Markus Schumacher appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 064 &#8211; An Interview with Markus Schumacher appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 063 &#8211; An Interview with Craig Miller</title>
		<link>https://www.cigital.com/podcasts/show-063/</link>
		<pubDate>Tue, 28 Jun 2011 10:25:23 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Energy]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[smart grid]]></category>
		<category><![CDATA[SMB]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-063/</guid>
		<description><![CDATA[<p>On the 63rd episode of The Silver Bullet Security Podcast, Gary talks with Craig Miller, principal at the MAPA Group. Gary and Craig discuss entrepreneurship, the pluses and minuses of working for start-ups and very large corporations, smart grid security, and working with NRECA. They close out the show discussing movies and books. Dr. Craig &#8230; <a href="https://www.cigital.com/podcasts/show-063/" class="more-link">Continue reading <span class="screen-reader-text">Show 063 &#8211; An Interview with Craig Miller</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-063/">Show 063 &#8211; An Interview with Craig Miller</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-full wp-image-358" src="https://www.cigital.com/wp-content/uploads/2015/06/craig-miller.jpg" alt="" width="125" height="125" />On the 63rd episode of The Silver Bullet Security Podcast, Gary talks with Craig Miller, principal at the MAPA Group. Gary and Craig discuss entrepreneurship, the pluses and minuses of working for start-ups and very large corporations, smart grid security, and working with NRECA. They close out the show discussing movies and books.</p>
<ul>
<li><a href="http://www.mapagroup.net/our-team/dr-craig-miller/">Dr. Craig Miller</a></li>
<li><a href="http://www.mapagroup.net/">MAPA Group</a></li>
<li><a href="http://www.saic.com/">SAIC</a></li>
<li><a href="http://en.wikipedia.org/wiki/Smart_grid">Smart grid</a></li>
<li><a href="http://www.nreca.org/">NRECA</a></li>
<li><a href="http://www.nerc.com/">NERC</a></li>
<li><a href="http://en.wikipedia.org/wiki/Continuous_improvement_process">Continuous improvement</a></li>
<li><a href="http://en.wikipedia.org/wiki/On_the_Waterfront"><em>On the Waterfront</em></a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-063/">Show 063 &#8211; An Interview with Craig Miller</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2855/0/silverbullet-063.mp3" length="47413376" type="audio/mpeg" />
		<itunes:duration>0:32:54</itunes:duration>
		<itunes:subtitle>On the 63rd episode of The Silver Bullet Security Podcast, Gary talks with Craig Miller, principal at the MAPA Group. Gary and Craig discuss entrepreneurship, the pluses and minuses of working for start-ups and very large corporations, smart grid se[...]</itunes:subtitle>
		<itunes:summary>On the 63rd episode of The Silver Bullet Security Podcast, Gary talks with Craig Miller, principal at the MAPA Group. Gary and Craig discuss entrepreneurship, the pluses and minuses of working for start-ups and very large corporations, smart grid security, and working with NRECA. They close out the show discussing movies and books.

Dr. Craig Miller
MAPA Group
SAIC
Smart grid
NRECA
NERC
Continuous improvement
On the Waterfront

The post Show 063 &#8211; An Interview with Craig Miller appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 063 &#8211; An Interview with Craig Miller appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Energy</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 062 &#8211; An Interview with Halvar Flake</title>
		<link>https://www.cigital.com/podcasts/show-062/</link>
		<pubDate>Tue, 31 May 2011 11:05:00 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[dynamic analysis]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[static analysis]]></category>
		<category><![CDATA[static code analysis tools]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-062/</guid>
		<description><![CDATA[<p>On the 62nd episode of The Silver Bullet Security Podcast, Gary chats with Halvar Flake (a.k.a. Thomas Dullien), founder of reverse engineering consultancy, Zynamics, which was recently purchased by Google. Gary and Halvar discuss the acquisition, Zynamics&#8217; product BinDiff, whether the &#8220;bad guys&#8221; are using code understanding tools (including decompilers) better than developers, static versus &#8230; <a href="https://www.cigital.com/podcasts/show-062/" class="more-link">Continue reading <span class="screen-reader-text">Show 062 &#8211; An Interview with Halvar Flake</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-062/">Show 062 &#8211; An Interview with Halvar Flake</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/wp-content/uploads/2015/06/hflake.png" alt="Halvar Flake" align="right" /></p>
<p>On the 62nd episode of The Silver Bullet Security Podcast, Gary chats with Halvar Flake (a.k.a. Thomas Dullien), founder of reverse engineering consultancy, Zynamics, which was recently purchased by Google. Gary and Halvar discuss the acquisition, Zynamics&#8217; product BinDiff, whether the &#8220;bad guys&#8221; are using code understanding tools (including decompilers) better than developers, static versus dynamic analysis, international politics meets computer security, and the growing complexity of malware. They close out with a discussion of music.</p>
<ul>
<li><a href="https://addxorrol.blogspot.com/">ADD / XOR / ROL</a> &#8211; Halvar&#8217;s blog</li>
<li><a href="https://twitter.com/#!/halvarflake">@halvarflake</a></li>
<li><a href="https://www.informit.com/articles/article.aspx?p=1662328">Cyber Warmongering and Influence Peddling</a> (November 24, 2010)</li>
<li><a href="http://techcrunch.com/2011/03/01/google-buys-security-analytics-startup-zynamics/">Google&#8217;s purchase of Zynamics</a></li>
<li><a href="http://www.zynamics.com/bindiff.html">BinDiff</a></li>
<li><a href=" https://www.cigital.com/podcasts/show-041/" target="_blank">Silver Bullet #41: Fred Schneider</a></li>
<li><a href="https://www.cigital.com/podcasts/show-046/">Silver Bullet #46: David Rice</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-062/">Show 062 &#8211; An Interview with Halvar Flake</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2849/0/silverbullet-062.mp3" length="43913344" type="audio/mpeg" />
		<itunes:duration>0:30:30</itunes:duration>
		<itunes:subtitle>
On the 62nd episode of The Silver Bullet Security Podcast, Gary chats with Halvar Flake (a.k.a. Thomas Dullien), founder of reverse engineering consultancy, Zynamics, which was recently purchased by Google. Gary and Halvar discuss the acquisition, [...]</itunes:subtitle>
		<itunes:summary>
On the 62nd episode of The Silver Bullet Security Podcast, Gary chats with Halvar Flake (a.k.a. Thomas Dullien), founder of reverse engineering consultancy, Zynamics, which was recently purchased by Google. Gary and Halvar discuss the acquisition, Zynamics&#8217; product BinDiff, whether the &#8220;bad guys&#8221; are using code understanding tools (including decompilers) better than developers, static versus dynamic analysis, international politics meets computer security, and the growing complexity of malware. They close out with a discussion of music.

ADD / XOR / ROL &#8211; Halvar&#8217;s blog
@halvarflake
Cyber Warmongering and Influence Peddling (November 24, 2010)
Google&#8217;s purchase of Zynamics
BinDiff
Silver Bullet #41: Fred Schneider
Silver Bullet #46: David Rice

The post Show 062 &#8211; An Interview with Halvar Flake appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 062 &#8211; An Interview with Halvar Flake appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 061 &#8211; An Interview with Carl Landwehr</title>
		<link>https://www.cigital.com/podcasts/show-061/</link>
		<pubDate>Thu, 28 Apr 2011 14:50:41 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-061/</guid>
		<description><![CDATA[<p>On the 61st episode of The Silver Bullet Security Podcast, Gary talks with Carl Landwehr, Director of Trustworthy Computing at the National Science Foundation and a Senior Research Scientist at the Institute for Systems Research within the University of Maryland. Gary and Carl discuss the most important changes in information security that have developed over &#8230; <a href="https://www.cigital.com/podcasts/show-061/" class="more-link">Continue reading <span class="screen-reader-text">Show 061 &#8211; An Interview with Carl Landwehr</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-061/">Show 061 &#8211; An Interview with Carl Landwehr</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/wp-content/uploads/2015/06/clandwehr.png" alt="Carl Landwehr" align="right" /></p>
<p>On the 61st episode of The Silver Bullet Security Podcast, Gary talks with Carl Landwehr, Director of Trustworthy Computing at the National Science Foundation and a Senior Research Scientist at the Institute for Systems Research within the University of Maryland. Gary and Carl discuss the most important changes in information security that have developed over the course of Carl&#8217;s career, the academic perspective of the state of commercial computer security, how to balance security and privacy, and the reason behind the leaking of government documents to Wikileaks. They close out the episode discussing books.</p>
<ul>
<li><a href="http://www.nsf.gov/">National Science Foundation</a></li>
<li><a href="https://www.cigital.com/podcasts/show-046/">Silver Bullet #46: David Rice</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-061/">Show 061 &#8211; An Interview with Carl Landwehr</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2809/0/silverbullet-061.mp3" length="39561216" type="audio/mpeg" />
		<itunes:duration>0:27:27</itunes:duration>
		<itunes:subtitle>
On the 61st episode of The Silver Bullet Security Podcast, Gary talks with Carl Landwehr, Director of Trustworthy Computing at the National Science Foundation and a Senior Research Scientist at the Institute for Systems Research within the Universi[...]</itunes:subtitle>
		<itunes:summary>
On the 61st episode of The Silver Bullet Security Podcast, Gary talks with Carl Landwehr, Director of Trustworthy Computing at the National Science Foundation and a Senior Research Scientist at the Institute for Systems Research within the University of Maryland. Gary and Carl discuss the most important changes in information security that have developed over the course of Carl&#8217;s career, the academic perspective of the state of commercial computer security, how to balance security and privacy, and the reason behind the leaking of government documents to Wikileaks. They close out the episode discussing books.

National Science Foundation
Silver Bullet #46: David Rice

The post Show 061 &#8211; An Interview with Carl Landwehr appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 061 &#8211; An Interview with Carl Landwehr appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 060 &#8211; An Interview with Neil Daswani</title>
		<link>https://www.cigital.com/podcasts/show-060/</link>
		<pubDate>Wed, 30 Mar 2011 11:51:23 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[SMB]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-060/</guid>
		<description><![CDATA[<p>On the 5th anniversary, 60th episode of The Silver Bullet Security Podcast, Gary talks with Neil Daswani, CTO and co-founder of Dasient. Gary and Neil discuss Neil&#8217;s previous work at Google and how the &#8220;start-up like&#8221; atmosphere at Google compares with an actual start-up. They also discuss bad ads (aka malvertising), Clickbot.A, the software security &#8230; <a href="https://www.cigital.com/podcasts/show-060/" class="more-link">Continue reading <span class="screen-reader-text">Show 060 &#8211; An Interview with Neil Daswani</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-060/">Show 060 &#8211; An Interview with Neil Daswani</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class=" size-full wp-image-4043 alignright" src="https://www.cigital.com/wp-content/uploads/2011/03/ndaswani.png" alt="ndaswani" width="125" height="125" /></p>
<p>On the 5th anniversary, 60th episode of The Silver Bullet Security Podcast, Gary talks with Neil Daswani, CTO and co-founder of Dasient. Gary and Neil discuss Neil&#8217;s previous work at Google and how the &#8220;start-up like&#8221; atmosphere at Google compares with an actual start-up. They also discuss bad ads (aka malvertising), Clickbot.A, the software security related emphasis on testing at Google, and sushi in San Jose.</p>
<ul>
<li><a href="http://www.neildaswani.com/">Neil Daswani</a></li>
<li><a href="http://blog.dasient.com/2011/03/dasient-q4-malware-update-significant.html">Dasient Q4 2010 Malware Update</a></li>
<li><a href="http://www.darkreading.com/risk/certifiable/d/d-id/1128759" target="_blank">Certifiable</a>, McGraw on Software Security Certification for darkreading (May 9, 2007)</li>
<li><a href="http://www.usenix.org/events/hotbots07/tech/full_papers/daswani/daswani.pdf">The Anatomy of Clickbot.A</a> [PDF]</li>
<li><a href="http://scpd.stanford.edu/public/category/courseCategoryCertificateProfile.do?method=load&amp;certificateId=1145836#searchResults">Stanford Advanced Security Certification Program</a></li>
<li><a href="http://tomosushionline.com/">Tomo Sushi</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-060/">Show 060 &#8211; An Interview with Neil Daswani</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2811/0/silverbullet-060.mp3" length="42580096" type="audio/mpeg" />
		<itunes:duration>0:29:32</itunes:duration>
		<itunes:subtitle>
On the 5th anniversary, 60th episode of The Silver Bullet Security Podcast, Gary talks with Neil Daswani, CTO and co-founder of Dasient. Gary and Neil discuss Neil&#8217;s previous work at Google and how the &#8220;start-up like&#8221; atmosphere a[...]</itunes:subtitle>
		<itunes:summary>
On the 5th anniversary, 60th episode of The Silver Bullet Security Podcast, Gary talks with Neil Daswani, CTO and co-founder of Dasient. Gary and Neil discuss Neil&#8217;s previous work at Google and how the &#8220;start-up like&#8221; atmosphere at Google compares with an actual start-up. They also discuss bad ads (aka malvertising), Clickbot.A, the software security related emphasis on testing at Google, and sushi in San Jose.

Neil Daswani
Dasient Q4 2010 Malware Update
Certifiable, McGraw on Software Security Certification for darkreading (May 9, 2007)
The Anatomy of Clickbot.A [PDF]
Stanford Advanced Security Certification Program
Tomo Sushi

The post Show 060 &#8211; An Interview with Neil Daswani appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 060 &#8211; An Interview with Neil Daswani appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 059 &#8211; An Interview with Ralph Langner</title>
		<link>https://www.cigital.com/podcasts/show-059/</link>
		<pubDate>Fri, 25 Feb 2011 19:00:25 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Independent Software Vendors]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-059/</guid>
		<description><![CDATA[<p>On the bonus-length 59th episode of The Silver Bullet Security Podcast, Gary chats with Ralph Langner, Founder and CEO of Langner Communications. Langer Communications is a German company specializing in control systems security. Ralph was the first to determine that Stuxnet is a directed cybersecurity attack against the kinds of Siemens control systems used to &#8230; <a href="https://www.cigital.com/podcasts/show-059/" class="more-link">Continue reading <span class="screen-reader-text">Show 059 &#8211; An Interview with Ralph Langner</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-059/">Show 059 &#8211; An Interview with Ralph Langner</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img class=" size-full wp-image-4046 alignright" src="https://www.cigital.com/wp-content/uploads/2011/02/rlangner.png" alt="rlangner" width="125" height="125" /></p>
<p>On the bonus-length 59th episode of The Silver Bullet Security Podcast, Gary chats with Ralph Langner, Founder and CEO of Langner Communications. Langer Communications is a German company specializing in control systems security. Ralph was the first to determine that Stuxnet is a directed cybersecurity attack against the kinds of Siemens control systems used to control nuclear centrifuges in Iran. Gary and Ralph discuss what&#8217;s involved in introducing the concept of cybersecurity to control systems engineers, how anti-virus vendors originally responded to the Stuxnet, as well as plenty of detailed technical info about the worm with an emphasis on its payload.</p>
<ul>
<li><a href="http://www.langner.com/">Langner Communications</a></li>
<li><a href="http://en.wikipedia.org/wiki/Stuxnet">Stuxnet</a></li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1636983">Software [In]security: How to p0wn a Control System with Stuxnet</a></li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1662328">Software [In]security: Cyber Warmongering and Influence Peddling</a></li>
<li><a href="http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html">Israeli Test on Worm Called Crucial in Iran Nuclear Delay</a> (<em>New York Times</em>)</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-059/">Show 059 &#8211; An Interview with Ralph Langner</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2847/0/silverbullet-059.mp3" length="60712960" type="audio/mpeg" />
		<itunes:duration>0:42:08</itunes:duration>
		<itunes:subtitle>
On the bonus-length 59th episode of The Silver Bullet Security Podcast, Gary chats with Ralph Langner, Founder and CEO of Langner Communications. Langer Communications is a German company specializing in control systems security. Ralph was the firs[...]</itunes:subtitle>
		<itunes:summary>
On the bonus-length 59th episode of The Silver Bullet Security Podcast, Gary chats with Ralph Langner, Founder and CEO of Langner Communications. Langer Communications is a German company specializing in control systems security. Ralph was the first to determine that Stuxnet is a directed cybersecurity attack against the kinds of Siemens control systems used to control nuclear centrifuges in Iran. Gary and Ralph discuss what&#8217;s involved in introducing the concept of cybersecurity to control systems engineers, how anti-virus vendors originally responded to the Stuxnet, as well as plenty of detailed technical info about the worm with an emphasis on its payload.

Langner Communications
Stuxnet
Software [In]security: How to p0wn a Control System with Stuxnet
Software [In]security: Cyber Warmongering and Influence Peddling
Israeli Test on Worm Called Crucial in Iran Nuclear Delay (New York Times)

The post Show 059 &#8211; An Interview with Ralph Langner appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 059 &#8211; An Interview with Ralph Langner appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 058 &#8211; An Interview with John Savage</title>
		<link>https://www.cigital.com/podcasts/show-058/</link>
		<pubDate>Mon, 24 Jan 2011 15:32:05 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cyber war]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-058/</guid>
		<description><![CDATA[<p>On the 58th episode of The Silver Bullet Security Podcast, Gary talks with John Savage, professor of Computer Science at Brown University and Jefferson Science Fellow for the State Department. Gary and John discuss whether Wikileaks is a terrorist organization, if the use of a cyber-weapon like Stuxnet can be a morally justified act, and &#8230; <a href="https://www.cigital.com/podcasts/show-058/" class="more-link">Continue reading <span class="screen-reader-text">Show 058 &#8211; An Interview with John Savage</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-058/">Show 058 &#8211; An Interview with John Savage</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/jsavage-125.png" alt="John Savage" align="right" /></p>
<p>On the 58th episode of The Silver Bullet Security Podcast, Gary talks with John Savage, professor of Computer Science at Brown University and Jefferson Science Fellow for the State Department. Gary and John discuss whether Wikileaks is a terrorist organization, if the use of a cyber-weapon like Stuxnet can be a morally justified act, and the implications of computational nanotechnology on cybersecurity.</p>
<ul>
<li><a href="http://www.cs.brown.edu/~jes/">John Savage at Brown University</a></li>
<li><a href="http://sites.nationalacademies.org/PGA/Jefferson/PGA_052045">Jefferson Science Fellow: Dr. John Savage</a></li>
<li><a href="http://en.wikipedia.org/wiki/International_Telecommunication_Union">International Telecommunication Union</a></li>
<li><a href="https://www.cigital.com/podcasts/show-049/" target="_blank">Silver Bullet #49: Ivan Arce</a></li>
<li><a href="http://www.amazon.com/Girl-Dragon-Tattoo-Stieg-Larsson/dp/0307269752"><em>The Girl with the Dragon Tattoo</em></a></li>
<li><a href="http://en.wikipedia.org/wiki/Homomorphic_encryption">Homomorphic Encryption</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-058/">Show 058 &#8211; An Interview with John Savage</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2794/0/silverbullet-058.mp3" length="42365056" type="audio/mpeg" />
		<itunes:duration>0:29:23</itunes:duration>
		<itunes:subtitle>
On the 58th episode of The Silver Bullet Security Podcast, Gary talks with John Savage, professor of Computer Science at Brown University and Jefferson Science Fellow for the State Department. Gary and John discuss whether Wikileaks is a terrorist [...]</itunes:subtitle>
		<itunes:summary>
On the 58th episode of The Silver Bullet Security Podcast, Gary talks with John Savage, professor of Computer Science at Brown University and Jefferson Science Fellow for the State Department. Gary and John discuss whether Wikileaks is a terrorist organization, if the use of a cyber-weapon like Stuxnet can be a morally justified act, and the implications of computational nanotechnology on cybersecurity.

John Savage at Brown University
Jefferson Science Fellow: Dr. John Savage
International Telecommunication Union
Silver Bullet #49: Ivan Arce
The Girl with the Dragon Tattoo
Homomorphic Encryption

The post Show 058 &#8211; An Interview with John Savage appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 058 &#8211; An Interview with John Savage appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 057 &#8211; An Interview with Elinor Mills</title>
		<link>https://www.cigital.com/podcasts/show-057/</link>
		<pubDate>Thu, 23 Dec 2010 15:10:09 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-057/</guid>
		<description><![CDATA[<p>On the 57th Silver Bullet Security Podcast, Gary talks with Elinor Mills, senior writer at CNET&#8217;s news.com. At CNET, Elinor covers Internet technology and security. Gary and Elinor discuss how writing about technology for news organizations has changed over the last 20 years, how technology adoption in Portugal differs from the States, WikiLeaks and the &#8230; <a href="https://www.cigital.com/podcasts/show-057/" class="more-link">Continue reading <span class="screen-reader-text">Show 057 &#8211; An Interview with Elinor Mills</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-057/">Show 057 &#8211; An Interview with Elinor Mills</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/emills-100.png" alt="Elinor Mills" align="right" /></p>
<p>On the 57th Silver Bullet Security Podcast, Gary talks with Elinor Mills, senior writer at CNET&#8217;s news.com. At CNET, Elinor covers Internet technology and security. Gary and Elinor discuss how writing about technology for news organizations has changed over the last 20 years, how technology adoption in Portugal differs from the States, WikiLeaks and the First Amendment, avoiding FUD when covering a breaking news story about security, and Burning Man. They close the episode with a brief discussion of Elinor&#8217;s favorite books.</p>
<ul>
<li><a href="http://www.cnet.com/profile/elinormills/">Elinor at CNET</a></li>
<li><a href="http://news.cnet.com/insecurity-complex/">Insecurity Complex</a> &#8211; Elinor&#8217;s blog</li>
<li><a href="http://twitter.com/elinormills">Elinor on Twitter</a></li>
<li><a href="http://www.dramainthedesert.com/"><em>Drama in the Desert: Sights and Sounds of Burning Man</em></a> / <a href="http://www.raisedbarnpress.com/">Raised Barn Press</a></li>
<li><a href="http://news.cnet.com/8301-27080_3-20024210-245.html?tag=cnetRiver">Demilitarizing cybersecurity (Q&amp;A)</a></li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1636983">How to p0wn a Control System with Stuxnet</a></li>
<li><a href="http://www.intelius.com/">Intellus</a></li>
<li><a href="http://www.reputationdefender.com/">Reputation Defender</a></li>
<li><a href="http://www.eatinganimals.com/"><em>Eating Animals</em></a></li>
<li><a href="http://www.amazon.com/Corrections-Novel-Jonathan-Franzen/dp/0312421273"><em>The Corrections</em></a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-057/">Show 057 &#8211; An Interview with Elinor Mills</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2778/0/silverbullet-057.mp3" length="44368000" type="audio/mpeg" />
		<itunes:duration>0:30:47</itunes:duration>
		<itunes:subtitle>
On the 57th Silver Bullet Security Podcast, Gary talks with Elinor Mills, senior writer at CNET&#8217;s news.com. At CNET, Elinor covers Internet technology and security. Gary and Elinor discuss how writing about technology for news organizations h[...]</itunes:subtitle>
		<itunes:summary>
On the 57th Silver Bullet Security Podcast, Gary talks with Elinor Mills, senior writer at CNET&#8217;s news.com. At CNET, Elinor covers Internet technology and security. Gary and Elinor discuss how writing about technology for news organizations has changed over the last 20 years, how technology adoption in Portugal differs from the States, WikiLeaks and the First Amendment, avoiding FUD when covering a breaking news story about security, and Burning Man. They close the episode with a brief discussion of Elinor&#8217;s favorite books.

Elinor at CNET
Insecurity Complex &#8211; Elinor&#8217;s blog
Elinor on Twitter
Drama in the Desert: Sights and Sounds of Burning Man / Raised Barn Press
Demilitarizing cybersecurity (Q&#38;A)
How to p0wn a Control System with Stuxnet
Intellus
Reputation Defender
Eating Animals
The Corrections

The post Show 057 &#8211; An Interview with Elinor Mills appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 057 &#8211; An Interview with Elinor Mills appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 056 &#8211; An Interview with Sammy Migues</title>
		<link>https://www.cigital.com/podcasts/show-056/</link>
		<pubDate>Tue, 30 Nov 2010 13:32:05 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[BSIMM]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[bugs]]></category>
		<category><![CDATA[Cigital leadership]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-056/</guid>
		<description><![CDATA[<p>On the 56th Silver Bullet Security Podcast, Gary sits down with Sammy Migues, Principal and Director of Knowledge Management at Cigital. Gary and Sammy discuss how Sammy&#8217;s southern upbringing affects his approach to security, his experience speaking to the National Rural Electric Cooperative Association, the advantages of defensive programming versus &#8220;the bug parade&#8221; and the &#8230; <a href="https://www.cigital.com/podcasts/show-056/" class="more-link">Continue reading <span class="screen-reader-text">Show 056 &#8211; An Interview with Sammy Migues</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-056/">Show 056 &#8211; An Interview with Sammy Migues</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/smigues-125.png" alt="Sammy Migues" align="right" /></p>
<p>On the 56th Silver Bullet Security Podcast, Gary sits down with Sammy Migues, Principal and Director of Knowledge Management at Cigital. Gary and Sammy discuss how Sammy&#8217;s southern upbringing affects his approach to security, his experience speaking to the National Rural Electric Cooperative Association, the advantages of defensive programming versus &#8220;the bug parade&#8221; and the BSIMM. They close the show out discussing bourbon. As a bonus, Sammy may be the first person to ever use the phrase &#8220;flips my bogometer&#8221; on a podcast.</p>
<ul>
<li><a href="http://bsimm.com/">BSIMM</a></li>
<li><a href="http://en.wikipedia.org/wiki/Trusted_Computer_System_Evaluation_Criteria"><em>Trusted Computer System Evaluation Criteria</em></a> &#8211; aka &#8220;The Orange Book&#8221;</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-056/">Show 056 &#8211; An Interview with Sammy Migues</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2779/0/silverbullet-056.mp3" length="38283392" type="audio/mpeg" />
		<itunes:duration>0:26:33</itunes:duration>
		<itunes:subtitle>
On the 56th Silver Bullet Security Podcast, Gary sits down with Sammy Migues, Principal and Director of Knowledge Management at Cigital. Gary and Sammy discuss how Sammy&#8217;s southern upbringing affects his approach to security, his experience s[...]</itunes:subtitle>
		<itunes:summary>
On the 56th Silver Bullet Security Podcast, Gary sits down with Sammy Migues, Principal and Director of Knowledge Management at Cigital. Gary and Sammy discuss how Sammy&#8217;s southern upbringing affects his approach to security, his experience speaking to the National Rural Electric Cooperative Association, the advantages of defensive programming versus &#8220;the bug parade&#8221; and the BSIMM. They close the show out discussing bourbon. As a bonus, Sammy may be the first person to ever use the phrase &#8220;flips my bogometer&#8221; on a podcast.

BSIMM
Trusted Computer System Evaluation Criteria &#8211; aka &#8220;The Orange Book&#8221;

The post Show 056 &#8211; An Interview with Sammy Migues appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 056 &#8211; An Interview with Sammy Migues appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>BSIMM, Energy</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 055 &#8211; An Interview with Deborah Frincke</title>
		<link>https://www.cigital.com/podcasts/show-055/</link>
		<pubDate>Fri, 29 Oct 2010 15:03:29 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-055/</guid>
		<description><![CDATA[<p>On the 55th Silver Bullet Security Podcast, Gary chats with Deborah Frincke, Chief Scientist, Cybersecurity at Pacific Northwest National Laboratory. Gary and Deb discuss the differences between being a professor and a researcher, whether a professional certification is better than an academic degree, and how a woman&#8217;s reasons for getting into the computer security field &#8230; <a href="https://www.cigital.com/podcasts/show-055/" class="more-link">Continue reading <span class="screen-reader-text">Show 055 &#8211; An Interview with Deborah Frincke</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-055/">Show 055 &#8211; An Interview with Deborah Frincke</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/wp-content/uploads/2010/10/dfrincke-125.png" alt="Deborah Frincke" width="125" height="189" align="right" /></p>
<p>On the 55th Silver Bullet Security Podcast, Gary chats with Deborah Frincke, Chief Scientist, Cybersecurity at Pacific Northwest National Laboratory. Gary and Deb discuss the differences between being a professor and a researcher, whether a professional certification is better than an academic degree, and how a woman&#8217;s reasons for getting into the computer security field may differ from a man&#8217;s. They close out the episode by talking flowers.</p>
<ul>
<li><a href="http://www.twitter.com/frincke">Deborah Frincke on Twitter</a></li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1648912">Software [In]security: Technology Transfer</a>, informIT</li>
<li><a href="http://www.pnl.gov/">Pacific Northwest National Labs</a></li>
<li><a href="http://www.uidaho.edu/engr/cs/">University of Idaho Computer Science</a></li>
<li><a href="http://www.uidaho.edu/mrci/csds">University of Idaho Center for Secure &amp; Dependable Systems</a></li>
<li><a href="http://www.nsa.gov/ia/academic_outreach/nat_cae/index.shtml">NSA National Centers of Academic Excellence</a></li>
<li><a href="http://en.wikipedia.org/wiki/Orchidaceae">Orchidaceae</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-055/">Show 055 &#8211; An Interview with Deborah Frincke</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2842/0/silverbullet-055.mp3" length="32100480" type="audio/mpeg" />
		<itunes:duration>0:22:16</itunes:duration>
		<itunes:subtitle>
On the 55th Silver Bullet Security Podcast, Gary chats with Deborah Frincke, Chief Scientist, Cybersecurity at Pacific Northwest National Laboratory. Gary and Deb discuss the differences between being a professor and a researcher, whether a profess[...]</itunes:subtitle>
		<itunes:summary>
On the 55th Silver Bullet Security Podcast, Gary chats with Deborah Frincke, Chief Scientist, Cybersecurity at Pacific Northwest National Laboratory. Gary and Deb discuss the differences between being a professor and a researcher, whether a professional certification is better than an academic degree, and how a woman&#8217;s reasons for getting into the computer security field may differ from a man&#8217;s. They close out the episode by talking flowers.

Deborah Frincke on Twitter
Software [In]security: Technology Transfer, informIT
Pacific Northwest National Labs
University of Idaho Computer Science
University of Idaho Center for Secure &#38; Dependable Systems
NSA National Centers of Academic Excellence
Orchidaceae

The post Show 055 &#8211; An Interview with Deborah Frincke appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 055 &#8211; An Interview with Deborah Frincke appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Decades Science Fiction with Marc Donner</title>
		<link>https://www.cigital.com/podcasts/show-054/</link>
		<pubDate>Mon, 27 Sep 2010 16:28:37 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cyber war]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-054/</guid>
		<description><![CDATA[<p>On the 54th Silver Bullet Security Podcast, Gary talks with Dr. Marc Donner, engineering director for Google Health and Google Finance. Gary and Marc discuss science-fiction books from the last decade, why Americans like to talk about cyberwarfare, and security issues and privacy concerns as related to Google Health initiatives. They finish up their discussion &#8230; <a href="https://www.cigital.com/podcasts/show-054/" class="more-link">Continue reading <span class="screen-reader-text">The Decades Science Fiction with Marc Donner</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-054/">The Decades Science Fiction with Marc Donner</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/mdonner-125.png" alt="Marc Donner" align="right" /></p>
<p>On the 54th Silver Bullet Security Podcast, Gary talks with Dr. Marc Donner, engineering director for Google Health and Google Finance. Gary and Marc discuss science-fiction books from the last decade, why Americans like to talk about cyberwarfare, and security issues and privacy concerns as related to Google Health initiatives. They finish up their discussion by talking about the <a href="http://www.cs.wustl.edu/~cytron/FAQ/Syrup/donner.html">Syrup Wars</a>.</p>
<ul>
<li><a href="http://www.google.com/profiles/marc.donner">Marc Donner</a></li>
<li><a href="http://nygeek.wordpress.com/">hacks from the bleeding edge</a> (Marc&#8217;s blog)</li>
<li><a href="http://www.amazon.com/Iron-Sunrise-Singularity-Charles-Stross/dp/0441012965"><em>Iron Sunrise</em></a>, <a href="http://www.amazon.com/gp/product/0441011799/ref=pd_lpo_k2_dp_sr_1?pf_rd_p=486539851&amp;pf_rd_s=lpo-top-stripe-1&amp;pf_rd_t=201&amp;pf_rd_i=0441012965&amp;pf_rd_m=ATVPDKIKX0DER&amp;pf_rd_r=0W34X7AEEVA9ASFW61FH"><em>Singularity Sky</em></a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-054/">The Decades Science Fiction with Marc Donner</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2747/0/silverbullet-054.mp3" length="40218752" type="audio/mpeg" />
		<itunes:duration>0:27:54</itunes:duration>
		<itunes:subtitle>
On the 54th Silver Bullet Security Podcast, Gary talks with Dr. Marc Donner, engineering director for Google Health and Google Finance. Gary and Marc discuss science-fiction books from the last decade, why Americans like to talk about cyberwarfare,[...]</itunes:subtitle>
		<itunes:summary>
On the 54th Silver Bullet Security Podcast, Gary talks with Dr. Marc Donner, engineering director for Google Health and Google Finance. Gary and Marc discuss science-fiction books from the last decade, why Americans like to talk about cyberwarfare, and security issues and privacy concerns as related to Google Health initiatives. They finish up their discussion by talking about the Syrup Wars.

Marc Donner
hacks from the bleeding edge (Marc&#8217;s blog)
Iron Sunrise, Singularity Sky

The post The Decades Science Fiction with Marc Donner appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Decades Science Fiction with Marc Donner appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Healthcare</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Network Security Best Practices with Richard Bejtlich</title>
		<link>https://www.cigital.com/podcasts/show-053/</link>
		<pubDate>Mon, 23 Aug 2010 16:44:23 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Energy]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[SMB]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-053/</guid>
		<description><![CDATA[<p>On the 53rd episode of The Silver Bullet Security Podcast, Gary interviews Richard Bejtlich, Director of Incident Response for General Electric and Principal Technologist for GE&#8217;s Global Infrastructure Services division. They discuss whether it&#8217;s better to look for known problems or anomalies when performing network security monitoring, how to explain security incidents to &#8220;business guys,&#8221; &#8230; <a href="https://www.cigital.com/podcasts/show-053/" class="more-link">Continue reading <span class="screen-reader-text">Network Security Best Practices with Richard Bejtlich</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-053/">Network Security Best Practices with Richard Bejtlich</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/rbejtlich-125.png" alt="Richard Bejtlich" align="right" /></p>
<p>On the 53rd episode of The Silver Bullet Security Podcast, Gary interviews Richard Bejtlich, Director of Incident Response for General Electric and Principal Technologist for GE&#8217;s Global Infrastructure Services division. They discuss whether it&#8217;s better to look for known problems or anomalies when performing network security monitoring, how to explain security incidents to &#8220;business guys,&#8221; the notion of “building visibility in,” and the difference between working as an independent consultant in a very small shop and working in a large corporation.</p>
<ul>
<li><a href="http://taosecurity.blogspot.com/">TaoSecurity blog</a></li>
<li><a href="https://www.cigital.com/podcasts/show-019/" target="_blank">Silver Bullet #19: Mikko Hyppönen</a></li>
<li><a href="https://www.cigital.com/podcasts/show-041/" target="_blank">Silver Bullet #41: Fred Schneider</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-053/">Network Security Best Practices with Richard Bejtlich</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2748/0/silverbullet-053.mp3" length="45916288" type="audio/mpeg" />
		<itunes:duration>0:31:51</itunes:duration>
		<itunes:subtitle>
On the 53rd episode of The Silver Bullet Security Podcast, Gary interviews Richard Bejtlich, Director of Incident Response for General Electric and Principal Technologist for GE&#8217;s Global Infrastructure Services division. They discuss whether [...]</itunes:subtitle>
		<itunes:summary>
On the 53rd episode of The Silver Bullet Security Podcast, Gary interviews Richard Bejtlich, Director of Incident Response for General Electric and Principal Technologist for GE&#8217;s Global Infrastructure Services division. They discuss whether it&#8217;s better to look for known problems or anomalies when performing network security monitoring, how to explain security incidents to &#8220;business guys,&#8221; the notion of “building visibility in,” and the difference between working as an independent consultant in a very small shop and working in a large corporation.

TaoSecurity blog
Silver Bullet #19: Mikko Hyppönen
Silver Bullet #41: Fred Schneider

The post Network Security Best Practices with Richard Bejtlich appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Network Security Best Practices with Richard Bejtlich appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Energy</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>A Breakdown of Security Analysis with Paul Kocher</title>
		<link>https://www.cigital.com/podcasts/show-052/</link>
		<pubDate>Wed, 21 Jul 2010 10:18:24 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cryptography]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-052/</guid>
		<description><![CDATA[<p>On the 52nd episode of The Silver Bullet Security Podcast, Gary chats with Paul Kocher, President and Chief Scientist of Cryptography Research. Gary and Paul discuss the first system that Paul ever broke, whether engineers and architects need to think like the &#8220;bad guys&#8221; or not, the decision to put content protection on Blu-Ray discs &#8230; <a href="https://www.cigital.com/podcasts/show-052/" class="more-link">Continue reading <span class="screen-reader-text">A Breakdown of Security Analysis with Paul Kocher</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-052/">A Breakdown of Security Analysis with Paul Kocher</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/pkocher-125.png" alt="Paul Kocher" align="right" /></p>
<p>On the 52nd episode of The Silver Bullet Security Podcast, Gary chats with Paul Kocher, President and Chief Scientist of Cryptography Research. Gary and Paul discuss the first system that Paul ever broke, whether engineers and architects need to think like the &#8220;bad guys&#8221; or not, the decision to put content protection on Blu-Ray discs rather than the player, and whether P=NP.</p>
<ul>
<li><a href="http://www.cryptography.com/">Cryptography Research</a> (<a href="http://www.cryptography.com/company/profiles/paul-kocher.html">Paul @ Cryptography Research</a>)</li>
<li><a href="http://www.wired.com/threatlevel/2008/02/how-crypto-won/">How Crypto Won the DVD War</a></li>
<li><a href="http://www.rovicorp.com/company/newscenter/pressreleases/1434_7711.htm">Macrovision to Acquire Blu-ray Disc Security Technology from Cryptography Research, Inc.</a> (press release)</li>
<li><a href="http://en.wikipedia.org/wiki/P_versus_NP_problem">P versus NP problem</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-052/">A Breakdown of Security Analysis with Paul Kocher</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2749/0/silverbullet-052.mp3" length="39264384" type="audio/mpeg" />
		<itunes:duration>0:27:14</itunes:duration>
		<itunes:subtitle>
On the 52nd episode of The Silver Bullet Security Podcast, Gary chats with Paul Kocher, President and Chief Scientist of Cryptography Research. Gary and Paul discuss the first system that Paul ever broke, whether engineers and architects need to th[...]</itunes:subtitle>
		<itunes:summary>
On the 52nd episode of The Silver Bullet Security Podcast, Gary chats with Paul Kocher, President and Chief Scientist of Cryptography Research. Gary and Paul discuss the first system that Paul ever broke, whether engineers and architects need to think like the &#8220;bad guys&#8221; or not, the decision to put content protection on Blu-Ray discs rather than the player, and whether P=NP.

Cryptography Research (Paul @ Cryptography Research)
How Crypto Won the DVD War
Macrovision to Acquire Blu-ray Disc Security Technology from Cryptography Research, Inc. (press release)
P versus NP problem

The post A Breakdown of Security Analysis with Paul Kocher appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post A Breakdown of Security Analysis with Paul Kocher appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Startup versus Government Research with Anup Ghosh</title>
		<link>https://www.cigital.com/podcasts/show-051/</link>
		<pubDate>Fri, 25 Jun 2010 13:29:09 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Retail]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[SMB]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-051/</guid>
		<description><![CDATA[<p>On the 51st episode of The Silver Bullet Security Podcast, Gary talks with former co-worker Dr. Anup Ghosh. Anup has authored three books on e-commerce security and over 40 peer-reviewed articles and is founder and chief scientist of Invincea. Gary and Anup discuss the difference between working in a startup and in government research, why &#8230; <a href="https://www.cigital.com/podcasts/show-051/" class="more-link">Continue reading <span class="screen-reader-text">Startup versus Government Research with Anup Ghosh</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-051/">Startup versus Government Research with Anup Ghosh</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/aghosh-125.png" alt="Anup Ghosh" align="right" /></p>
<p>On the 51st episode of The Silver Bullet Security Podcast, Gary talks with former co-worker Dr. Anup Ghosh. Anup has authored three books on e-commerce security and over 40 peer-reviewed articles and is founder and chief scientist of Invincea. Gary and Anup discuss the difference between working in a startup and in government research, why antivirus doesn&#8217;t work against the ZeuS botnet and what businesses should do to protect themselves, and the relevance of the desktop in the future of computing. They close out with a discussion about Anup&#8217;s favorite newspapers and recent books.</p>
<ul>
<li><a href="http://www.invincea.com/">Invincea</a></li>
<li><a href="http://www.amazon.com/gp/search/ref=sr_nr_p_n_feature_browse-b_0?rh=i%3Astripbooks%2Cn%3A%211000%2Cp_27%3AAnup+K.+Ghosh%2Cp_n_feature_browse-bin%3A618083011&amp;bbn=1000&amp;sort=relevancerank&amp;ie=UTF8&amp;qid=1277406212&amp;rnid=618072011">Anup&#8217;s books on Amazon</a></li>
<li><a href="http://www.atp.nist.gov/">Advanced Technology Program</a></li>
<li><a href="http://www.invincea.com/wordpress/?p=738">Why Patching Isn’t Enough</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-051/">Startup versus Government Research with Anup Ghosh</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2750/0/silverbullet-051.mp3" length="47690861" type="audio/mpeg" />
		<itunes:duration>0:33:07</itunes:duration>
		<itunes:subtitle>
On the 51st episode of The Silver Bullet Security Podcast, Gary talks with former co-worker Dr. Anup Ghosh. Anup has authored three books on e-commerce security and over 40 peer-reviewed articles and is founder and chief scientist of Invincea. Gary[...]</itunes:subtitle>
		<itunes:summary>
On the 51st episode of The Silver Bullet Security Podcast, Gary talks with former co-worker Dr. Anup Ghosh. Anup has authored three books on e-commerce security and over 40 peer-reviewed articles and is founder and chief scientist of Invincea. Gary and Anup discuss the difference between working in a startup and in government research, why antivirus doesn&#8217;t work against the ZeuS botnet and what businesses should do to protect themselves, and the relevance of the desktop in the future of computing. They close out with a discussion about Anup&#8217;s favorite newspapers and recent books.

Invincea
Anup&#8217;s books on Amazon
Advanced Technology Program
Why Patching Isn’t Enough

The post Startup versus Government Research with Anup Ghosh appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Startup versus Government Research with Anup Ghosh appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Retail</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Lacking Defense in Cyber War with Richard Clarke</title>
		<link>https://www.cigital.com/podcasts/show-050/</link>
		<pubDate>Tue, 01 Jun 2010 15:01:02 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cyber war]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-050/</guid>
		<description><![CDATA[<p>On the landmark 50th episode of Silver Bullet, Gary talks with Richard A. Clarke. Richard Clarke is an internationally-recognized expert on security, including homeland security, national security, cyber security, and counterterrorism. Gary and Dick discuss what needs to change in order for the United States to focus more attention on defense against cyber war (as &#8230; <a href="https://www.cigital.com/podcasts/show-050/" class="more-link">Continue reading <span class="screen-reader-text">Lacking Defense in Cyber War with Richard Clarke</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-050/">Lacking Defense in Cyber War with Richard Clarke</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>On the landmark 50th episode of Silver Bullet, Gary talks with Richard A. Clarke. Richard Clarke is an internationally-recognized expert on security, including homeland security, national security, cyber security, and counterterrorism. Gary and Dick discuss what needs to change in order for the United States to focus more attention on defense against cyber war (as opposed to offense). They also discuss the importance of software security in preventing cyber crime and cyber war, network scanning as a part of Dick&#8217;s &#8220;Defensive Triad,&#8221; and balancing cybersecurity against individual liberty. We also uncover whether being a guest on Silver Bullet is more stressful than being on <em>The Colbert Report</em>.</p>
<p>This special edition of Silver Bullet was also captured on video. View the video below (for those on feed readers, go to <a href="https://www.cigital.com/podcasts/show-050/">this episode&#8217;s page</a> for the video):</p>
<div align="center"><iframe width="560" height="315" src="https://www.youtube.com/embed/videoseries?list=PLE8B0493CB85431CB&amp;hl=en_US" frameborder="0"></iframe></div>
<ul>
<li><a href="http://www.9-11commission.gov/report/911Report.pdf">9/11 Commission Report</a></li>
<li><a href="http://www.computerworld.com/s/article/9176566/What_if_the_smart_grid_has_stupid_security">What if the smart grid has stupid security?</a></li>
<li>Select TV appearances: <a href="http://www.thedailyshow.com/watch/thu-may-29-2008/richard-clarke">The Daily Show</a> (2008) / <a href="http://www.colbertnation.com/the-colbert-report-videos/80961/january-17-2007/richard-clarke">The Colbert Report</a> (2007) / <a href="http://www.colbertnation.com/the-colbert-report-videos/35756/december-01-2005/richard-clarke">The Colbert Report</a> (2005) / <a href="http://www.cbsnews.com/stories/2004/03/19/60minutes/main607356.shtml">60 Minutes</a> (2004)</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-050/">Lacking Defense in Cyber War with Richard Clarke</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2751/0/silverbullet-050.mp3" length="48566400" type="audio/mpeg" />
		<itunes:duration>0:33:42</itunes:duration>
		<itunes:subtitle>On the landmark 50th episode of Silver Bullet, Gary talks with Richard A. Clarke. Richard Clarke is an internationally-recognized expert on security, including homeland security, national security, cyber security, and counterterrorism. Gary and Dick[...]</itunes:subtitle>
		<itunes:summary>On the landmark 50th episode of Silver Bullet, Gary talks with Richard A. Clarke. Richard Clarke is an internationally-recognized expert on security, including homeland security, national security, cyber security, and counterterrorism. Gary and Dick discuss what needs to change in order for the United States to focus more attention on defense against cyber war (as opposed to offense). They also discuss the importance of software security in preventing cyber crime and cyber war, network scanning as a part of Dick&#8217;s &#8220;Defensive Triad,&#8221; and balancing cybersecurity against individual liberty. We also uncover whether being a guest on Silver Bullet is more stressful than being on The Colbert Report.
This special edition of Silver Bullet was also captured on video. View the video below (for those on feed readers, go to this episode&#8217;s page for the video):


9/11 Commission Report
What if the smart grid has stupid security?
Select TV appearances: The Daily Show (2008) / The Colbert Report (2007) / The Colbert Report (2005) / 60 Minutes (2004)

The post Lacking Defense in Cyber War with Richard Clarke appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Lacking Defense in Cyber War with Richard Clarke appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Imitating the Attackers Prespective with Ivan Arce</title>
		<link>https://www.cigital.com/podcasts/show-049/</link>
		<pubDate>Fri, 30 Apr 2010 10:01:32 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Independent Software Vendors]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[vulnerabilities]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-049/</guid>
		<description><![CDATA[<p>On the 49th episode of The Silver Bullet Security Podcast, Gary talks with Ivan Arce, co-founder and CTO of Core Security Technologies. Gary and Ivan discuss whether teaching builders to think like attackers is worthwhile, how living in Argentina both helps and hinders a career in computer security, the current state of embedded systems attacks, &#8230; <a href="https://www.cigital.com/podcasts/show-049/" class="more-link">Continue reading <span class="screen-reader-text">Imitating the Attackers Prespective with Ivan Arce</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-049/">Imitating the Attackers Prespective with Ivan Arce</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/iarce-125.png" alt="Ivan Arce" align="right" /></p>
<p>On the 49th episode of The Silver Bullet Security Podcast, Gary talks with Ivan Arce, co-founder and CTO of Core Security Technologies. Gary and Ivan discuss whether teaching builders to think like attackers is worthwhile, how living in Argentina both helps and hinders a career in computer security, the current state of embedded systems attacks, and Ivan&#8217;s ongoing disagreement with Microsoft about Virtual PC vulnerabilities. They close things out with a discussion of science fiction books and whether scotch trumps bourbon.</p>
<ul>
<li><a href="http://www.coresecurity.com/">Core Security Technologies</a></li>
<li><a href="http://www.coresecurity.com/content/virtual-pc-2007-hypervisor-memory-protection-bug">Security vulnerability in Microsoft’s Virtual PC</a></li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1588145">Assume Nothing: Is Microsoft Forgetting a Crucial Security Lesson?</a></li>
<li><a href="http://www.jus.uio.no/sisu/accelerando.charles_stross/sisu_manifest.html">SiSU manifest of document filetypes and metadata</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-049/">Imitating the Attackers Prespective with Ivan Arce</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2752/0/silverbullet-049.mp3" length="52990080" type="audio/mpeg" />
		<itunes:duration>0:36:47</itunes:duration>
		<itunes:subtitle>
On the 49th episode of The Silver Bullet Security Podcast, Gary talks with Ivan Arce, co-founder and CTO of Core Security Technologies. Gary and Ivan discuss whether teaching builders to think like attackers is worthwhile, how living in Argentina b[...]</itunes:subtitle>
		<itunes:summary>
On the 49th episode of The Silver Bullet Security Podcast, Gary talks with Ivan Arce, co-founder and CTO of Core Security Technologies. Gary and Ivan discuss whether teaching builders to think like attackers is worthwhile, how living in Argentina both helps and hinders a career in computer security, the current state of embedded systems attacks, and Ivan&#8217;s ongoing disagreement with Microsoft about Virtual PC vulnerabilities. They close things out with a discussion of science fiction books and whether scotch trumps bourbon.

Core Security Technologies
Security vulnerability in Microsoft’s Virtual PC
Assume Nothing: Is Microsoft Forgetting a Crucial Security Lesson?
SiSU manifest of document filetypes and metadata

The post Imitating the Attackers Prespective with Ivan Arce appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Imitating the Attackers Prespective with Ivan Arce appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Changes in Security Compliance with Andrew Jaquith</title>
		<link>https://www.cigital.com/podcasts/show-048/</link>
		<pubDate>Thu, 25 Mar 2010 11:29:08 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Regulatory Compliance]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[security metrics]]></category>
		<category><![CDATA[social media]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-048/</guid>
		<description><![CDATA[<p>On the 48th episode of The Silver Bullet Security Podcast, Gary interviews Andrew Jaquith, senior analyst at Forrester. Gary and Andy discuss how security has become overrun by compliance in the biggest change to corporate security in 15 years, the battle between social networking technology use in the workplace (think Twitter, Facebook, AIM&#8230;) and security, &#8230; <a href="https://www.cigital.com/podcasts/show-048/" class="more-link">Continue reading <span class="screen-reader-text">Changes in Security Compliance with Andrew Jaquith</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-048/">Changes in Security Compliance with Andrew Jaquith</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/ajaquith-125.png" alt="Andrew Jaquith" align="right" /></p>
<p>On the 48th episode of The Silver Bullet Security Podcast, Gary interviews Andrew Jaquith, senior analyst at Forrester. Gary and Andy discuss how security has become overrun by compliance in the biggest change to corporate security in 15 years, the battle between social networking technology use in the workplace (think Twitter, Facebook, AIM&#8230;) and security, security metrics (or lack of such), and Andy&#8217;s latest musical find.</p>
<ul>
<li><a href="https://twitter.com/ARJ">Andy on Twitter</a></li>
<li><a href="https://www.forrester.com/Data+Security+Predictions+For+2010/fulltext/-/E-RES55857?docid=55857">Data Security Predictions For 2010</a> (December 02, 2009)</li>
<li><a href="https://www.forrester.com/Know+Your+Code+How+Static+Analysis+Tools+Make+Applications+More+Secure/fulltext/-/E-RES55716?docid=55716">Know Your Code: How Static Analysis Tools Make Applications More Secure</a> (November 20, 2009)</li>
<li><a href="https://www.bsimm.com">BSIMM</a></li>
<li><a href="https://en.wikipedia.org/wiki/@stake">@stake</a></li>
<li><a href="https://www.amazon.com/Security-Metrics-Replacing-Uncertainty-Doubt/dp/0321349989"><em>Security Metrics: Replacing Fear, Uncertainty, and Doubt</em></a></li>
<li><a href="https://en.wikipedia.org/wiki/S/MIME">S/MIME</a></li>
<li><a href="https://www.cigital.com/podcasts/show-026/" target="_blank">Silver Bullet #26: Adam Shostack</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-048/">Changes in Security Compliance with Andrew Jaquith</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2753/0/silverbullet-048.mp3" length="43982976" type="audio/mpeg" />
		<itunes:duration>0:30:32</itunes:duration>
		<itunes:subtitle>
On the 48th episode of The Silver Bullet Security Podcast, Gary interviews Andrew Jaquith, senior analyst at Forrester. Gary and Andy discuss how security has become overrun by compliance in the biggest change to corporate security in 15 years, the[...]</itunes:subtitle>
		<itunes:summary>
On the 48th episode of The Silver Bullet Security Podcast, Gary interviews Andrew Jaquith, senior analyst at Forrester. Gary and Andy discuss how security has become overrun by compliance in the biggest change to corporate security in 15 years, the battle between social networking technology use in the workplace (think Twitter, Facebook, AIM&#8230;) and security, security metrics (or lack of such), and Andy&#8217;s latest musical find.

Andy on Twitter
Data Security Predictions For 2010 (December 02, 2009)
Know Your Code: How Static Analysis Tools Make Applications More Secure (November 20, 2009)
BSIMM
@stake
Security Metrics: Replacing Fear, Uncertainty, and Doubt
S/MIME
Silver Bullet #26: Adam Shostack

The post Changes in Security Compliance with Andrew Jaquith appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Changes in Security Compliance with Andrew Jaquith appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Security&#8217;s need for Languages with Greg Morrisett</title>
		<link>https://www.cigital.com/podcasts/show-047/</link>
		<pubDate>Sun, 28 Feb 2010 12:43:13 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[java]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-047/</guid>
		<description><![CDATA[<p>On the 47th episode of The Silver Bullet Security Podcast, Gary calls in from Leuven, Belgium to chat with childhood friend and security expert Greg Morrisett. Greg is the Allen B. Cutting Professor of Computer Science and Associate Dean for Computer Science and Engineering in the School of Engineering and Applied Sciences at Harvard University. &#8230; <a href="https://www.cigital.com/podcasts/show-047/" class="more-link">Continue reading <span class="screen-reader-text">Security&#8217;s need for Languages with Greg Morrisett</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-047/">Security&#8217;s need for Languages with Greg Morrisett</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/gmorrisett-125.png" alt="Greg Morrisett" align="right" /></p>
<p>On the 47th episode of The Silver Bullet Security Podcast, Gary calls in from Leuven, Belgium to chat with childhood friend and security expert Greg Morrisett. Greg is the Allen B. Cutting Professor of Computer Science and Associate Dean for Computer Science and Engineering in the School of Engineering and Applied Sciences at Harvard University. Gary and Greg discuss the relationship between security and programming languages, why the choice of a good programming language (and/or VM) is more important than code review, sensor networks and security, information control, and Gary and Greg&#8217;s most embarrassing moment from adolescence.</p>
<ul>
<li><a href="http://www.eecs.harvard.edu/~greg/">Greg Morrisett</a></li>
<li><a href="http://www.crcs.deas.harvard.edu/">The Center for Research on Computation and Society</a></li>
<li><a href="http://ynot.cs.harvard.edu/">Ynot</a></li>
<li><a href="http://robobees.seas.harvard.edu/">RoboBees</a></li>
<li><a href="http://sos.cse.lehigh.edu/gonative/">GoNative</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-047/">Security&#8217;s need for Languages with Greg Morrisett</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2754/0/silverbullet-047.mp3" length="41773184" type="audio/mpeg" />
		<itunes:duration>0:29:00</itunes:duration>
		<itunes:subtitle>
On the 47th episode of The Silver Bullet Security Podcast, Gary calls in from Leuven, Belgium to chat with childhood friend and security expert Greg Morrisett. Greg is the Allen B. Cutting Professor of Computer Science and Associate Dean for Comput[...]</itunes:subtitle>
		<itunes:summary>
On the 47th episode of The Silver Bullet Security Podcast, Gary calls in from Leuven, Belgium to chat with childhood friend and security expert Greg Morrisett. Greg is the Allen B. Cutting Professor of Computer Science and Associate Dean for Computer Science and Engineering in the School of Engineering and Applied Sciences at Harvard University. Gary and Greg discuss the relationship between security and programming languages, why the choice of a good programming language (and/or VM) is more important than code review, sensor networks and security, information control, and Gary and Greg&#8217;s most embarrassing moment from adolescence.

Greg Morrisett
The Center for Research on Computation and Society
Ynot
RoboBees
GoNative

The post Security&#8217;s need for Languages with Greg Morrisett appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Security&#8217;s need for Languages with Greg Morrisett appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>A Look Inside Infowar with David Rice</title>
		<link>https://www.cigital.com/podcasts/show-046/</link>
		<pubDate>Wed, 27 Jan 2010 12:35:22 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Web Application Security]]></category>
		<category><![CDATA[cyber war]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-046/</guid>
		<description><![CDATA[<p>On the bonus-length 46th episode of The Silver Bullet Security Podcast, Gary talks with David Rice, Executive Director of the Monterey Group and author of Geekonomics: The Real Cost of Insecure Software. Gary and David discuss David&#8217;s involvement with Infowar at the Naval Postgraduate School and how it impacted his thinking about software, the recent &#8230; <a href="https://www.cigital.com/podcasts/show-046/" class="more-link">Continue reading <span class="screen-reader-text">A Look Inside Infowar with David Rice</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-046/">A Look Inside Infowar with David Rice</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/drice-125.png" alt="David Rice" align="right" /></p>
<p>On the bonus-length 46th episode of The Silver Bullet Security Podcast, Gary talks with David Rice, Executive Director of the Monterey Group and author of <em>Geekonomics: The Real Cost of Insecure Software</em>. Gary and David discuss David&#8217;s involvement with Infowar at the Naval Postgraduate School and how it impacted his thinking about software, the recent Chinese cyberattack on Google, what incentives exist to create and apply software security best practices, how users may be mistaking marketing for security, and the SANS WhatWorks in Application Security Summit. They close out by discussing unusual yoga positions.</p>
<ul>
<li><a href="https://www.cigital.com/podcasts/show-041/" target="_blank">Silver Bullet #41 &#8211; Fred Schneider</a></li>
<li><a href="https://www.cigital.com/podcasts/show-011/" target="_blank">Silver Bullet #11 &#8211; Dorothy Denning</a></li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1338343">Software Security Comes of Age</a> (InformIT) &#8211; on the growth of the software security space</li>
<li><a href="http://www.techcrunch.com/2010/01/12/google-china-attacks/">Google Defends Against Large Scale Chinese Cyber Attack</a></li>
<li><a href="http://bsimm.com" target="_blank">BSIMM</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-046/">A Look Inside Infowar with David Rice</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2755/0/silverbullet-046.mp3" length="51990656" type="audio/mpeg" />
		<itunes:duration>0:36:06</itunes:duration>
		<itunes:subtitle>
On the bonus-length 46th episode of The Silver Bullet Security Podcast, Gary talks with David Rice, Executive Director of the Monterey Group and author of Geekonomics: The Real Cost of Insecure Software. Gary and David discuss David&#8217;s involve[...]</itunes:subtitle>
		<itunes:summary>
On the bonus-length 46th episode of The Silver Bullet Security Podcast, Gary talks with David Rice, Executive Director of the Monterey Group and author of Geekonomics: The Real Cost of Insecure Software. Gary and David discuss David&#8217;s involvement with Infowar at the Naval Postgraduate School and how it impacted his thinking about software, the recent Chinese cyberattack on Google, what incentives exist to create and apply software security best practices, how users may be mistaking marketing for security, and the SANS WhatWorks in Application Security Summit. They close out by discussing unusual yoga positions.

Silver Bullet #41 &#8211; Fred Schneider
Silver Bullet #11 &#8211; Dorothy Denning
Software Security Comes of Age (InformIT) &#8211; on the growth of the software security space
Google Defends Against Large Scale Chinese Cyber Attack
BSIMM

The post A Look Inside Infowar with David Rice appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post A Look Inside Infowar with David Rice appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Common Disregard for Privacy with Lorrie Cranor</title>
		<link>https://www.cigital.com/podcasts/show-045/</link>
		<pubDate>Fri, 18 Dec 2009 11:33:06 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-045/</guid>
		<description><![CDATA[<p>On the 45th episode of The Silver Bullet Security Podcast, Gary chats with Lorrie Cranor, Associate Professor of Computer Science and Engineering and Public Policy at Carnegie Melon University. Gary and Lorrie discuss how everyday people think about privacy and what we can do to get them to care about it, the relationship between trust &#8230; <a href="https://www.cigital.com/podcasts/show-045/" class="more-link">Continue reading <span class="screen-reader-text">The Common Disregard for Privacy with Lorrie Cranor</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-045/">The Common Disregard for Privacy with Lorrie Cranor</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/lcranor-125.png" alt="Lorrie Cranor" align="right" /></p>
<p>On the 45th episode of The Silver Bullet Security Podcast, Gary chats with Lorrie Cranor, Associate Professor of Computer Science and Engineering and Public Policy at Carnegie Melon University. Gary and Lorrie discuss how everyday people think about privacy and what we can do to get them to care about it, the relationship between trust and privacy, and why the US is lagging behind the EU on privacy-related issues. They close out the discussion by talking about women in computing.</p>
<ul>
<li><a href="http://lorrie.cranor.org/">Lorrie Cranor</a></li>
<li><a href="http://www.oreilly.com/catalog/securityusability/index.html"><em>Security and Usability: Designing Secure Systems That People Can Use</em></a></li>
<li><a href="http://oreilly.com/catalog/9780596003715/"><em>Web Privacy with P3P</em></a></li>
<li><a href="http://cups.cs.cmu.edu/index.php">CyLab Usable Privacy and Security Laboratory (CUPS)</a></li>
<li><a href="http://cups.cs.cmu.edu/soups/2009/proceedings/a4-kelley.pdf">A &#8220;Nutrition Label&#8221; for Privacy</a></li>
<li><a href="https://www.youtube.com/watch?v=kLgJYBRzUXY">Google search privacy video</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-045/">The Common Disregard for Privacy with Lorrie Cranor</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2756/0/silverbullet-045.mp3" length="38668416" type="audio/mpeg" />
		<itunes:duration>0:26:51</itunes:duration>
		<itunes:subtitle>
On the 45th episode of The Silver Bullet Security Podcast, Gary chats with Lorrie Cranor, Associate Professor of Computer Science and Engineering and Public Policy at Carnegie Melon University. Gary and Lorrie discuss how everyday people think abou[...]</itunes:subtitle>
		<itunes:summary>
On the 45th episode of The Silver Bullet Security Podcast, Gary chats with Lorrie Cranor, Associate Professor of Computer Science and Engineering and Public Policy at Carnegie Melon University. Gary and Lorrie discuss how everyday people think about privacy and what we can do to get them to care about it, the relationship between trust and privacy, and why the US is lagging behind the EU on privacy-related issues. They close out the discussion by talking about women in computing.

Lorrie Cranor
Security and Usability: Designing Secure Systems That People Can Use
Web Privacy with P3P
CyLab Usable Privacy and Security Laboratory (CUPS)
A &#8220;Nutrition Label&#8221; for Privacy
Google search privacy video

The post The Common Disregard for Privacy with Lorrie Cranor appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Common Disregard for Privacy with Lorrie Cranor appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The History of Network Security with Steve Kent</title>
		<link>https://www.cigital.com/podcasts/show-044/</link>
		<pubDate>Wed, 25 Nov 2009 17:55:05 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[network security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-044/</guid>
		<description><![CDATA[<p>On the 44th episode of The Silver Bullet Security Podcast, Gary talks with Steve Kent, Chief Scientist &#8211; Information Security, for BBN Technologies, a division of Raytheon. Gary and Steve discuss the history of network security, secure transport and base Internet protocols, the role of politics in the adoption of security on the Internet, applied &#8230; <a href="https://www.cigital.com/podcasts/show-044/" class="more-link">Continue reading <span class="screen-reader-text">The History of Network Security with Steve Kent</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-044/">The History of Network Security with Steve Kent</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/skent-125.png" alt="Steve Kent" align="right" /></p>
<p>On the 44th episode of The Silver Bullet Security Podcast, Gary talks with Steve Kent, Chief Scientist &#8211; Information Security, for BBN Technologies, a division of Raytheon. Gary and Steve discuss the history of network security, secure transport and base Internet protocols, the role of politics in the adoption of security on the Internet, applied cryptography, and whether security and individual liberty co-exist. They finish by discussing extremely high end wine.</p>
<ul>
<li><a href="http://www.wired.com/threatlevel/2008/08/revealed-the-in/">Internet&#8217;s Biggest Security Hole</a></li>
<li><a href="http://www.ir.bbn.com/sbgp/S-BGP_Clarke_workshop.ppt">Securing the Border Gateway Protocol</a> (PPT)</li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-044/">The History of Network Security with Steve Kent</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2757/0/silverbullet-044.mp3" length="46776448" type="audio/mpeg" />
		<itunes:duration>0:32:29</itunes:duration>
		<itunes:subtitle>
On the 44th episode of The Silver Bullet Security Podcast, Gary talks with Steve Kent, Chief Scientist &#8211; Information Security, for BBN Technologies, a division of Raytheon. Gary and Steve discuss the history of network security, secure transp[...]</itunes:subtitle>
		<itunes:summary>
On the 44th episode of The Silver Bullet Security Podcast, Gary talks with Steve Kent, Chief Scientist &#8211; Information Security, for BBN Technologies, a division of Raytheon. Gary and Steve discuss the history of network security, secure transport and base Internet protocols, the role of politics in the adoption of security on the Internet, applied cryptography, and whether security and individual liberty co-exist. They finish by discussing extremely high end wine.

Internet&#8217;s Biggest Security Hole
Securing the Border Gateway Protocol (PPT)

The post The History of Network Security with Steve Kent appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The History of Network Security with Steve Kent appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Hype behind Cloud Security with Chris Hoff</title>
		<link>https://www.cigital.com/podcasts/show-043/</link>
		<pubDate>Wed, 21 Oct 2009 17:20:16 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-043/</guid>
		<description><![CDATA[<p>On the 43rd episode of The Silver Bullet Security Podcast, Gary chats with Christofer Hoff, Director of Cloud and Virtualization Solutions at Cisco. Hoff is well known for his colorful blog posts and presentations on cloud security and other complex security issues. Suffice it to say, the cloud was a big topic for this issue. &#8230; <a href="https://www.cigital.com/podcasts/show-043/" class="more-link">Continue reading <span class="screen-reader-text">The Hype behind Cloud Security with Chris Hoff</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-043/">The Hype behind Cloud Security with Chris Hoff</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/choff-125.png" alt="Christofer Hoff" align="right" /></p>
<p>On the 43rd episode of The Silver Bullet Security Podcast, Gary chats with Christofer Hoff, Director of Cloud and Virtualization Solutions at Cisco. Hoff is well known for his colorful blog posts and presentations on cloud security and other complex security issues. Suffice it to say, the cloud was a big topic for this issue. And rum.</p>
<ul>
<li><a href="http://www.rationalsurvivability.com/blog/">Rational Survivability</a></li>
<li><a href="http://www.rationalsurvivability.com/blog/?p=567">The Frogs Who Desired a King: A Virtualization &amp; Cloud Computing Fable</a></li>
<li><a href="http://www.rationalsurvivability.com/blog/?p=1271">Cloudifornication: Indiscriminate Information Intercourse Involving Internet Infrastructure</a></li>
<li><a href="http://www.mountgay.com/">Mount Gay Extra Old Rum</a> (Gary&#8217;s favorite)</li>
<li><a href="http://en.wikipedia.org/wiki/Ron_Zacapa_Centenario">Ron Zacapa Centenario Rum</a> (Hoff&#8217;s favorite)</li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-043/">The Hype behind Cloud Security with Chris Hoff</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2758/0/silverbullet-043.mp3" length="45994112" type="audio/mpeg" />
		<itunes:duration>0:31:56</itunes:duration>
		<itunes:subtitle>
On the 43rd episode of The Silver Bullet Security Podcast, Gary chats with Christofer Hoff, Director of Cloud and Virtualization Solutions at Cisco. Hoff is well known for his colorful blog posts and presentations on cloud security and other comple[...]</itunes:subtitle>
		<itunes:summary>
On the 43rd episode of The Silver Bullet Security Podcast, Gary chats with Christofer Hoff, Director of Cloud and Virtualization Solutions at Cisco. Hoff is well known for his colorful blog posts and presentations on cloud security and other complex security issues. Suffice it to say, the cloud was a big topic for this issue. And rum.

Rational Survivability
The Frogs Who Desired a King: A Virtualization &#38; Cloud Computing Fable
Cloudifornication: Indiscriminate Information Intercourse Involving Internet Infrastructure
Mount Gay Extra Old Rum (Gary&#8217;s favorite)
Ron Zacapa Centenario Rum (Hoff&#8217;s favorite)

The post The Hype behind Cloud Security with Chris Hoff appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Hype behind Cloud Security with Chris Hoff appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Informatics and Health Security with Gilian Hayes</title>
		<link>https://www.cigital.com/podcasts/show-042/</link>
		<pubDate>Fri, 25 Sep 2009 14:31:20 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-042/</guid>
		<description><![CDATA[<p>On the 42nd episode of The Silver Bullet Security Podcast, Gary chats with Gillian Hayes, Assistant Professor in Informatics at the Bren School of Information and Computer Sciences at UC Irvine. Gary and Gillian discuss how much people really need to know about security going on behind the scenes, how usability affects the health records &#8230; <a href="https://www.cigital.com/podcasts/show-042/" class="more-link">Continue reading <span class="screen-reader-text">Informatics and Health Security with Gilian Hayes</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-042/">Informatics and Health Security with Gilian Hayes</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/ghayes-125.png" alt="Gillian Hayes" align="right" /></p>
<p>On the 42nd episode of The Silver Bullet Security Podcast, Gary chats with Gillian Hayes, Assistant Professor in Informatics at the Bren School of Information and Computer Sciences at UC Irvine. Gary and Gillian discuss how much people really need to know about security going on behind the scenes, how usability affects the health records security, whether or not surveillance changes how 20-somethings act in public (including on the net), and how having more women technologists positively impacts the humanization of technology.</p>
<ul>
<li><a href="https://www.cigital.com/silver-bullet-files/shows/silverbullet-042-ghayes.pdf">Transcript of this episode</a> [PDF]</li>
<li><a href="http://www.gillianhayes.com/">Gillian Hayes</a></li>
<li><a href="http://www.cs.umd.edu/~ben/">Ben Shneiderman</a></li>
<li><a href="http://www.ncwit.org/">National Center for Women and Information Technology</a></li>
<li><a href="http://www.amazon.com/Discovery-Heaven-Harry-Mulisch/dp/0140239375/ref=sr_1_1?ie=UTF8&amp;s=books&amp;qid=1253629779&amp;sr=1-1-spell">The Discovery of Heaven</a></li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-042/">Informatics and Health Security with Gilian Hayes</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2759/0/silverbullet-042.mp3" length="44429440" type="audio/mpeg" />
		<itunes:duration>0:30:51</itunes:duration>
		<itunes:subtitle>
On the 42nd episode of The Silver Bullet Security Podcast, Gary chats with Gillian Hayes, Assistant Professor in Informatics at the Bren School of Information and Computer Sciences at UC Irvine. Gary and Gillian discuss how much people really need [...]</itunes:subtitle>
		<itunes:summary>
On the 42nd episode of The Silver Bullet Security Podcast, Gary chats with Gillian Hayes, Assistant Professor in Informatics at the Bren School of Information and Computer Sciences at UC Irvine. Gary and Gillian discuss how much people really need to know about security going on behind the scenes, how usability affects the health records security, whether or not surveillance changes how 20-somethings act in public (including on the net), and how having more women technologists positively impacts the humanization of technology.

Transcript of this episode [PDF]
Gillian Hayes
Ben Shneiderman
National Center for Women and Information Technology
The Discovery of Heaven

The post Informatics and Health Security with Gilian Hayes appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Informatics and Health Security with Gilian Hayes appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Healthcare</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Security vs. Reliability with Fred Schneider</title>
		<link>https://www.cigital.com/podcasts/show-041/</link>
		<pubDate>Fri, 21 Aug 2009 14:10:20 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defects, Bugs, and Flaws]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[bugs]]></category>
		<category><![CDATA[design flaws]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-041/</guid>
		<description><![CDATA[<p>On the 41st episode of The Silver Bullet Security Podcast, Gary talks with Fred Schneider, Samuel B. Eckert Professor of Computer Science at Cornell University and author of Trust in Cyberspace. On the show, Gary and Fred discuss the relationship between security and reliability, diversity as a security mechanism, and the continuum of attack categories &#8230; <a href="https://www.cigital.com/podcasts/show-041/" class="more-link">Continue reading <span class="screen-reader-text">Security vs. Reliability with Fred Schneider</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-041/">Security vs. Reliability with Fred Schneider</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/fschneider-125.png" alt="Fred Schneider" align="right" /></p>
<p>On the 41st episode of The Silver Bullet Security Podcast, Gary talks with Fred Schneider, Samuel B. Eckert Professor of Computer Science at Cornell University and author of Trust in Cyberspace. On the show, Gary and Fred discuss the relationship between security and reliability, diversity as a security mechanism, and the continuum of attack categories from configuration problems, to bugs, to flaws, to trust issues. Fred briefly discusses Pointillism at the end of the show.</p>
<ul>
<li><a href="https://www.cigital.com/silver-bullet-files/shows/silverbullet-041-fschneider.pdf">Transcript of this episode</a> [PDF]</li>
<li><a href="http://www.cs.cornell.edu/fbs/">Fred B. Schneider</a></li>
<li><a href="http://www.cs.cornell.edu/fbs/publications/IEEEspMonoculture.pdf">IEEE Security and Privacy 7, 1 (January/February 2009)</a> [PDF], 14&#8211;17. With Ken Birman.</li>
<li><a href="http://www.nap.edu/openbook.php?record_id=6161">Trust in Cyberspace</a></li>
<li><a href="http://www.webexhibits.org/colorart/jatte.html">Pointillism (Seurat)</a></li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-041/">Security vs. Reliability with Fred Schneider</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2760/0/silverbullet-041.mp3" length="45879424" type="audio/mpeg" />
		<itunes:duration>0:31:51</itunes:duration>
		<itunes:subtitle>
On the 41st episode of The Silver Bullet Security Podcast, Gary talks with Fred Schneider, Samuel B. Eckert Professor of Computer Science at Cornell University and author of Trust in Cyberspace. On the show, Gary and Fred discuss the relationship b[...]</itunes:subtitle>
		<itunes:summary>
On the 41st episode of The Silver Bullet Security Podcast, Gary talks with Fred Schneider, Samuel B. Eckert Professor of Computer Science at Cornell University and author of Trust in Cyberspace. On the show, Gary and Fred discuss the relationship between security and reliability, diversity as a security mechanism, and the continuum of attack categories from configuration problems, to bugs, to flaws, to trust issues. Fred briefly discusses Pointillism at the end of the show.

Transcript of this episode [PDF]
Fred B. Schneider
IEEE Security and Privacy 7, 1 (January/February 2009) [PDF], 14&#8211;17. With Ken Birman.
Trust in Cyberspace
Pointillism (Seurat)

The post Security vs. Reliability with Fred Schneider appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Security vs. Reliability with Fred Schneider appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Comparing Security Models with Bob Blakley</title>
		<link>https://www.cigital.com/podcasts/show-040/</link>
		<pubDate>Fri, 17 Jul 2009 10:06:47 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-040/</guid>
		<description><![CDATA[<p>For the 40th episode of The Silver Bullet Security Podcast, Gary interviews Bob Blakley, VP and research director of The Burton Group&#8217;s Identity and Privacy Strategies. Gary and Bob discuss the importance of liberal arts degrees, the (over) complications of CORBA security, whether computer security requires a complete shift in approach, cybersecurity and governments, and &#8230; <a href="https://www.cigital.com/podcasts/show-040/" class="more-link">Continue reading <span class="screen-reader-text">Comparing Security Models with Bob Blakley</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-040/">Comparing Security Models with Bob Blakley</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/bblakley-125.png" alt="Bob Blakley" align="right" /></p>
<p>For the 40th episode of The Silver Bullet Security Podcast, Gary interviews Bob Blakley, VP and research director of The Burton Group&#8217;s Identity and Privacy Strategies. Gary and Bob discuss the importance of liberal arts degrees, the (over) complications of CORBA security, whether computer security requires a complete shift in approach, cybersecurity and governments, and the movie <em>Perils in Nude Modeling</em> (really).</p>
<ul>
<li><a href="https://www.cigital.com/silver-bullet-files/shows/silverbullet-040-bblakley.pdf">Transcript of this episode</a> [PDF]</li>
<li><a href="http://notabob.blogspot.com/">Ceci n&#8217;est pas un Bob</a> &#8211; Bob&#8217;s blog</li>
<li><a href="http://www.amazon.com/CORBA-Security-Introduction-Addison-Wesley-Technology/dp/0201325659"><em>CORBA Security: An Introduction to Safe Computing with Objects</em></a></li>
<li><a href="http://www.isoc.org/isoc/conferences/ndss/98/blakl_sl.pdf">NDSS&#8217;98 Trust Management Panel: LE NOZZE DI NOMEN</a> [PDF] &#8211; The NDSS &#8220;wedding script&#8221;</li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1379758">Moving U.S. Cybersecurity Beyond Cyberplatitudes</a></li>
<li><a href="http://www.imdb.com/title/tt0432710/"><em>Perils in Nude Modeling</em></a></li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-040/">Comparing Security Models with Bob Blakley</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2761/0/silverbullet-040.mp3" length="37165184" type="audio/mpeg" />
		<itunes:duration>0:25:48</itunes:duration>
		<itunes:subtitle>
For the 40th episode of The Silver Bullet Security Podcast, Gary interviews Bob Blakley, VP and research director of The Burton Group&#8217;s Identity and Privacy Strategies. Gary and Bob discuss the importance of liberal arts degrees, the (over) c[...]</itunes:subtitle>
		<itunes:summary>
For the 40th episode of The Silver Bullet Security Podcast, Gary interviews Bob Blakley, VP and research director of The Burton Group&#8217;s Identity and Privacy Strategies. Gary and Bob discuss the importance of liberal arts degrees, the (over) complications of CORBA security, whether computer security requires a complete shift in approach, cybersecurity and governments, and the movie Perils in Nude Modeling (really).

Transcript of this episode [PDF]
Ceci n&#8217;est pas un Bob &#8211; Bob&#8217;s blog
CORBA Security: An Introduction to Safe Computing with Objects
NDSS&#8217;98 Trust Management Panel: LE NOZZE DI NOMEN [PDF] &#8211; The NDSS &#8220;wedding script&#8221;
Moving U.S. Cybersecurity Beyond Cyberplatitudes
Perils in Nude Modeling

The post Comparing Security Models with Bob Blakley appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Comparing Security Models with Bob Blakley appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>&#8220;Cyber Coordinator&#8221; defined with Matt Blaze</title>
		<link>https://www.cigital.com/podcasts/show-039/</link>
		<pubDate>Wed, 17 Jun 2009 17:01:53 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-039/</guid>
		<description><![CDATA[<p>For the 39th episode of The Silver Bullet Security Podcast, Gary chats with Matt Blaze, Associate Professor of Computer and Information Science at the University of Pennsylvania. Gary and Matt start the show off discussing the Obama administration&#8217;s &#8220;cyber coordinator&#8221; plan and the large number of cyber plans that are never cyber realized. They also &#8230; <a href="https://www.cigital.com/podcasts/show-039/" class="more-link">Continue reading <span class="screen-reader-text">&#8220;Cyber Coordinator&#8221; defined with Matt Blaze</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-039/">&#8220;Cyber Coordinator&#8221; defined with Matt Blaze</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/mblaze-126.png" alt="Matt Blaze" align="right" /></p>
<p>For the 39th episode of The Silver Bullet Security Podcast, Gary chats with Matt Blaze, Associate Professor of Computer and Information Science at the University of Pennsylvania. Gary and Matt start the show off discussing the Obama administration&#8217;s &#8220;cyber coordinator&#8221; plan and the large number of cyber plans that are never cyber realized. They also discuss key escrow, warrantless wiretapping, the responsibility we have to stay engaged with issues surrounding individual liberty and privacy, and the similarities between physical locks and computer security. Matt’s musical tastes are also briefly touched on.</p>
<ul>
<li><a href="http://www.crypto.com/">Matt Blaze</a></li>
<li><a href="http://en.wikipedia.org/wiki/Matt_Blaze">Matt Blaze &#8211; Wikipedia</a></li>
<li><a href="http://www.crypto.com/blog/">Matt Blaze&#8217;s Exhaustive Search</a> &#8211; Matt&#8217;s blog</li>
<li><a href="http://www.crypto.com/blog/safecracking_and_science/">Safecracking, Secrecy and Science</a></li>
<li><a href="http://www.crypto.com/papers/mk.pdf">Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks</a> &#8211; <em>IEEE Security &amp; Privacy</em>, March/April 2003</li>
<li><a href="http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci1353725,00.html">RSA panel on Surveillance</a></li>
<li><a href="https://www.cigital.com/podcasts/show-011/">Silver Bullet 11: Dorothy Denning</a></li>
<li><a href="http://en.wikipedia.org/wiki/Trust_management">Trust Management</a></li>
<li><a href="http://www.crypto.com/papers/wiretap.pdf">Signaling Vulnerabilities in Wiretapping Systems</a> &#8211; <em>IEEE Security &amp; Privacy</em>, November/December 2005, by M. Sherr, E. Cronin, S. Clark and M. Blaze.</li>
<li><a href="http://www.everythingthathappens.com/">Eno/Byrne: Everything That Happens Will Happen Today</a></li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-039/">&#8220;Cyber Coordinator&#8221; defined with Matt Blaze</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2762/0/silverbullet-039.mp3" length="46944384" type="audio/mpeg" />
		<itunes:duration>0:32:36</itunes:duration>
		<itunes:subtitle>
For the 39th episode of The Silver Bullet Security Podcast, Gary chats with Matt Blaze, Associate Professor of Computer and Information Science at the University of Pennsylvania. Gary and Matt start the show off discussing the Obama administration[...]</itunes:subtitle>
		<itunes:summary>
For the 39th episode of The Silver Bullet Security Podcast, Gary chats with Matt Blaze, Associate Professor of Computer and Information Science at the University of Pennsylvania. Gary and Matt start the show off discussing the Obama administration&#8217;s &#8220;cyber coordinator&#8221; plan and the large number of cyber plans that are never cyber realized. They also discuss key escrow, warrantless wiretapping, the responsibility we have to stay engaged with issues surrounding individual liberty and privacy, and the similarities between physical locks and computer security. Matt’s musical tastes are also briefly touched on.

Matt Blaze
Matt Blaze &#8211; Wikipedia
Matt Blaze&#8217;s Exhaustive Search &#8211; Matt&#8217;s blog
Safecracking, Secrecy and Science
Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks &#8211; IEEE Security &#38; Privacy, March/April 2003
RSA panel on Surveillance
Silver Bullet 11: Dorothy Denning
Trust Management
Signaling Vulnerabilities in Wiretapping Systems &#8211; IEEE Security &#38; Privacy, November/December 2005, by M. Sherr, E. Cronin, S. Clark and M. Blaze.
Eno/Byrne: Everything That Happens Will Happen Today

The post &#8220;Cyber Coordinator&#8221; defined with Matt Blaze appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post &#8220;Cyber Coordinator&#8221; defined with Matt Blaze appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Importance of In-Situ Usability with Kay Connelly</title>
		<link>https://www.cigital.com/podcasts/show-038/</link>
		<pubDate>Tue, 19 May 2009 17:33:17 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-038/</guid>
		<description><![CDATA[<p>For the 38th episode of The Silver Bullet Security Podcast, Gary talks privacy with Kay Connelly, Associate Professor of Computer Science at Indiana University and Senior Associate Director of IU&#8217;s Center for Applied Cybersecurity Research. Gary and Kay discuss why in situ usability study is important, the E.T.H.O.S. living lab (including the &#8220;presence clock&#8221; and &#8230; <a href="https://www.cigital.com/podcasts/show-038/" class="more-link">Continue reading <span class="screen-reader-text">The Importance of In-Situ Usability with Kay Connelly</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-038/">The Importance of In-Situ Usability with Kay Connelly</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/kconnelly-125.png" alt="Kay Connelly" align="right" /></p>
<p>For the 38th episode of The Silver Bullet Security Podcast, Gary talks privacy with Kay Connelly, Associate Professor of Computer Science at Indiana University and Senior Associate Director of IU&#8217;s Center for Applied Cybersecurity Research. Gary and Kay discuss why in situ usability study is important, the E.T.H.O.S. living lab (including the &#8220;presence clock&#8221; and the portal monitor), and Kay&#8217;s advice to women interested in pursuing a career in computer science.</p>
<ul>
<li><a href="http://www.cs.indiana.edu/~connelly/">Kay Connelly</a></li>
<li><a href="http://ethos.indiana.edu/?q=blog/3">E.T.H.O.S. &#8211; Ethical Technology in the Homes of Seniors</a></li>
<li><a href="http://www.npr.org/templates/story/story.php?storyId=5201273">Crafting a Smarter, Gentler Cell Phone</a> &#8211; NPR story featuring Kay Connelly</li>
<li><a href="https://www.cigital.com/podcasts/show-007/" target="_blank">Silver Bullet #7: John Stewart</a></li>
<li><a href="https://www.cigital.com/podcasts/show-015/" target="_blank">Silver Bullet #15: Annie Antón</a></li>
<li><a href="http://www.hhs.gov/ocr/hipaa/">HIPAA</a></li>
<li><a href="http://www.amazon.com/Song-You-Novel-Arthur-Phillips/dp/1400066468/ref=sr_1_1?ie=UTF8&amp;s=books&amp;qid=1242410749&amp;sr=1-1"><em>The Song Is You: A Novel</em></a> by Arthur Phillips</li>
<li><a href="http://www.amazon.com/Was-Told-Thered-Be-Cake/dp/159448306X/ref=sr_1_1?ie=UTF8&amp;s=books&amp;qid=1242410724&amp;sr=1-1"><em>I Was Told There&#8217;d Be Cake</em></a> by Sloane Crosley</li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-038/">The Importance of In-Situ Usability with Kay Connelly</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2763/0/silverbullet-038.mp3" length="36331648" type="audio/mpeg" />
		<itunes:duration>0:25:14</itunes:duration>
		<itunes:subtitle>
For the 38th episode of The Silver Bullet Security Podcast, Gary talks privacy with Kay Connelly, Associate Professor of Computer Science at Indiana University and Senior Associate Director of IU&#8217;s Center for Applied Cybersecurity Research. G[...]</itunes:subtitle>
		<itunes:summary>
For the 38th episode of The Silver Bullet Security Podcast, Gary talks privacy with Kay Connelly, Associate Professor of Computer Science at Indiana University and Senior Associate Director of IU&#8217;s Center for Applied Cybersecurity Research. Gary and Kay discuss why in situ usability study is important, the E.T.H.O.S. living lab (including the &#8220;presence clock&#8221; and the portal monitor), and Kay&#8217;s advice to women interested in pursuing a career in computer science.

Kay Connelly
E.T.H.O.S. &#8211; Ethical Technology in the Homes of Seniors
Crafting a Smarter, Gentler Cell Phone &#8211; NPR story featuring Kay Connelly
Silver Bullet #7: John Stewart
Silver Bullet #15: Annie Antón
HIPAA
The Song Is You: A Novel by Arthur Phillips
I Was Told There&#8217;d Be Cake by Sloane Crosley

The post The Importance of In-Situ Usability with Kay Connelly appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Importance of In-Situ Usability with Kay Connelly appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Changes and Immortality of Security with Virgil Gilgor</title>
		<link>https://www.cigital.com/podcasts/show-037/</link>
		<pubDate>Tue, 21 Apr 2009 14:56:51 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Training]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-037/</guid>
		<description><![CDATA[<p>On the 37th episode of The Silver Bullet Security Podcast, Gary interviews Virgil Gligor, Professor at Carnegie Mellon University in the Department of Electrical and Computer Engineering and co-director of CyLab. Gary and Virgil discuss how information security has changed over the last 35 years, why software security will be with us forever, and how &#8230; <a href="https://www.cigital.com/podcasts/show-037/" class="more-link">Continue reading <span class="screen-reader-text">Changes and Immortality of Security with Virgil Gilgor</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-037/">Changes and Immortality of Security with Virgil Gilgor</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/vgligor-120.png" alt="Virgil Gligor" align="right" /></p>
<p>On the 37th episode of The Silver Bullet Security Podcast, Gary interviews Virgil Gligor, Professor at Carnegie Mellon University in the Department of Electrical and Computer Engineering and co-director of CyLab. Gary and Virgil discuss how information security has changed over the last 35 years, why software security will be with us forever, and how Virgil&#8217;s childhood in Romania has shaped his views on security. They close out with a discussion of Virgil&#8217;s breakfast-eating habits.</p>
<ul>
<li><a href="http://www.ece.cmu.edu/~virgil/">Virgil D. Gligor</a> (@ Carnegie Mellon)</li>
<li><a href="http://www.cylab.cmu.edu/">CyLab</a></li>
<li><a href="http://www.ece.cmu.edu/">Electrical and Computer Engineering at Carnegie Mellon University</a></li>
<li><a href="http://www.amazon.com/Building-Secure-Computer-System-Morrie/dp/0442230222/ref=sr_1_1?ie=UTF8&amp;s=books&amp;qid=1240327785&amp;sr=8-1">Building a Secure Computer System</a></li>
<li><a href="http://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act">Foreign Intelligence Surveillance Act</a></li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1338343">Software Security Comes of Age</a></li>
<li><a href="http://searchsecurity.techtarget.com/news/interview/0,289202,sid14_gci1353725,00.html">RSA panel to discuss surveillance, privacy concerns</a></li>
<li><a href="http://www.amazon.com/Computer-Security-Science-Matt-Bishop/dp/0201440997"><em>Computer Security: Art and Science</em></a> by Matt Bishop</li>
<li><a href="http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel2%2F358%2F3978%2F00151571.pdf%3Farnumber%3D151571&amp;authDecision=-203">Towards a Theory of Penetration-Resistant Systems and its Applications</a> (1991)</li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-037/">Changes and Immortality of Security with Virgil Gilgor</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2764/0/silverbullet-037.mp3" length="39116851" type="audio/mpeg" />
		<itunes:duration>0:27:10</itunes:duration>
		<itunes:subtitle>
On the 37th episode of The Silver Bullet Security Podcast, Gary interviews Virgil Gligor, Professor at Carnegie Mellon University in the Department of Electrical and Computer Engineering and co-director of CyLab. Gary and Virgil discuss how informa[...]</itunes:subtitle>
		<itunes:summary>
On the 37th episode of The Silver Bullet Security Podcast, Gary interviews Virgil Gligor, Professor at Carnegie Mellon University in the Department of Electrical and Computer Engineering and co-director of CyLab. Gary and Virgil discuss how information security has changed over the last 35 years, why software security will be with us forever, and how Virgil&#8217;s childhood in Romania has shaped his views on security. They close out with a discussion of Virgil&#8217;s breakfast-eating habits.

Virgil D. Gligor (@ Carnegie Mellon)
CyLab
Electrical and Computer Engineering at Carnegie Mellon University
Building a Secure Computer System
Foreign Intelligence Surveillance Act
Software Security Comes of Age
RSA panel to discuss surveillance, privacy concerns
Computer Security: Art and Science by Matt Bishop
Towards a Theory of Penetration-Resistant Systems and its Applications (1991)

The post Changes and Immortality of Security with Virgil Gilgor appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Changes and Immortality of Security with Virgil Gilgor appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Birth of the BSIMM with Gary McGraw</title>
		<link>https://www.cigital.com/podcasts/show-036/</link>
		<pubDate>Wed, 18 Mar 2009 16:40:27 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[BSIMM]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Cigital leadership]]></category>
		<category><![CDATA[OWASP]]></category>
		<category><![CDATA[security measurement]]></category>
		<category><![CDATA[security metrics]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-036/</guid>
		<description><![CDATA[<p>We switch things up for this special third anniversary episode of Silver Bullet. This time around, Gary is the victim, being interviewed by James McGovern, Enterprise Architect for The Hartford Financial Services Group, Inc. and OWASP maven. Gary and James discuss the recently released Building Security In Maturity Model, how companies with Software Security Groups &#8230; <a href="https://www.cigital.com/podcasts/show-036/" class="more-link">Continue reading <span class="screen-reader-text">The Birth of the BSIMM with Gary McGraw</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-036/">The Birth of the BSIMM with Gary McGraw</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/gem-125.png" alt="Gary McGraw" align="right" /></p>
<p>We switch things up for this special third anniversary episode of Silver Bullet. This time around, Gary is the victim, being interviewed by James McGovern, Enterprise Architect for The Hartford Financial Services Group, Inc. and OWASP maven. Gary and James discuss the recently released Building Security In Maturity Model, how companies with Software Security Groups retain their best and brightest, Microsoft&#8217;s trustworthy computing initiative/SDL program, and what less expensive tools small organizations with only a few developers can use.</p>
<ul>
<li><a href="https://www.cigital.com/silver-bullet-files/shows/silverbullet-036-gem.pdf">Transcript of this episode</a> [PDF]</li>
<li><a href="http://duckdown.blogspot.com/">Enterprise Architecture: From Incite comes Insight&#8230;</a> &#8211; James McGovern&#8217;s blog</li>
<li><a href="https://www.cigital.com/~gem/">Gary McGraw&#8217;s site</a></li>
<li><a href="http://www.swsec.com/"><em>Software Security: Building Security In</em></a></li>
<li><a href="http://www.bsimm.com/">Building Security In Maturity Model (BSIMM)</a></li>
<li><a href="http://duckdown.blogspot.com/2009/02/gartner-releases-paper-on-static.html">Gartner releases paper on Static Analysis</a> &#8211; James&#8217; blog entry on Gartner</li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-036/">The Birth of the BSIMM with Gary McGraw</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2765/0/silverbullet-036.mp3" length="49784960" type="audio/mpeg" />
		<itunes:duration>0:34:34</itunes:duration>
		<itunes:subtitle>
We switch things up for this special third anniversary episode of Silver Bullet. This time around, Gary is the victim, being interviewed by James McGovern, Enterprise Architect for The Hartford Financial Services Group, Inc. and OWASP maven. Gary a[...]</itunes:subtitle>
		<itunes:summary>
We switch things up for this special third anniversary episode of Silver Bullet. This time around, Gary is the victim, being interviewed by James McGovern, Enterprise Architect for The Hartford Financial Services Group, Inc. and OWASP maven. Gary and James discuss the recently released Building Security In Maturity Model, how companies with Software Security Groups retain their best and brightest, Microsoft&#8217;s trustworthy computing initiative/SDL program, and what less expensive tools small organizations with only a few developers can use.

Transcript of this episode [PDF]
Enterprise Architecture: From Incite comes Insight&#8230; &#8211; James McGovern&#8217;s blog
Gary McGraw&#8217;s site
Software Security: Building Security In
Building Security In Maturity Model (BSIMM)
Gartner releases paper on Static Analysis &#8211; James&#8217; blog entry on Gartner

The post The Birth of the BSIMM with Gary McGraw appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Birth of the BSIMM with Gary McGraw appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>BSIMM</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Computer Security within Daemon with Daniel Suarez</title>
		<link>https://www.cigital.com/podcasts/show-035/</link>
		<pubDate>Mon, 23 Feb 2009 16:50:17 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber war]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-035/</guid>
		<description><![CDATA[<p>On the 35th episode of The Silver Bullet Security Podcast, Gary talks with Daniel Suarez, independent consultant and author of Daemon, a new techno-thriller about a gamer that reaches from beyond the grave to declare a war on all of humanity. They talk about Daniel&#8217;s new book and the movie options attached to it, the &#8230; <a href="https://www.cigital.com/podcasts/show-035/" class="more-link">Continue reading <span class="screen-reader-text">Computer Security within Daemon with Daniel Suarez</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-035/">Computer Security within Daemon with Daniel Suarez</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div style="float: right; text-align: center;"><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/dsuarez-125.png" alt="Daniel Suarez" /><br />
<img style="padding-left: 7px; padding-top: 5px;" src="https://www.cigital.com/silverbullet-files/daemon-125.gif" alt="Daemon" /></div>
<p>On the 35th episode of The Silver Bullet Security Podcast, Gary talks with Daniel Suarez, independent consultant and author of <em>Daemon</em>, a new techno-thriller about a gamer that reaches from beyond the grave to declare a war on all of humanity. They talk about Daniel&#8217;s new book and the movie options attached to it, the use of MMORPGs and flash mobs for nefarious means in the form of a distributed emergent attack, the current state of AI, and the follow-up to <em>Daemon</em>, <em>Freedom <sup>TM</sup></em>.</p>
<ul>
<li><em><a href="http://www.thedaemon.com/">Daemon</a></em></li>
<li><a href="http://nwn.blogs.com/nwn/2007/08/second-life-and.html">Al-Qaeda in Second Life</a></li>
<li><a href="http://www.amazon.com/Distraction-Bruce-Sterling/dp/0553576399"><em>Distraction</em></a> by Bruce Sterling</li>
<li><a href="http://www.amazon.com/Halting-State-Charles-Stross/dp/0441014984"><em>Halting State</em></a> by Charles Stross</li>
<li><a href="http://fora.tv/2008/08/08/Daniel_Suarez_Daemon_Bot-Mediated_Reality">Bot-Mediated Reality</a> at the Long Now Foundation</li>
<li><a href="http://wiredforwar.pwsinger.com/"><em>Wired for War</em></a> by P.W. Singer</li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-035/">Computer Security within Daemon with Daniel Suarez</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2766/0/silverbullet-035.mp3" length="36373366" type="audio/mpeg" />
		<itunes:duration>0:25:16</itunes:duration>
		<itunes:subtitle>

On the 35th episode of The Silver Bullet Security Podcast, Gary talks with Daniel Suarez, independent consultant and author of Daemon, a new techno-thriller about a gamer that reaches from beyond the grave to declare a war on all of humanity. They[...]</itunes:subtitle>
		<itunes:summary>

On the 35th episode of The Silver Bullet Security Podcast, Gary talks with Daniel Suarez, independent consultant and author of Daemon, a new techno-thriller about a gamer that reaches from beyond the grave to declare a war on all of humanity. They talk about Daniel&#8217;s new book and the movie options attached to it, the use of MMORPGs and flash mobs for nefarious means in the form of a distributed emergent attack, the current state of AI, and the follow-up to Daemon, Freedom TM.

Daemon
Al-Qaeda in Second Life
Distraction by Bruce Sterling
Halting State by Charles Stross
Bot-Mediated Reality at the Long Now Foundation
Wired for War by P.W. Singer

The post Computer Security within Daemon with Daniel Suarez appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Computer Security within Daemon with Daniel Suarez appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 034 &#8211; An Interview with Bill Brenner</title>
		<link>https://www.cigital.com/podcasts/show-034/</link>
		<pubDate>Wed, 14 Jan 2009 15:05:39 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-034/</guid>
		<description><![CDATA[<p>On the 34th episode of The Silver Bullet Security Podcast, Gary interviews Bill Brenner, senior editor at CSO Online and CSO Magazine. Gary and Bill discuss how delivering the security message changes based on the audience (executives versus geeks and CSO’s versus CIO’s), the much-exaggerated death of print media, and balancing headline-grabbing sensationalism with solid &#8230; <a href="https://www.cigital.com/podcasts/show-034/" class="more-link">Continue reading <span class="screen-reader-text">Show 034 &#8211; An Interview with Bill Brenner</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-034/">Show 034 &#8211; An Interview with Bill Brenner</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/bbrenner-125.png" alt="Bill Brenner" align="right" /></p>
<p>On the 34th episode of The Silver Bullet Security Podcast, Gary interviews Bill Brenner, senior editor at CSO Online and <em>CSO Magazine</em>. Gary and Bill discuss how delivering the security message changes based on the audience (executives versus geeks and CSO’s versus CIO’s), the much-exaggerated death of print media, and balancing headline-grabbing sensationalism with solid security business coverage. They close out their interview with a discussion of Bill&#8217;s favorite period of history.</p>
<ul>
<li><a href="http://www.linkedin.com/in/billbrenner">Bill Brenner on LinkedIn</a></li>
<li><a href="http://www.facebook.com/profile.php?id=1426070157">Bill Brenner on Facebook</a></li>
<li><a href="http://securitywireweekly.blogs.techtarget.com/">Security Wire Weekly</a></li>
<li><a href="http://1raindrop.typepad.com/">1 Raindrop</a> &#8211; Gunnar Peterson&#8217;s blog.</li>
<li>Silver Bullet interviews with <a href="https://www.cigital.com/podcasts/show-025/" target="_blank">Jon Swartz, USA Today</a>, <a href="https://www.cigital.com/podcasts/show-029/" target="_blank">Dennis Fisher, Tech Target</a>, and <a href="https://www.cigital.com/podcasts/show-032/" target="_blank">Jeremiah Grossman, Whitehat</a></li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-034/">Show 034 &#8211; An Interview with Bill Brenner</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2780/0/silverbullet-034.mp3" length="40020895" type="audio/mpeg" />
		<itunes:duration>0:27:48</itunes:duration>
		<itunes:subtitle>
On the 34th episode of The Silver Bullet Security Podcast, Gary interviews Bill Brenner, senior editor at CSO Online and CSO Magazine. Gary and Bill discuss how delivering the security message changes based on the audience (executives versus geeks [...]</itunes:subtitle>
		<itunes:summary>
On the 34th episode of The Silver Bullet Security Podcast, Gary interviews Bill Brenner, senior editor at CSO Online and CSO Magazine. Gary and Bill discuss how delivering the security message changes based on the audience (executives versus geeks and CSO’s versus CIO’s), the much-exaggerated death of print media, and balancing headline-grabbing sensationalism with solid security business coverage. They close out their interview with a discussion of Bill&#8217;s favorite period of history.

Bill Brenner on LinkedIn
Bill Brenner on Facebook
Security Wire Weekly
1 Raindrop &#8211; Gunnar Peterson&#8217;s blog.
Silver Bullet interviews with Jon Swartz, USA Today, Dennis Fisher, Tech Target, and Jeremiah Grossman, Whitehat

The post Show 034 &#8211; An Interview with Bill Brenner appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 034 &#8211; An Interview with Bill Brenner appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>CISO</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 033 &#8211; An Interview with Laurie Williams</title>
		<link>https://www.cigital.com/podcasts/show-033/</link>
		<pubDate>Mon, 22 Dec 2008 13:41:28 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Training]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-033/</guid>
		<description><![CDATA[<p>On the 33rd episode of The Silver Bullet Security Podcast, Gary talks with Laurie Williams, Associate Professor of Computer Science at North Carolina State University. Gary and Laurie discuss Laurie&#8217;s nine years at IBM, Agile&#8217;s adoption in the commercial space, XP and software security, and what changes Laurie would make to the standard computer science &#8230; <a href="https://www.cigital.com/podcasts/show-033/" class="more-link">Continue reading <span class="screen-reader-text">Show 033 &#8211; An Interview with Laurie Williams</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-033/">Show 033 &#8211; An Interview with Laurie Williams</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/lwilliams-125.png" alt="Laurie Williams" align="right" /></p>
<p>On the 33rd episode of The Silver Bullet Security Podcast, Gary talks with Laurie Williams, Associate Professor of Computer Science at North Carolina State University. Gary and Laurie discuss Laurie&#8217;s nine years at IBM, Agile&#8217;s adoption in the commercial space, XP and software security, and what changes Laurie would make to the standard computer science curriculum to better prepare students.</p>
<ul>
<li><a href="http://collaboration.csc.ncsu.edu/laurie/">Laurie Williams</a></li>
<li><a href="http://agile.csc.ncsu.edu/realsearch/">Empirical Software Engineering</a></li>
<li><a href="http://collaboration.csc.ncsu.edu/laurie/Security/ProtectionPoker/">Protection Poker tutorial</a></li>
<li><a href="http://collaboration.csc.ncsu.edu/laurie/Papers/p47-shin.pdf">Is Complexity Really the Enemy of Software Security?</a> [PDF]</li>
<li><a href="https://www.cigital.com/podcasts/show-026/" target="_blank">Silver Bullet interview with Adam Shostack</a></li>
<li><a href="http://www.learnoutloud.com/Sale-Section/Self-Development/Spirituality/The-Law-of-Attraction/20044"><em>Law of Attraction</em></a> audiobook</li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-033/">Show 033 &#8211; An Interview with Laurie Williams</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2781/0/silverbullet-033.mp3" length="34050176" type="audio/mpeg" />
		<itunes:duration>0:23:39</itunes:duration>
		<itunes:subtitle>
On the 33rd episode of The Silver Bullet Security Podcast, Gary talks with Laurie Williams, Associate Professor of Computer Science at North Carolina State University. Gary and Laurie discuss Laurie&#8217;s nine years at IBM, Agile&#8217;s adoption[...]</itunes:subtitle>
		<itunes:summary>
On the 33rd episode of The Silver Bullet Security Podcast, Gary talks with Laurie Williams, Associate Professor of Computer Science at North Carolina State University. Gary and Laurie discuss Laurie&#8217;s nine years at IBM, Agile&#8217;s adoption in the commercial space, XP and software security, and what changes Laurie would make to the standard computer science curriculum to better prepare students.

Laurie Williams
Empirical Software Engineering
Protection Poker tutorial
Is Complexity Really the Enemy of Software Security? [PDF]
Silver Bullet interview with Adam Shostack
Law of Attraction audiobook

The post Show 033 &#8211; An Interview with Laurie Williams appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 033 &#8211; An Interview with Laurie Williams appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 032 &#8211; An Interview with Jeremiah Grossman</title>
		<link>https://www.cigital.com/podcasts/show-032/</link>
		<pubDate>Thu, 13 Nov 2008 22:17:49 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Business Leader]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[conferences]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-032/</guid>
		<description><![CDATA[<p>The 32nd episode of The Silver Bullet Security Podcast features founder and Chief Technology Officer of WhiteHat Security, Jeremiah Grossman. Gary and Jeremiah discuss clickjacking, cross-site request forgery, why 50% of web problems can&#8217;t be discovered reliably automatically, and which conferences Jeremiah most enjoyed on his 2008 world tour. Clickjacking Adobe 0-day Browser Exploit Web &#8230; <a href="https://www.cigital.com/podcasts/show-032/" class="more-link">Continue reading <span class="screen-reader-text">Show 032 &#8211; An Interview with Jeremiah Grossman</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-032/">Show 032 &#8211; An Interview with Jeremiah Grossman</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/jgrossman-125.png" alt="Jeremiah Grossman" align="right" /></p>
<p>The 32nd episode of The Silver Bullet Security Podcast features founder and Chief Technology Officer of WhiteHat Security, Jeremiah Grossman. Gary and Jeremiah discuss clickjacking, cross-site request forgery, why 50% of web problems can&#8217;t be discovered reliably automatically, and which conferences Jeremiah most enjoyed on his 2008 world tour.</p>
<ul>
<li><a href="http://jeremiahgrossman.blogspot.com/2008/10/clickjacking-web-pages-can-see-and-hear.html">Clickjacking</a></li>
<li><a href="http://www.webadminblog.com/index.php/2008/09/24/new-0day-browser-exploit-clickjacking-owasp-appsec-nyc-2008/">Adobe 0-day Browser Exploit</a></li>
<li><a href="http://jeremiahgrossman.blogspot.com/2007/05/web-application-scan-o-meter.html">Web application scan-o-meter</a></li>
<li><a href="http://1.bp.blogspot.com/_JdybrokZBAk/SO_rUc-ebPI/AAAAAAAABOY/dKbFPJfv1Cs/s1600-h/badgewall.jpg">The &#8220;Wall of Fame&#8221;</a></li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-032/">Show 032 &#8211; An Interview with Jeremiah Grossman</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2782/0/silverbullet-032.mp3" length="42240718" type="audio/mpeg" />
		<itunes:duration>0:29:20</itunes:duration>
		<itunes:subtitle>
The 32nd episode of The Silver Bullet Security Podcast features founder and Chief Technology Officer of WhiteHat Security, Jeremiah Grossman. Gary and Jeremiah discuss clickjacking, cross-site request forgery, why 50% of web problems can&#8217;t be[...]</itunes:subtitle>
		<itunes:summary>
The 32nd episode of The Silver Bullet Security Podcast features founder and Chief Technology Officer of WhiteHat Security, Jeremiah Grossman. Gary and Jeremiah discuss clickjacking, cross-site request forgery, why 50% of web problems can&#8217;t be discovered reliably automatically, and which conferences Jeremiah most enjoyed on his 2008 world tour.

Clickjacking
Adobe 0-day Browser Exploit
Web application scan-o-meter
The &#8220;Wall of Fame&#8221;

The post Show 032 &#8211; An Interview with Jeremiah Grossman appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 032 &#8211; An Interview with Jeremiah Grossman appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 031 &#8211; An Interview with Matt Bishop</title>
		<link>https://www.cigital.com/podcasts/show-031/</link>
		<pubDate>Mon, 20 Oct 2008 14:33:12 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Developer]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Starting a Security Initiative]]></category>
		<category><![CDATA[Web Application Security]]></category>
		<category><![CDATA[software development]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-031/</guid>
		<description><![CDATA[<p>On the 31st episode of The Silver Bullet Security Podcast, Gary talks with Matt Bishop, professor of Computer Science at UC Davis and author of the book Computer Security: Art and Science as well as many peer-reviewed papers. Gary and Matt discuss Matt&#8217;s plan to work security analysis and secure coding into a wider computer &#8230; <a href="https://www.cigital.com/podcasts/show-031/" class="more-link">Continue reading <span class="screen-reader-text">Show 031 &#8211; An Interview with Matt Bishop</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-031/">Show 031 &#8211; An Interview with Matt Bishop</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/mbishop-125.png" alt="Matt Bishop" align="right" /></p>
<p>On the 31st episode of The Silver Bullet Security Podcast, Gary talks with Matt Bishop, professor of Computer Science at UC Davis and author of the book <em>Computer Security: Art and Science</em> as well as many peer-reviewed papers. Gary and Matt discuss Matt&#8217;s plan to work security analysis and secure coding into a wider computer science cirriculum, Matt&#8217;s early work with Mike Dilger on TOCTOU, whether or not progress is being made in the field of software security, and the role of training in large-scale software security initiatives. Their chat closes with a mention of Matt&#8217;s home menagerie (which does not include any one-legged chickens at this time).</p>
<ul>
<li><a href="http://nob.cs.ucdavis.edu/bishop/">Matt Bishop</a></li>
<li><a href="https://www.computer.org/web/computingnow/securityandprivacy">IEEE <em>Security &amp; Privacy Magazine</em></a></li>
<li><a href="http://nob.cs.ucdavis.edu/book/book-aands/"><em>Computer Security: Art and Science</em></a></li>
<li><a href="https://www.cigital.com/podcasts/show-011/" target="_blank">Silver Bullet Security Podcast interview with Dorothy Denning</a></li>
<li><a href="http://www.albany.edu/acc/courses/ia/classics/belllapadula1.pdf">Secure Computer Systems: Mathematical Foundations</a> &#8211; The Bell Lapadula model [PDF]</li>
<li><a href="http://csrc.nist.gov/publications/history/bell76.pdf">Secure Computer System: Unified Exposition and Multics Interpretation</a> [PDF]</li>
<li><a href="http://seclab.cs.ucdavis.edu/papers/HaughBishopNDSS2003.pdf">Testing C Programs for Buffer Overflow Vulnerabilities</a> &#8211; Eric Haugh, Matt Bishop [PDF]</li>
<li><a href="https://www.owasp.org/index.php/File_Access_Race_Condition:_TOCTOU">TOCTOU</a></li>
<li><a href="http://nob.cs.ucdavis.edu/bishop/papers/1996-compsys/">Checking for Race Conditions in File Accesses</a> by Matt Bishop and Michael Dilger</li>
<li><a href="https://www.amazon.com/Song-One-Legged-Chicken/dp/B000V672OK">&#8220;The Song of the One Legged Chicken&#8221;</a></li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-031/">Show 031 &#8211; An Interview with Matt Bishop</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2783/0/silverbullet-031.mp3" length="35151294" type="audio/mpeg" />
		<itunes:duration>0:24:24</itunes:duration>
		<itunes:subtitle>
On the 31st episode of The Silver Bullet Security Podcast, Gary talks with Matt Bishop, professor of Computer Science at UC Davis and author of the book Computer Security: Art and Science as well as many peer-reviewed papers. Gary and Matt discuss [...]</itunes:subtitle>
		<itunes:summary>
On the 31st episode of The Silver Bullet Security Podcast, Gary talks with Matt Bishop, professor of Computer Science at UC Davis and author of the book Computer Security: Art and Science as well as many peer-reviewed papers. Gary and Matt discuss Matt&#8217;s plan to work security analysis and secure coding into a wider computer science cirriculum, Matt&#8217;s early work with Mike Dilger on TOCTOU, whether or not progress is being made in the field of software security, and the role of training in large-scale software security initiatives. Their chat closes with a mention of Matt&#8217;s home menagerie (which does not include any one-legged chickens at this time).

Matt Bishop
IEEE Security &#38; Privacy Magazine
Computer Security: Art and Science
Silver Bullet Security Podcast interview with Dorothy Denning
Secure Computer Systems: Mathematical Foundations &#8211; The Bell Lapadula model [PDF]
Secure Computer System: Unified Exposition and Multics Interpretation [PDF]
Testing C Programs for Buffer Overflow Vulnerabilities &#8211; Eric Haugh, Matt Bishop [PDF]
TOCTOU
Checking for Race Conditions in File Accesses by Matt Bishop and Michael Dilger
&#8220;The Song of the One Legged Chicken&#8221;

The post Show 031 &#8211; An Interview with Matt Bishop appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 031 &#8211; An Interview with Matt Bishop appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Developer</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 030 &#8211; An Interview with Ken van Wyk</title>
		<link>https://www.cigital.com/podcasts/show-030/</link>
		<pubDate>Fri, 26 Sep 2008 17:23:25 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Web Application Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-030/</guid>
		<description><![CDATA[<p>On the 30th episode of The Silver Bullet Security Podcast, Gary talks with Ken van Wyk, principal and founder of KRvW Associates. Ken was the first employee of CERT and has been an active member of FIRST. Ken and Gary discuss why the discipline of computer science doesn&#8217;t learn from failure like mechanical engineering does, &#8230; <a href="https://www.cigital.com/podcasts/show-030/" class="more-link">Continue reading <span class="screen-reader-text">Show 030 &#8211; An Interview with Ken van Wyk</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-030/">Show 030 &#8211; An Interview with Ken van Wyk</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/kvanwyk-125.png" alt="Ken van Wyk" align="right" /></p>
<p>On the 30th episode of The Silver Bullet Security Podcast, Gary talks with Ken van Wyk, principal and founder of KRvW Associates. Ken was the first employee of CERT and has been an active member of FIRST. Ken and Gary discuss why the discipline of computer science doesn&#8217;t learn from failure like mechanical engineering does, how we&#8217;re making steps backwards in computer security, whether focusing on web applications is a good or bad thing for software security, and Ken&#8217;s recommendation for moderately-priced red wines.</p>
<ul>
<li><a href="http://www.vanwyk.org/ken/">Ken&#8217;s personal page</a></li>
<li><a href="http://www.krvw.com/">KRvW Associates</a></li>
<li><a href="http://www.cert.org/">CERT</a></li>
<li><a href="http://www.first.org/">FIRST</a></li>
<li><a href="http://www.securecoding.org/"><em>Secure Coding</em></a></li>
<li><a href="http://oreilly.com/catalog/9780596001308/"><em>Incident Response</em></a></li>
<li><a href="http://www.securecoding.org/list/">SC-L mailing list</a></li>
<li><a href="http://finance.google.com/finance?chdnp=1&amp;chdd=1&amp;chds=1&amp;chdv=1&amp;chvs=maximized&amp;chdeh=0&amp;chdet=1222200000000&amp;chddm=166345&amp;q=NYSE:TJX&amp;ntsp=0">TJX&#8217;s stock increase since the January 2007 security breach</a></li>
<li><a href="http://www.buildsecurityin.com/">The Addison-Wesley Software Security Series</a></li>
<li><a href="http://www.google.com/search?hl=en&amp;client=opera&amp;rls=en&amp;hs=fdc&amp;sa=X&amp;oi=spell&amp;resnum=0&amp;ct=result&amp;cd=1&amp;q=barbera+d%27asti&amp;spell=1">Barbera D&#8217;Asti wines</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-030/">Show 030 &#8211; An Interview with Ken van Wyk</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2784/0/silverbullet-030.mp3" length="31395675" type="audio/mpeg" />
		<itunes:duration>0:21:48</itunes:duration>
		<itunes:subtitle>
On the 30th episode of The Silver Bullet Security Podcast, Gary talks with Ken van Wyk, principal and founder of KRvW Associates. Ken was the first employee of CERT and has been an active member of FIRST. Ken and Gary discuss why the discipline of [...]</itunes:subtitle>
		<itunes:summary>
On the 30th episode of The Silver Bullet Security Podcast, Gary talks with Ken van Wyk, principal and founder of KRvW Associates. Ken was the first employee of CERT and has been an active member of FIRST. Ken and Gary discuss why the discipline of computer science doesn&#8217;t learn from failure like mechanical engineering does, how we&#8217;re making steps backwards in computer security, whether focusing on web applications is a good or bad thing for software security, and Ken&#8217;s recommendation for moderately-priced red wines.

Ken&#8217;s personal page
KRvW Associates
CERT
FIRST
Secure Coding
Incident Response
SC-L mailing list
TJX&#8217;s stock increase since the January 2007 security breach
The Addison-Wesley Software Security Series
Barbera D&#8217;Asti wines

The post Show 030 &#8211; An Interview with Ken van Wyk appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 030 &#8211; An Interview with Ken van Wyk appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 029 &#8211; An Interview with Dennis Fisher</title>
		<link>https://www.cigital.com/podcasts/show-029/</link>
		<pubDate>Mon, 18 Aug 2008 11:05:01 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
		
		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-029/</guid>
		<description><![CDATA[<p>On the 29th episode of The Silver Bullet Security Podcast, Gary talks with Dennis Fisher, executive editor of The Security Media Group at TechTarget. Dennis helps run SearchSecurity.com and Information Security Magazine. Gary and Dennis discuss the current &#8220;BS factor&#8221; in security journalism, shopping at TJ Maxx right after the TJX privacy breach, the state &#8230; <a href="https://www.cigital.com/podcasts/show-029/" class="more-link">Continue reading <span class="screen-reader-text">Show 029 &#8211; An Interview with Dennis Fisher</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-029/">Show 029 &#8211; An Interview with Dennis Fisher</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img align="right" alt="Dennis Fisher" src="https://www.cigital.com/silverbullet-files/dfisher-108.png" style="padding-left: 7px" /></p>
<p>On the 29th episode of The Silver Bullet Security Podcast, Gary talks with Dennis Fisher, executive editor of The Security Media Group at TechTarget.  Dennis helps run SearchSecurity.com and <em>Information Security Magazine</em>.  Gary and Dennis discuss the current &#8220;BS factor&#8221; in security journalism, shopping at TJ Maxx right after the TJX privacy breach, the state of software security, and which is harder: being a fry cook at Hardees or working as a PR flack.</p>
<ul>
<li><a href="http://security.blogs.techtarget.com/author/security/">Dennis&#8217; blog</a></li>
<li><a href="http://searchsecurity.techtarget.com/news/column/0,294698,sid14_gci1239802,00.html">TJX</a></li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1237978">Software Security Grows</a></li>
<li><a href="http://securitywireweekly.blogs.techtarget.com/2008/07/31/the-state-of-software-security">Dennis&#8217; un-named podcast</a></li>
<li><a href="https://www.youtube.com/watch?v=f99PcP0aFNE">Series of Tubes</a></li>
<li><a href="http://www.hardees.com/">Hardees</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-029/">Show 029 &#8211; An Interview with Dennis Fisher</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2785/0/silverbullet-029.mp3" length="34313704" type="audio/mpeg" />
		<itunes:duration>0:23:50</itunes:duration>
		<itunes:subtitle>
On the 29th episode of The Silver Bullet Security Podcast, Gary talks with Dennis Fisher, executive editor of The Security Media Group at TechTarget.  Dennis helps run SearchSecurity.com and Information Security Magazine.  Gary and Dennis discuss t[...]</itunes:subtitle>
		<itunes:summary>
On the 29th episode of The Silver Bullet Security Podcast, Gary talks with Dennis Fisher, executive editor of The Security Media Group at TechTarget.  Dennis helps run SearchSecurity.com and Information Security Magazine.  Gary and Dennis discuss the current &#8220;BS factor&#8221; in security journalism, shopping at TJ Maxx right after the TJX privacy breach, the state of software security, and which is harder: being a fry cook at Hardees or working as a PR flack.

Dennis&#8217; blog
TJX
Software Security Grows
Dennis&#8217; un-named podcast
Series of Tubes
Hardees

The post Show 029 &#8211; An Interview with Dennis Fisher appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 029 &#8211; An Interview with Dennis Fisher appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 028 &#8211; An Interview with Bill Cheswick</title>
		<link>https://www.cigital.com/podcasts/show-028/</link>
		<pubDate>Tue, 15 Jul 2008 15:30:25 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cyber war]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-028/</guid>
		<description><![CDATA[<p>On the 28th episode of The Silver Bullet Security Podcast, Gary interviews Bill Cheswick, a lead member of technical staff at AT&#38;T Research and all around security guru. Bill has been working in computer security for over 35 years. He coined the term &#8220;proxy&#8221; in 1990 with reference to firewalls, and co-authored the book Firewalls &#8230; <a href="https://www.cigital.com/podcasts/show-028/" class="more-link">Continue reading <span class="screen-reader-text">Show 028 &#8211; An Interview with Bill Cheswick</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-028/">Show 028 &#8211; An Interview with Bill Cheswick</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/bcheswick-125.png" alt="Bill Cheswick" align="right" /></p>
<p>On the 28th episode of <em>The Silver Bullet Security Podcast</em>, Gary interviews Bill Cheswick, a lead member of technical staff at AT&amp;T Research and all around security guru. Bill has been working in computer security for over 35 years. He coined the term &#8220;proxy&#8221; in 1990 with reference to firewalls, and co-authored the book <em>Firewalls and Internet Security</em> which was used to train an entire generation of sys admins. Gary and Bill discuss whether we&#8217;re winning or losing the computer security war, how security threats have evolved from pimply-faced teenagers to organized crime, whether we should move security into &#8220;the cloud,&#8221; and whether re-naming &#8220;Christmas lights&#8221; to &#8220;solstice lights&#8221; would bypass NJ holiday decoration ordinances.</p>
<ul>
<li><a href="http://www.research.att.com/">AT&amp;T Research</a></li>
<li><a href="http://www.lumeta.com/">Lumeta</a></li>
<li><a href="http://www.wilyhacker.com/">FWIS</a></li>
<li>“<a href="https://www.clusit.it/whitepapers/gateway.pdf">The Design of a Secure Internet Gateway</a>” (Usenix 1990, coining of “proxy”)</li>
<li><a href="https://httpd.apache.org/">The Apache web server</a></li>
<li><a href="https://en.wikipedia.org/wiki/Turtles_all_the_way_down">Turtles all the Way Down</a></li>
<li><a href="https://www.cigital.com/podcasts/show-022/" target="_blank">Ed Amoroso’s Silver Bullet Podcast</a> (use blink test to compare)</li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-028/">Show 028 &#8211; An Interview with Bill Cheswick</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2786/0/silverbullet-028.mp3" length="34531879" type="audio/mpeg" />
		<itunes:duration>0:23:59</itunes:duration>
		<itunes:subtitle>
On the 28th episode of The Silver Bullet Security Podcast, Gary interviews Bill Cheswick, a lead member of technical staff at AT&#38;T Research and all around security guru. Bill has been working in computer security for over 35 years. He coined th[...]</itunes:subtitle>
		<itunes:summary>
On the 28th episode of The Silver Bullet Security Podcast, Gary interviews Bill Cheswick, a lead member of technical staff at AT&#38;T Research and all around security guru. Bill has been working in computer security for over 35 years. He coined the term &#8220;proxy&#8221; in 1990 with reference to firewalls, and co-authored the book Firewalls and Internet Security which was used to train an entire generation of sys admins. Gary and Bill discuss whether we&#8217;re winning or losing the computer security war, how security threats have evolved from pimply-faced teenagers to organized crime, whether we should move security into &#8220;the cloud,&#8221; and whether re-naming &#8220;Christmas lights&#8221; to &#8220;solstice lights&#8221; would bypass NJ holiday decoration ordinances.

AT&#38;T Research
Lumeta
FWIS
“The Design of a Secure Internet Gateway” (Usenix 1990, coining of “proxy”)
The Apache web server
Turtles all the Way Down
Ed Amoroso’s Silver Bullet Podcast (use blink test to compare)

The post Show 028 &#8211; An Interview with Bill Cheswick appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 028 &#8211; An Interview with Bill Cheswick appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 027 &#8211; An Interview with Gunnar Peterson</title>
		<link>https://www.cigital.com/podcasts/show-027/</link>
		<pubDate>Wed, 18 Jun 2008 09:30:44 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Financial Services]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-027/</guid>
		<description><![CDATA[<p>On the 27th episode of The Silver Bullet Security Podcast, Gary interviews software security expert Gunnar Peterson, a Managing Principal at Arctec Group. Gary and Gunnar begin with the age-old question, &#8220;What is security?&#8221; They go on to discuss how Web 2.0 and SOA security is progressing, the big idea behind &#8220;federated identity,&#8221; whether all &#8230; <a href="https://www.cigital.com/podcasts/show-027/" class="more-link">Continue reading <span class="screen-reader-text">Show 027 &#8211; An Interview with Gunnar Peterson</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-027/">Show 027 &#8211; An Interview with Gunnar Peterson</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/gpeterson-123.gif" alt="Gunnar Peterson" align="right" /></p>
<p>On the 27th episode of <em>The Silver Bullet Security Podcast</em>, Gary interviews software security expert Gunnar Peterson, a Managing Principal at Arctec Group. Gary and Gunnar begin with the age-old question, &#8220;What is security?&#8221; They go on to discuss how Web 2.0 and SOA security is progressing, the big idea behind &#8220;federated identity,&#8221; whether all market verticals can follow the software security lead of the financial services industry, and the inherent badness of the color purple.</p>
<ul>
<li><a href="https://www.cigital.com/silver-bullet-files/shows/silverbullet-027-gpeterson.pdf">Transcript of this episode</a> [PDF]</li>
<li><a href="http://1raindrop.typepad.com/">Gunnar’s Blog</a></li>
<li><a href="http://www.informit.com/articles/article.aspx?p=1217101">informIT (Securing Web 3.0)</a></li>
<li><a href="http://www.securitymetrics.org/content/Wiki.jsp?page=Welcome_blogentry_110308_1">Metricon 3.0</a></li>
<li><a href="http://research.microsoft.com/lampson/69-SecurityRealIEEE/69-SecurityRealIEEE.htm">Butler Lampson on Security</a></li>
<li><a href="http://en.wikipedia.org/wiki/Federated_identity">Federated Identity</a></li>
<li><a href="http://www.pingidentity.com/">Ping Identity</a></li>
<li><a href="http://www.geraldmweinberg.com/Site/Home.html">Gerald Weinberg</a></li>
<li><a href="http://securityblog.verizonbusiness.com/2008/06/13/patching-conundrum/">Verizon Business Security: Patching Conundrum</a></li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-027/">Show 027 &#8211; An Interview with Gunnar Peterson</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2787/0/silverbullet-027.mp3" length="40217586" type="audio/mpeg" />
		<itunes:duration>0:27:56</itunes:duration>
		<itunes:subtitle>
On the 27th episode of The Silver Bullet Security Podcast, Gary interviews software security expert Gunnar Peterson, a Managing Principal at Arctec Group. Gary and Gunnar begin with the age-old question, &#8220;What is security?&#8221; They go on t[...]</itunes:subtitle>
		<itunes:summary>
On the 27th episode of The Silver Bullet Security Podcast, Gary interviews software security expert Gunnar Peterson, a Managing Principal at Arctec Group. Gary and Gunnar begin with the age-old question, &#8220;What is security?&#8221; They go on to discuss how Web 2.0 and SOA security is progressing, the big idea behind &#8220;federated identity,&#8221; whether all market verticals can follow the software security lead of the financial services industry, and the inherent badness of the color purple.

Transcript of this episode [PDF]
Gunnar’s Blog
informIT (Securing Web 3.0)
Metricon 3.0
Butler Lampson on Security
Federated Identity
Ping Identity
Gerald Weinberg
Verizon Business Security: Patching Conundrum

The post Show 027 &#8211; An Interview with Gunnar Peterson appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 027 &#8211; An Interview with Gunnar Peterson appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 026 &#8211; An Interview with Adam Shostack</title>
		<link>https://www.cigital.com/podcasts/show-026/</link>
		<pubDate>Thu, 15 May 2008 15:17:01 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Regulatory Compliance]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Development Life Cycle (SDLC)]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-026/</guid>
		<description><![CDATA[<p>The 26th episode of The Silver Bullet Security Podcast features Adam Shostack, a security expert on Microsoft&#8217;s Secure Development Lifecycle team who has also worked for Zero Knowledge and Reflective. Gary and Adam discuss how Adam got started in computer security, how art/literature informs Adam’s current work, and the main ideas behind Adam’s new book &#8230; <a href="https://www.cigital.com/podcasts/show-026/" class="more-link">Continue reading <span class="screen-reader-text">Show 026 &#8211; An Interview with Adam Shostack</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-026/">Show 026 &#8211; An Interview with Adam Shostack</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/ashostack-125.gif" alt="Adam Shostack" align="right" /></p>
<p>The 26th episode of <em>The Silver Bullet Security Podcast</em> features Adam Shostack, a security expert on Microsoft&#8217;s Secure Development Lifecycle team who has also worked for Zero Knowledge and Reflective. Gary and Adam discuss how Adam got started in computer security, how art/literature informs Adam’s current work, and the main ideas behind Adam’s new book <em>The New School of Information Security</em>. They go on to chat about Adam&#8217;s aversion to the term &#8220;best practices,&#8221; the role IEEE Security &amp; Privacy magazine plays in bringing the science of security to a practical level, and whether the biggest problem of the CardSystems breach was following the letter, rather than the spirit, of PCI. Also on the agenda, duck-billed platypuses, Kandinski, and books by Pynchon.</p>
<p>(Beginning with this episode, Silver Bullet will be available as a 192k MP3.)</p>
<ul>
<li><a href="http://www.emergentchaos.com/">Emergent Chaos blog</a></li>
<li><a href="http://www.amazon.com/New-School-Information-Security/dp/0321502787/"><em>The New School of Information Security</em></a></li>
<li><a href="http://msdn.microsoft.com/en-us/library/ms995349.aspx">Microsoft&#8217;s SDL</a></li>
<li><a href="http://en.wikipedia.org/wiki/Wassily_Kandinsky">Wassily Kandinsky</a></li>
<li><a href="http://money.cnn.com/2005/06/17/news/master_card/index.htm">The CardSystems breach</a> (2005)</li>
<li><a href="http://en.wikipedia.org/wiki/Thomas_Pynchon">Thomas Pynchon</a></li>
</ul>
<p></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-026/">Show 026 &#8211; An Interview with Adam Shostack</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2788/0/silverbullet-026.mp3" length="43490207" type="audio/mpeg" />
		<itunes:duration>0:30:12</itunes:duration>
		<itunes:subtitle>
The 26th episode of The Silver Bullet Security Podcast features Adam Shostack, a security expert on Microsoft&#8217;s Secure Development Lifecycle team who has also worked for Zero Knowledge and Reflective. Gary and Adam discuss how Adam got starte[...]</itunes:subtitle>
		<itunes:summary>
The 26th episode of The Silver Bullet Security Podcast features Adam Shostack, a security expert on Microsoft&#8217;s Secure Development Lifecycle team who has also worked for Zero Knowledge and Reflective. Gary and Adam discuss how Adam got started in computer security, how art/literature informs Adam’s current work, and the main ideas behind Adam’s new book The New School of Information Security. They go on to chat about Adam&#8217;s aversion to the term &#8220;best practices,&#8221; the role IEEE Security &#38; Privacy magazine plays in bringing the science of security to a practical level, and whether the biggest problem of the CardSystems breach was following the letter, rather than the spirit, of PCI. Also on the agenda, duck-billed platypuses, Kandinski, and books by Pynchon.
(Beginning with this episode, Silver Bullet will be available as a 192k MP3.)

Emergent Chaos blog
The New School of Information Security
Microsoft&#8217;s SDL
Wassily Kandinsky
The CardSystems breach (2005)
Thomas Pynchon

The post Show 026 &#8211; An Interview with Adam Shostack appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 026 &#8211; An Interview with Adam Shostack appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 025 &#8211; An Interview with Jon Swartz</title>
		<link>https://www.cigital.com/podcasts/show-025/</link>
		<pubDate>Fri, 18 Apr 2008 16:58:21 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Financial Services]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-025/</guid>
		<description><![CDATA[<p>Jon Swartz, USA Today&#8216;s award-winning technology reporter and Pulitzer Prize nominee, is Gary&#8217;s guest on the 25th episode of The Silver Bullet Security Podcast. They discuss Jon&#8217;s new book, Zero Day Threat: The Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks Steal Your Money and Identity and the research that went into &#8230; <a href="https://www.cigital.com/podcasts/show-025/" class="more-link">Continue reading <span class="screen-reader-text">Show 025 &#8211; An Interview with Jon Swartz</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-025/">Show 025 &#8211; An Interview with Jon Swartz</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding-left: 7px;" src="https://www.cigital.com/silverbullet-files/jswartz-125.gif" alt="Jon Swartz" align="right" /></p>
<p>Jon Swartz, <em>USA Today</em>&#8216;s award-winning technology reporter and Pulitzer Prize nominee, is Gary&#8217;s guest on the 25th episode of <em>The Silver Bullet Security Podcast</em>. They discuss Jon&#8217;s new book, <em>Zero Day Threat: The Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks Steal Your Money and Identity</em> and the research that went into writing it. Gary and Jon also cover how cybercrime is driven by capitalist principals, why the general public&#8217;s attitude is so lax about software security, and how, even though it&#8217;s hard to get an accurate count of identity theft instances, they tend to show a sharp upward trend. Jon ends the episode by disclosing his secret dream career.</p>
<p>(Apologies for the below-average sound quality on this episode.)</p>
<ul>
<li><a href="https://www.cigital.com/silver-bullet-files/shows/silverbullet-025-jswartz.pdf">Transcript of this episode</a> [PDF]</li>
<li><a href="http://content.usatoday.com/topics/reporter/Jon+Swartz/1">Jon&#8217;s <em>USA Today</em> articles</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-025/">Show 025 &#8211; An Interview with Jon Swartz</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2789/0/silverbullet-025.mp3" length="26697856" type="audio/mpeg" />
		<itunes:duration>0:27:49</itunes:duration>
		<itunes:subtitle>
Jon Swartz, USA Today&#8216;s award-winning technology reporter and Pulitzer Prize nominee, is Gary&#8217;s guest on the 25th episode of The Silver Bullet Security Podcast. They discuss Jon&#8217;s new book, Zero Day Threat: The Shocking Truth of H[...]</itunes:subtitle>
		<itunes:summary>
Jon Swartz, USA Today&#8216;s award-winning technology reporter and Pulitzer Prize nominee, is Gary&#8217;s guest on the 25th episode of The Silver Bullet Security Podcast. They discuss Jon&#8217;s new book, Zero Day Threat: The Shocking Truth of How Banks and Credit Bureaus Help Cyber Crooks Steal Your Money and Identity and the research that went into writing it. Gary and Jon also cover how cybercrime is driven by capitalist principals, why the general public&#8217;s attitude is so lax about software security, and how, even though it&#8217;s hard to get an accurate count of identity theft instances, they tend to show a sharp upward trend. Jon ends the episode by disclosing his secret dream career.
(Apologies for the below-average sound quality on this episode.)

Transcript of this episode [PDF]
Jon&#8217;s USA Today articles

The post Show 025 &#8211; An Interview with Jon Swartz appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 025 &#8211; An Interview with Jon Swartz appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Background Behind a CSO with Mary Ann Davidson</title>
		<link>https://www.cigital.com/podcasts/show-024/</link>
		<pubDate>Fri, 14 Mar 2008 14:26:36 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Developer]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[software development]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-024/</guid>
		<description><![CDATA[<p>Oracle Chief Security Officer Mary Ann Davidson is the guest on the 24th episode of The Silver Bullet Security Podcast. Gary and Mary Ann discuss how an MBA helps in the CSO role, Oracle&#8217;s &#8220;Unbreakable&#8221; campaign, why everyone needs training in secure coding, and how military history informs computer security. They also talk about how &#8230; <a href="https://www.cigital.com/podcasts/show-024/" class="more-link">Continue reading <span class="screen-reader-text">Background Behind a CSO with Mary Ann Davidson</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-024/">Background Behind a CSO with Mary Ann Davidson</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/madavidson-125.gif" alt="Mary Ann Davidson" align="right" /></p>
<p>Oracle Chief Security Officer Mary Ann Davidson is the guest on the 24th episode of The Silver Bullet Security Podcast. Gary and Mary Ann discuss how an MBA helps in the CSO role, Oracle&#8217;s &#8220;Unbreakable&#8221; campaign, why everyone needs training in secure coding, and how military history informs computer security. They also talk about how a young CSO-to-be got her first library card.</p>
<ul>
<li><a href="https://blogs.oracle.com/maryanndavidson/">Mary Ann Davidson&#8217;s blog</a></li>
<li><a href="https://www.amazon.com/Lone-Survivor-Eyewitness-Account-Operation/dp/0316067598"><em>Lone Survivor</em></a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-024/">Background Behind a CSO with Mary Ann Davidson</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2701/0/silverbullet-024.mp3" length="27605631" type="audio/mpeg" />
		<itunes:duration>0:28:45</itunes:duration>
		<itunes:subtitle>
Oracle Chief Security Officer Mary Ann Davidson is the guest on the 24th episode of The Silver Bullet Security Podcast. Gary and Mary Ann discuss how an MBA helps in the CSO role, Oracle&#8217;s &#8220;Unbreakable&#8221; campaign, why everyone need[...]</itunes:subtitle>
		<itunes:summary>
Oracle Chief Security Officer Mary Ann Davidson is the guest on the 24th episode of The Silver Bullet Security Podcast. Gary and Mary Ann discuss how an MBA helps in the CSO role, Oracle&#8217;s &#8220;Unbreakable&#8221; campaign, why everyone needs training in secure coding, and how military history informs computer security. They also talk about how a young CSO-to-be got her first library card.

Mary Ann Davidson&#8217;s blog
Lone Survivor

The post Background Behind a CSO with Mary Ann Davidson appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Background Behind a CSO with Mary Ann Davidson appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>CISO, Developer</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Growth of Software Security with Chris Wysopal</title>
		<link>https://www.cigital.com/podcasts/show-023/</link>
		<pubDate>Tue, 19 Feb 2008 12:41:13 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Business Leader]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-023/</guid>
		<description><![CDATA[<p>On the 23rd episode of The Silver Bullet Security Podcast, Gary talks with Chris Wysopal, founder and CTO of Veracode and author of The Art of Software Security Testing. Chris was one of the seven original members of the L0pht hacker collective (operating under the hacker handle Weld Pond) and later went on to work &#8230; <a href="https://www.cigital.com/podcasts/show-023/" class="more-link">Continue reading <span class="screen-reader-text">The Growth of Software Security with Chris Wysopal</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-023/">The Growth of Software Security with Chris Wysopal</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/cwysopal-125.gif" alt="Chris Wysopal" align="right" /></p>
<p>On the 23rd episode of The Silver Bullet Security Podcast, Gary talks with Chris Wysopal, founder and CTO of Veracode and author of <em>The Art of Software Security Testing</em>. Chris was one of the seven original members of the L0pht hacker collective (operating under the hacker handle Weld Pond) and later went on to work for @stake. Gary and Chris reminisce about L0pht (and the warehouse full of stuff) and discuss the role of security researchers now versus in the mid-late &#8217;90s. They also talk about the current state of the software security market and its continued growth.</p>
<ul>
<li><a href="http://en.wikipedia.org/wiki/Weld_Pond">Chris&#8217; Wikipedia entry</a></li>
<li><a href="http://www.softwaresecuritytesting.com/"><em>The Art of Software Security Testing</em></a></li>
<li><a href="http://www.veracode.com/">Veracode</a></li>
<li><a href="http://en.wikipedia.org/wiki/L0pht">L0pht Heavy Industries</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-023/">The Growth of Software Security with Chris Wysopal</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2702/0/silverbullet-023.mp3" length="23801984" type="audio/mpeg" />
		<itunes:duration>0:24:48</itunes:duration>
		<itunes:subtitle>
On the 23rd episode of The Silver Bullet Security Podcast, Gary talks with Chris Wysopal, founder and CTO of Veracode and author of The Art of Software Security Testing. Chris was one of the seven original members of the L0pht hacker collective (op[...]</itunes:subtitle>
		<itunes:summary>
On the 23rd episode of The Silver Bullet Security Podcast, Gary talks with Chris Wysopal, founder and CTO of Veracode and author of The Art of Software Security Testing. Chris was one of the seven original members of the L0pht hacker collective (operating under the hacker handle Weld Pond) and later went on to work for @stake. Gary and Chris reminisce about L0pht (and the warehouse full of stuff) and discuss the role of security researchers now versus in the mid-late &#8217;90s. They also talk about the current state of the software security market and its continued growth.

Chris&#8217; Wikipedia entry
The Art of Software Security Testing
Veracode
L0pht Heavy Industries

The post The Growth of Software Security with Chris Wysopal appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Growth of Software Security with Chris Wysopal appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Software Security Behind AT&#038;T with Ed Amoroso</title>
		<link>https://www.cigital.com/podcasts/show-022/</link>
		<pubDate>Wed, 23 Jan 2008 17:33:09 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Defects, Bugs, and Flaws]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[bugs]]></category>
		<category><![CDATA[design flaws]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-022/</guid>
		<description><![CDATA[<p>On the 22nd episode of The Silver Bullet Security Podcast, Gary interviews Ed Amoroso, Chief Information Security Officer of AT&#38;T. They discuss how Peter Neumann influenced Ed, the difference between bugs and flaws and whether bugs are getting too much attention, the propensity for confusion around how security actually works, privacy, security, and monitoring, and &#8230; <a href="https://www.cigital.com/podcasts/show-022/" class="more-link">Continue reading <span class="screen-reader-text">Software Security Behind AT&#038;T with Ed Amoroso</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-022/">Software Security Behind AT&#038;T with Ed Amoroso</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/eamoroso-125.gif" alt="Ed Amaroso" align="right" /></p>
<p style="margin-top: 5px;">On the 22nd episode of The Silver Bullet Security Podcast, Gary interviews Ed Amoroso, Chief Information Security Officer of AT&amp;T. They discuss how Peter Neumann influenced Ed, the difference between bugs and flaws and whether bugs are getting too much attention, the propensity for confusion around how security actually works, privacy, security, and monitoring, and software correctness/quality vs software security. They also discuss the Hugh Thompson show now airing on AT&amp;T&#8217;s Tech Channel.</p>
<ul>
<li><a href="https://www.cigial.com/silver-bullet-files/shows/silverbullet-022-eamoroso.pdf">Transcript of this episode</a> [PDF]</li>
<li><a href="http://www.silicon-press.com/books/isbn.0-929306-38-4/index.html"><em>Cyber Security</em></a></li>
<li><a href="http://www.amazon.com/Fundamentals-Computer-Security-Technology-Amoroso/dp/0131089293"><em>Fundamentals of Computer Security Technology</em></a></li>
<li><a href="https://www.cigital.com/podcasts/show-014/" target="_blank">Silver Bullet Interview with Peter Neumann</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-022/">Software Security Behind AT&#038;T with Ed Amoroso</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2703/0/silverbullet-022.mp3" length="31119488" type="audio/mpeg" />
		<itunes:duration>0:32:25</itunes:duration>
		<itunes:subtitle>
On the 22nd episode of The Silver Bullet Security Podcast, Gary interviews Ed Amoroso, Chief Information Security Officer of AT&#38;T. They discuss how Peter Neumann influenced Ed, the difference between bugs and flaws and whether bugs are getting [...]</itunes:subtitle>
		<itunes:summary>
On the 22nd episode of The Silver Bullet Security Podcast, Gary interviews Ed Amoroso, Chief Information Security Officer of AT&#38;T. They discuss how Peter Neumann influenced Ed, the difference between bugs and flaws and whether bugs are getting too much attention, the propensity for confusion around how security actually works, privacy, security, and monitoring, and software correctness/quality vs software security. They also discuss the Hugh Thompson show now airing on AT&#38;T&#8217;s Tech Channel.

Transcript of this episode [PDF]
Cyber Security
Fundamentals of Computer Security Technology
Silver Bullet Interview with Peter Neumann

The post Software Security Behind AT&#038;T with Ed Amoroso appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Software Security Behind AT&#038;T with Ed Amoroso appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>CISO</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 021 &#8211; A Panel Discussion with Cigital&#8217;s Principals</title>
		<link>https://www.cigital.com/podcasts/show-021/</link>
		<pubDate>Fri, 21 Dec 2007 16:40:32 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Architecture Risk Analysis]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Starting a Security Initiative]]></category>
		<category><![CDATA[Threat Modeling]]></category>
		<category><![CDATA[Cigital leadership]]></category>
		<category><![CDATA[touchpoints]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-021/</guid>
		<description><![CDATA[<p>For the 21st episode of The Silver Bullet Security Podcast, Gary hosts a panel discussion with Cigital&#8217;s principals. Participants include Sammy Migues (Director of Training and Knowledge Management), John Steven (Principal Consultant) and Pravir Chandra (Principal Consultant). The group discusses the best ways for large companies to get started with software security and the similarities &#8230; <a href="https://www.cigital.com/podcasts/show-021/" class="more-link">Continue reading <span class="screen-reader-text">Show 021 &#8211; A Panel Discussion with Cigital&#8217;s Principals</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-021/">Show 021 &#8211; A Panel Discussion with Cigital&#8217;s Principals</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p style="margin-top: 5px;">For the 21st episode of The Silver Bullet Security Podcast, Gary hosts a panel discussion with Cigital&#8217;s principals. Participants include Sammy Migues (Director of Training and Knowledge Management), John Steven (Principal Consultant) and Pravir Chandra (Principal Consultant). The group discusses the best ways for large companies to get started with software security and the similarities between CLASP, Microsoft&#8217;s SDL, and the Security Touchpoints. They also ponder how much the security testing burden should fall on QA and whether developing expertise in architectural risk analysis or threat modeling is more helpful. John Steven also discusses the hole in his dining room, which threat modeling would not have helped to prevent.</p>
<ul>
<li><a href="https://www.cigital.com/silver-bullet-files/shows/silverbullet-021-cigital.pdf">Transcript of this episode</a> [PDF]</li>
<li><a href="https://www.cigital.com/blog/" target="_blank">Justice League blog</a></li>
<li><a href="http://www.owasp.org/index.php/Top_10_2007">OWASP Top 10 for 2007</a></li>
<li><a href="http://www.owasp.org/">OWASP</a></li>
<li><a href="http://www.shmoo.com/">The Shmoo Group</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-021/">Show 021 &#8211; A Panel Discussion with Cigital&#8217;s Principals</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2790/0/silverbullet-021.mp3" length="22640768" type="audio/mpeg" />
		<itunes:duration>0:23:35</itunes:duration>
		<itunes:subtitle>For the 21st episode of The Silver Bullet Security Podcast, Gary hosts a panel discussion with Cigital&#8217;s principals. Participants include Sammy Migues (Director of Training and Knowledge Management), John Steven (Principal Consultant) and Prav[...]</itunes:subtitle>
		<itunes:summary>For the 21st episode of The Silver Bullet Security Podcast, Gary hosts a panel discussion with Cigital&#8217;s principals. Participants include Sammy Migues (Director of Training and Knowledge Management), John Steven (Principal Consultant) and Pravir Chandra (Principal Consultant). The group discusses the best ways for large companies to get started with software security and the similarities between CLASP, Microsoft&#8217;s SDL, and the Security Touchpoints. They also ponder how much the security testing burden should fall on QA and whether developing expertise in architectural risk analysis or threat modeling is more helpful. John Steven also discusses the hole in his dining room, which threat modeling would not have helped to prevent.

Transcript of this episode [PDF]
Justice League blog
OWASP Top 10 for 2007
OWASP
The Shmoo Group

The post Show 021 &#8211; A Panel Discussion with Cigital&#8217;s Principals appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 021 &#8211; A Panel Discussion with Cigital&#8217;s Principals appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 020 &#8211; An Interview with Markus Jakobsson</title>
		<link>https://www.cigital.com/podcasts/show-020/</link>
		<pubDate>Fri, 16 Nov 2007 18:32:45 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[cryptography]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-020/</guid>
		<description><![CDATA[<p>For the landmark 20th episode of The Silver Bullet Security Podcast, Gary interviews Markus Jakobsson, soon to be a reseacher at PARC after a stint as an Associate Professor of Informatics and associate director of the Center for Applied Cybersecurity Research at Indiana University. Gary and Markus discuss the difference between academic and corporate research, &#8230; <a href="https://www.cigital.com/podcasts/show-020/" class="more-link">Continue reading <span class="screen-reader-text">Show 020 &#8211; An Interview with Markus Jakobsson</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-020/">Show 020 &#8211; An Interview with Markus Jakobsson</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/mjakobsson-125.gif" alt="Markus Jakobsson" align="right" /></p>
<p style="margin-top: 5px;">For the landmark 20th episode of The Silver Bullet Security Podcast, Gary interviews Markus Jakobsson, soon to be a reseacher at PARC after a stint as an Associate Professor of Informatics and associate director of the Center for Applied Cybersecurity Research at Indiana University. Gary and Markus discuss the difference between academic and corporate research, the idea of &#8220;perfect privacy,&#8221; moving from hardcore cryptography to sociology, how reality is mimicking phishers, and how cartoons can be used to teach security. In addition, Markus mentions the best place in Southeast Asia to get a haircut.</p>
<ul>
<li><a href="http://en.wikipedia.org/wiki/Markus_Jakobsson">Markus @ Wikipedia</a> &#8211; he&#8217;s &#8220;orphaned&#8221;!</li>
<li><a href="http://www.ravenwhite.com/">RavenWhite</a></li>
<li><a href="http://www.amazon.com/Crimeware-Symantec-Press-Markus-Jakobsson/dp/0321501950"><em>Crimeware</em></a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-020/">Show 020 &#8211; An Interview with Markus Jakobsson</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2791/0/silverbullet-020.mp3" length="23502848" type="audio/mpeg" />
		<itunes:duration>0:24:29</itunes:duration>
		<itunes:subtitle>
For the landmark 20th episode of The Silver Bullet Security Podcast, Gary interviews Markus Jakobsson, soon to be a reseacher at PARC after a stint as an Associate Professor of Informatics and associate director of the Center for Applied Cybersecur[...]</itunes:subtitle>
		<itunes:summary>
For the landmark 20th episode of The Silver Bullet Security Podcast, Gary interviews Markus Jakobsson, soon to be a reseacher at PARC after a stint as an Associate Professor of Informatics and associate director of the Center for Applied Cybersecurity Research at Indiana University. Gary and Markus discuss the difference between academic and corporate research, the idea of &#8220;perfect privacy,&#8221; moving from hardcore cryptography to sociology, how reality is mimicking phishers, and how cartoons can be used to teach security. In addition, Markus mentions the best place in Southeast Asia to get a haircut.

Markus @ Wikipedia &#8211; he&#8217;s &#8220;orphaned&#8221;!
RavenWhite
Crimeware

The post Show 020 &#8211; An Interview with Markus Jakobsson appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 020 &#8211; An Interview with Markus Jakobsson appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Legitimacy of Mobile Viruses with Mikko Hyppönen</title>
		<link>https://www.cigital.com/podcasts/show-019/</link>
		<pubDate>Thu, 18 Oct 2007 11:21:38 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Mobile Application Security]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[mobile]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-019/</guid>
		<description><![CDATA[<p>For the 19th episode of The Silver Bullet Security Podcast, Gary interviews Mikko Hyppönen, Chief Research Officer at F-Secure. During this show, Gary and Mikko discuss Helsinki and Finnish pronunciation, whether mobile viruses are all hype or a legitimate threat, if the iPhone as a closed system is good or bad for security, and Mikko&#8217;s &#8230; <a href="https://www.cigital.com/podcasts/show-019/" class="more-link">Continue reading <span class="screen-reader-text">The Legitimacy of Mobile Viruses with Mikko Hyppönen</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-019/">The Legitimacy of Mobile Viruses with Mikko Hyppönen</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/mikko-125.gif" alt="Mikko Hyppönen" align="right" /></p>
<p style="margin-top: 5px;">For the 19th episode of The Silver Bullet Security Podcast, Gary interviews Mikko Hyppönen, Chief Research Officer at F-Secure. During this show, Gary and Mikko discuss Helsinki and Finnish pronunciation, whether mobile viruses are all hype or a legitimate threat, if the iPhone as a closed system is good or bad for security, and Mikko&#8217;s prediction for the appearance of the first mobile botnet. They also chat about Finnish hip-hop.</p>
<ul>
<li><a href="https://www.cigital.com/silver-bullet-files/shows/silverbullet-019-mhypponen.pdf">Transcript of this episode</a> [PDF]</li>
<li><a href="http://mikko.hypponen.com/">Mikko Hyppönen</a></li>
<li><a href="http://en.wikipedia.org/wiki/Mikko_Hyppönen">Mikko Hyppönen</a>&#8211; Wikipedia</li>
<li><a href="http://www.f-secure.com/">F-Secure</a></li>
<li><a href="http://www.usenix.org/events/sec07/tech/#thurs">Mobile Malware</a> &#8211; Mikko&#8217;s USENIX 2007 talk, both audio and video (scroll down a bit)</li>
<li><a href="http://www.klov.com/game_detail.php?game_id=10505">Xevious</a></li>
<li><a href="http://www.management-consoles.com/">The FSMCs</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-019/">The Legitimacy of Mobile Viruses with Mikko Hyppönen</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2714/0/silverbullet-019.mp3" length="21301376" type="audio/mpeg" />
		<itunes:duration>0:22:11</itunes:duration>
		<itunes:subtitle>
For the 19th episode of The Silver Bullet Security Podcast, Gary interviews Mikko Hyppönen, Chief Research Officer at F-Secure. During this show, Gary and Mikko discuss Helsinki and Finnish pronunciation, whether mobile viruses are all hype or a le[...]</itunes:subtitle>
		<itunes:summary>
For the 19th episode of The Silver Bullet Security Podcast, Gary interviews Mikko Hyppönen, Chief Research Officer at F-Secure. During this show, Gary and Mikko discuss Helsinki and Finnish pronunciation, whether mobile viruses are all hype or a legitimate threat, if the iPhone as a closed system is good or bad for security, and Mikko&#8217;s prediction for the appearance of the first mobile botnet. They also chat about Finnish hip-hop.

Transcript of this episode [PDF]
Mikko Hyppönen
Mikko Hyppönen&#8211; Wikipedia
F-Secure
Mobile Malware &#8211; Mikko&#8217;s USENIX 2007 talk, both audio and video (scroll down a bit)
Xevious
The FSMCs

The post The Legitimacy of Mobile Viruses with Mikko Hyppönen appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Legitimacy of Mobile Viruses with Mikko Hyppönen appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Importance of Software Testing with Eugene Spafford</title>
		<link>https://www.cigital.com/podcasts/show-018/</link>
		<pubDate>Tue, 25 Sep 2007 17:04:22 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Energy]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Security Training]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[ethical hacking]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-018/</guid>
		<description><![CDATA[<p>On the 18th episode of The Silver Bullet Security Podcast, Gary talks with Dr. Eugene Spafford, better known as &#8220;Spaf.&#8221; Spaf is a professor of computer science and Electrical and Computer Engineering at Purdue University and executive director of the Center for Education and Research in Information Assurance and Security (CERIAS). On this episode, Gary &#8230; <a href="https://www.cigital.com/podcasts/show-018/" class="more-link">Continue reading <span class="screen-reader-text">The Importance of Software Testing with Eugene Spafford</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-018/">The Importance of Software Testing with Eugene Spafford</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/spaf-125.gif" alt="Eugene Spafford" align="right" /></p>
<p style="margin-top: 5px;">On the 18th episode of The Silver Bullet Security Podcast, Gary talks with Dr. Eugene Spafford, better known as &#8220;Spaf.&#8221; Spaf is a professor of computer science and Electrical and Computer Engineering at Purdue University and executive director of the Center for Education and Research in Information Assurance and Security (CERIAS). On this episode, Gary and Spaf discuss the role of software testing in computer security, commercial certifications and whether they obviate the need for academic training, how Spaf feels about so-called &#8220;ethical hacking,&#8221; and why auditing and compliance is an area of emerging specialization.</p>
<ul>
<li><a href="https://www.cigital.com/silver-bullet-files/shows/silverbullet-018-spaf.pdf">Transcript of this episode</a> [PDF]</li>
<li><a href="http://spaf.cerias.purdue.edu/">Dr. Eugene Spafford</a></li>
<li><a href="http://www.cerias.purdue.edu/weblogs/author/spaf/">Spaf&#8217;s blog at CERIAS</a></li>
<li><a href="http://en.wikipedia.org/wiki/Gene_Spafford">Gene Spafford</a> &#8211; Wikipedia</li>
<li><a href="http://www.cerias.purdue.edu/">CERIAS</a> &#8211; Center for Education and Research in Information Assurance and Security</li>
<li><a href="http://www.nitrd.gov/pitac/">PITAC</a> &#8211; President&#8217;s Information Technology Advisory Committee</li>
<li><a href="http://www.cerias.purdue.edu/weblogs/spaf/kudos-opinions-rants/post-120/what-did-you-really-expect/">What did you really expect?</a> &#8211; Spaf&#8217;s post on &#8220;reformed hackers&#8221;</li>
<li><a href="http://wiretap.area.com/Gopher/Library/Techdoc/Virus/inetvir.823">The Internet Worm Program: An Analysis</a></li>
<li><a href="http://spaf.cerias.purdue.edu/~spaf/Yucks/">Yucks Digest</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-018/">The Importance of Software Testing with Eugene Spafford</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2715/0/silverbullet-018.mp3" length="27003008" type="audio/mpeg" />
		<itunes:duration>0:28:08</itunes:duration>
		<itunes:subtitle>
On the 18th episode of The Silver Bullet Security Podcast, Gary talks with Dr. Eugene Spafford, better known as &#8220;Spaf.&#8221; Spaf is a professor of computer science and Electrical and Computer Engineering at Purdue University and executive d[...]</itunes:subtitle>
		<itunes:summary>
On the 18th episode of The Silver Bullet Security Podcast, Gary talks with Dr. Eugene Spafford, better known as &#8220;Spaf.&#8221; Spaf is a professor of computer science and Electrical and Computer Engineering at Purdue University and executive director of the Center for Education and Research in Information Assurance and Security (CERIAS). On this episode, Gary and Spaf discuss the role of software testing in computer security, commercial certifications and whether they obviate the need for academic training, how Spaf feels about so-called &#8220;ethical hacking,&#8221; and why auditing and compliance is an area of emerging specialization.

Transcript of this episode [PDF]
Dr. Eugene Spafford
Spaf&#8217;s blog at CERIAS
Gene Spafford &#8211; Wikipedia
CERIAS &#8211; Center for Education and Research in Information Assurance and Security
PITAC &#8211; President&#8217;s Information Technology Advisory Committee
What did you really expect? &#8211; Spaf&#8217;s post on &#8220;reformed hackers&#8221;
The Internet Worm Program: An Analysis
Yucks Digest

The post The Importance of Software Testing with Eugene Spafford appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Importance of Software Testing with Eugene Spafford appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Energy</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The ROI of Computer Security with Eric Cole</title>
		<link>https://www.cigital.com/podcasts/show-017/</link>
		<pubDate>Fri, 24 Aug 2007 16:19:43 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Developer]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Security Training]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[software development]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-017/</guid>
		<description><![CDATA[<p>On the 17th episode of The Silver Bullet Security Podcast, Gary talks with Eric Cole, CEO of Secure Anchor. Eric has written seven books on computer security, including books on steganography and network security. Gary and Eric discuss how to demostrate security ROI in different types of organizations (ranging from government to corporate), the academic &#8230; <a href="https://www.cigital.com/podcasts/show-017/" class="more-link">Continue reading <span class="screen-reader-text">The ROI of Computer Security with Eric Cole</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-017/">The ROI of Computer Security with Eric Cole</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/ecole-125.gif" alt="Eric Cole" align="right" /></p>
<p style="margin-top: 5px;">On the 17th episode of The Silver Bullet Security Podcast, Gary talks with Eric Cole, CEO of Secure Anchor. Eric has written seven books on computer security, including books on steganography and network security. Gary and Eric discuss how to demostrate security ROI in different types of organizations (ranging from government to corporate), the academic approach to security versus practitioner certification models, and what kinds of training makes for good network security practitioners. They also discuss the difficulty of certifying software developers.</p>
<ul>
<li><a href="http://www.secure-anchor.com/">Secure Anchor</a></li>
<li><a href="http://www.securityhaven.com/">Security Haven</a></li>
<li><a href="http://digitalcommons.pace.edu/dissertations/AAI3127379/">Stego-marking packets to control information leakage on TCP/IP based networks</a> &#8211; Eric&#8217;s dissertation</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-017/">The ROI of Computer Security with Eric Cole</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2717/0/silverbullet-017.mp3" length="28208320" type="audio/mpeg" />
		<itunes:duration>0:29:23</itunes:duration>
		<itunes:subtitle>
On the 17th episode of The Silver Bullet Security Podcast, Gary talks with Eric Cole, CEO of Secure Anchor. Eric has written seven books on computer security, including books on steganography and network security. Gary and Eric discuss how to demos[...]</itunes:subtitle>
		<itunes:summary>
On the 17th episode of The Silver Bullet Security Podcast, Gary talks with Eric Cole, CEO of Secure Anchor. Eric has written seven books on computer security, including books on steganography and network security. Gary and Eric discuss how to demostrate security ROI in different types of organizations (ranging from government to corporate), the academic approach to security versus practitioner certification models, and what kinds of training makes for good network security practitioners. They also discuss the difficulty of certifying software developers.

Secure Anchor
Security Haven
Stego-marking packets to control information leakage on TCP/IP based networks &#8211; Eric&#8217;s dissertation

The post The ROI of Computer Security with Eric Cole appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The ROI of Computer Security with Eric Cole appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Developer</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Understanding Exploits with Greg Hoglund</title>
		<link>https://www.cigital.com/podcasts/show-016/</link>
		<pubDate>Thu, 12 Jul 2007 18:38:30 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[malicious code]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-016/</guid>
		<description><![CDATA[<p>On the 16th episode of The Silver Bullet Security Podcast, Gary talks with Greg Hoglund, who runs the popular rootkit.com, CEO of HB Gary, and co-author of Rootkits: Subverting the Windows Kernel and Exploiting Software. In addition to shameless self-promotion of their new book, Exploiting Online Games, Gary and Greg discuss the natural tendency of &#8230; <a href="https://www.cigital.com/podcasts/show-016/" class="more-link">Continue reading <span class="screen-reader-text">Understanding Exploits with Greg Hoglund</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-016/">Understanding Exploits with Greg Hoglund</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/ghoglund-125.gif" alt="Greg Hoglund" align="right" /></p>
<p style="margin-top: 5px;">On the 16th episode of The Silver Bullet Security Podcast, Gary talks with Greg Hoglund, who runs the popular rootkit.com, CEO of HB Gary, and co-author of <em>Rootkits: Subverting the Windows Kernel</em> and <em>Exploiting Software</em>. In addition to shameless self-promotion of their new book, <em>Exploiting Online Games</em>, Gary and Greg discuss the natural tendency of certain types of code to allow exploits, how disclosure is a good thing when it comes to revealing exploits, and the use of rootkits by the &#8220;good guys.&#8221; Greg also makes us concerned that his 11-year-old daughter may 0wn our box.</p>
<ul>
<li><a href="http://www.hbgary.com/">HB Gary</a></li>
<li><a href="http://www.exploitingonlinegames.com/">Exploiting Online Games</a></li>
<li><a href="http://www.buildingsecurityin.com/">AWL Software Security Series</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-016/">Understanding Exploits with Greg Hoglund</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2718/0/silverbullet-016.mp3" length="23085184" type="audio/mpeg" />
		<itunes:duration>0:24:03</itunes:duration>
		<itunes:subtitle>
On the 16th episode of The Silver Bullet Security Podcast, Gary talks with Greg Hoglund, who runs the popular rootkit.com, CEO of HB Gary, and co-author of Rootkits: Subverting the Windows Kernel and Exploiting Software. In addition to shameless se[...]</itunes:subtitle>
		<itunes:summary>
On the 16th episode of The Silver Bullet Security Podcast, Gary talks with Greg Hoglund, who runs the popular rootkit.com, CEO of HB Gary, and co-author of Rootkits: Subverting the Windows Kernel and Exploiting Software. In addition to shameless self-promotion of their new book, Exploiting Online Games, Gary and Greg discuss the natural tendency of certain types of code to allow exploits, how disclosure is a good thing when it comes to revealing exploits, and the use of rootkits by the &#8220;good guys.&#8221; Greg also makes us concerned that his 11-year-old daughter may 0wn our box.

HB Gary
Exploiting Online Games
AWL Software Security Series

The post Understanding Exploits with Greg Hoglund appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Understanding Exploits with Greg Hoglund appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Data Privacy Defined with Annie Antón</title>
		<link>https://www.cigital.com/podcasts/show-015/</link>
		<pubDate>Tue, 19 Jun 2007 10:12:30 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-015/</guid>
		<description><![CDATA[<p>On the 15th episode of The Silver Bullet Security Podcast, Gary interviews Annie Antón, Associate Professor of Software Engineering at North Carolina State University and director of theprivacyplace.org. During their discussion, Annie and Gary focus on privacy. They start with an attempt to define what &#8220;privacy&#8221; is in the digital world, moving on to Annie&#8217;s &#8230; <a href="https://www.cigital.com/podcasts/show-015/" class="more-link">Continue reading <span class="screen-reader-text">Data Privacy Defined with Annie Antón</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-015/">Data Privacy Defined with Annie Antón</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/aanton-125.gif" alt="Annie Anton" align="right" /></p>
<p style="margin-top: 5px;">On the 15th episode of The Silver Bullet Security Podcast, Gary interviews Annie Antón, Associate Professor of Software Engineering at North Carolina State University and director of theprivacyplace.org. During their discussion, Annie and Gary focus on privacy. They start with an attempt to define what &#8220;privacy&#8221; is in the digital world, moving on to Annie&#8217;s work with The Privacy Place. Annie also discusses airlines&#8217; pretty much pitiful privacy policies, the impact that a Google/Doubleclick deal would have on consumer privacy, crazy talk in EULAs, and the book <em>Letters to a Young Catholic</em> (which has nothing to do with privacy).</p>
<ul>
<li><a href="http://www4.ncsu.edu/~aianton/">Annie I. Antón</a></li>
<li><a href="http://www.theprivacyplace.org/">The Privacy Place</a></li>
<li><a href="http://www.privacyrights.org/ar/CPResponse.htm">The ChoicePoint Data Security Breach</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-015/">Data Privacy Defined with Annie Antón</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2719/0/silverbullet-015.mp3" length="2147483647" type="audio/mpeg" />
		<itunes:duration>0:25:16</itunes:duration>
		<itunes:subtitle>
On the 15th episode of The Silver Bullet Security Podcast, Gary interviews Annie Antón, Associate Professor of Software Engineering at North Carolina State University and director of theprivacyplace.org. During their discussion, Annie and Gary focu[...]</itunes:subtitle>
		<itunes:summary>
On the 15th episode of The Silver Bullet Security Podcast, Gary interviews Annie Antón, Associate Professor of Software Engineering at North Carolina State University and director of theprivacyplace.org. During their discussion, Annie and Gary focus on privacy. They start with an attempt to define what &#8220;privacy&#8221; is in the digital world, moving on to Annie&#8217;s work with The Privacy Place. Annie also discusses airlines&#8217; pretty much pitiful privacy policies, the impact that a Google/Doubleclick deal would have on consumer privacy, crazy talk in EULAs, and the book Letters to a Young Catholic (which has nothing to do with privacy).

Annie I. Antón
The Privacy Place
The ChoicePoint Data Security Breach

The post Data Privacy Defined with Annie Antón appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Data Privacy Defined with Annie Antón appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Computer Security since the 1960&#8217;s with Peter Neumann</title>
		<link>https://www.cigital.com/podcasts/show-014/</link>
		<pubDate>Tue, 22 May 2007 13:04:03 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-014/</guid>
		<description><![CDATA[<p>The 14th episode of The Silver Bullet Security Podcast features Peter Neumann, designer of the Multics OS file system, moderator of comp.RISKS, and Principal Scientist at the SRI Computer Science Laboratory. In this show, Gary and Peter discuss the most important changes in computer security since the 1960s, the discipline involved in early Multics engineering &#8230; <a href="https://www.cigital.com/podcasts/show-014/" class="more-link">Continue reading <span class="screen-reader-text">Computer Security since the 1960&#8217;s with Peter Neumann</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-014/">Computer Security since the 1960&#8217;s with Peter Neumann</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/pneumann-125.gif" alt="Peter Neumann" align="right" /></p>
<p style="margin-top: 5px;">The 14th episode of The Silver Bullet Security Podcast features Peter Neumann, designer of the Multics OS file system, moderator of comp.RISKS, and Principal Scientist at the SRI Computer Science Laboratory. In this show, Gary and Peter discuss the most important changes in computer security since the 1960s, the discipline involved in early Multics engineering (&#8220;nodody writes a line of code without the approving authorities [having] read and understood the specification&#8221;), why DRM is the &#8220;wrong solution to the wrong problem,&#8221; and who was more interesting to meet: Albert Einstein or Norah Jones.</p>
<ul>
<li><a href="http://www.csl.sri.com/users/neumann/">Peter Neumann</a></li>
<li><a href="http://catless.ncl.ac.uk/risks">comp.RISKS</a></li>
<li><a href="http://www.csl.sri.com/users/neumann/neumann-book.html"><em>Computer-Related Risks</em></a></li>
<li><a href="http://en.wikipedia.org/wiki/Multics">Multics</a></li>
<li><a href="http://www.multicians.org/fjcc4.html">A General-Purpose File System For Secondary Storage</a> &#8211; Peter&#8217;s 1965 paper on Multics</li>
<li><a href="http://www.multicians.org/">Multics History Project</a></li>
<li><a href="http://www.luntzel.com/bbb/">The Brooklyn Boogaloo Blowout</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-014/">Computer Security since the 1960&#8217;s with Peter Neumann</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2720/0/silverbullet-014.mp3" length="20148352" type="audio/mpeg" />
		<itunes:duration>0:20:59</itunes:duration>
		<itunes:subtitle>
The 14th episode of The Silver Bullet Security Podcast features Peter Neumann, designer of the Multics OS file system, moderator of comp.RISKS, and Principal Scientist at the SRI Computer Science Laboratory. In this show, Gary and Peter discuss the[...]</itunes:subtitle>
		<itunes:summary>
The 14th episode of The Silver Bullet Security Podcast features Peter Neumann, designer of the Multics OS file system, moderator of comp.RISKS, and Principal Scientist at the SRI Computer Science Laboratory. In this show, Gary and Peter discuss the most important changes in computer security since the 1960s, the discipline involved in early Multics engineering (&#8220;nodody writes a line of code without the approving authorities [having] read and understood the specification&#8221;), why DRM is the &#8220;wrong solution to the wrong problem,&#8221; and who was more interesting to meet: Albert Einstein or Norah Jones.

Peter Neumann
comp.RISKS
Computer-Related Risks
Multics
A General-Purpose File System For Secondary Storage &#8211; Peter&#8217;s 1965 paper on Multics
Multics History Project
The Brooklyn Boogaloo Blowout

The post Computer Security since the 1960&#8217;s with Peter Neumann appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Computer Security since the 1960&#8217;s with Peter Neumann appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Security Engineering Described with Ross Anderson</title>
		<link>https://www.cigital.com/podcasts/show-013/</link>
		<pubDate>Fri, 13 Apr 2007 16:33:21 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Developer]]></category>
		<category><![CDATA[IT Professional]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[software development]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-013/</guid>
		<description><![CDATA[<p>On the 13th episode of The Silver Bullet Security Podcast, Gary chats with Ross Anderson, Professor of Security Engineering at the Computer Laboratory at Cambridge University and author of the book Security Engineering. Gary and Ross discuss the effect of posting his excellent book on the net for free, the simple reasons why most systems &#8230; <a href="https://www.cigital.com/podcasts/show-013/" class="more-link">Continue reading <span class="screen-reader-text">Security Engineering Described with Ross Anderson</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-013/">Security Engineering Described with Ross Anderson</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silver-bullet-files/randerson-125.gif" alt="Ross Anderson" align="right" /></p>
<p style="margin-top: 5px;">On the 13th episode of The Silver Bullet Security Podcast, Gary chats with Ross Anderson, Professor of Security Engineering at the Computer Laboratory at Cambridge University and author of the book <em>Security Engineering</em>. Gary and Ross discuss the effect of posting his excellent book on the net for free, the simple reasons why most systems fail, the economic imbalance between engineers/developers and a system&#8217;s users (with respect to who should address security), and why publicly describing attacks is essential to security engineering. They close out by examining the security implications of wearing a kilt.</p>
<ul>
<li><a href="http://www.ross-anderson.com/">Ross Anderson</a></li>
<li><a href="https://www.lightbluetouchpaper.org/">Light Blue Touchpaper</a> &#8211; A security blog by Cambridge computer scientists.</li>
<li><em>Security Engineering</em> &#8211; Ross&#8217; groundbreaking book <a href="https://www.amazon.com/exec/obidos/ASIN/0471389226/rossandersshomep">in print</a> and <a href="https://www.cl.cam.ac.uk/~rja14/book.html">online</a></li>
<li><a href="http://www.econinfosec.org/archive/weis2007/">WEIS 2007 &#8211; Sixth Workshop on the Economics of Information Security</a></li>
<li><a href="https://www.cl.cam.ac.uk/~rja14/Papers/rfid-fc07.pdf">RFID and the Middleman</a> [PDF]</li>
<li><a href="https://www.cl.cam.ac.uk/~rja14/Presentations/busking.jpg">Ross playing the bagpipes</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-013/">Security Engineering Described with Ross Anderson</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2721/0/silverbullet-013.mp3" length="21927936" type="audio/mpeg" />
		<itunes:duration>0:22:50</itunes:duration>
		<itunes:subtitle>
On the 13th episode of The Silver Bullet Security Podcast, Gary chats with Ross Anderson, Professor of Security Engineering at the Computer Laboratory at Cambridge University and author of the book Security Engineering. Gary and Ross discuss the ef[...]</itunes:subtitle>
		<itunes:summary>
On the 13th episode of The Silver Bullet Security Podcast, Gary chats with Ross Anderson, Professor of Security Engineering at the Computer Laboratory at Cambridge University and author of the book Security Engineering. Gary and Ross discuss the effect of posting his excellent book on the net for free, the simple reasons why most systems fail, the economic imbalance between engineers/developers and a system&#8217;s users (with respect to who should address security), and why publicly describing attacks is essential to security engineering. They close out by examining the security implications of wearing a kilt.

Ross Anderson
Light Blue Touchpaper &#8211; A security blog by Cambridge computer scientists.
Security Engineering &#8211; Ross&#8217; groundbreaking book in print and online
WEIS 2007 &#8211; Sixth Workshop on the Economics of Information Security
RFID and the Middleman [PDF]
Ross playing the bagpipes

The post Security Engineering Described with Ross Anderson appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Security Engineering Described with Ross Anderson appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Developer</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>From Ruralism to Computer Security with Becky Bace</title>
		<link>https://www.cigital.com/podcasts/show-012/</link>
		<pubDate>Tue, 13 Mar 2007 17:13:02 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cryptography]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-012/</guid>
		<description><![CDATA[<p>On the 12th episode of The Silver Bullet Security Podcast, Gary talks with Becky Bace, Advisor to Venture Capital firm Trident Capital. Becky spent twelve years at the NSA working on intrusion detection and cryptography from 1984 until 1996, followed by a stint at Los Alamos National Laboratory. Gary and Becky discuss growing up in rural &#8230; <a href="https://www.cigital.com/podcasts/show-012/" class="more-link">Continue reading <span class="screen-reader-text">From Ruralism to Computer Security with Becky Bace</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-012/">From Ruralism to Computer Security with Becky Bace</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/bbace-125.gif" alt="Becky Bace" align="right" /></p>
<p style="margin-top: 5px;">On the 12th episode of The Silver Bullet Security Podcast, Gary talks with Becky Bace, Advisor to Venture Capital firm Trident Capital. Becky spent twelve years at the NSA working on intrusion detection and cryptography from 1984 until 1996, followed by a stint at Los Alamos National Laboratory. Gary and Becky discuss growing up in rural America, explosives, and Becky&#8217;s Jimmy Hoffa sponsored college funding situation. They also talk about the evolution of security curricula in academia, rampant commercialization of computer security, Becky&#8217;s involvement in tracking down the notorious Kevin Mitnick, vicodin-induced creativity, and eclectic music.</p>
<ul>
<li><a href="https://www.cigital.com/silver-bullet-files/shows/silverbullet-012-bbace.pdf">Transcript of this episode</a> [PDF]</li>
<li><a href="http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci927913,00.html">Who&#8217;s Who in Infosec: Rebecca Bace</a></li>
<li><a href="http://www.tridentcap.com/">Trident Capital</a> &#8211; The VC firm where Becky is an advisor</li>
<li><a href="http://www.lanl.gov/">Los Alamos National Labs</a></li>
<li><a href="http://www.amazon.com/Intrusion-Detection-Rebecca-Gurley-Bace/dp/1578701856/ref=sr_1_1/104-2577668-4903944?ie=UTF8&amp;s=books&amp;qid=1173812537&amp;sr=8-1"><em>Intrusion Detection</em></a></li>
<li><a href="http://www.amazon.com/Guide-Forensic-Testimony-Presenting-Technical/dp/0201752794/ref=sr_1_2/104-2577668-4903944?ie=UTF8&amp;s=books&amp;qid=1173812537&amp;sr=8-2"><em>A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness</em></a> &#8211; Co-authored with Fred Smith</li>
<li><a href="http://www.franksinatra.com/">Frank Sinatra</a></li>
<li><a href="http://www.kinseysicks.com/">The Kinsey Sicks</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-012/">From Ruralism to Computer Security with Becky Bace</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2722/0/silverbullet-012.mp3" length="22704256" type="audio/mpeg" />
		<itunes:duration>0:23:39</itunes:duration>
		<itunes:subtitle>
On the 12th episode of The Silver Bullet Security Podcast, Gary talks with Becky Bace, Advisor to Venture Capital firm Trident Capital. Becky spent twelve years at the NSA working on intrusion detection and cryptography from 1984 until 1996, follow[...]</itunes:subtitle>
		<itunes:summary>
On the 12th episode of The Silver Bullet Security Podcast, Gary talks with Becky Bace, Advisor to Venture Capital firm Trident Capital. Becky spent twelve years at the NSA working on intrusion detection and cryptography from 1984 until 1996, followed by a stint at Los Alamos National Laboratory. Gary and Becky discuss growing up in rural America, explosives, and Becky&#8217;s Jimmy Hoffa sponsored college funding situation. They also talk about the evolution of security curricula in academia, rampant commercialization of computer security, Becky&#8217;s involvement in tracking down the notorious Kevin Mitnick, vicodin-induced creativity, and eclectic music.

Transcript of this episode [PDF]
Who&#8217;s Who in Infosec: Rebecca Bace
Trident Capital &#8211; The VC firm where Becky is an advisor
Los Alamos National Labs
Intrusion Detection
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness &#8211; Co-authored with Fred Smith
Frank Sinatra
The Kinsey Sicks

The post From Ruralism to Computer Security with Becky Bace appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post From Ruralism to Computer Security with Becky Bace appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Teaching Computer Security with Dorothy Denning</title>
		<link>https://www.cigital.com/podcasts/show-011/</link>
		<pubDate>Thu, 15 Feb 2007 18:07:35 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[malicious code]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-011/</guid>
		<description><![CDATA[<p>On the 11th episode of The Silver Bullet Security Podcast, Gary talks with Dorothy Denning, a professor in the Department of Defense Analysis at the Naval Postgraduate School. Previously, Dorothy was a distinguished professor at Georgetown University and a professor at Purdue University. Gary and Dorothy discuss Dorothy&#8217;s involvement in the Clipper Chip controversy (which &#8230; <a href="https://www.cigital.com/podcasts/show-011/" class="more-link">Continue reading <span class="screen-reader-text">Teaching Computer Security with Dorothy Denning</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-011/">Teaching Computer Security with Dorothy Denning</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/ddenning-125.gif" alt="Dorothy Denning" align="right" /></p>
<p style="margin-top: 5px;">On the 11th episode of The Silver Bullet Security Podcast, Gary talks with <a href="http://www.nps.navy.mil/ctiw/staff/denning.html">Dorothy Denning</a>, a professor in the <a href="http://www.nps.navy.mil/da/">Department of Defense Analysis</a> at the Naval Postgraduate School. Previously, Dorothy was a distinguished professor at Georgetown University and a professor at Purdue University. Gary and Dorothy discuss Dorothy&#8217;s involvement in the Clipper Chip controversy (which earned Dorothy the moniker &#8220;clipper chick&#8221;), the concept of geo-encryption, and a famous 1990 paper she wrote describing a series of interviews with malicious hackers.</p>
<ul>
<li><a href="http://en.wikipedia.org/wiki/Dorothy_E._Denning">Wikipedia: Dorothy Denning</a></li>
<li><a href="http://www.epic.org/crypto/clipper/">Clipper Chip</a> (<a href="http://en.wikipedia.org/wiki/Clipper_chip">More</a>)</li>
<li><a href="http://www.wired.com/wired/archive/4.09/denning_pr.html">Clipper Chick</a> &#8211; a 1996 <em>Wired</em> article about the Clipper Chip controversy.</li>
<li><a href="http://www.bsim.org">Big Sur Power Walk</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-011/">Teaching Computer Security with Dorothy Denning</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2723/0/silverbullet-011.mp3" length="21471242" type="audio/mpeg" />
		<itunes:duration>0:22:22</itunes:duration>
		<itunes:subtitle>
On the 11th episode of The Silver Bullet Security Podcast, Gary talks with Dorothy Denning, a professor in the Department of Defense Analysis at the Naval Postgraduate School. Previously, Dorothy was a distinguished professor at Georgetown Universi[...]</itunes:subtitle>
		<itunes:summary>
On the 11th episode of The Silver Bullet Security Podcast, Gary talks with Dorothy Denning, a professor in the Department of Defense Analysis at the Naval Postgraduate School. Previously, Dorothy was a distinguished professor at Georgetown University and a professor at Purdue University. Gary and Dorothy discuss Dorothy&#8217;s involvement in the Clipper Chip controversy (which earned Dorothy the moniker &#8220;clipper chick&#8221;), the concept of geo-encryption, and a famous 1990 paper she wrote describing a series of interviews with malicious hackers.

Wikipedia: Dorothy Denning
Clipper Chip (More)
Clipper Chick &#8211; a 1996 Wired article about the Clipper Chip controversy.
Big Sur Power Walk

The post Teaching Computer Security with Dorothy Denning appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Teaching Computer Security with Dorothy Denning appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>A Discussion on Software Security &#038; Static Analysis Tools</title>
		<link>https://www.cigital.com/podcasts/show-010/</link>
		<pubDate>Mon, 22 Jan 2007 15:59:59 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Managed Services]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[static code analysis tools]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-010/</guid>
		<description><![CDATA[<p>The tenth episode of The Silver Bullet Security Podcast features a panel discussion with the Fortify Software Technical Advisory Board, several of whom have been featured on previous episodes. The group discusses what commercial software tools can learn from academic research, the state of software security in China, real world lessons learned while using static &#8230; <a href="https://www.cigital.com/podcasts/show-010/" class="more-link">Continue reading <span class="screen-reader-text">A Discussion on Software Security &#038; Static Analysis Tools</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-010/">A Discussion on Software Security &#038; Static Analysis Tools</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p align="center"><img src="https://www.cigital.com/silverbullet-files/fortify-tab.jpg" alt="Fortify TAB" /></p>
<p style="margin-top: 5px;">The tenth episode of The Silver Bullet Security Podcast features a panel discussion with the Fortify Software Technical Advisory Board, several of whom have been featured on previous episodes. The group discusses what commercial software tools can learn from academic research, the state of software security in China, real world lessons learned while using static analysis tools, and software security pedagogy.</p>
<p>Participating members of the Technical Advisory Board include:</p>
<ul>
<li><a href="http://www.cs.umd.edu/~pugh/">Bill Pugh</a>, Professor at University of Maryland, static analysis for finding bugs</li>
<li>Li Gong, GM at Microsoft, MSN in China</li>
<li><a href="http://www.ranum.com/">Marcus Ranum</a>, CSO of Tenable Network Security, security products trainer</li>
<li><a href="http://avirubin.com/">Avi Rubin</a>, Professor at Johns Hopkins, electronic voting security</li>
<li><a href="http://www.cs.cornell.edu/fbs/">Fred Schneider</a>, Professor at Cornell, trustworthy computing</li>
<li><a href="http://www.eecs.harvard.edu/~greg/">Greg Morrisett</a>, Professor at Harvard, dependant type theory</li>
<li><a href="http://nob.cs.ucdavis.edu/~bishop/">Matt Bishop</a>, Professor at UC Davis, computer security</li>
<li><a href="http://www.cs.berkeley.edu/~daw/">Dave Wagner</a>, Professor at Berkeley, software security and electronic voting</li>
</ul>
<p>A complete transcript of this podcast will be available soon from Fortify at <a href="http://www.fortify.com/silverbullet">http://www.fortify.com/silverbullet</a>.</p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-010/">A Discussion on Software Security &#038; Static Analysis Tools</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2724/0/silverbullet-010.mp3" length="18776359" type="audio/mpeg" />
		<itunes:duration>0:19:34</itunes:duration>
		<itunes:subtitle>
The tenth episode of The Silver Bullet Security Podcast features a panel discussion with the Fortify Software Technical Advisory Board, several of whom have been featured on previous episodes. The group discusses what commercial software tools can [...]</itunes:subtitle>
		<itunes:summary>
The tenth episode of The Silver Bullet Security Podcast features a panel discussion with the Fortify Software Technical Advisory Board, several of whom have been featured on previous episodes. The group discusses what commercial software tools can learn from academic research, the state of software security in China, real world lessons learned while using static analysis tools, and software security pedagogy.
Participating members of the Technical Advisory Board include:

Bill Pugh, Professor at University of Maryland, static analysis for finding bugs
Li Gong, GM at Microsoft, MSN in China
Marcus Ranum, CSO of Tenable Network Security, security products trainer
Avi Rubin, Professor at Johns Hopkins, electronic voting security
Fred Schneider, Professor at Cornell, trustworthy computing
Greg Morrisett, Professor at Harvard, dependant type theory
Matt Bishop, Professor at UC Davis, computer security
Dave Wagner, Professor at Berkeley, software security and electronic voting

A complete transcript of this podcast will be available soon from Fortify at http://www.fortify.com/silverbullet.
The post A Discussion on Software Security &#038; Static Analysis Tools appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post A Discussion on Software Security &#038; Static Analysis Tools appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Phyisical And Computer Security Compared with Bruce Schneier</title>
		<link>https://www.cigital.com/podcasts/show-009/</link>
		<pubDate>Thu, 14 Dec 2006 07:45:53 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[cryptography]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-009/</guid>
		<description><![CDATA[<p>In the ninth episode of The Silver Bullet Podcast, Gary interviews Bruce Schneier. Bruce is the founder and CTO of Counterpane and is regarded as the &#8220;uber-guru&#8221; of computer security. He has written eight bestselling books, most recently Beyond Fear: Thinking Sensibly About Security in an Uncertain World and is the editor of the massively &#8230; <a href="https://www.cigital.com/podcasts/show-009/" class="more-link">Continue reading <span class="screen-reader-text">Phyisical And Computer Security Compared with Bruce Schneier</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-009/">Phyisical And Computer Security Compared with Bruce Schneier</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/bschneier-123.jpg" alt="Bruce Schneier" align="right" /></p>
<p>In the ninth episode of The Silver Bullet Podcast, Gary interviews Bruce Schneier. Bruce is the founder and CTO of Counterpane and is regarded as the &#8220;uber-guru&#8221; of computer security. He has written eight bestselling books, most recently <em>Beyond Fear: Thinking Sensibly About Security in an Uncertain World</em> and is the editor of the massively popular Cryptogram mailing list. In this episode, Gary and Bruce discuss the connection between physical security its technological component, the idea of risk management, the intersection of economics and security, and the ideas of &#8220;wholesale surveillance&#8221; and &#8220;security theater.&#8221; They also discuss patch Tuesday, hack Wednesday, and Microsoft&#8217;s approach to software security.</p>
<ul>
<li><a href="http://en.wikipedia.org/wiki/Bruce_Schneier">Bruce&#8217;s Wikipedia entry</a></li>
<li><a href="http://www.amazon.com/s/104-2577668-4903944?ie=UTF8&amp;index=books&amp;rank=-relevance%2C%2Bavailability%2C-daterank&amp;field-author-exact=Schneier%2C%20Bruce">Bruce&#8217;s books</a></li>
<li><a href="http://crypto-gram.libsyn.com/">Crypto-Gram security podcast</a></li>
<li><a href="http://www.freedom-to-tinker.com/?p=1052">Property Rights Management</a> &#8211; Ed Felten&#8217;s discussion of PRM, mentioned on the show</li>
<li><a href="http://www.techdirt.com/articles/20051205/2345233.shtml">Copyright Mythbusters: Believe It or Not, Fair Use Exists</a> &#8211; a look at the &#8220;fair use doesn&#8217;t exist&#8221; argument</li>
<li><a href="http://news.bbc.co.uk/2/hi/uk_news/politics/4806948.stm">BBC plans attacked for &#8216;TV tax&#8217;</a> (March 14, 2006)</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-009/">Phyisical And Computer Security Compared with Bruce Schneier</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2725/0/silverbullet-009.mp3" length="23840778" type="audio/mpeg" />
		<itunes:duration>0:24:50</itunes:duration>
		<itunes:subtitle>
In the ninth episode of The Silver Bullet Podcast, Gary interviews Bruce Schneier. Bruce is the founder and CTO of Counterpane and is regarded as the &#8220;uber-guru&#8221; of computer security. He has written eight bestselling books, most recentl[...]</itunes:subtitle>
		<itunes:summary>
In the ninth episode of The Silver Bullet Podcast, Gary interviews Bruce Schneier. Bruce is the founder and CTO of Counterpane and is regarded as the &#8220;uber-guru&#8221; of computer security. He has written eight bestselling books, most recently Beyond Fear: Thinking Sensibly About Security in an Uncertain World and is the editor of the massively popular Cryptogram mailing list. In this episode, Gary and Bruce discuss the connection between physical security its technological component, the idea of risk management, the intersection of economics and security, and the ideas of &#8220;wholesale surveillance&#8221; and &#8220;security theater.&#8221; They also discuss patch Tuesday, hack Wednesday, and Microsoft&#8217;s approach to software security.

Bruce&#8217;s Wikipedia entry
Bruce&#8217;s books
Crypto-Gram security podcast
Property Rights Management &#8211; Ed Felten&#8217;s discussion of PRM, mentioned on the show
Copyright Mythbusters: Believe It or Not, Fair Use Exists &#8211; a look at the &#8220;fair use doesn&#8217;t exist&#8221; argument
BBC plans attacked for &#8216;TV tax&#8217; (March 14, 2006)

The post Phyisical And Computer Security Compared with Bruce Schneier appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Phyisical And Computer Security Compared with Bruce Schneier appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 008 &#8211; An Interview with Brian Chess</title>
		<link>https://www.cigital.com/podcasts/show-008/</link>
		<pubDate>Fri, 17 Nov 2006 12:35:55 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Developer]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[software development]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-008/</guid>
		<description><![CDATA[<p>In the eighth episode of The Silver Bullet Podcast, Gary talks with Brian Chess, co-founder and chief scientist of Fortify Software. Brian completed his computer science Ph.D. at UC Santa Cruz after several years in the commercial sector. Gary and Brian discuss what commercial developers and academics have to learn from each other, what it&#8217;s &#8230; <a href="https://www.cigital.com/podcasts/show-008/" class="more-link">Continue reading <span class="screen-reader-text">Show 008 &#8211; An Interview with Brian Chess</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-008/">Show 008 &#8211; An Interview with Brian Chess</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/bchess-125.jpg" alt="Brian Chess" align="right" /></p>
<p style="margin-top: 5px;">In the eighth episode of The Silver Bullet Podcast, Gary talks with Brian Chess, co-founder and chief scientist of Fortify Software. Brian completed his computer science Ph.D. at UC Santa Cruz after several years in the commercial sector. Gary and Brian discuss what commercial developers and academics have to learn from each other, what it&#8217;s like to work for a Kleiner-Perkins startup (KP is the VC firm behind familiar names like Google, Amazon, and Sun), and how mystifying it is that some developers are OK with XSS vulnerabilities in their web applications.</p>
<ul>
<li>Matt Bishop&#8217;s <a href="http://nob.cs.ucdavis.edu/book/book-aands/index.html"><em>Computer Security: Art and Science</em></a> (mentioned again!)</li>
<li><a href="http://www.kpcb.com/">Kleiner Perkins Caufield &amp; Byers</a></li>
<li><a href="http://sctest.cse.ucsc.edu/chess/">Brian as a wee lad</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-008/">Show 008 &#8211; An Interview with Brian Chess</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2792/0/silverbullet-008.mp3" length="23570442" type="audio/mpeg" />
		<itunes:duration>0:24:33</itunes:duration>
		<itunes:subtitle>
In the eighth episode of The Silver Bullet Podcast, Gary talks with Brian Chess, co-founder and chief scientist of Fortify Software. Brian completed his computer science Ph.D. at UC Santa Cruz after several years in the commercial sector. Gary and [...]</itunes:subtitle>
		<itunes:summary>
In the eighth episode of The Silver Bullet Podcast, Gary talks with Brian Chess, co-founder and chief scientist of Fortify Software. Brian completed his computer science Ph.D. at UC Santa Cruz after several years in the commercial sector. Gary and Brian discuss what commercial developers and academics have to learn from each other, what it&#8217;s like to work for a Kleiner-Perkins startup (KP is the VC firm behind familiar names like Google, Amazon, and Sun), and how mystifying it is that some developers are OK with XSS vulnerabilities in their web applications.

Matt Bishop&#8217;s Computer Security: Art and Science (mentioned again!)
Kleiner Perkins Caufield &#38; Byers
Brian as a wee lad

The post Show 008 &#8211; An Interview with Brian Chess appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 008 &#8211; An Interview with Brian Chess appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>Developer</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Day in The Life of a CSO with John Stewart</title>
		<link>https://www.cigital.com/podcasts/show-007/</link>
		<pubDate>Wed, 25 Oct 2006 11:00:58 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[CISO]]></category>
		<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-007/</guid>
		<description><![CDATA[<p>In the seventh episode of The Silver Bullet Podcast, Gary interviews Cisco Chief Security Officer John Stewart. Gary and John discuss what CSOs do all day, how John got started in computer security, and the infamous Morris Worm from 1988 (which John was deeply involved in while a student at Syracuse). John and Gary also &#8230; <a href="https://www.cigital.com/podcasts/show-007/" class="more-link">Continue reading <span class="screen-reader-text">Day in The Life of a CSO with John Stewart</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-007/">Day in The Life of a CSO with John Stewart</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/jstewart-125.jpg" alt="Michael Howard" align="right" /></p>
<p style="margin-top: 5px;">In the seventh episode of The Silver Bullet Podcast, Gary interviews Cisco Chief Security Officer John Stewart. Gary and John discuss what CSOs do all day, how John got started in computer security, and the infamous Morris Worm from 1988 (which John was deeply involved in while a student at Syracuse). John and Gary also revisit Cisco-gate, talk about how John&#8217;s identity was stolen, and determine why John&#8217;s kids don&#8217;t have e-mail addresses.</p>
<ul>
<li><a href="https://en.wikipedia.org/wiki/CSO">Wikipedia: CSO</a></li>
<li><a href="https://en.wikipedia.org/wiki/Digital_Island">Digital Island</a></li>
<li><a href="https://snowplow.org/tom/worm/worm.html">The What, Why, and How of the 1988 Internet Worm</a> &#8211; a look at the history of the Morris Worm</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-007/">Day in The Life of a CSO with John Stewart</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2767/0/silverbullet-007.mp3" length="25985034" type="audio/mpeg" />
		<itunes:duration>0:27:04</itunes:duration>
		<itunes:subtitle>
In the seventh episode of The Silver Bullet Podcast, Gary interviews Cisco Chief Security Officer John Stewart. Gary and John discuss what CSOs do all day, how John got started in computer security, and the infamous Morris Worm from 1988 (which Joh[...]</itunes:subtitle>
		<itunes:summary>
In the seventh episode of The Silver Bullet Podcast, Gary interviews Cisco Chief Security Officer John Stewart. Gary and John discuss what CSOs do all day, how John got started in computer security, and the infamous Morris Worm from 1988 (which John was deeply involved in while a student at Syracuse). John and Gary also revisit Cisco-gate, talk about how John&#8217;s identity was stolen, and determine why John&#8217;s kids don&#8217;t have e-mail addresses.

Wikipedia: CSO
Digital Island
The What, Why, and How of the 1988 Internet Worm &#8211; a look at the history of the Morris Worm

The post Day in The Life of a CSO with John Stewart appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Day in The Life of a CSO with John Stewart appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:keywords>CISO</itunes:keywords>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Security&#8217;s impact on Microsoft with Michael Howard</title>
		<link>https://www.cigital.com/podcasts/show-006/</link>
		<pubDate>Thu, 28 Sep 2006 16:11:47 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-006/</guid>
		<description><![CDATA[<p>The sixth episode of the show features an interview with Michael Howard, the Senior Security Program Manager of Microsoft&#8217;s Security Technology Unit. Michael has been at Microsoft since 1992 and discusses what it has been like watching the company come to grips with software security. Michael continues to play a key roll in implementing the &#8230; <a href="https://www.cigital.com/podcasts/show-006/" class="more-link">Continue reading <span class="screen-reader-text">Security&#8217;s impact on Microsoft with Michael Howard</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-006/">Security&#8217;s impact on Microsoft with Michael Howard</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/mhoward-118.jpg" alt="Michael Howard" align="right" /></p>
<p style="margin-top: 5px;">The sixth episode of the show features an interview with Michael Howard, the Senior Security Program Manager of Microsoft&#8217;s Security Technology Unit. Michael has been at Microsoft since 1992 and discusses what it has been like watching the company come to grips with software security. Michael continues to play a key roll in implementing the Trustworthy Computing Initiative at Microsoft. Gary and Michael also discuss the security features of Windows Vista and Michael&#8217;s recommendations for the two most important best practices when developing secure software. Listen for a startling revelation about Michael&#8217;s choice of a &#8220;desert island book.&#8221;</p>
<ul>
<li><a href="http://blogs.msdn.com/michael_howard/">Michael Howard&#8217;s blog</a></li>
<li><a href="http://www.microsoft.com/mspress/books/5957.asp"><em>Writing Secure Code</em></a> by Michael Howard</li>
<li><a href="http://en.wikipedia.org/wiki/Defense_in_depth">Wikipedia: Defense in Depth</a></li>
<li><a href="http://msdn.microsoft.com/security/default.aspx?pull=/library/en-us/dnsecure/html/sdl.asp">Microsoft&#8217;s Trustworthy Computing Security Development Lifecycle</a></li>
<li><a href="http://nob.cs.ucdavis.edu/book/">Matt Bishop&#8217;s computer security books</a> &#8211; These would go with Michael to a desert island.</li>
<li><a href="http://en.wikipedia.org/wiki/Michael_Howard">Michael Howard</a> &#8211; but not the one Gary interviewed.</li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-006/">Security&#8217;s impact on Microsoft with Michael Howard</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2768/0/silverbullet-006.mp3" length="24731658" type="audio/mpeg" />
		<itunes:duration>0:25:46</itunes:duration>
		<itunes:subtitle>
The sixth episode of the show features an interview with Michael Howard, the Senior Security Program Manager of Microsoft&#8217;s Security Technology Unit. Michael has been at Microsoft since 1992 and discusses what it has been like watching the co[...]</itunes:subtitle>
		<itunes:summary>
The sixth episode of the show features an interview with Michael Howard, the Senior Security Program Manager of Microsoft&#8217;s Security Technology Unit. Michael has been at Microsoft since 1992 and discusses what it has been like watching the company come to grips with software security. Michael continues to play a key roll in implementing the Trustworthy Computing Initiative at Microsoft. Gary and Michael also discuss the security features of Windows Vista and Michael&#8217;s recommendations for the two most important best practices when developing secure software. Listen for a startling revelation about Michael&#8217;s choice of a &#8220;desert island book.&#8221;

Michael Howard&#8217;s blog
Writing Secure Code by Michael Howard
Wikipedia: Defense in Depth
Microsoft&#8217;s Trustworthy Computing Security Development Lifecycle
Matt Bishop&#8217;s computer security books &#8211; These would go with Michael to a desert island.
Michael Howard &#8211; but not the one Gary interviewed.

The post Security&#8217;s impact on Microsoft with Michael Howard appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Security&#8217;s impact on Microsoft with Michael Howard appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>2006 Technology Predications with Ed Felton</title>
		<link>https://www.cigital.com/podcasts/show-005/</link>
		<pubDate>Mon, 28 Aug 2006 14:05:36 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-005/</guid>
		<description><![CDATA[<p>The fifth edition of the Silver Bullet Security Podcast features Ed Felten, Professor of Computer Science and Public Affairs at Princeton University and the Director of the Center for Information Technology Policy. Gary and Ed take a look at Ed&#8217;s predictions for 2006 and how he&#8217;s faring so far and then discuss Ed&#8217;s relationship with &#8230; <a href="https://www.cigital.com/podcasts/show-005/" class="more-link">Continue reading <span class="screen-reader-text">2006 Technology Predications with Ed Felton</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-005/">2006 Technology Predications with Ed Felton</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/efelten-125.jpg" alt="Ed Felten" align="right" /></p>
<p style="margin-top: 5px;">The fifth edition of the Silver Bullet Security Podcast features <a href="http://www.cs.princeton.edu/~felten">Ed Felten</a>, Professor of Computer Science and Public Affairs at Princeton University and the Director of the Center for Information Technology Policy. Gary and Ed take a look at Ed&#8217;s predictions for 2006 and how he&#8217;s faring so far and then discuss Ed&#8217;s relationship with his former adversaries. They also talk about how to discuss difficult technology issues with lawmakers and the importance of public policy and the law to computer scientists. Ed also outlines the challenges of raising a bright 11-year-old.</p>
<ul>
<li><a href="http://www.freedom-to-tinker.com/">Freedom to Tinker</a> &#8211; Ed Felten&#8217;s blog</li>
<li><a href="http://www.freedom-to-tinker.com/?p=953">Ed&#8217;s Predictions for 2006</a></li>
<li><a href="http://en.wikipedia.org/wiki/Series_of_tubes">Wikipedia: Series of Tubes</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-005/">2006 Technology Predications with Ed Felton</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2727/0/silverbullet-005.mp3" length="22001674" type="audio/mpeg" />
		<itunes:duration>0:22:55</itunes:duration>
		<itunes:subtitle>
The fifth edition of the Silver Bullet Security Podcast features Ed Felten, Professor of Computer Science and Public Affairs at Princeton University and the Director of the Center for Information Technology Policy. Gary and Ed take a look at Ed[...]</itunes:subtitle>
		<itunes:summary>
The fifth edition of the Silver Bullet Security Podcast features Ed Felten, Professor of Computer Science and Public Affairs at Princeton University and the Director of the Center for Information Technology Policy. Gary and Ed take a look at Ed&#8217;s predictions for 2006 and how he&#8217;s faring so far and then discuss Ed&#8217;s relationship with his former adversaries. They also talk about how to discuss difficult technology issues with lawmakers and the importance of public policy and the law to computer scientists. Ed also outlines the challenges of raising a bright 11-year-old.

Freedom to Tinker &#8211; Ed Felten&#8217;s blog
Ed&#8217;s Predictions for 2006
Wikipedia: Series of Tubes

The post 2006 Technology Predications with Ed Felton appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post 2006 Technology Predications with Ed Felton appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>A Software Security Industry 360 with Dana Epp</title>
		<link>https://www.cigital.com/podcasts/show-004/</link>
		<pubDate>Mon, 31 Jul 2006 17:30:23 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-004/</guid>
		<description><![CDATA[<p>In the fourth episode of the Silver Bullet Security Podcast, Gary&#8217;s guest is Dana Epp, CEO and founder of Scorpion Software. Dana also runs a popular software security blog and is a jazz trumpeter. On this show, Dana and Gary talk about past programming disasters (&#8220;code lives forever&#8221;), the security implications of systems with ever-increasing &#8230; <a href="https://www.cigital.com/podcasts/show-004/" class="more-link">Continue reading <span class="screen-reader-text">A Software Security Industry 360 with Dana Epp</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-004/">A Software Security Industry 360 with Dana Epp</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/depp-125.jpg" alt="Dana Epp" align="right" /></p>
<p style="margin-top: 5px;">In the fourth episode of the Silver Bullet Security Podcast, Gary&#8217;s guest is Dana Epp, CEO and founder of <a href="http://www.scorpionsoft.com/">Scorpion Software</a>. Dana also runs a popular <a href="http://silverstr.ufies.org/blog/">software security blog</a> and is a jazz trumpeter. On this show, Dana and Gary talk about past programming disasters (&#8220;code lives forever&#8221;), the security implications of systems with ever-increasing complexity, suggestions for new developers interested in learning about software security, regulation&#8217;s role in information security, and Miles Davis.</p>
<ul>
<li><a href="http://silverstr.ufies.org/blog/">SilverStr&#8217;s blog</a> &#8211; Dana&#8217;s blog</li>
<li><a href="http://snltranscripts.jt.org/90/90tpat.phtml">It&#8217;s Pat!</a></li>
<li><a href="http://www.rapro.com/">RemoteAccess BBS</a></li>
<li><a href="http://silverstr.ufies.org/blog/archives/000926.html">The 5 Rules of the Regulatory Process</a></li>
<li><a href="http://www.securecoding.org/list/">SC-L List</a></li>
<li><em><a href="http://www.miles-davis.com/brew.html">Bitches Brew</a></em></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-004/">A Software Security Industry 360 with Dana Epp</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2728/0/silverbullet-004.mp3" length="23488522" type="audio/mpeg" />
		<itunes:duration>0:24:28</itunes:duration>
		<itunes:subtitle>
In the fourth episode of the Silver Bullet Security Podcast, Gary&#8217;s guest is Dana Epp, CEO and founder of Scorpion Software. Dana also runs a popular software security blog and is a jazz trumpeter. On this show, Dana and Gary talk about past [...]</itunes:subtitle>
		<itunes:summary>
In the fourth episode of the Silver Bullet Security Podcast, Gary&#8217;s guest is Dana Epp, CEO and founder of Scorpion Software. Dana also runs a popular software security blog and is a jazz trumpeter. On this show, Dana and Gary talk about past programming disasters (&#8220;code lives forever&#8221;), the security implications of systems with ever-increasing complexity, suggestions for new developers interested in learning about software security, regulation&#8217;s role in information security, and Miles Davis.

SilverStr&#8217;s blog &#8211; Dana&#8217;s blog
It&#8217;s Pat!
RemoteAccess BBS
The 5 Rules of the Regulatory Process
SC-L List
Bitches Brew

The post A Software Security Industry 360 with Dana Epp appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post A Software Security Industry 360 with Dana Epp appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Computer Security Plateau with Marcus Ranum</title>
		<link>https://www.cigital.com/podcasts/show-003/</link>
		<pubDate>Fri, 14 Jul 2006 15:10:27 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[network security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-003/</guid>
		<description><![CDATA[<p>In the third episode of the Silver Bullet Security Podcast, Gary talks with Marcus Ranum, who is an acclaimed security guru widely credited with inventing the proxy firewall. Marcus and Gary discuss why Marcus thinks we&#8217;re not making progress in the computer security field, how common sense would help computer security, Richard Feynman, and power &#8230; <a href="https://www.cigital.com/podcasts/show-003/" class="more-link">Continue reading <span class="screen-reader-text">The Computer Security Plateau with Marcus Ranum</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-003/">The Computer Security Plateau with Marcus Ranum</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/mranum-125.jpg" alt="Marcus J. Ranum" align="right" /></p>
<p style="margin-top: 5px;">In the third episode of the Silver Bullet Security Podcast, Gary talks with Marcus Ranum, who is an acclaimed security guru widely credited with inventing the proxy firewall. Marcus and Gary discuss why Marcus thinks we&#8217;re not making progress in the computer security field, how common sense would help computer security, Richard Feynman, and power tools for home repair and improvement.</p>
<ul>
<li><a href="http://www.ranum.com/">Ranum.com</a></li>
<li><a href="http://www.ranum.com/security/computer_security/editorials/dumb/index.html">The Six Dumbest Ideas in Computer Security</a></li>
<li><a href="http://www.oldwestsnakeoil.com/">Old West Snake Oil</a></li>
<li><a href="http://www.networkworld.com/news/2005/011005widernetpatchtuesday.html">Patch Tuesday</a></li>
<li><a href="http://en.wikipedia.org/wiki/Richard_Feynman">Richard Feynman</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-003/">The Computer Security Plateau with Marcus Ranum</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2729/0/silverbullet-003.mp3" length="22011914" type="audio/mpeg" />
		<itunes:duration>0:22:56</itunes:duration>
		<itunes:subtitle>
In the third episode of the Silver Bullet Security Podcast, Gary talks with Marcus Ranum, who is an acclaimed security guru widely credited with inventing the proxy firewall. Marcus and Gary discuss why Marcus thinks we&#8217;re not making progress[...]</itunes:subtitle>
		<itunes:summary>
In the third episode of the Silver Bullet Security Podcast, Gary talks with Marcus Ranum, who is an acclaimed security guru widely credited with inventing the proxy firewall. Marcus and Gary discuss why Marcus thinks we&#8217;re not making progress in the computer security field, how common sense would help computer security, Richard Feynman, and power tools for home repair and improvement.

Ranum.com
The Six Dumbest Ideas in Computer Security
Old West Snake Oil
Patch Tuesday
Richard Feynman

The post The Computer Security Plateau with Marcus Ranum appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Computer Security Plateau with Marcus Ranum appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>The Necessities of a Security Practitioner with Dan Geer</title>
		<link>https://www.cigital.com/podcasts/show-002/</link>
		<pubDate>Mon, 12 Jun 2006 13:28:07 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-002/</guid>
		<description><![CDATA[<p>In this episode of the Silver Bullet Security Podcast, Gary chats with Dan Geer, Chief Scientist at Verdasys. Dan has a Ph.D. in biostatistics from Harvard. He and Gary discuss the need to understand both technology and business in order to be a good security practitioner, Dan&#8217;s paper Cyber Insecurity, his work on Project Athena, &#8230; <a href="https://www.cigital.com/podcasts/show-002/" class="more-link">Continue reading <span class="screen-reader-text">The Necessities of a Security Practitioner with Dan Geer</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-002/">The Necessities of a Security Practitioner with Dan Geer</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img style="padding: 10px;" src="https://www.cigital.com/silverbullet-files/dgeer-125.jpg" alt="Dan Geer" align="right" /></p>
<p style="margin-top: 5px;">In this episode of the Silver Bullet Security Podcast, Gary chats with Dan Geer, Chief Scientist at <a href="http://www.verdasys.com/">Verdasys</a>. Dan has a Ph.D. in biostatistics from Harvard. He and Gary discuss the need to understand both technology and business in order to be a good security practitioner, Dan&#8217;s paper Cyber Insecurity, his work on Project Athena, and livestock.</p>
<ul>
<li><a href="http://en.wikipedia.org/wiki/Dan_Geer">Dan Geer on Wikipedia</a></li>
<li><a href="http://en.wikipedia.org/wiki/Project_Athena">Project Athena on Wikipedia</a></li>
<li><a href="http://www.sims.berkeley.edu/research/projects/how-much-info-2003/">How Much Information 2003</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-002/">The Necessities of a Security Practitioner with Dan Geer</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2726/0/silverbullet-002.mp3" length="21510154" type="audio/mpeg" />
		<itunes:duration>0:22:24</itunes:duration>
		<itunes:subtitle>
In this episode of the Silver Bullet Security Podcast, Gary chats with Dan Geer, Chief Scientist at Verdasys. Dan has a Ph.D. in biostatistics from Harvard. He and Gary discuss the need to understand both technology and business in order to be a go[...]</itunes:subtitle>
		<itunes:summary>
In this episode of the Silver Bullet Security Podcast, Gary chats with Dan Geer, Chief Scientist at Verdasys. Dan has a Ph.D. in biostatistics from Harvard. He and Gary discuss the need to understand both technology and business in order to be a good security practitioner, Dan&#8217;s paper Cyber Insecurity, his work on Project Athena, and livestock.

Dan Geer on Wikipedia
Project Athena on Wikipedia
How Much Information 2003

The post The Necessities of a Security Practitioner with Dan Geer appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post The Necessities of a Security Practitioner with Dan Geer appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
		<item>
		<title>Show 001 &#8211; An Interview with Avi Rubin</title>
		<link>https://www.cigital.com/podcasts/show-001/</link>
		<pubDate>Wed, 19 Apr 2006 13:47:13 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security Best Practices]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://www.cigital.com/podcasts/show-001/</guid>
		<description><![CDATA[<p>In the debut episode of the Silver Bullet Security Podcast, Gary talks with Avi Rubin, professor of computer science and technical director of the information security institute at Johns Hopkins University. Avi made headlines in 2003 when he revealed glitches in Diebold electronic voting machines. Links: A partial transcript of the interview in IEEE Security &#8230; <a href="https://www.cigital.com/podcasts/show-001/" class="more-link">Continue reading <span class="screen-reader-text">Show 001 &#8211; An Interview with Avi Rubin</span></a></p>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-001/">Show 001 &#8211; An Interview with Avi Rubin</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="https://www.cigital.com/silverbullet-files/arubin-125.jpg" alt="Avi Rubin" align="right" /></p>
<p style="margin-top: 5px;">In the debut episode of the <em>Silver Bullet Security Podcast</em>, Gary talks with Avi Rubin, professor of computer science and technical director of the information security institute at Johns Hopkins University. Avi made headlines in 2003 when he revealed glitches in Diebold electronic voting machines.</p>
<p>Links:</p>
<ul>
<li><a href="https://www.cigital.com/silver-bullet-files/shows/silverbullet-001-arubin.pdf">A partial transcript of the interview in <em>IEEE Security &amp; Privacy</em></a></li>
<li><a href="http://www.avirubin.com/">Avi&#8217;s site</a></li>
<li><a href="http://www.bravenewballot.org/"><em>Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting</em></a>, Avi&#8217;s forthcoming book</li>
<li><a href="http://accurate-voting.org/">ACCURATE</a> &#8211; A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections</li>
<li><a href="http://www.frootloops.com/">Froot Loops</a> and <a href="http://en.wikipedia.org/wiki/Corn_flakes">Corn Flakes</a></li>
</ul>
<p>The post <a rel="nofollow" href="https://www.cigital.com/podcasts/show-001/">Show 001 &#8211; An Interview with Avi Rubin</a> appeared first on <a rel="nofollow" href="https://www.cigital.com">Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw</a>.</p>
]]></content:encoded>
				<enclosure url="https://www.cigital.com/podpress_trac/feed/2793/0/silverbullet-001.mp3" length="19243018" type="audio/mpeg" />
		<itunes:duration>0:20:03</itunes:duration>
		<itunes:subtitle>
In the debut episode of the Silver Bullet Security Podcast, Gary talks with Avi Rubin, professor of computer science and technical director of the information security institute at Johns Hopkins University. Avi made headlines in 2003 when he reveal[...]</itunes:subtitle>
		<itunes:summary>
In the debut episode of the Silver Bullet Security Podcast, Gary talks with Avi Rubin, professor of computer science and technical director of the information security institute at Johns Hopkins University. Avi made headlines in 2003 when he revealed glitches in Diebold electronic voting machines.
Links:

A partial transcript of the interview in IEEE Security &#38; Privacy
Avi&#8217;s site
Brave New Ballot: The Battle to Safeguard Democracy in the Age of Electronic Voting, Avi&#8217;s forthcoming book
ACCURATE &#8211; A Center for Correct, Usable, Reliable, Auditable, and Transparent Elections
Froot Loops and Corn Flakes

The post Show 001 &#8211; An Interview with Avi Rubin appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.
The post Show 001 &#8211; An Interview with Avi Rubin appeared first on Cigital &#187; The Silver Bullet Security Podcast with Gary McGraw.</itunes:summary>
		<itunes:author>Gary McGraw</itunes:author>
		<itunes:explicit>no</itunes:explicit>
		<itunes:block>no</itunes:block>
	</item>
	</channel>
</rss>
