<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/IDG3896937688" rel="self" type="application/rss+xml"/>
    <title>Salted Hash</title>
    <link>https://www.csoonline.com/video/series/8528/salted-hash</link>
    <language>en</language>
    <copyright>Copyright Foundry | Sponsored Content - All rights reserved.</copyright>
    <description>Security writer Steve Ragan talks with experts about the latest in cybersecurity, ransomware, malware, hacking and more. Stay informed, minimize risk and protect your organization. Catch new episodes weekly.</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/c2b0006e-e93a-11e9-af9d-3b0d5e54cf96/image/fe807582bec72ece5f6e519c79185ca7.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>Salted Hash</title>
      <link>https://www.csoonline.com/video/series/8528/salted-hash</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Security writer Steve Ragan talks with experts ab…</itunes:subtitle>
    <itunes:author>Foundry</itunes:author>
    <itunes:summary>Security writer Steve Ragan talks with experts about the latest in cybersecurity, ransomware, malware, hacking and more. Stay informed, minimize risk and protect your organization. Catch new episodes weekly.</itunes:summary>
    <content:encoded>
      <![CDATA[<p>Security writer Steve Ragan talks with experts about the latest in cybersecurity, ransomware, malware, hacking and more. Stay informed, minimize risk and protect your organization. Catch new episodes weekly.</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>FoundryCo</itunes:name>
      <itunes:email>podcasts@foundryco.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/c2b0006e-e93a-11e9-af9d-3b0d5e54cf96/image/fe807582bec72ece5f6e519c79185ca7.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="Technology">
    </itunes:category>
    <item>
      <title>Regulating the IoT: A conversation with Bruce Schneier | Salted Hash Ep 49</title>
      <description>Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips -- allowing hackers to access cars, refrigerators, toys and soon, even more home consumer items.</description>
      <pubDate>Tue, 04 Dec 2018 18:38:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c31caae8-e93a-11e9-b481-c7d1e4b2fcc5/image/artworks-000453136584-jojuao-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Security expert and author Bruce Schneier talks w…</itunes:subtitle>
      <itunes:summary>Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips -- allowing hackers to access cars, refrigerators, toys and soon, even more home consumer items.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Security expert and author Bruce Schneier talks with senior writer J.M. Porup about that widespread use of connected chips -- allowing hackers to access cars, refrigerators, toys and soon, even more home consumer items.</p>]]>
      </content:encoded>
      <itunes:duration>2326</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/539769834]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG5449210058.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How secure are electronic voting machines? | Salted Hash Ep 48</title>
      <description>With the midterm elections looming, electronic voting machines are getting increased scrutiny. J.M. Porup, senior writer at CSO, sits in the hosts chair this episode, breaking down the security risk with content producer Juliet Beauchamp.</description>
      <pubDate>Tue, 04 Dec 2018 18:35:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c347d650-e93a-11e9-b481-877a6f21f3f1/image/artworks-000453134664-g88jqz-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>With the midterm elections looming, electronic vo…</itunes:subtitle>
      <itunes:summary>With the midterm elections looming, electronic voting machines are getting increased scrutiny. J.M. Porup, senior writer at CSO, sits in the hosts chair this episode, breaking down the security risk with content producer Juliet Beauchamp.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>With the midterm elections looming, electronic voting machines are getting increased scrutiny. J.M. Porup, senior writer at CSO, sits in the hosts chair this episode, breaking down the security risk with content producer Juliet Beauchamp.</p>]]>
      </content:encoded>
      <itunes:duration>1472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/539768442]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG5489132582.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Talking DerbyCon, spy chip whispers and Google's data breach | Ep 47</title>
      <description>Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data breach.</description>
      <pubDate>Mon, 15 Oct 2018 20:02:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c376e01c-e93a-11e9-b481-6b09ff9b4632/image/artworks-000421554885-w85bjp-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Steve Ragan and J.M. Porup catch up post-DerbyCon…</itunes:subtitle>
      <itunes:summary>Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data breach.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Steve Ragan and J.M. Porup catch up post-DerbyCon conference to discuss psychological issues in the infosec community, supply chain security and whether it's time to make China the boogeyman again, as well as Google's recent data breach.</p>]]>
      </content:encoded>
      <itunes:duration>1913</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/514802736]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG9719710155.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Smart cities and security vulnerabilities | Salted Hash Ep 46</title>
      <description>In this episode, host Steve Ragan talks with Charles Henderson, global managing partner at IBM's X-Force Red, about smart cities and the potential vulnerabilities in IoT, as well as Daniel Crowley, research director at X-Force Red.</description>
      <pubDate>Thu, 30 Aug 2018 14:36:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c3cb9abc-e93a-11e9-b481-cb1524e36ea3/image/artworks-000397162803-f4d1qg-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode, host Steve Ragan talks with Char…</itunes:subtitle>
      <itunes:summary>In this episode, host Steve Ragan talks with Charles Henderson, global managing partner at IBM's X-Force Red, about smart cities and the potential vulnerabilities in IoT, as well as Daniel Crowley, research director at X-Force Red.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, host Steve Ragan talks with Charles Henderson, global managing partner at IBM's X-Force Red, about smart cities and the potential vulnerabilities in IoT, as well as Daniel Crowley, research director at X-Force Red.</p>]]>
      </content:encoded>
      <itunes:duration>734</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/492815769]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG6091760743.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>VirusTotal Intelligence, a search engine for malware | Salted Hash Ep 45</title>
      <description>In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.</description>
      <pubDate>Fri, 24 Aug 2018 18:11:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c3fc9130-e93a-11e9-b481-1798ba37f650/image/artworks-000394108896-ah3ksl-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode, host Steve Ragan talks with Karl…</itunes:subtitle>
      <itunes:summary>In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, host Steve Ragan talks with Karl Hiramoto, technical solutions consultant for VirusTotal, maker of VirusTotal Intelligence, a searchable detection tool for malware.</p>]]>
      </content:encoded>
      <itunes:duration>446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/490120056]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG8400771121.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Detecting bot attacks | Salted Hash Ep 44</title>
      <description>In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.</description>
      <pubDate>Fri, 24 Aug 2018 18:09:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c42d1a6c-e93a-11e9-b481-af400f22a2b1/image/artworks-000394108122-o3dbkr-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode, host Steve Ragan talks with Engi…</itunes:subtitle>
      <itunes:summary>In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, host Steve Ragan talks with Engin Akyol, CTO at Distil Networks at the Black Hat 2018 conference, about bot account takeovers and how they can be detected.</p>]]>
      </content:encoded>
      <itunes:duration>431</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/490119087]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG7051375676.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blue Team Village, DEF CON 2018 | Salted Hash Ep 43</title>
      <description>Host Steve Ragan talks to Munin, a staffer at the DEF CON Blue Team Village about what's happening and what you can expect.</description>
      <pubDate>Fri, 24 Aug 2018 18:05:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c45df9b6-e93a-11e9-b481-d7d43bc569f0/image/artworks-000394106871-jh0u9z-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Host Steve Ragan talks to Munin, a staffer at the…</itunes:subtitle>
      <itunes:summary>Host Steve Ragan talks to Munin, a staffer at the DEF CON Blue Team Village about what's happening and what you can expect.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host Steve Ragan talks to Munin, a staffer at the DEF CON Blue Team Village about what's happening and what you can expect.</p>]]>
      </content:encoded>
      <itunes:duration>381</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/490117554]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG4537302800.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing AI | Salted Hash Ep 42</title>
      <description>Host Steve Ragan is joined by Lookout’s Jeremy Richards, who manages the @PhishingAI account on Twitter, as well as a good friend and fellow reporter from Ars Technica.</description>
      <pubDate>Fri, 24 Aug 2018 18:03:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c4a8782e-e93a-11e9-b481-f7428d0ba40a/image/artworks-000394106151-p8hnzj-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Host Steve Ragan is joined by Lookout’s Jeremy Ri…</itunes:subtitle>
      <itunes:summary>Host Steve Ragan is joined by Lookout’s Jeremy Richards, who manages the @PhishingAI account on Twitter, as well as a good friend and fellow reporter from Ars Technica.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host Steve Ragan is joined by Lookout’s Jeremy Richards, who manages the @PhishingAI account on Twitter, as well as a good friend and fellow reporter from Ars Technica.</p>]]>
      </content:encoded>
      <itunes:duration>783</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/490116825]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG3211289997.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An inside look at hybrid Office 365 phishing attacks | Salted Hash Ep 41</title>
      <description>In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.</description>
      <pubDate>Fri, 24 Aug 2018 18:01:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c4e6aac2-e93a-11e9-b481-4744c9ca6dfb/image/artworks-000394105359-vutkvv-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode, Steve Ragan shows what a hybrid …</itunes:subtitle>
      <itunes:summary>In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves to another.</p>]]>
      </content:encoded>
      <itunes:duration>604</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/490115850]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG9549569294.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40</title>
      <description>Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.</description>
      <pubDate>Fri, 24 Aug 2018 17:59:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c509a22a-e93a-11e9-b481-3bc062f167c4/image/artworks-000394104705-q4tkxn-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Kit Hunter, a basic Python script written by host…</itunes:subtitle>
      <itunes:summary>Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.</p>]]>
      </content:encoded>
      <itunes:duration>410</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/490114866]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG9969504567.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What is a phishing kit? Listen to this in-depth explainer | Salted Hash Ep 39</title>
      <description>What is a phishing kit? In this podcast, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.</description>
      <pubDate>Fri, 24 Aug 2018 17:56:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c5446dd8-e93a-11e9-b481-23316b4d8b10/image/artworks-000394103715-oai1h6-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>What is a phishing kit? In this podcast, Steve Ra…</itunes:subtitle>
      <itunes:summary>What is a phishing kit? In this podcast, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>What is a phishing kit? In this podcast, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.</p>]]>
      </content:encoded>
      <itunes:duration>913</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/490113468]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG3701991632.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Conversation hijacking attacks | Salted Hash Ep 38</title>
      <description>Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.</description>
      <pubDate>Thu, 23 Aug 2018 19:48:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c57d8992-e93a-11e9-b481-c390ca4a7443/image/artworks-000393609450-pmz6ca-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Troy Gill, manager of security research at AppRiv…</itunes:subtitle>
      <itunes:summary>Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.</p>]]>
      </content:encoded>
      <itunes:duration>946</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/489681669]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG2648119453.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37</title>
      <description>Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.</description>
      <pubDate>Thu, 23 Aug 2018 19:46:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c5b54b52-e93a-11e9-b481-df1fbbbba0b0/image/artworks-000393614988-s31yo0-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Asaf Cidon, vice president of email security at B…</itunes:subtitle>
      <itunes:summary>Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.</p>]]>
      </content:encoded>
      <itunes:duration>1044</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/489680847]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG4292496773.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The risks associated with global Internationalized Domain Names | Salted Hash Ep 36</title>
      <description>Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.</description>
      <pubDate>Thu, 23 Aug 2018 19:44:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c605e076-e93a-11e9-b481-e333d5da8a4a/image/artworks-000393605904-kvoffv-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Paul Vixie, CEO of Farsight Security, explains ho…</itunes:subtitle>
      <itunes:summary>Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.</p>]]>
      </content:encoded>
      <itunes:duration>802</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/489679989]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG5411306617.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don't ignore application security | Salted Hash Ep 35</title>
      <description>In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.</description>
      <pubDate>Thu, 23 Aug 2018 19:43:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c63d3800-e93a-11e9-b481-e397c3a20d27/image/artworks-000393605307-vrgqiq-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode, Michael Feiertag, CEO and co-fou…</itunes:subtitle>
      <itunes:summary>In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.</p>]]>
      </content:encoded>
      <itunes:duration>1097</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/489679254]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG9873840203.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34</title>
      <description>In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.</description>
      <pubDate>Thu, 23 Aug 2018 19:41:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c698dc00-e93a-11e9-b481-ff2ee04d187f/image/artworks-000393604632-t0j4yj-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode, host Steve Ragan talks with Phil…</itunes:subtitle>
      <itunes:summary>In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.</p>]]>
      </content:encoded>
      <itunes:duration>955</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/489678513]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG9403511467.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TSB phishing attacks | Salted Hash Ep 33</title>
      <description>TSB phishing attacks | Salted Hash Ep 33 by Salted Hash</description>
      <pubDate>Mon, 09 Jul 2018 13:51:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c6cc3eba-e93a-11e9-b481-ef6a20dd06ea/image/artworks-000371059488-nbof8k-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>TSB phishing attacks | Salted Hash Ep 33 by Salte…</itunes:subtitle>
      <itunes:summary>TSB phishing attacks | Salted Hash Ep 33 by Salted Hash</itunes:summary>
      <content:encoded>
        <![CDATA[<p>TSB phishing attacks | Salted Hash Ep 33 by Salted Hash</p>]]>
      </content:encoded>
      <itunes:duration>714</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/469306689]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG7160829877.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34</title>
      <description>In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.</description>
      <pubDate>Mon, 09 Jul 2018 13:47:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c70e8748-e93a-11e9-b481-bb52b816a7cc/image/artworks-000371058150-4fa4lz-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode, host Steve Ragan talks with Phil…</itunes:subtitle>
      <itunes:summary>In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.</p>]]>
      </content:encoded>
      <itunes:duration>955</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/469305177]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG7040730545.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What an Apple phishing attack looks like | Salted Hash Ep 32</title>
      <description>How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.</description>
      <pubDate>Mon, 09 Jul 2018 13:43:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c7581b38-e93a-11e9-b481-9b936cea6adb/image/artworks-000371057166-mxpt2r-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>How can you tell the difference between a legitim…</itunes:subtitle>
      <itunes:summary>How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.</p>]]>
      </content:encoded>
      <itunes:duration>645</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/469304034]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG6414151861.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Getting hands-on with industrial control system setups at RSA | Salted Hash Ep 31</title>
      <description>Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the equipment.</description>
      <pubDate>Mon, 09 Jul 2018 13:41:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c782084e-e93a-11e9-b481-2f17e068736d/image/artworks-000371056629-wxs5x5-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Host Steve Ragan is joined on the RSA 2018 show f…</itunes:subtitle>
      <itunes:summary>Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the equipment.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the equipment.</p>]]>
      </content:encoded>
      <itunes:duration>435</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/469303338]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG7941588341.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How the Spanish cybercriminal underground operates | Salted Hash Ep 30</title>
      <description>Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.</description>
      <pubDate>Mon, 09 Jul 2018 13:39:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c7acfa86-e93a-11e9-b481-b340424d7fc5/image/artworks-000371056056-3pypga-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Host Steve Ragan reports from the RSA 2018 confer…</itunes:subtitle>
      <itunes:summary>Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.</p>]]>
      </content:encoded>
      <itunes:duration>527</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/469302507]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG1433503055.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Learn what the 'zero trust' security model really means | Salted Hash Ep 29</title>
      <description>Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.</description>
      <pubDate>Fri, 08 Jun 2018 15:44:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c80db8f8-e93a-11e9-b481-eba338629022/image/artworks-000358374294-zo97p4-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Host Steve Ragan reports from RSA 2018 conference…</itunes:subtitle>
      <itunes:summary>Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.</p>]]>
      </content:encoded>
      <itunes:duration>518</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/455636673]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG1970361344.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Words on a ceiling: Red Team stories with Salted Hash</title>
      <description>Host Steve Ragan talks shop with Phil Grimes, a security consultant with an interesting collection of Red Team engagement stories.</description>
      <pubDate>Mon, 04 Jun 2018 18:55:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c864b950-e93a-11e9-b481-2fe7b765b1d7/image/artworks-000356632236-y79jkj-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Host Steve Ragan talks shop with Phil Grimes, a s…</itunes:subtitle>
      <itunes:summary>Host Steve Ragan talks shop with Phil Grimes, a security consultant with an interesting collection of Red Team engagement stories.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host Steve Ragan talks shop with Phil Grimes, a security consultant with an interesting collection of Red Team engagement stories.</p>]]>
      </content:encoded>
      <itunes:duration>1417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/453706230]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG6310707884.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Countdown to the GDPR deadline: Are you ready? | Salted Hash Ep 28</title>
      <description>Host Steve Ragan reports from the RSA 2018 show floor, talking with Greg Reber, founder and CEO at AsTech Consulting, about the looming GDPR deadline and what IT security professionals should be getting done now.</description>
      <pubDate>Wed, 23 May 2018 23:12:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c88d22be-e93a-11e9-b481-bb2be1e2006d/image/artworks-000351960567-pe9cvo-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Host Steve Ragan reports from the RSA 2018 show f…</itunes:subtitle>
      <itunes:summary>Host Steve Ragan reports from the RSA 2018 show floor, talking with Greg Reber, founder and CEO at AsTech Consulting, about the looming GDPR deadline and what IT security professionals should be getting done now.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host Steve Ragan reports from the RSA 2018 show floor, talking with Greg Reber, founder and CEO at AsTech Consulting, about the looming GDPR deadline and what IT security professionals should be getting done now.</p>]]>
      </content:encoded>
      <itunes:duration>424</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/448279326]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG2091279995.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Can AI help bridge the IT security skills gap? | Salted Hash Ep 27</title>
      <description>Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to artificial intelligence systems.</description>
      <pubDate>Wed, 23 May 2018 23:09:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c8e76f62-e93a-11e9-b481-f730b326a4be/image/artworks-000351959802-bywud1-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Host Steve Ragan reports from the show floor at R…</itunes:subtitle>
      <itunes:summary>Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to artificial intelligence systems.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to artificial intelligence systems.</p>]]>
      </content:encoded>
      <itunes:duration>627</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/448278558]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG8647945610.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How deception technologies use camouflage to attract attackers  | Salted Hash Ep 26</title>
      <description>Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies.</description>
      <pubDate>Wed, 23 May 2018 23:07:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c9189c0e-e93a-11e9-b481-1fb9d5357d82/image/artworks-000351958932-ylv7vv-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Host Steve Ragan reports from the show floor at R…</itunes:subtitle>
      <itunes:summary>Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies.</p>]]>
      </content:encoded>
      <itunes:duration>548</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/448277775]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG2949109925.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Get a hands-on, inside look at the dark web | Salted Hash Ep 25</title>
      <description>Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.</description>
      <pubDate>Wed, 23 May 2018 23:04:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c9467dd6-e93a-11e9-b481-2f5ff0de44d2/image/artworks-000351958032-b9fl58-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Reporting from RSA 2018, host Steve Ragan helps d…</itunes:subtitle>
      <itunes:summary>Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Reporting from RSA 2018, host Steve Ragan helps dispel the hype and confusion surrounding the dark web, as he talks with Alon Arvatz, co-founder at IntSights.</p>]]>
      </content:encoded>
      <itunes:duration>622</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/448276701]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG3636135673.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Defending against mobile technology threats | Salted Hash Ep 24</title>
      <description>What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and security evangelist at VASCO Data Security.</description>
      <pubDate>Wed, 23 May 2018 23:01:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c997fab2-e93a-11e9-b481-8380f7b71f83/image/artworks-000351956475-ylz618-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>What are the current dangers in mobile technology…</itunes:subtitle>
      <itunes:summary>What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and security evangelist at VASCO Data Security.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and security evangelist at VASCO Data Security.</p>]]>
      </content:encoded>
      <itunes:duration>492</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/448275603]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG8296538076.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Honeypots and the evolution of botnets | Salted Hash Ep 23</title>
      <description>Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.</description>
      <pubDate>Wed, 23 May 2018 22:59:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c9cf3004-e93a-11e9-b481-1ba68386138c/image/artworks-000351954156-2uqwvc-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Host Steve Ragan reports from the show floor at R…</itunes:subtitle>
      <itunes:summary>Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.</p>]]>
      </content:encoded>
      <itunes:duration>719</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/448274814]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG7005211087.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is it time to kill the pen test? | Salted Hash Ep 22</title>
      <description>Is it time to kill the pen test? | Salted Hash Ep 22 by Salted Hash</description>
      <pubDate>Wed, 23 May 2018 22:57:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c9f4b112-e93a-11e9-b481-af566db5f3a7/image/artworks-000351952833-w5nhpd-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Is it time to kill the pen test? | Salted Hash Ep…</itunes:subtitle>
      <itunes:summary>Is it time to kill the pen test? | Salted Hash Ep 22 by Salted Hash</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Is it time to kill the pen test? | Salted Hash Ep 22 by Salted Hash</p>]]>
      </content:encoded>
      <itunes:duration>727</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/448274019]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG1840276834.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scammers spoof Office 365, DocuSign and others | Salted Hash Ep 21</title>
      <description>As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game of phishing.</description>
      <pubDate>Mon, 05 Mar 2018 20:01:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ca1790b0-e93a-11e9-b481-ff16d402baa2/image/artworks-000311462823-habjwu-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>As phishing attacks evolve, hackers are using cus…</itunes:subtitle>
      <itunes:summary>As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game of phishing.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As phishing attacks evolve, hackers are using customization and targeted scams to ensnare users. Asaf Cidon, vice president, email security services at Barracuda, talks with host Steve Ragan about the ever-changing cat-and-mouse game of phishing.</p>]]>
      </content:encoded>
      <itunes:duration>1008</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/409134099]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG9325049548.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GDPR deadline looms: The price and penalties | Salted Hash Ep 20</title>
      <description>With the General Data Protection Regulation (GDPR) deadline fast approaching, host Steve Ragan explores the implications of noncompliance for companies -- and possible penalties -- with Greg Reber, founder/CEO of AsTech Consulting.</description>
      <pubDate>Mon, 26 Feb 2018 17:22:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ca40ee4c-e93a-11e9-b481-1bccffe00659/image/artworks-000308121144-49xyd0-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>With the General Data Protection Regulation (GDPR…</itunes:subtitle>
      <itunes:summary>With the General Data Protection Regulation (GDPR) deadline fast approaching, host Steve Ragan explores the implications of noncompliance for companies -- and possible penalties -- with Greg Reber, founder/CEO of AsTech Consulting.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>With the General Data Protection Regulation (GDPR) deadline fast approaching, host Steve Ragan explores the implications of noncompliance for companies -- and possible penalties -- with Greg Reber, founder/CEO of AsTech Consulting.</p>]]>
      </content:encoded>
      <itunes:duration>810</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/405501621]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG8476761629.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware: Do you pay the ransom? | Salted Hash Ep 19</title>
      <description>Robert Gibbons, CTO at Datta, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks.</description>
      <pubDate>Tue, 20 Feb 2018 15:14:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ca7dec70-e93a-11e9-b481-0ffa51b24e44/image/artworks-000305480274-k3p9az-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Robert Gibbons, CTO at Datta, joins host Steve Ra…</itunes:subtitle>
      <itunes:summary>Robert Gibbons, CTO at Datta, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Robert Gibbons, CTO at Datta, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks.</p>]]>
      </content:encoded>
      <itunes:duration>913</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/402493776]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG6269533445.mp3?updated=1571260547" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mobile security and privacy for activists worldwide | Salted Hash Ep 18</title>
      <description>Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the world.</description>
      <pubDate>Mon, 12 Feb 2018 15:52:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/caa6a994-e93a-11e9-b481-631252c2c9fc/image/artworks-000301157268-huh2zt-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Nathan Freitas, who heads The Guardian Project, t…</itunes:subtitle>
      <itunes:summary>Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the world.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the world.</p>]]>
      </content:encoded>
      <itunes:duration>951</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/398465085]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG1039170852.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spectre and Meltdown | Salted Hash Ep 17</title>
      <description>What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.</description>
      <pubDate>Tue, 06 Feb 2018 19:47:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/caf9dff6-e93a-11e9-b481-3b5ae227275c/image/artworks-000298307157-e52ixu-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>What is it about the Spectre and Meltdown attacks…</itunes:subtitle>
      <itunes:summary>What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.</p>]]>
      </content:encoded>
      <itunes:duration>906</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/395471391]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG2197737657.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ready for the EU's GDPR compliance deadline? Many companies aren't | Salted Hash Ep 16</title>
      <description>CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.</description>
      <pubDate>Tue, 06 Feb 2018 19:44:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cb2eea98-e93a-11e9-b481-136a6b3d3a1a/image/artworks-000298305888-idmysb-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>CSO senior editor Michael Nadeau joins host Steve…</itunes:subtitle>
      <itunes:summary>CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CSO senior editor Michael Nadeau joins host Steve Ragan to talk about predictions for 2018, including the looming GDPR compliance deadline.</p>]]>
      </content:encoded>
      <itunes:duration>1367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/395470008]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG6377526118.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The people you call when you've had a breach | Salted Hash Ep 15</title>
      <description>Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.</description>
      <pubDate>Tue, 06 Feb 2018 19:42:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cb9ae95a-e93a-11e9-b481-5305bb335715/image/artworks-000298303701-bft2du-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Rob Lee, faculty fellow at the SANS Technology In…</itunes:subtitle>
      <itunes:summary>Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rob Lee, faculty fellow at the SANS Technology Institute, talks with host Steve Ragan about his group's work to help companies out of sticky situations, plus the state of the security industry and predictions for 2018.</p>]]>
      </content:encoded>
      <itunes:duration>1869</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/395468226]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG5929461220.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Are mass transit systems the next cybersecurity target? | Salted Hash Ep 14</title>
      <description>Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.</description>
      <pubDate>Fri, 19 Jan 2018 16:09:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cc101aa4-e93a-11e9-b481-ab773d6da567/image/artworks-000289000388-mrpcjk-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Host Steve Ragan talks with Stan Engelbrecht, dir…</itunes:subtitle>
      <itunes:summary>Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host Steve Ragan talks with Stan Engelbrecht, director of the cybersecurity practice at D3 Security, about the inherent flaws in security defenses for public transportation systems -- and what can be done.</p>]]>
      </content:encoded>
      <itunes:duration>558</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/386021948]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG5684114334.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DJI's bounty problems and video surveillance programs | Salted Hash Ep 13</title>
      <description>Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid.</description>
      <pubDate>Fri, 19 Jan 2018 16:07:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cc638b62-e93a-11e9-b481-230d42d4c907/image/artworks-000289000475-jwfi4j-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Host Steve Ragan unpacks the latest news about Ch…</itunes:subtitle>
      <itunes:summary>Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host Steve Ragan unpacks the latest news about Chinese company DJI's bug bounty program, plus new developments in video surveillance and more, with Fahmida Rashid.</p>]]>
      </content:encoded>
      <itunes:duration>1242</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/386021069]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG5766822505.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How to build a security career | Salted Hash Ep 5</title>
      <description>What does it mean to be a security professional? CSO's Fahmida Rashid and Steve Ragan break down what it takes to get ahead in the field.</description>
      <pubDate>Thu, 14 Dec 2017 21:42:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cd177a78-e93a-11e9-b481-7f83d04f6021/image/artworks-000269904839-u9o5f5-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>What does it mean to be a security professional? …</itunes:subtitle>
      <itunes:summary>What does it mean to be a security professional? CSO's Fahmida Rashid and Steve Ragan break down what it takes to get ahead in the field.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>What does it mean to be a security professional? CSO's Fahmida Rashid and Steve Ragan break down what it takes to get ahead in the field.</p>]]>
      </content:encoded>
      <itunes:duration>1942</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/369635222]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG3037143707.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Attribution, AI and hacking | Salted Hash Ep 4</title>
      <description>Does attack attribution really matter? CSO's Fahmida Rashid and Steve Ragan argue that what, when and how a breach happened are the most immediate concerns. Who did it comes later.</description>
      <pubDate>Thu, 14 Dec 2017 21:40:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cd63d738-e93a-11e9-b481-a3eb391aec72/image/artworks-000269903774-xu0y03-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Does attack attribution really matter? CSO's Fahm…</itunes:subtitle>
      <itunes:summary>Does attack attribution really matter? CSO's Fahmida Rashid and Steve Ragan argue that what, when and how a breach happened are the most immediate concerns. Who did it comes later.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Does attack attribution really matter? CSO's Fahmida Rashid and Steve Ragan argue that what, when and how a breach happened are the most immediate concerns. Who did it comes later.</p>]]>
      </content:encoded>
      <itunes:duration>1511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/369633974]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG6024021705.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing, application security and cool tools | Salted Hash Ep 3</title>
      <description>CSO's Fahmida Rashid and Steve Ragan dig into the latest phishing attempts (and how to sidestep them), plus the debate over application security, and some cool new tools.</description>
      <pubDate>Thu, 14 Dec 2017 21:38:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cdd1b654-e93a-11e9-b481-efd07b4d8194/image/artworks-000269903204-e86273-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>CSO's Fahmida Rashid and Steve Ragan dig into the…</itunes:subtitle>
      <itunes:summary>CSO's Fahmida Rashid and Steve Ragan dig into the latest phishing attempts (and how to sidestep them), plus the debate over application security, and some cool new tools.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CSO's Fahmida Rashid and Steve Ragan dig into the latest phishing attempts (and how to sidestep them), plus the debate over application security, and some cool new tools.</p>]]>
      </content:encoded>
      <itunes:duration>1608</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/369633293]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG8649510427.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Equifax breach, incident response and the future of passwords | Salted Hash Ep 2</title>
      <description>So much of security comes down to 4 little words: Keep it simple, stupid. CSO’s Steve Ragan and Fahmida Rashid explain why there’s no magical mystery cure for ransomware. Also, how much is data from the Equifax breach worth? (Hint: It's a whole lot less than you might think.)</description>
      <pubDate>Thu, 14 Dec 2017 21:35:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ce1b639e-e93a-11e9-b481-9b0fc3885982/image/artworks-000269901854-8jcs3u-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>So much of security comes down to 4 little words:…</itunes:subtitle>
      <itunes:summary>So much of security comes down to 4 little words: Keep it simple, stupid. CSO’s Steve Ragan and Fahmida Rashid explain why there’s no magical mystery cure for ransomware. Also, how much is data from the Equifax breach worth? (Hint: It's a whole lot less than you might think.)</itunes:summary>
      <content:encoded>
        <![CDATA[<p>So much of security comes down to 4 little words: Keep it simple, stupid. CSO’s Steve Ragan and Fahmida Rashid explain why there’s no magical mystery cure for ransomware. Also, how much is data from the Equifax breach worth? (Hint: It's a whole lot less than you might think.)</p>]]>
      </content:encoded>
      <itunes:duration>1669</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/369631319]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG1221123187.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pilot | Salted Hash Ep 1</title>
      <description>Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?</description>
      <pubDate>Thu, 14 Dec 2017 21:34:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ce3de5e0-e93a-11e9-b481-9f65fd38fb16/image/artworks-000269901485-1bu5rv-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Reporters Fahmida Rashid and Steve Ragan talk abo…</itunes:subtitle>
      <itunes:summary>Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?</p>]]>
      </content:encoded>
      <itunes:duration>2541</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/369630752]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG8943655350.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Zero trust systems, dentity authentication permeate enterprise security strategy | Salted Hash Ep 12</title>
      <description>Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.</description>
      <pubDate>Thu, 14 Dec 2017 21:25:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ceacd6c6-e93a-11e9-b481-57a6f6aea4b5/image/artworks-000269898692-w7km0r-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Executives at cloud services vendor Akamai -- Dav…</itunes:subtitle>
      <itunes:summary>Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.</p>]]>
      </content:encoded>
      <itunes:duration>1540</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/369626810]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG7930316491.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Dyn cyberattack, one year later | Salted Hash Ep 11</title>
      <description>It's been one year since the Dyn cyberattack, a distributed denial-of-service attack that affected traffic to a number of high-level domains. Host Steve Ragan talks with Josh Shaul, vice president of web security at Akamai Technologies, about the event's impact.</description>
      <pubDate>Thu, 14 Dec 2017 21:22:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cedbdfc0-e93a-11e9-b481-0300cc0817f6/image/artworks-000269897495-wi6cjd-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>It's been one year since the Dyn cyberattack, a d…</itunes:subtitle>
      <itunes:summary>It's been one year since the Dyn cyberattack, a distributed denial-of-service attack that affected traffic to a number of high-level domains. Host Steve Ragan talks with Josh Shaul, vice president of web security at Akamai Technologies, about the event's impact.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It's been one year since the Dyn cyberattack, a distributed denial-of-service attack that affected traffic to a number of high-level domains. Host Steve Ragan talks with Josh Shaul, vice president of web security at Akamai Technologies, about the event's impact.</p>]]>
      </content:encoded>
      <itunes:duration>1347</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/369625259]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG7071561303.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Office 365 phishing examples | Salted Hash Ep 10</title>
      <description>Salted Hash looks at recent Office 365 phishing examples, discussing why they work and what can be done about them.</description>
      <pubDate>Fri, 08 Dec 2017 17:57:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf27fb80-e93a-11e9-b481-2bcbe7964af5/image/artworks-000266935061-vkqgyo-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Salted Hash looks at recent Office 365 phishing e…</itunes:subtitle>
      <itunes:summary>Salted Hash looks at recent Office 365 phishing examples, discussing why they work and what can be done about them.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Salted Hash looks at recent Office 365 phishing examples, discussing why they work and what can be done about them.</p>]]>
      </content:encoded>
      <itunes:duration>812</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/366795641]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG6306446717.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What keeps IT administrators up at night? Ransomware, for one | Salted Hash Ep 8</title>
      <description>A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.</description>
      <pubDate>Fri, 08 Dec 2017 17:55:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf5c3116-e93a-11e9-b481-0f069c80477a/image/artworks-000269904995-uzf8nm-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A solid backup policy and frequent awareness trai…</itunes:subtitle>
      <itunes:summary>A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.</p>]]>
      </content:encoded>
      <itunes:duration>1639</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/366794918]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG7610132631.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Matrix Banker malware spreads to multiple industries | Salted Hash Ep 7</title>
      <description>The Matrix Banker malware, first found in Latin America, is now gaining a foothold in diversified targets. Steve Ragan breaks down the threat with Justin Fier, director for cyber intelligence and analysis at Darktrace.</description>
      <pubDate>Fri, 08 Dec 2017 17:52:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf83316c-e93a-11e9-b481-3f09a4d6598f/image/artworks-000269905253-g47e4z-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Matrix Banker malware, first found in Latin A…</itunes:subtitle>
      <itunes:summary>The Matrix Banker malware, first found in Latin America, is now gaining a foothold in diversified targets. Steve Ragan breaks down the threat with Justin Fier, director for cyber intelligence and analysis at Darktrace.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Matrix Banker malware, first found in Latin America, is now gaining a foothold in diversified targets. Steve Ragan breaks down the threat with Justin Fier, director for cyber intelligence and analysis at Darktrace.</p>]]>
      </content:encoded>
      <itunes:duration>627</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/366793715]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG6319735431.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware marketplaces and the future of malware | Salted Hash Ep 6</title>
      <description>Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.</description>
      <pubDate>Fri, 08 Dec 2017 17:48:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:author>Foundry</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cfce89dc-e93a-11e9-b481-cf234020ba8b/image/avatars-000362097434-ta3kcc-original.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Would you give up a customer's data or credential…</itunes:subtitle>
      <itunes:summary>Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.</p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[tag:soundcloud,2010:tracks/366792365]]></guid>
      <enclosure url="https://traffic.megaphone.fm/IDG9063506672.mp3" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
