<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/the-bluehat-podcast" rel="self" type="application/rss+xml"/>
    <title>The BlueHat Podcast</title>
    <link>https://bluehatpodcast.com</link>
    <language>en</language>
    <copyright>©2025 Microsoft</copyright>
    <description>Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all. </description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/b3d6df64-33fd-11ef-a630-7bb26b1fdd26/image/0520e2e154dd21ce630dc4078baf2a62.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>The BlueHat Podcast</title>
      <link>https://bluehatpodcast.com</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>The Microsoft Security Response Center podcast. Hear from cyber security researchers, responders, hackers, and engineers from within and outside of Microsoft working to make the world a safer place for all.</itunes:subtitle>
    <itunes:author>Microsoft</itunes:author>
    <itunes:summary>Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all. </itunes:summary>
    <content:encoded>
      <![CDATA[<p>Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all. </p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>Bruce Bracken</itunes:name>
      <itunes:email>bbrack@microsoft.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/b3d6df64-33fd-11ef-a630-7bb26b1fdd26/image/0520e2e154dd21ce630dc4078baf2a62.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="Technology">
    </itunes:category>
    <item>
      <title>Hunting Variants: Finding the Bugs Behind the Bug</title>
      <description>In this episode of The BlueHat Podcast, host Nic Fillingham is joined by George Hughey from Microsoft who returns to discuss his Blue Hat India talk on variant hunting, explaining how MSRC uses submission data from hacking competitions like Pwn2Own and Tianfu Cup to uncover additional security vulnerabilities in Windows. George shares how incentives in competitions differ from bug bounty programs, how tools like CodeQL assist variant hunting, and why collaborating with the security research community is key to improving Windows security. 

 



In This Episode You Will Learn:  


  
How hacking competitions help find real-world Windows vulnerabilities 





  
The role of MSRC in hunting variants beyond submitted vulnerabilities 





  
Why fuzzing is not always effective for modern edge cases 




 

Some Questions We Ask: 


  
How do you decide which cases to pursue for variant hunting? 





  
What advice do you have for researchers submitting variants? 





  
How does the CodeQL team collaborate with your team? 




   

Resources:      

View George Hughey on LinkedIn     

View Wendy Zenone on LinkedIn   

View Nic Fillingham on LinkedIn  

 

Related Microsoft Podcasts:   


  
Microsoft Threat Intelligence Podcast   





  
Afternoon Cyber Tea with Ann Johnson   





  
Uncovering Hidden Risks   




  

Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

 

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </description>
      <pubDate>Wed, 09 Jul 2025 07:05:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of The BlueHat Podcast, host Nic Fillingham is joined by George Hughey from Microsoft who returns to discuss his Blue Hat India talk on variant hunting, explaining how MSRC uses submission data from hacking competitions like Pwn2Own and Tianfu Cup to uncover additional security vulnerabilities in Windows. George shares how incentives in competitions differ from bug bounty programs, how tools like CodeQL assist variant hunting, and why collaborating with the security research community is key to improving Windows security. 

 



In This Episode You Will Learn:  


  
How hacking competitions help find real-world Windows vulnerabilities 





  
The role of MSRC in hunting variants beyond submitted vulnerabilities 





  
Why fuzzing is not always effective for modern edge cases 




 

Some Questions We Ask: 


  
How do you decide which cases to pursue for variant hunting? 





  
What advice do you have for researchers submitting variants? 





  
How does the CodeQL team collaborate with your team? 




   

Resources:      

View George Hughey on LinkedIn     

View Wendy Zenone on LinkedIn   

View Nic Fillingham on LinkedIn  

 

Related Microsoft Podcasts:   


  
Microsoft Threat Intelligence Podcast   





  
Afternoon Cyber Tea with Ann Johnson   





  
Uncovering Hidden Risks   




  

Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

 

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, host <a href="https://www.linkedin.com/in/nicfill/"><u>Nic Fillingham</u></a> is joined by <a href="https://www.linkedin.com/in/ghughey/?utm_source=chatgpt.com"><u>George Hughey</u></a> from Microsoft who returns to discuss his Blue Hat India talk on variant hunting, explaining how MSRC uses submission data from hacking competitions like Pwn2Own and Tianfu Cup to uncover additional security vulnerabilities in Windows. George shares how incentives in competitions differ from bug bounty programs, how tools like CodeQL assist variant hunting, and why collaborating with the security research community is key to improving Windows security. </p>
<p> </p>
<p><br></p>
<p>In This Episode You Will Learn:  </p>
<ul>
  <li>
<p>How hacking competitions help find real-world Windows vulnerabilities </p>
</li>
</ul>
<ul>
  <li>
<p>The role of MSRC in hunting variants beyond submitted vulnerabilities </p>
</li>
</ul>
<ul>
  <li>
<p>Why fuzzing is not always effective for modern edge cases </p>
</li>
</ul>
<p> </p>
<p>Some Questions We Ask: </p>
<ul>
  <li>
<p>How do you decide which cases to pursue for variant hunting? </p>
</li>
</ul>
<ul>
  <li>
<p>What advice do you have for researchers submitting variants? </p>
</li>
</ul>
<ul>
  <li>
<p>How does the CodeQL team collaborate with your team? </p>
</li>
</ul>
<p>   </p>
<p>Resources:      </p>
<p><a href="https://www.linkedin.com/in/ghughey/?utm_source=chatgpt.com"><u>View George Hughey on LinkedIn</u></a>     </p>
<p><a href="https://www.linkedin.com/in/wendyzenone/"><u>View Wendy Zenone on LinkedIn</u></a>   </p>
<p><a href="https://www.linkedin.com/in/nicfill/"><u>View Nic Fillingham on LinkedIn</u></a>  </p>
<p> </p>
<p>Related Microsoft Podcasts:   </p>
<ul>
  <li>
<p><a href="https://msthreatintelpodcast.com/"><u>Microsoft Threat Intelligence Podcast</u></a>   </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://afternooncybertea.com/"><u>Afternoon Cyber Tea with Ann Johnson</u></a>   </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://uncoveringhiddenrisks.com/"><u>Uncovering Hidden Risks</u></a>   </p>
</li>
</ul>
<p>  </p>
<p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> </a><a href="https://news.microsoft.com/podcasts/"><u>microsoft.com/podcasts</u></a>   </p>
<p> </p>
<p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em>  </p>]]>
      </content:encoded>
      <itunes:duration>2340</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e0bee1a8-578c-11f0-bfb4-43f085465aa2]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2876018560.mp3?updated=1751492604" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Securing Redirections with Mike Macelletti </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/56/notes</link>
      <description>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Mike Macelletti from Microsoft’s MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation designed to tackle a long-standing class of file path redirection vulnerabilities in Windows. Mike shares how his interest in security began, the journey behind developing Redirection Guard, and how it's helping reduce a once-common bug class across Microsoft products. He also explains how the feature works, why it's impactful, and what developers can do to adopt it. Plus, a few fun detours into Solitaire hacking, skiing, and protein powder. 

 

 In This Episode You Will Learn:  


  
What Redirection Guard is and how it helps prevent file system vulnerabilities 





  
How Microsoft identifies and addresses common bug classes across their ecosystem 





  
Why some vulnerabilities still slip past Redirection Guard and what’s out of scope 




 

Some Questions We Ask: 


  
What is a junction and how is it different from other redirects? 





  
How does Redirection Guard decide which shortcuts to block? 





  
Are there vulnerabilities Redirection Guard doesn’t cover? 




   

Resources:      

View Mike Macelletti on LinkedIn     

View Wendy Zenone on LinkedIn   

View Nic Fillingham on LinkedIn  

 

Related Microsoft Podcasts:   


  
Microsoft Threat Intelligence Podcast   





  
Afternoon Cyber Tea with Ann Johnson   





  
Uncovering Hidden Risks   




  

Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

 

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </description>
      <pubDate>Wed, 25 Jun 2025 07:05:00 -0000</pubDate>
      <itunes:title>Securing Redirections with Mike Macelletti </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Mike Macelletti from Microsoft’s MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation designed to tackle a long-standing class of file path redirection vulnerabilities in Windows. Mike shares how his interest in security began, the journey behind developing Redirection Guard, and how it's helping reduce a once-common bug class across Microsoft products. He also explains how the feature works, why it's impactful, and what developers can do to adopt it. Plus, a few fun detours into Solitaire hacking, skiing, and protein powder. 

 

 In This Episode You Will Learn:  


  
What Redirection Guard is and how it helps prevent file system vulnerabilities 





  
How Microsoft identifies and addresses common bug classes across their ecosystem 





  
Why some vulnerabilities still slip past Redirection Guard and what’s out of scope 




 

Some Questions We Ask: 


  
What is a junction and how is it different from other redirects? 





  
How does Redirection Guard decide which shortcuts to block? 





  
Are there vulnerabilities Redirection Guard doesn’t cover? 




   

Resources:      

View Mike Macelletti on LinkedIn     

View Wendy Zenone on LinkedIn   

View Nic Fillingham on LinkedIn  

 

Related Microsoft Podcasts:   


  
Microsoft Threat Intelligence Podcast   





  
Afternoon Cyber Tea with Ann Johnson   





  
Uncovering Hidden Risks   




  

Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

 

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, host <a href="https://www.linkedin.com/in/nicfill/"><u>Nic Fillingham</u></a> and <a href="https://www.linkedin.com/in/wendyzenone/"><u>Wendy Zenone</u></a> are joined by <a href="https://www.linkedin.com/in/michael-macelletti-390082a5/"><u>Mike Macelletti</u></a> from Microsoft’s MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation designed to tackle a long-standing class of file path redirection vulnerabilities in Windows. Mike shares how his interest in security began, the journey behind developing Redirection Guard, and how it's helping reduce a once-common bug class across Microsoft products. He also explains how the feature works, why it's impactful, and what developers can do to adopt it. Plus, a few fun detours into Solitaire hacking, skiing, and protein powder. </p>
<p> </p>
<p> In This Episode You Will Learn:  </p>
<ul>
  <li>
<p>What Redirection Guard is and how it helps prevent file system vulnerabilities </p>
</li>
</ul>
<ul>
  <li>
<p>How Microsoft identifies and addresses common bug classes across their ecosystem </p>
</li>
</ul>
<ul>
  <li>
<p>Why some vulnerabilities still slip past Redirection Guard and what’s out of scope </p>
</li>
</ul>
<p> </p>
<p>Some Questions We Ask: </p>
<ul>
  <li>
<p>What is a junction and how is it different from other redirects? </p>
</li>
</ul>
<ul>
  <li>
<p>How does Redirection Guard decide which shortcuts to block? </p>
</li>
</ul>
<ul>
  <li>
<p>Are there vulnerabilities Redirection Guard doesn’t cover? </p>
</li>
</ul>
<p>   </p>
<p>Resources:      </p>
<p><a href="https://www.linkedin.com/in/michael-macelletti-390082a5/"><u>View Mike Macelletti on LinkedIn</u></a>     </p>
<p><a href="https://www.linkedin.com/in/wendyzenone/"><u>View Wendy Zenone on LinkedIn</u></a>   </p>
<p><a href="https://www.linkedin.com/in/nicfill/"><u>View Nic Fillingham on LinkedIn</u></a>  </p>
<p> </p>
<p>Related Microsoft Podcasts:   </p>
<ul>
  <li>
<p><a href="https://msthreatintelpodcast.com/"><u>Microsoft Threat Intelligence Podcast</u></a>   </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://afternooncybertea.com/"><u>Afternoon Cyber Tea with Ann Johnson</u></a>   </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://uncoveringhiddenrisks.com/"><u>Uncovering Hidden Risks</u></a>   </p>
</li>
</ul>
<p>  </p>
<p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> </a><a href="https://news.microsoft.com/podcasts/"><u>microsoft.com/podcasts</u></a>   </p>
<p> </p>
<p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em>  </p>]]>
      </content:encoded>
      <itunes:duration>2522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[593a5898-4d41-11f0-85b7-93c069c7102d]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW7125545012.mp3?updated=1750451413" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ignore Ram Shankar Siva Kumar’s Previous Directions </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/55/notes</link>
      <description>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world case studies, including prompt injection, content safety violations, and memory poisoning in AI agents. Ram underscores the urgent need for robust red teaming practices to secure AI systems against traditional security flaws and emerging threats across images, text, audio, and autonomous agents. 

 

In This Episode You Will Learn:  


  
Why old-school security flaws still break modern AI systems 





  
Real-world AI red teaming in action, from scams to memory hacks 





  
How small input tweaks can fool AI across images, audio, and text 




Some Questions We Ask: 


  
Can attackers fool AI using just slight image changes? 





  
Are generative AI systems vulnerable to prompt manipulation? 





  
Do you need to be an expert to break an AI model? 




   

Resources:      

Watch Ram’s BlueHat India 2025 Keynote: BlueHat India 2025 Day 2 Keynote - Ram Shankar Siva Kumar 

Listen to Ram’s Previous Appearance on The BlueHat Podcast: Not with a Bug but with a Sticker 

 

View Ram Shankar Siva Kumar on LinkedIn    

View Wendy Zenone on LinkedIn   

View Nic Fillingham on LinkedIn  

 

Related Microsoft Podcasts:   


  
Microsoft Threat Intelligence Podcast   





  
Afternoon Cyber Tea with Ann Johnson   





  
Uncovering Hidden Risks   




  

Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

 

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </description>
      <pubDate>Wed, 11 Jun 2025 07:05:00 -0000</pubDate>
      <itunes:title>Ignore Ram Shankar Siva Kumar’s Previous Directions </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world case studies, including prompt injection, content safety violations, and memory poisoning in AI agents. Ram underscores the urgent need for robust red teaming practices to secure AI systems against traditional security flaws and emerging threats across images, text, audio, and autonomous agents. 

 

In This Episode You Will Learn:  


  
Why old-school security flaws still break modern AI systems 





  
Real-world AI red teaming in action, from scams to memory hacks 





  
How small input tweaks can fool AI across images, audio, and text 




Some Questions We Ask: 


  
Can attackers fool AI using just slight image changes? 





  
Are generative AI systems vulnerable to prompt manipulation? 





  
Do you need to be an expert to break an AI model? 




   

Resources:      

Watch Ram’s BlueHat India 2025 Keynote: BlueHat India 2025 Day 2 Keynote - Ram Shankar Siva Kumar 

Listen to Ram’s Previous Appearance on The BlueHat Podcast: Not with a Bug but with a Sticker 

 

View Ram Shankar Siva Kumar on LinkedIn    

View Wendy Zenone on LinkedIn   

View Nic Fillingham on LinkedIn  

 

Related Microsoft Podcasts:   


  
Microsoft Threat Intelligence Podcast   





  
Afternoon Cyber Tea with Ann Johnson   





  
Uncovering Hidden Risks   




  

Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

 

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, host <a href="https://www.linkedin.com/in/nicfill/"><u>Nic Fillingham</u></a> and <a href="https://www.linkedin.com/in/wendyzenone/"><u>Wendy Zenone</u></a> share <a href="https://www.linkedin.com/in/rssk/?utm_source=chatgpt.com"><u>Ram Shankar Siva Kumar’s</u></a> dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world case studies, including prompt injection, content safety violations, and memory poisoning in AI agents. Ram underscores the urgent need for robust red teaming practices to secure AI systems against traditional security flaws and emerging threats across images, text, audio, and autonomous agents. </p>
<p> </p>
<p>In This Episode You Will Learn:  </p>
<ul>
  <li>
<p>Why old-school security flaws still break modern AI systems </p>
</li>
</ul>
<ul>
  <li>
<p>Real-world AI red teaming in action, from scams to memory hacks </p>
</li>
</ul>
<ul>
  <li>
<p>How small input tweaks can fool AI across images, audio, and text </p>
</li>
</ul>
<p>Some Questions We Ask: </p>
<ul>
  <li>
<p>Can attackers fool AI using just slight image changes? </p>
</li>
</ul>
<ul>
  <li>
<p>Are generative AI systems vulnerable to prompt manipulation? </p>
</li>
</ul>
<ul>
  <li>
<p>Do you need to be an expert to break an AI model? </p>
</li>
</ul>
<p>   </p>
<p>Resources:      </p>
<p>Watch Ram’s BlueHat India 2025 Keynote: <a href="https://www.youtube.com/watch?v=SalQD4Kio0U"><u>BlueHat India 2025 Day 2 Keynote - Ram Shankar Siva Kumar</u></a> </p>
<p>Listen to Ram’s Previous Appearance on The BlueHat Podcast: <a href="https://thecyberwire.com/podcasts/the-bluehat-podcast/10/notes"><u>Not with a Bug but with a Sticker</u></a> </p>
<p> </p>
<p><a href="https://www.linkedin.com/in/rssk/?utm_source=chatgpt.com"><u>View Ram Shankar Siva Kumar on LinkedIn</u></a>    </p>
<p><a href="https://www.linkedin.com/in/wendyzenone/"><u>View Wendy Zenone on LinkedIn</u></a>   </p>
<p><a href="https://www.linkedin.com/in/nicfill/"><u>View Nic Fillingham on LinkedIn</u></a>  </p>
<p> </p>
<p>Related Microsoft Podcasts:   </p>
<ul>
  <li>
<p><a href="https://msthreatintelpodcast.com/"><u>Microsoft Threat Intelligence Podcast</u></a>   </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://afternooncybertea.com/"><u>Afternoon Cyber Tea with Ann Johnson</u></a>   </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://uncoveringhiddenrisks.com/"><u>Uncovering Hidden Risks</u></a>   </p>
</li>
</ul>
<p>  </p>
<p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> </a><a href="https://news.microsoft.com/podcasts/"><u>microsoft.com/podcasts</u></a>   </p>
<p> </p>
<p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em>  </p>]]>
      </content:encoded>
      <itunes:duration>2394</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[af91a4e8-419e-11f0-998e-f715d34c3bb3]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1396378627.mp3?updated=1750451468" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Protecting AI at the Edge with David Weston </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/54/notes</link>
      <description>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-powered malware. He also shares insights on innovations like Windows Recall, biometric protection, and the future of secure, agentic operating systems. 



  

In This Episode You Will Learn:  


  
How AI integration in Windows (like Windows Recall and MS Paint) is evolving 





  
Emerging threats from protocols like MCP and CUAs 





  
What a “confused deputy” attack is, and how Microsoft is protecting users 




Some Questions We Ask: 


  
What are the biggest security threats in on-device AI—data, model, or runtime? 





  
Can AI be used to accelerate post-compromise attacks? 





  
What will it take to bring Azure-level confidential computing to the consumer device? 




   

Resources:      

View David Weston on LinkedIn   

View Wendy Zenone on LinkedIn   

View Nic Fillingham on LinkedIn  

 

  

Related Microsoft Podcasts:   


  
Microsoft Threat Intelligence Podcast   





  
Afternoon Cyber Tea with Ann Johnson   





  
Uncovering Hidden Risks   




  

Discover and follow other Microsoft podcasts at microsoft.com/podcasts   



The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </description>
      <pubDate>Wed, 28 May 2025 07:05:00 -0000</pubDate>
      <itunes:title>Protecting AI at the Edge with David Weston </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-powered malware. He also shares insights on innovations like Windows Recall, biometric protection, and the future of secure, agentic operating systems. 



  

In This Episode You Will Learn:  


  
How AI integration in Windows (like Windows Recall and MS Paint) is evolving 





  
Emerging threats from protocols like MCP and CUAs 





  
What a “confused deputy” attack is, and how Microsoft is protecting users 




Some Questions We Ask: 


  
What are the biggest security threats in on-device AI—data, model, or runtime? 





  
Can AI be used to accelerate post-compromise attacks? 





  
What will it take to bring Azure-level confidential computing to the consumer device? 




   

Resources:      

View David Weston on LinkedIn   

View Wendy Zenone on LinkedIn   

View Nic Fillingham on LinkedIn  

 

  

Related Microsoft Podcasts:   


  
Microsoft Threat Intelligence Podcast   





  
Afternoon Cyber Tea with Ann Johnson   





  
Uncovering Hidden Risks   




  

Discover and follow other Microsoft podcasts at microsoft.com/podcasts   



The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, host <a href="https://www.linkedin.com/in/nicfill/"><u>Nic Fillingham</u></a> and <a href="https://www.linkedin.com/in/wendyzenone/"><u>Wendy Zenone</u></a> share <a href="https://www.linkedin.com/in/dwizzzle/"><u>David Weston’s</u></a> keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-powered malware. He also shares insights on innovations like Windows Recall, biometric protection, and the future of secure, agentic operating systems. </p>
<p><br></p>
<p>  </p>
<p>In This Episode You Will Learn:  </p>
<ul>
  <li>
<p>How AI integration in Windows (like Windows Recall and MS Paint) is evolving </p>
</li>
</ul>
<ul>
  <li>
<p>Emerging threats from protocols like MCP and CUAs </p>
</li>
</ul>
<ul>
  <li>
<p>What a “confused deputy” attack is, and how Microsoft is protecting users </p>
</li>
</ul>
<p>Some Questions We Ask: </p>
<ul>
  <li>
<p>What are the biggest security threats in on-device AI—data, model, or runtime? </p>
</li>
</ul>
<ul>
  <li>
<p>Can AI be used to accelerate post-compromise attacks? </p>
</li>
</ul>
<ul>
  <li>
<p>What will it take to bring Azure-level confidential computing to the consumer device? </p>
</li>
</ul>
<p>   </p>
<p>Resources:      </p>
<p><a href="https://www.linkedin.com/in/dwizzzle/"><u>View David Weston on LinkedIn</u></a>   </p>
<p><a href="https://www.linkedin.com/in/wendyzenone/"><u>View Wendy Zenone on LinkedIn</u></a>   </p>
<p><a href="https://www.linkedin.com/in/nicfill/"><u>View Nic Fillingham on LinkedIn</u></a>  </p>
<p> </p>
<p>  </p>
<p>Related Microsoft Podcasts:   </p>
<ul>
  <li>
<p><a href="https://msthreatintelpodcast.com/"><u>Microsoft Threat Intelligence Podcast</u></a>   </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://afternooncybertea.com/"><u>Afternoon Cyber Tea with Ann Johnson</u></a>   </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://uncoveringhiddenrisks.com/"><u>Uncovering Hidden Risks</u></a>   </p>
</li>
</ul>
<p>  </p>
<p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> </a><a href="https://news.microsoft.com/podcasts/"><u>microsoft.com/podcasts</u></a>   </p>
<p><br></p>
<p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em>  </p>]]>
      </content:encoded>
      <itunes:duration>2355</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[87406276-3d54-11ef-ab80-23a9dd2b408a]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2020212659.mp3?updated=1748028518" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking at the Weeds with Felix Boulet </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/53/notes</link>
      <description>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Felix Boulet fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to becoming a full-time vulnerability researcher, and how that background fuels his passion for hacking and bug bounty work. He explains his method for finding bugs in Microsoft products—particularly in identity systems—and why identity is such a valuable target for attackers. Felix also shares highlights from the Zero Day Quest event, where he focused on building connections, learning from Microsoft engineers, and experiencing the collaborative side of the security community. 

  

In This Episode You Will Learn:  


  
Why identity-based bugs are especially valuable and dangerous in the security world 





  
When breaking identity controls can be the key to pivoting through an entire system 





  
How SharePoint's concept of "virtual files" impacts vulnerability validation 






Some Questions We Ask: 


  
What was your first bug bounty experience? 





  
Can you explain what the flash challenges were and what your experience was like? 





  
Do you think sharing bug ideas could cost you a bounty? 




   

Resources:      

View Felix Boulet on LinkedIn  

View Wendy Zenone on LinkedIn   

View Nic Fillingham on LinkedIn  

 

Related Microsoft Podcasts:   


  
Microsoft Threat Intelligence Podcast   





  
Afternoon Cyber Tea with Ann Johnson   





  
Uncovering Hidden Risks   




  

Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

 

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </description>
      <pubDate>Wed, 14 May 2025 07:05:00 -0000</pubDate>
      <itunes:title>Hacking at the Weeds with Felix Boulet </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Felix Boulet fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to becoming a full-time vulnerability researcher, and how that background fuels his passion for hacking and bug bounty work. He explains his method for finding bugs in Microsoft products—particularly in identity systems—and why identity is such a valuable target for attackers. Felix also shares highlights from the Zero Day Quest event, where he focused on building connections, learning from Microsoft engineers, and experiencing the collaborative side of the security community. 

  

In This Episode You Will Learn:  


  
Why identity-based bugs are especially valuable and dangerous in the security world 





  
When breaking identity controls can be the key to pivoting through an entire system 





  
How SharePoint's concept of "virtual files" impacts vulnerability validation 






Some Questions We Ask: 


  
What was your first bug bounty experience? 





  
Can you explain what the flash challenges were and what your experience was like? 





  
Do you think sharing bug ideas could cost you a bounty? 




   

Resources:      

View Felix Boulet on LinkedIn  

View Wendy Zenone on LinkedIn   

View Nic Fillingham on LinkedIn  

 

Related Microsoft Podcasts:   


  
Microsoft Threat Intelligence Podcast   





  
Afternoon Cyber Tea with Ann Johnson   





  
Uncovering Hidden Risks   




  

Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

 

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, host <a href="https://www.linkedin.com/in/nicfill/"><u>Nic Fillingham</u></a> and <a href="https://www.linkedin.com/in/wendyzenone/"><u>Wendy Zenone</u></a> are joined by <a href="https://www.linkedin.com/in/felix-boulet/?originalSubdomain=ca"><u>Felix Boulet</u></a> fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to becoming a full-time vulnerability researcher, and how that background fuels his passion for hacking and bug bounty work. He explains his method for finding bugs in Microsoft products—particularly in identity systems—and why identity is such a valuable target for attackers. Felix also shares highlights from the Zero Day Quest event, where he focused on building connections, learning from Microsoft engineers, and experiencing the collaborative side of the security community. </p>
<p>  </p>
<p>In This Episode You Will Learn:  </p>
<ul>
  <li>
<p>Why identity-based bugs are especially valuable and dangerous in the security world </p>
</li>
</ul>
<ul>
  <li>
<p>When breaking identity controls can be the key to pivoting through an entire system </p>
</li>
</ul>
<ul>
  <li>
<p>How SharePoint's concept of "virtual files" impacts vulnerability validation </p>
</li>
</ul>
<p><br></p>
<p>Some Questions We Ask: </p>
<ul>
  <li>
<p>What was your first bug bounty experience? </p>
</li>
</ul>
<ul>
  <li>
<p>Can you explain what the flash challenges were and what your experience was like? </p>
</li>
</ul>
<ul>
  <li>
<p>Do you think sharing bug ideas could cost you a bounty? </p>
</li>
</ul>
<p>   </p>
<p>Resources:      </p>
<p><a href="https://www.linkedin.com/in/felix-boulet/?originalSubdomain=ca"><u>View Felix Boulet on LinkedIn</u></a>  </p>
<p><a href="https://www.linkedin.com/in/wendyzenone/"><u>View Wendy Zenone on LinkedIn</u></a>   </p>
<p><a href="https://www.linkedin.com/in/nicfill/"><u>View Nic Fillingham on LinkedIn</u></a>  </p>
<p> </p>
<p>Related Microsoft Podcasts:   </p>
<ul>
  <li>
<p><a href="https://msthreatintelpodcast.com/"><u>Microsoft Threat Intelligence Podcast</u></a>   </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://afternooncybertea.com/"><u>Afternoon Cyber Tea with Ann Johnson</u></a>   </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://uncoveringhiddenrisks.com/"><u>Uncovering Hidden Risks</u></a>   </p>
</li>
</ul>
<p>  </p>
<p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> </a><a href="https://news.microsoft.com/podcasts/"><u>microsoft.com/podcasts</u></a>   </p>
<p> </p>
<p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em>  </p>]]>
      </content:encoded>
      <itunes:duration>1999</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f1278c4c-2c4f-11f0-affe-f3c60e3cb235]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6667800288.mp3?updated=1746741732" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Evolutions in Hacking with Marco Ivaldi </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/52/notes</link>
      <description>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With nearly three decades of experience in cybersecurity, Marco digs into the ongoing challenges, particularly in Active Directory and password security, highlighting vulnerabilities that continue to pose significant risks today. He recounts his unexpected path into bug bounty hunting, including his involvement in Microsoft's Zero Day Quest and his passion for auditing real-time operating systems like Azure RTOS. 


In This Episode You Will Learn: 


How Marco taught himself BASIC and assembly through cassette tapes and trips to local libraries

Why mentorship and positive leadership can catapult your cybersecurity career

When measuring network response times can unintentionally leak valuable info


Some Questions We Ask:


Do you remember the first time you made code do something unexpected?

What was your experience like in the Zero Day Quest building for those three days?

How are you thinking of approaching fuzzing after Zero Day Quest?

  
 
Resources:     
View Marco Ivaldi on LinkedIn   
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 

HN SECURITY
Learn More About Marco
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  


The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </description>
      <pubDate>Wed, 30 Apr 2025 07:05:00 -0000</pubDate>
      <itunes:title>Evolutions in Hacking with Marco Ivaldi </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With nearly three decades of experience in cybersecurity, Marco digs into the ongoing challenges, particularly in Active Directory and password security, highlighting vulnerabilities that continue to pose significant risks today. He recounts his unexpected path into bug bounty hunting, including his involvement in Microsoft's Zero Day Quest and his passion for auditing real-time operating systems like Azure RTOS. 


In This Episode You Will Learn: 


How Marco taught himself BASIC and assembly through cassette tapes and trips to local libraries

Why mentorship and positive leadership can catapult your cybersecurity career

When measuring network response times can unintentionally leak valuable info


Some Questions We Ask:


Do you remember the first time you made code do something unexpected?

What was your experience like in the Zero Day Quest building for those three days?

How are you thinking of approaching fuzzing after Zero Day Quest?

  
 
Resources:     
View Marco Ivaldi on LinkedIn   
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 

HN SECURITY
Learn More About Marco
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  


The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, host <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/wendyzenone/">Wendy Zenone</a> are joined by <a href="https://www.linkedin.com/in/raptor/?originalSubdomain=it">Marco Ivaldi</a>, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With nearly three decades of experience in cybersecurity, Marco digs into the ongoing challenges, particularly in Active Directory and password security, highlighting vulnerabilities that continue to pose significant risks today. He recounts his unexpected path into bug bounty hunting, including his involvement in Microsoft's Zero Day Quest and his passion for auditing real-time operating systems like Azure RTOS. </p><p><br></p><p><br></p><p><strong>In This Episode You Will Learn</strong>: </p><p><br></p><ul>
<li>How Marco taught himself BASIC and assembly through cassette tapes and trips to local libraries</li>
<li>Why mentorship and positive leadership can catapult your cybersecurity career</li>
<li>When measuring network response times can unintentionally leak valuable info</li>
</ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><p><br></p><ul>
<li>Do you remember the first time you made code do something unexpected?</li>
<li>What was your experience like in the Zero Day Quest building for those three days?</li>
<li>How are you thinking of approaching fuzzing after Zero Day Quest?</li>
</ul><p>  </p><p> </p><p><strong>Resources:</strong>     </p><p><a href="https://www.linkedin.com/in/raptor/?originalSubdomain=it">View Marco Ivaldi on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><br></p><p><a href="https://security.humanativaspa.it/">HN SECURITY</a></p><p><a href="https://0xdeadbeef.info/">Learn More About Marco</a></p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> </a><a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a>  </p><p><br></p><p><br></p><p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em> </p>]]>
      </content:encoded>
      <itunes:duration>2960</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[93934cc0-214f-11f0-bcdf-5ffc02e480db]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2455844330.mp3?updated=1745870992" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From Facebook-phished to MVR Top 5 with Dhiral Patel </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/51/notes</link>
      <description>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Dhiral Patel, Senior Security Engineer at ZoomInfo and one of MSRC’s Most Valuable Researchers (MVR). Dhiral shares how a hacked Facebook account sparked his passion for ethical hacking. From web development to penetration testing, Dhiral has become a top bug hunter, landing multiple spots on the MSRC leaderboards. Dhiral reflects on his early MSRC submissions and lessons learned. He also discusses the importance of mastering web security basics, practicing on platforms like TryHackMe and Hack the Box, and staying connected with the bug bounty community. 


In This Episode You Will Learn: 


The importance of mastering web security basics before diving into bug bounty hunting

Why hands-on platforms like TryHackMe and Hack the Box are perfect for beginners

Dhiral’s journey from blogging to freelancing and security research


Some Questions We Ask:


How do you balance competition and collaboration in the bug bounty community?

Can you explain what clickjacking is and if it still works today?

Why did you start with Power BI, and how did it lead to your journey in security?

  

Resources:     
View Dhiral Patel on LinkedIn  
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  


Discover and follow other Microsoft podcasts at microsoft.com/podcasts  


The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </description>
      <pubDate>Wed, 16 Apr 2025 07:05:00 -0000</pubDate>
      <itunes:title>From Facebook-phished to MVR Top 5 with Dhiral Patel </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Dhiral Patel, Senior Security Engineer at ZoomInfo and one of MSRC’s Most Valuable Researchers (MVR). Dhiral shares how a hacked Facebook account sparked his passion for ethical hacking. From web development to penetration testing, Dhiral has become a top bug hunter, landing multiple spots on the MSRC leaderboards. Dhiral reflects on his early MSRC submissions and lessons learned. He also discusses the importance of mastering web security basics, practicing on platforms like TryHackMe and Hack the Box, and staying connected with the bug bounty community. 


In This Episode You Will Learn: 


The importance of mastering web security basics before diving into bug bounty hunting

Why hands-on platforms like TryHackMe and Hack the Box are perfect for beginners

Dhiral’s journey from blogging to freelancing and security research


Some Questions We Ask:


How do you balance competition and collaboration in the bug bounty community?

Can you explain what clickjacking is and if it still works today?

Why did you start with Power BI, and how did it lead to your journey in security?

  

Resources:     
View Dhiral Patel on LinkedIn  
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  


Discover and follow other Microsoft podcasts at microsoft.com/podcasts  


The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, host <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/wendyzenone/">Wendy Zenone</a> are joined by <a href="https://www.linkedin.com/in/dhiral1994/">Dhiral Patel</a>, Senior Security Engineer at ZoomInfo and one of MSRC’s Most Valuable Researchers (MVR). Dhiral shares how a hacked Facebook account sparked his passion for ethical hacking. From web development to penetration testing, Dhiral has become a top bug hunter, landing multiple spots on the MSRC leaderboards. Dhiral reflects on his early MSRC submissions and lessons learned. He also discusses the importance of mastering web security basics, practicing on platforms like TryHackMe and Hack the Box, and staying connected with the bug bounty community. </p><p><br></p><p><br></p><p><strong>In This Episode You Will Learn</strong>: </p><p><br></p><ul>
<li>The importance of mastering web security basics before diving into bug bounty hunting</li>
<li>Why hands-on platforms like TryHackMe and Hack the Box are perfect for beginners</li>
<li>Dhiral’s journey from blogging to freelancing and security research</li>
</ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><p><br></p><ul>
<li>How do you balance competition and collaboration in the bug bounty community?</li>
<li>Can you explain what clickjacking is and if it still works today?</li>
<li>Why did you start with Power BI, and how did it lead to your journey in security?</li>
</ul><p>  </p><p><br></p><p><strong>Resources:</strong>     </p><p><a href="https://www.linkedin.com/in/dhiral1994/">View Dhiral Patel on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p><br></p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><p><br></p><p><br></p><p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em> </p>]]>
      </content:encoded>
      <itunes:duration>2505</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b38a8340-1669-11f0-a63d-ef0ae6360ff9]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2285235481.mp3?updated=1745871365" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI &amp; the Hunt for Hidden Vulnerabilities with Tobias Diehl</title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/50/notes</link>
      <description>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by security researcher Tobias Diehl, a top contributor to the Microsoft Security Research Center (MSRC) leaderboards and a Most Valuable Researcher. Tobias shares his journey from IT support to uncovering vulnerabilities in Microsoft products. He discusses his participation in the upcoming Zero Day Quest hacking challenge and breaks down a recent discovery involving Power Automate, where he identified a security flaw that could be exploited via malicious URLs. Tobias explains how developers can mitigate such risks and the importance of strong proof-of-concept submissions in security research. 


In This Episode You Will Learn: 


Researching vulnerabilities in Power Automate, Power Automate Desktop, and Azure

The importance of user prompts to prevent unintended application behavior

Key vulnerabilities Tobias looks for when researching Microsoft products


Some Questions We Ask:


Have you submitted any AI-related findings to Microsoft or other bug bounty programs?

How does the lack of visibility into AI models impact the research process?

Has your approach to security research changed when working with AI versus traditional systems?

  
Resources:     
View Tobias Diehl on LinkedIn   
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 


Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  



Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </description>
      <pubDate>Wed, 02 Apr 2025 07:10:00 -0000</pubDate>
      <itunes:title>AI &amp; the Hunt for Hidden Vulnerabilities with Tobias Diehl</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by security researcher Tobias Diehl, a top contributor to the Microsoft Security Research Center (MSRC) leaderboards and a Most Valuable Researcher. Tobias shares his journey from IT support to uncovering vulnerabilities in Microsoft products. He discusses his participation in the upcoming Zero Day Quest hacking challenge and breaks down a recent discovery involving Power Automate, where he identified a security flaw that could be exploited via malicious URLs. Tobias explains how developers can mitigate such risks and the importance of strong proof-of-concept submissions in security research. 


In This Episode You Will Learn: 


Researching vulnerabilities in Power Automate, Power Automate Desktop, and Azure

The importance of user prompts to prevent unintended application behavior

Key vulnerabilities Tobias looks for when researching Microsoft products


Some Questions We Ask:


Have you submitted any AI-related findings to Microsoft or other bug bounty programs?

How does the lack of visibility into AI models impact the research process?

Has your approach to security research changed when working with AI versus traditional systems?

  
Resources:     
View Tobias Diehl on LinkedIn   
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 


Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  



Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, host <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/wendyzenone/">Wendy Zenone</a> are joined by security researcher <a href="https://www.linkedin.com/in/tobias-diehl-19ba901b5/">Tobias Diehl</a>, a top contributor to the Microsoft Security Research Center (MSRC) leaderboards and a Most Valuable Researcher. Tobias shares his journey from IT support to uncovering vulnerabilities in Microsoft products. He discusses his participation in the upcoming Zero Day Quest hacking challenge and breaks down a recent discovery involving Power Automate, where he identified a security flaw that could be exploited via malicious URLs. Tobias explains how developers can mitigate such risks and the importance of strong proof-of-concept submissions in security research. </p><p><br></p><p><br></p><p><strong>In This Episode You Will Learn</strong>: </p><p><br></p><ul>
<li>Researching vulnerabilities in Power Automate, Power Automate Desktop, and Azure</li>
<li>The importance of user prompts to prevent unintended application behavior</li>
<li>Key vulnerabilities Tobias looks for when researching Microsoft products</li>
</ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><p><br></p><ul>
<li>Have you submitted any AI-related findings to Microsoft or other bug bounty programs?</li>
<li>How does the lack of visibility into AI models impact the research process?</li>
<li>Has your approach to security research changed when working with AI versus traditional systems?</li>
</ul><p>  </p><p><strong>Resources:</strong>     </p><p><a href="https://www.linkedin.com/in/tobias-diehl-19ba901b5/">View Tobias Diehl on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><br></p><p><br></p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p><br></p><p><br></p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><p><br></p><p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em> </p>]]>
      </content:encoded>
      <itunes:duration>2125</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[326cf526-0c33-11f0-82e4-7ba5a385cc6a]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW9490539181.mp3?updated=1743539382" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bug Hunting from the Beach with Brad Schlintz </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/49/notes</link>
      <description>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Brad Schlintz, independent security researcher and bug bounty hunter. Brad shares how he transitioned from a decade-long career as a software engineer to hacking Microsoft products while traveling the world with his wife. He recounts his early days tinkering with RuneScape bots, his experience working in SharePoint and Azure at Microsoft, and the moment he first encountered a real-world cybersecurity incident. He also discusses his journey into ethical hacking and his qualification for the upcoming Zero Day Quest, showcasing how he turned bug hunting into a lifestyle that allows him to work from anywhere—including a stunning island in Brazil. 
 
 
In This Episode You Will Learn:  
 

How a single discovered bug can lead to finding multiple vulnerabilities in the same area 

The importance of exploring app integrations when searching for security vulnerabilities 

Why building on prior discoveries can make it easier to uncover more hidden security issues 

 
Some Questions We Ask: 
 

What guidance can you share with other researchers and hackers on how to find vulnerabilities? 

Why did your background in software engineering help you in your bug bounty work? 

How did you transition from working on the website incident to more full-time security research? 

   
Resources:      
View Brad Schlintz on LinkedIn    
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
  
Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   
 
The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </description>
      <pubDate>Wed, 19 Mar 2025 07:10:00 -0000</pubDate>
      <itunes:title>Bug Hunting from the Beach with Brad Schlintz </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Brad Schlintz, independent security researcher and bug bounty hunter. Brad shares how he transitioned from a decade-long career as a software engineer to hacking Microsoft products while traveling the world with his wife. He recounts his early days tinkering with RuneScape bots, his experience working in SharePoint and Azure at Microsoft, and the moment he first encountered a real-world cybersecurity incident. He also discusses his journey into ethical hacking and his qualification for the upcoming Zero Day Quest, showcasing how he turned bug hunting into a lifestyle that allows him to work from anywhere—including a stunning island in Brazil. 
 
 
In This Episode You Will Learn:  
 

How a single discovered bug can lead to finding multiple vulnerabilities in the same area 

The importance of exploring app integrations when searching for security vulnerabilities 

Why building on prior discoveries can make it easier to uncover more hidden security issues 

 
Some Questions We Ask: 
 

What guidance can you share with other researchers and hackers on how to find vulnerabilities? 

Why did your background in software engineering help you in your bug bounty work? 

How did you transition from working on the website incident to more full-time security research? 

   
Resources:      
View Brad Schlintz on LinkedIn    
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
  
Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   
 
The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, host <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/wendyzenone/">Wendy Zenone</a> are joined by <a href="https://www.linkedin.com/in/bschlintz/">Brad Schlintz</a>, independent security researcher and bug bounty hunter. Brad shares how he transitioned from a decade-long career as a software engineer to hacking Microsoft products while traveling the world with his wife. He recounts his early days tinkering with RuneScape bots, his experience working in SharePoint and Azure at Microsoft, and the moment he first encountered a real-world cybersecurity incident. He also discusses his journey into ethical hacking and his qualification for the upcoming Zero Day Quest, showcasing how he turned bug hunting into a lifestyle that allows him to work from anywhere—including a stunning island in Brazil. </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:  </p><p> </p><ul>
<li>How a single discovered bug can lead to finding multiple vulnerabilities in the same area </li>
<li>The importance of exploring app integrations when searching for security vulnerabilities </li>
<li>Why building on prior discoveries can make it easier to uncover more hidden security issues </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><p> </p><ul>
<li>What guidance can you share with other researchers and hackers on how to find vulnerabilities? </li>
<li>Why did your background in software engineering help you in your bug bounty work? </li>
<li>How did you transition from working on the website incident to more full-time security research? </li>
</ul><p>   </p><p><strong>Resources:</strong>      </p><p><a href="https://www.linkedin.com/in/bschlintz/">View Brad Schlintz on LinkedIn</a>  <a href="https://www.linkedin.com/in/joe-bialek-21118626/"> </a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a>  </p><p>  </p><p><strong>Related Microsoft Podcasts:</strong>   </p><p>  </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>   </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>   </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>   </li>
</ul><p>  </p><p>  </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>   </p><p> </p><p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em>  </p>]]>
      </content:encoded>
      <itunes:duration>2323</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[58055a00-006f-11f0-af5b-73a7729afcfc]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2541393118.mp3?updated=1741972063" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PoCs, Patching and Zero Day Quest Participation with Michael Gorelik </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/48/notes</link>
      <description>In this episode of The BlueHat Podcast, Nic and Wendy are joined by seasoned security researcher, and CTO of Morphisec, Michael Gorelik. Michael discusses his approach to security research, which often begins by exploring PoCs released by other researcher groups and continues through to the release and validation of – sometimes multiple rounds of – fixes. Michael also provides an overview of this BlueHat 2024 presentation from last October and discusses his upcoming participation in the Zero Day Quest Onsite Hacking Challenge. 
 
 
In This Episode You Will Learn:  
 

How Michael Gorelik transitioned from security researcher to company founder 

Deeper motivations driving ethical hackers like Michael Gorelik beyond money 

The importance of identifying incomplete security patches before attackers do 

 
Some Questions We Ask: 
 

What are you looking forward to with Zero Day Quest? 

Did you have a moral dilemma about hacking when you were younger? 

What was your experience like at Deutsche Telekom Laboratories? 

   
Resources:      
View Michael Gorelik on LinkedIn   
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
  
Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

﻿The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </description>
      <pubDate>Wed, 05 Mar 2025 08:10:00 -0000</pubDate>
      <itunes:title>PoCs, Patching and Zero Day Quest Participation with Michael Gorelik </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this episode of The BlueHat Podcast, Nic and Wendy are joined by seasoned security researcher, and CTO of Morphisec, Michael Gorelik. Michael discusses his approach to security research, which often begins by exploring PoCs released by other researcher groups and continues through to the release and validation of – sometimes multiple rounds of – fixes. Michael also provides an overview of this BlueHat 2024 presentation from last October and discusses his upcoming participation in the Zero Day Quest Onsite Hacking Challenge. 
 
 
In This Episode You Will Learn:  
 

How Michael Gorelik transitioned from security researcher to company founder 

Deeper motivations driving ethical hackers like Michael Gorelik beyond money 

The importance of identifying incomplete security patches before attackers do 

 
Some Questions We Ask: 
 

What are you looking forward to with Zero Day Quest? 

Did you have a moral dilemma about hacking when you were younger? 

What was your experience like at Deutsche Telekom Laboratories? 

   
Resources:      
View Michael Gorelik on LinkedIn   
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
  
Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

﻿The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, <a href="https://www.linkedin.com/in/nicfill/">Nic</a> and <a href="https://www.linkedin.com/in/wendyzenone/">Wendy</a> are joined by seasoned security researcher, and CTO of Morphisec, Michael Gorelik. Michael discusses his approach to security research, which often begins by exploring PoCs released by other researcher groups and continues through to the release and validation of – sometimes multiple rounds of – fixes. Michael also provides an overview of this BlueHat 2024 presentation from last October and discusses his upcoming participation in the Zero Day Quest Onsite Hacking Challenge. </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:  </p><p> </p><ul>
<li>How Michael Gorelik transitioned from security researcher to company founder </li>
<li>Deeper motivations driving ethical hackers like Michael Gorelik beyond money </li>
<li>The importance of identifying incomplete security patches before attackers do </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><p> </p><ul>
<li>What are you looking forward to with Zero Day Quest? </li>
<li>Did you have a moral dilemma about hacking when you were younger? </li>
<li>What was your experience like at Deutsche Telekom Laboratories? </li>
</ul><p>   </p><p><strong>Resources:</strong>      </p><p><a href="https://www.linkedin.com/in/smgoreli/">View Michael Gorelik on LinkedIn</a> <a href="https://www.linkedin.com/in/joe-bialek-21118626/"> </a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a>  </p><p>  </p><p><strong>Related Microsoft Podcasts:</strong>   </p><p>  </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>   </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>   </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>   </li>
</ul><p>  </p><p>  </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>   </p><p><br></p><p><em>﻿The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em> </p>]]>
      </content:encoded>
      <itunes:duration>2785</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8727e76e-3d54-11ef-ab80-efa3ade17628]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6262294522.mp3?updated=1741036115" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Secret Herbs, Spices and Hacking Copilot Studio </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/47/notes</link>
      <description>In this episode of The BlueHat Podcast, host Nic Fillingham is joined by Scott Gorlick, Security Architect for Power Platform at Microsoft. Scott shares his unconventional journey into cybersecurity, from managing a KFC to driving big rigs before landing in tech. He dives into security research in Copilot Studio, discussing how AI models interact with security frameworks and how researchers can approach testing these systems. We also explore his recent training video on YouTube, which provides guidance for security researchers looking to engage with Microsoft’s bug bounty program. 
 

In This Episode You Will Learn:  
 

What Scott does to ensure Power Platform applications remain governable and secure 

Why security and software quality go hand in hand in modern development. 

How security researchers can explore vulnerabilities in Microsoft's low-code AI development platform 

 
Some Questions We Ask: 
 

What kinds of security issues should researchers focus on in Copilot Studio? 

Can Copilot help researchers write better reports, especially in different languages? 

How can researchers get access to Copilot Studio? Is there a free version? 

   
  
Resources:      
View Scott Gorlick on LinkedIn   
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
 
Security Research in Copilot Studio Overview and Training on YouTube 
 

Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   </description>
      <pubDate>Wed, 19 Feb 2025 08:10:00 -0000</pubDate>
      <itunes:title>Secret Herbs, Spices and Hacking Copilot Studio </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this episode of The BlueHat Podcast, host Nic Fillingham is joined by Scott Gorlick, Security Architect for Power Platform at Microsoft. Scott shares his unconventional journey into cybersecurity, from managing a KFC to driving big rigs before landing in tech. He dives into security research in Copilot Studio, discussing how AI models interact with security frameworks and how researchers can approach testing these systems. We also explore his recent training video on YouTube, which provides guidance for security researchers looking to engage with Microsoft’s bug bounty program. 
 

In This Episode You Will Learn:  
 

What Scott does to ensure Power Platform applications remain governable and secure 

Why security and software quality go hand in hand in modern development. 

How security researchers can explore vulnerabilities in Microsoft's low-code AI development platform 

 
Some Questions We Ask: 
 

What kinds of security issues should researchers focus on in Copilot Studio? 

Can Copilot help researchers write better reports, especially in different languages? 

How can researchers get access to Copilot Studio? Is there a free version? 

   
  
Resources:      
View Scott Gorlick on LinkedIn   
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
 
Security Research in Copilot Studio Overview and Training on YouTube 
 

Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, host <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> is joined by <a href="https://www.linkedin.com/in/chowned/">Scott Gorlick</a>, Security Architect for Power Platform at Microsoft. Scott shares his unconventional journey into cybersecurity, from managing a KFC to driving big rigs before landing in tech. He dives into security research in Copilot Studio, discussing how AI models interact with security frameworks and how researchers can approach testing these systems. We also explore his <a href="https://youtu.be/0Bw2YCDypUY">recent training video on YouTube</a>, which provides guidance for security researchers looking to engage with Microsoft’s bug bounty program. </p><p> </p><p><br></p><p><strong>In This Episode You Will Learn</strong>:  </p><p> </p><ul>
<li>What Scott does to ensure Power Platform applications remain governable and secure </li>
<li>Why security and software quality go hand in hand in modern development. </li>
<li>How security researchers can explore vulnerabilities in Microsoft's low-code AI development platform </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><p> </p><ul>
<li>What kinds of security issues should researchers focus on in Copilot Studio? </li>
<li>Can Copilot help researchers write better reports, especially in different languages? </li>
<li>How can researchers get access to Copilot Studio? Is there a free version? </li>
</ul><p>   </p><p>  </p><p><strong>Resources:</strong>      </p><p><a href="https://www.linkedin.com/in/chowned/">View Scott Gorlick on LinkedIn</a> <a href="https://www.linkedin.com/in/joe-bialek-21118626/"> </a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a>  </p><p> </p><p><a href="https://www.youtube.com/watch?v=0Bw2YCDypUY">Security Research in Copilot Studio Overview and Training on YouTube</a> </p><p> </p><p><br></p><p><strong>Related Microsoft Podcasts:</strong>   </p><p>  </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>   </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>   </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>   </li>
</ul><p>  </p><p>  </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>   </p>]]>
      </content:encoded>
      <itunes:duration>2638</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[870e9c00-3d54-11ef-ab80-0f896cb7e4c1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2548160418.mp3?updated=1739549966" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Automating Dynamic Application Security Testing at Scale </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/46/notes</link>
      <description>In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by Jason Geffner, Principal Security Architect at Microsoft, to discuss his groundbreaking work on scaling and automating Dynamic Application Security Testing (DAST). Following on from his BlueHat 2024 session, and outlined in this MSRC blog post, Jason explains the key differences between DAST, SAST, and IAST, and dives into the challenges of scaling DAST at Microsoft’s enterprise level, detailing how automation eliminates manual configuration and improves efficiency for web service testing.  
 
In This Episode You Will Learn:  
 

Overcoming the challenges of authenticated requests for DAST tools 

The importance of API specs for DAST and how automation streamlines the process 

Insights into how Microsoft uses DAST to protect its vast array of web services 

 
Some Questions We Ask: 
 

What's a lesson from this work that you can share with those without Microsoft's resources? 

Can you explain what the transparent auth protocol is that you mentioned in the blog post? 

How is your work reducing the manual effort needed to configure DAST system services? 

  
Resources:      
View Jason Geffner on LinkedIn   
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
 
Related Blog Post: Scaling Dynamic Application Security Testing (DAST) | MSRC Blog 
Related BlueHat Session Recording: BlueHat 2024: S10: How Microsoft is Scaling DAST 
 
 Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   </description>
      <pubDate>Wed, 05 Feb 2025 08:10:00 -0000</pubDate>
      <itunes:title>Automating Dynamic Application Security Testing at Scale </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by Jason Geffner, Principal Security Architect at Microsoft, to discuss his groundbreaking work on scaling and automating Dynamic Application Security Testing (DAST). Following on from his BlueHat 2024 session, and outlined in this MSRC blog post, Jason explains the key differences between DAST, SAST, and IAST, and dives into the challenges of scaling DAST at Microsoft’s enterprise level, detailing how automation eliminates manual configuration and improves efficiency for web service testing.  
 
In This Episode You Will Learn:  
 

Overcoming the challenges of authenticated requests for DAST tools 

The importance of API specs for DAST and how automation streamlines the process 

Insights into how Microsoft uses DAST to protect its vast array of web services 

 
Some Questions We Ask: 
 

What's a lesson from this work that you can share with those without Microsoft's resources? 

Can you explain what the transparent auth protocol is that you mentioned in the blog post? 

How is your work reducing the manual effort needed to configure DAST system services? 

  
Resources:      
View Jason Geffner on LinkedIn   
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
 
Related Blog Post: Scaling Dynamic Application Security Testing (DAST) | MSRC Blog 
Related BlueHat Session Recording: BlueHat 2024: S10: How Microsoft is Scaling DAST 
 
 Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/wendyzenone/">Wendy Zenone</a> are joined by <a href="https://www.linkedin.com/in/geffner/">Jason Geffner</a>, Principal Security Architect at Microsoft, to discuss his groundbreaking work on scaling and automating Dynamic Application Security Testing (DAST). Following on from <a href="https://www.youtube.com/watch?v=kfuOzDwv874">his BlueHat 2024 session</a>, and <a href="https://msrc.microsoft.com/blog/2025/01/scaling-dynamic-application-security-testing-dast/">outlined in this MSRC blog post</a>, Jason explains the key differences between DAST, SAST, and IAST, and dives into the challenges of scaling DAST at Microsoft’s enterprise level, detailing how automation eliminates manual configuration and improves efficiency for web service testing.  </p><p> </p><p><strong>In This Episode You Will Learn</strong>:  </p><p> </p><ul>
<li>Overcoming the challenges of authenticated requests for DAST tools </li>
<li>The importance of API specs for DAST and how automation streamlines the process </li>
<li>Insights into how Microsoft uses DAST to protect its vast array of web services </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><p> </p><ul>
<li>What's a lesson from this work that you can share with those without Microsoft's resources? </li>
<li>Can you explain what the transparent auth protocol is that you mentioned in the blog post? </li>
<li>How is your work reducing the manual effort needed to configure DAST system services? </li>
</ul><p>  </p><p><strong>Resources:</strong>      </p><p><a href="https://www.linkedin.com/in/geffner/">View Jason Geffner on LinkedIn</a> <a href="https://www.linkedin.com/in/joe-bialek-21118626/"> </a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a>  </p><p> </p><p>Related Blog Post: <a href="https://msrc.microsoft.com/blog/2025/01/scaling-dynamic-application-security-testing-dast/">Scaling Dynamic Application Security Testing (DAST) | MSRC Blog</a> </p><p>Related BlueHat Session Recording: <a href="https://www.youtube.com/watch?v=kfuOzDwv874">BlueHat 2024: S10: How Microsoft is Scaling DAST</a> </p><p> </p><p> <strong>Related Microsoft Podcasts:</strong>   </p><p>  </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>   </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>   </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>   </li>
</ul><p>  </p><p>  </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>   </p>]]>
      </content:encoded>
      <itunes:duration>2756</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[86f69920-3d54-11ef-ab80-d3af43a06a47]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW5995646813.mp3?updated=1738606653" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Refactoring the Windows Kernel with Joe Bialek </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/45/notes</link>
      <description>In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by BlueHat 2024 presenter Joe Bialek, a security engineer at Microsoft with over 13 years of experience. Joe shares his fascinating journey from intern to red team pioneer, recounting how he helped establish the Office 365 Red Team and pushed the boundaries of ethical hacking within Microsoft. He discusses his formative years building sneaky hacking tools, navigating the controversial beginnings of red teaming, and transitioning to the Windows Security Team to focus on low-level security and mitigations. Joe reflects on the challenges of internal hacking, the human reactions to being "hacked," and the value of strengthening defenses before external threats arise. 
 
In This Episode You Will Learn:  
 

How Microsoft is developing tooling to identify and address bad programming patterns 

Why kernel-related discussions are primarily focused on Windows and driver developers 

The challenges developers face when reading and writing through pointers in C or C++ 

 
Some Questions We Ask: 
 

How does working with the Windows kernel impact system security and performance? 

What sets Windows kernel and driver development apart from other types of development? 

Why should internal teams test systems for vulnerabilities before external hackers? 

   

Resources:      
View Joe Bialek on LinkedIn  
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
 
BlueHat 2024 Session: Pointer Problems – Why We’re Refactoring the Windows Kernel 
 

Related Microsoft Podcasts:    


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

﻿
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </description>
      <pubDate>Wed, 22 Jan 2025 08:10:00 -0000</pubDate>
      <itunes:title>Refactoring the Windows Kernel with Joe Bialek </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by BlueHat 2024 presenter Joe Bialek, a security engineer at Microsoft with over 13 years of experience. Joe shares his fascinating journey from intern to red team pioneer, recounting how he helped establish the Office 365 Red Team and pushed the boundaries of ethical hacking within Microsoft. He discusses his formative years building sneaky hacking tools, navigating the controversial beginnings of red teaming, and transitioning to the Windows Security Team to focus on low-level security and mitigations. Joe reflects on the challenges of internal hacking, the human reactions to being "hacked," and the value of strengthening defenses before external threats arise. 
 
In This Episode You Will Learn:  
 

How Microsoft is developing tooling to identify and address bad programming patterns 

Why kernel-related discussions are primarily focused on Windows and driver developers 

The challenges developers face when reading and writing through pointers in C or C++ 

 
Some Questions We Ask: 
 

How does working with the Windows kernel impact system security and performance? 

What sets Windows kernel and driver development apart from other types of development? 

Why should internal teams test systems for vulnerabilities before external hackers? 

   

Resources:      
View Joe Bialek on LinkedIn  
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
 
BlueHat 2024 Session: Pointer Problems – Why We’re Refactoring the Windows Kernel 
 

Related Microsoft Podcasts:    


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

﻿
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/wendyzenone/">Wendy Zenone</a> are joined by BlueHat 2024 presenter <a href="https://www.linkedin.com/in/joe-bialek-21118626/">Joe Bialek</a>, a security engineer at Microsoft with over 13 years of experience. Joe shares his fascinating journey from intern to red team pioneer, recounting how he helped establish the Office 365 Red Team and pushed the boundaries of ethical hacking within Microsoft. He discusses his formative years building sneaky hacking tools, navigating the controversial beginnings of red teaming, and transitioning to the Windows Security Team to focus on low-level security and mitigations. Joe reflects on the challenges of internal hacking, the human reactions to being "hacked," and the value of strengthening defenses before external threats arise. </p><p> </p><p><strong>In This Episode You Will Learn</strong>:  </p><p> </p><ul>
<li>How Microsoft is developing tooling to identify and address bad programming patterns </li>
<li>Why kernel-related discussions are primarily focused on Windows and driver developers </li>
<li>The challenges developers face when reading and writing through pointers in C or C++ </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><p> </p><ul>
<li>How does working with the Windows kernel impact system security and performance? </li>
<li>What sets Windows kernel and driver development apart from other types of development? </li>
<li>Why should internal teams test systems for vulnerabilities before external hackers? </li>
</ul><p>   </p><p><br></p><p><strong>Resources:</strong>      </p><p><a href="https://www.linkedin.com/in/joe-bialek-21118626/">View Joe Bialek on LinkedIn </a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a>  </p><p> </p><p><a href="https://www.youtube.com/watch?v=-3jxVIFGuQw">BlueHat 2024 Session: Pointer Problems – Why We’re Refactoring the Windows Kernel</a> </p><p> </p><p><br></p><p><strong>Related Microsoft Podcasts:</strong>    </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>   </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>   </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>   </li>
</ul><p>﻿</p><p>  </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>   </p><p><br></p><p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em> </p>]]>
      </content:encoded>
      <itunes:duration>2834</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[86dc39cc-3d54-11ef-ab80-e3c3d1bb12a0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW7865798522.mp3?updated=1737490581" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Defending Against NTLM Relay Attacks with Rohit Mothe and George Hughey</title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/44/notes</link>
      <description>In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone welcome back George Hughey and Rohit Mothe from the Microsoft Security Response Center (MSRC) to discuss their latest blog post on mitigating NTLM relay attacks by default. George and Rohit explain their roles in vulnerability hunting and delve into NTLM, a 40-year-old authentication protocol, outlining its vulnerabilities and the risks of relay attacks, which function as a type of man-in-the-middle exploit. They highlight Microsoft's move to a "secure by default" approach, ensuring mitigations like channel binding are enabled automatically, providing stronger protections across services like Exchange, Active Directory Certificate Services (ADCS), and LDAP.  
 

In This Episode You Will Learn:  
 

Steps users can take to enhance security in their environments 

Why legacy protocols remain a challenge and what the future might hold 

The challenges and successes of improving authentication security 

 
 
Some Questions We Ask: 

What is an NTLM relay attack, and how does it work? 

Can you explain channel binding and its role in preventing NTLM relay attacks? 

What challenges arise from modernizing authentication in complex environments? 

   
  
Resources:      
View George Hughey on LinkedIn  
View Rohit Mothe on LinkedIn  
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
  
Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   
 </description>
      <pubDate>Wed, 08 Jan 2025 08:20:00 -0000</pubDate>
      <itunes:title>Defending Against NTLM Relay Attacks with Rohit Mothe and George Hughey</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone welcome back George Hughey and Rohit Mothe from the Microsoft Security Response Center (MSRC) to discuss their latest blog post on mitigating NTLM relay attacks by default. George and Rohit explain their roles in vulnerability hunting and delve into NTLM, a 40-year-old authentication protocol, outlining its vulnerabilities and the risks of relay attacks, which function as a type of man-in-the-middle exploit. They highlight Microsoft's move to a "secure by default" approach, ensuring mitigations like channel binding are enabled automatically, providing stronger protections across services like Exchange, Active Directory Certificate Services (ADCS), and LDAP.  
 

In This Episode You Will Learn:  
 

Steps users can take to enhance security in their environments 

Why legacy protocols remain a challenge and what the future might hold 

The challenges and successes of improving authentication security 

 
 
Some Questions We Ask: 

What is an NTLM relay attack, and how does it work? 

Can you explain channel binding and its role in preventing NTLM relay attacks? 

What challenges arise from modernizing authentication in complex environments? 

   
  
Resources:      
View George Hughey on LinkedIn  
View Rohit Mothe on LinkedIn  
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
  
Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   
 </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone welcome back <a href="https://www.linkedin.com/in/ghughey/">George Hughey</a> and <a href="https://www.linkedin.com/in/rohit-mothe-0a047728/">Rohit Mothe</a> from the Microsoft Security Response Center (MSRC) to discuss their latest blog post on mitigating NTLM relay attacks by default. George and Rohit explain their roles in vulnerability hunting and delve into NTLM, a 40-year-old authentication protocol, outlining its vulnerabilities and the risks of relay attacks, which function as a type of man-in-the-middle exploit. They highlight Microsoft's move to a "secure by default" approach, ensuring mitigations like channel binding are enabled automatically, providing stronger protections across services like Exchange, Active Directory Certificate Services (ADCS), and LDAP.  </p><p> </p><p><br></p><p><strong>In This Episode You Will Learn</strong>:  </p><p> </p><ul>
<li>Steps users can take to enhance security in their environments </li>
<li>Why legacy protocols remain a challenge and what the future might hold </li>
<li>The challenges and successes of improving authentication security </li>
</ul><p> </p><p> </p><p><strong>Some Questions We Ask:</strong> </p><ul>
<li>What is an NTLM relay attack, and how does it work? </li>
<li>Can you explain channel binding and its role in preventing NTLM relay attacks? </li>
<li>What challenges arise from modernizing authentication in complex environments? </li>
</ul><p>   </p><p>  </p><p><strong>Resources:</strong>      </p><p><a href="https://www.linkedin.com/in/ghughey/">View George Hughey on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/rohit-mothe-0a047728/">View Rohit Mothe on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a>  </p><p>  </p><p><strong>Related Microsoft Podcasts:</strong>   </p><p>  </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>   </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>   </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>   </li>
</ul><p>  </p><p>  </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>   </p><p> </p>]]>
      </content:encoded>
      <itunes:duration>2408</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[86c37f2c-3d54-11ef-ab80-7b03d0cd43e4]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW8653841246.mp3?updated=1735915853" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Navigating AI Safety and Security Challenges with Yonatan Zunger [Encore]</title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/34/notes</link>
      <description>Yonatan Zunger, CVP of AI Safety &amp; Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. 
 
 

In This Episode You Will Learn:    
 

How predictive AI anticipates outcomes based on historical data 

The difficulties and strategies involved in making AI systems safe and secure from misuse 

How role-playing exercises help developers understand the behavior of AI systems 

 

Some Questions We Ask:     
 

What distinguishes predictive AI from generative AI? 

Can generative AI be used to improve decision-making processes? 

What is the role of unit testing and test cases in policy and AI system development? 


 

Resources:  
View Yonatan Zunger on LinkedIn     
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 

 

Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  </description>
      <pubDate>Wed, 25 Dec 2024 08:10:00 -0000</pubDate>
      <itunes:title>Navigating AI Safety and Security Challenges with Yonatan Zunger [Encore]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Yonatan Zunger, CVP of AI Safety &amp; Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. 
 
 

In This Episode You Will Learn:    
 

How predictive AI anticipates outcomes based on historical data 

The difficulties and strategies involved in making AI systems safe and secure from misuse 

How role-playing exercises help developers understand the behavior of AI systems 

 

Some Questions We Ask:     
 

What distinguishes predictive AI from generative AI? 

Can generative AI be used to improve decision-making processes? 

What is the role of unit testing and test cases in policy and AI system development? 


 

Resources:  
View Yonatan Zunger on LinkedIn     
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 

 

Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  </itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/yonatanzunger/">Yonatan Zunger</a>, CVP of AI Safety &amp; Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. </p><p> </p><p> </p><h3>
<strong>In This Episode You Will Learn</strong>:    </h3><p> </p><ul>
<li>How predictive AI anticipates outcomes based on historical data </li>
<li>The difficulties and strategies involved in making AI systems safe and secure from misuse </li>
<li>How role-playing exercises help developers understand the behavior of AI systems </li>
</ul><p> </p><h3>
<strong>Some Questions We Ask: </strong>    </h3><p> </p><ul>
<li>What distinguishes predictive AI from generative AI? </li>
<li>Can generative AI be used to improve decision-making processes? </li>
<li>What is the role of unit testing and test cases in policy and AI system development? </li>
</ul><p><br></p><p> </p><h3>
<strong>Resources:</strong>  </h3><p><a href="https://www.linkedin.com/in/yonatanzunger/">View Yonatan Zunger on LinkedIn</a>     </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><br></p><p> </p><h3>
<strong>Related Microsoft Podcasts:</strong>  </h3><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p>]]>
      </content:encoded>
      <itunes:duration>3214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[86ab1b12-3d54-11ef-ab80-5fb5aec273c5]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2441463874.mp3?updated=1734036318" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Johann Rehberger on Researching AI &amp; LLM Attacks</title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/43/notes</link>
      <description>In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by Johann Rehberger, security expert and Red Team director at Electronic Arts. Johann shares his career journey through roles at Microsoft, Uber, and EA, highlighting his expertise in red teaming and cybersecurity. Johann shares the inspiration behind his book on Red Team strategies and discusses his BlueHat 2024 talk on prompt injection vulnerabilities, a critical and evolving AI security challenge. Johann breaks down the distinction between prompt injection and jailbreaking, offering insights into the potential risks, including data exfiltration and system unavailability, and emphasizes the importance of securing Red Teams themselves. 
 
 
In This Episode You Will Learn:  
 

Why AI tools should have stricter default settings to control what kind of outputs they generate 

The importance of reading technical documentation to understand how AI systems are built 

Why developers should implement stronger filters for what tokens are allowed to be emitted by LLMs 

 
Some Questions We Ask: 
 

How are prompt injection and SQL injection similar, and how are they different? 

What is AI spyware, and how does it exploit memory tools in ChatGPT? 

Does AI jailbreaking access the LLM’s core system like iPhone jailbreaking does the OS? 

   
  
Resources:      
View Johann Rehberger on LinkedIn  
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
  
Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   </description>
      <pubDate>Wed, 11 Dec 2024 08:10:00 -0000</pubDate>
      <itunes:title>Johann Rehberger on Researching AI &amp; LLM Attacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by Johann Rehberger, security expert and Red Team director at Electronic Arts. Johann shares his career journey through roles at Microsoft, Uber, and EA, highlighting his expertise in red teaming and cybersecurity. Johann shares the inspiration behind his book on Red Team strategies and discusses his BlueHat 2024 talk on prompt injection vulnerabilities, a critical and evolving AI security challenge. Johann breaks down the distinction between prompt injection and jailbreaking, offering insights into the potential risks, including data exfiltration and system unavailability, and emphasizes the importance of securing Red Teams themselves. 
 
 
In This Episode You Will Learn:  
 

Why AI tools should have stricter default settings to control what kind of outputs they generate 

The importance of reading technical documentation to understand how AI systems are built 

Why developers should implement stronger filters for what tokens are allowed to be emitted by LLMs 

 
Some Questions We Ask: 
 

How are prompt injection and SQL injection similar, and how are they different? 

What is AI spyware, and how does it exploit memory tools in ChatGPT? 

Does AI jailbreaking access the LLM’s core system like iPhone jailbreaking does the OS? 

   
  
Resources:      
View Johann Rehberger on LinkedIn  
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
  
Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by <a href="https://www.linkedin.com/in/johannrehberger/">Johann Rehberger</a>, security expert and Red Team director at Electronic Arts. Johann shares his career journey through roles at Microsoft, Uber, and EA, highlighting his expertise in red teaming and cybersecurity. Johann shares the inspiration behind his book on Red Team strategies and discusses his BlueHat 2024 talk on prompt injection vulnerabilities, a critical and evolving AI security challenge. Johann breaks down the distinction between prompt injection and jailbreaking, offering insights into the potential risks, including data exfiltration and system unavailability, and emphasizes the importance of securing Red Teams themselves. </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:  </p><p> </p><ul>
<li>Why AI tools should have stricter default settings to control what kind of outputs they generate </li>
<li>The importance of reading technical documentation to understand how AI systems are built </li>
<li>Why developers should implement stronger filters for what tokens are allowed to be emitted by LLMs </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><p> </p><ul>
<li>How are prompt injection and SQL injection similar, and how are they different? </li>
<li>What is AI spyware, and how does it exploit memory tools in ChatGPT? </li>
<li>Does AI jailbreaking access the LLM’s core system like iPhone jailbreaking does the OS? </li>
</ul><p>   </p><p>  </p><p><strong>Resources:</strong>      </p><p><a href="https://www.linkedin.com/in/johannrehberger/">View Johann Rehberger on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a>  </p><p>  </p><p><strong>Related Microsoft Podcasts:</strong>   </p><p>  </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>   </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>   </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>   </li>
</ul><p>  </p><p>  </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>   </p>]]>
      </content:encoded>
      <itunes:duration>2960</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8692a2e4-3d54-11ef-ab80-07f29f0045aa]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2037358617.mp3?updated=1734036197" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlueHat 2024 Day 2 Keynote: Amanda Silver, CVP Microsoft Developer Division</title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/42/notes</link>
      <description>In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone present an insightful address by Corporate Vice President and Head of Product for Microsoft's Developer Division, Amanda Silver. Amanda discusses the importance of securing the software supply chain and Microsoft's efforts to protect the open-source ecosystem. She introduces the Secure Software Supply Chain Consumption Framework (S2C2F), a model for tracking and defending against vulnerabilities in open-source dependencies. Silver highlights tools like Dependabot and improvements in NuGet to help developers address security issues seamlessly. She also shares a case study on the "XZ" supply chain attack, underscoring the need for a security mindset in tech culture. Silver closes by urging listeners to adopt a proactive approach to cybersecurity, emphasizing that attacks are inevitable. 
 
  
Resources:   
View Amanda Silver on LinkedIn     
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
  
Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</description>
      <pubDate>Wed, 27 Nov 2024 08:10:00 -0000</pubDate>
      <itunes:title>BlueHat 2024 Day 2 Keynote: Amanda Silver, CVP Microsoft Developer Division</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone present an insightful address by Corporate Vice President and Head of Product for Microsoft's Developer Division, Amanda Silver. Amanda discusses the importance of securing the software supply chain and Microsoft's efforts to protect the open-source ecosystem. She introduces the Secure Software Supply Chain Consumption Framework (S2C2F), a model for tracking and defending against vulnerabilities in open-source dependencies. Silver highlights tools like Dependabot and improvements in NuGet to help developers address security issues seamlessly. She also shares a case study on the "XZ" supply chain attack, underscoring the need for a security mindset in tech culture. Silver closes by urging listeners to adopt a proactive approach to cybersecurity, emphasizing that attacks are inevitable. 
 
  
Resources:   
View Amanda Silver on LinkedIn     
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
  
Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <strong>T</strong>he BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone present an insightful address by Corporate Vice President and Head of Product for Microsoft's Developer Division, <a href="https://www.linkedin.com/in/amandaksilver/">Amanda Silver</a>. Amanda discusses the importance of securing the software supply chain and Microsoft's efforts to protect the open-source ecosystem. She introduces the Secure Software Supply Chain Consumption Framework (S2C2F), a model for tracking and defending against vulnerabilities in open-source dependencies. Silver highlights tools like Dependabot and improvements in NuGet to help developers address security issues seamlessly. She also shares a case study on the "XZ" supply chain attack, underscoring the need for a security mindset in tech culture. Silver closes by urging listeners to adopt a proactive approach to cybersecurity, emphasizing that attacks are inevitable. </p><p> </p><p>  </p><p><strong>Resources:</strong>   </p><p><a href="https://www.linkedin.com/in/amandaksilver/">View Amanda Silver on LinkedIn</a>     </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a>  </p><p>  </p><p><strong>Related Microsoft Podcasts:</strong>   </p><p>  </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>   </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>   </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>   </li>
</ul><p>  </p><p>  </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>   </p><p><br></p><p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em></p>]]>
      </content:encoded>
      <itunes:duration>2742</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[86691e1a-3d54-11ef-ab80-739ec6ac3693]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW7239897310.mp3?updated=1732558488" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlueHat 2024 Day 1 Keynote: Chris Wysopal AKA Weld Pond </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/41/notes</link>
      <description>In episode 41 of The BlueHat Podcast we bring you the BlueHat 2024 day 1 keynote address given by Chris Wysopal, also known as Weld Pond, founder and Chief Security Evangelist at VeraCode, and founding member of the L0pht.  
 
Chris’ talk - A Clash of Cultures Comes Together to Change Software Security - recounts the early days of “hacking” and how the industry evolved to embrace vulnerability discovery and coordinated, responsible disclosure. 
 
Chris presentation provides a fascinating reflection on a tumultuous period for Microsoft around 2001, marked by significant vulnerability discoveries, which ultimately led to the establishment of the Organization for Internet Safety and the consultancy AtStake, transforming the security landscape and professionalizing the role of hackers. Watch Chris’ BlueHat 2024 Day 1 Keynote here: https://youtu.be/w6SAqT4ZQik
  
Resources:   
View Chris Wysopal on LinkedIn     
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
  
Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   </description>
      <pubDate>Wed, 13 Nov 2024 08:10:00 -0000</pubDate>
      <itunes:title>BlueHat 2024 Day 1 Keynote: Chris Wysopal AKA Weld Pond </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In episode 41 of The BlueHat Podcast we bring you the BlueHat 2024 day 1 keynote address given by Chris Wysopal, also known as Weld Pond, founder and Chief Security Evangelist at VeraCode, and founding member of the L0pht.  
 
Chris’ talk - A Clash of Cultures Comes Together to Change Software Security - recounts the early days of “hacking” and how the industry evolved to embrace vulnerability discovery and coordinated, responsible disclosure. 
 
Chris presentation provides a fascinating reflection on a tumultuous period for Microsoft around 2001, marked by significant vulnerability discoveries, which ultimately led to the establishment of the Organization for Internet Safety and the consultancy AtStake, transforming the security landscape and professionalizing the role of hackers. Watch Chris’ BlueHat 2024 Day 1 Keynote here: https://youtu.be/w6SAqT4ZQik
  
Resources:   
View Chris Wysopal on LinkedIn     
View Wendy Zenone on LinkedIn   
View Nic Fillingham on LinkedIn  
  
Related Microsoft Podcasts:   
  


Microsoft Threat Intelligence Podcast   


Afternoon Cyber Tea with Ann Johnson   


Uncovering Hidden Risks   

  
  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts   </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In episode 41 of The BlueHat Podcast we bring you the BlueHat 2024 day 1 keynote address given by <a href="https://www.linkedin.com/in/wysopal/">Chris Wysopal</a>, also known as Weld Pond, founder and Chief Security Evangelist at VeraCode, and founding member of the L0pht.  </p><p> </p><p>Chris’ talk - A Clash of Cultures Comes Together to Change Software Security - recounts the early days of “hacking” and how the industry evolved to embrace vulnerability discovery and coordinated, responsible disclosure. </p><p> </p><p>Chris presentation provides a fascinating reflection on a tumultuous period for Microsoft around 2001, marked by significant vulnerability discoveries, which ultimately led to the establishment of the Organization for Internet Safety and the consultancy AtStake, transforming the security landscape and professionalizing the role of hackers. Watch Chris’ BlueHat 2024 Day 1 Keynote here: <a href="https://youtu.be/w6SAqT4ZQik">https://youtu.be/w6SAqT4ZQik</a></p><p>  </p><p><strong>Resources:</strong>   </p><p><a href="https://www.linkedin.com/in/wysopal/">View Chris Wysopal on LinkedIn</a>     </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a>  </p><p>  </p><p><strong>Related Microsoft Podcasts:</strong>   </p><p>  </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>   </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>   </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>   </li>
</ul><p>  </p><p>  </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>   </p>]]>
      </content:encoded>
      <itunes:duration>2870</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[864613de-3d54-11ef-ab80-630d75f8586a]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1464855952.mp3?updated=1731444803" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From Software to Security: Arjun Gopalakrishna’s Journey at Microsoft</title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/40/notes</link>
      <description>In this episode of the Blue Hat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by Arjun Gopalakrishna, a security engineer at Microsoft, to discuss his fascinating journey from software engineer to security leader. Arjun reflects on his 11-year tenure at Microsoft, including how a childhood experience with a computer virus sparked his curiosity in cybersecurity. He talks about his early exposure to security issues while working in Windows and his eventual transition to Azure security. Arjun also shares insights into how he began presenting security talks internally through Microsoft's Strike program and how he continues to use storytelling to make complex security concepts approachable for colleagues across the company. 
 
In This Episode You Will Learn:    
 

The importance of empathy and accessibility when discussing technical vulnerabilities 

Why Arjun honed his focus on cloud security, application security, and offensive security. 

How Microsoft's internal Strike platform helps employees build a deeper understanding of cybersecurity 


Some Questions We Ask:     
 

Can you walk us through how you honed in on a specific area of security? 

What are your tips for bringing non-security professionals into a security mindset? 

Is there anything you're specifically working on within SFI? 

  
Resources:  
View Arjun Gopalakrishna on LinkedIn  
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  


The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </description>
      <pubDate>Wed, 30 Oct 2024 07:10:00 -0000</pubDate>
      <itunes:title>From Software to Security: Arjun Gopalakrishna’s Journey at Microsoft</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this episode of the Blue Hat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by Arjun Gopalakrishna, a security engineer at Microsoft, to discuss his fascinating journey from software engineer to security leader. Arjun reflects on his 11-year tenure at Microsoft, including how a childhood experience with a computer virus sparked his curiosity in cybersecurity. He talks about his early exposure to security issues while working in Windows and his eventual transition to Azure security. Arjun also shares insights into how he began presenting security talks internally through Microsoft's Strike program and how he continues to use storytelling to make complex security concepts approachable for colleagues across the company. 
 
In This Episode You Will Learn:    
 

The importance of empathy and accessibility when discussing technical vulnerabilities 

Why Arjun honed his focus on cloud security, application security, and offensive security. 

How Microsoft's internal Strike platform helps employees build a deeper understanding of cybersecurity 


Some Questions We Ask:     
 

Can you walk us through how you honed in on a specific area of security? 

What are your tips for bringing non-security professionals into a security mindset? 

Is there anything you're specifically working on within SFI? 

  
Resources:  
View Arjun Gopalakrishna on LinkedIn  
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  


The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of the Blue Hat Podcast, hosts Nic Fillingham and Wendy Zenone are joined by <a href="https://www.linkedin.com/in/247arjun/">Arjun Gopalakrishna</a>, a security engineer at Microsoft, to discuss his fascinating journey from software engineer to security leader. Arjun reflects on his 11-year tenure at Microsoft, including how a childhood experience with a computer virus sparked his curiosity in cybersecurity. He talks about his early exposure to security issues while working in Windows and his eventual transition to Azure security. Arjun also shares insights into how he began presenting security talks internally through Microsoft's Strike program and how he continues to use storytelling to make complex security concepts approachable for colleagues across the company. </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>The importance of empathy and accessibility when discussing technical vulnerabilities </li>
<li>Why Arjun honed his focus on cloud security, application security, and offensive security. </li>
<li>How Microsoft's internal Strike platform helps employees build a deeper understanding of cybersecurity </li>
</ul><p><br></p><p><strong>Some Questions We Ask: </strong>    </p><p> </p><ul>
<li>Can you walk us through how you honed in on a specific area of security? </li>
<li>What are your tips for bringing non-security professionals into a security mindset? </li>
<li>Is there anything you're specifically working on within SFI? </li>
</ul><p>  </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/247arjun/">View Arjun Gopalakrishna on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><p><br></p><p><br></p><p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em> </p>]]>
      </content:encoded>
      <itunes:duration>2581</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[86296cac-3d54-11ef-ab80-4f75c53ce156]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6522717648.mp3?updated=1730373361" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Host vs Host: Get to Know Nic and Wendy</title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/39/notes</link>
      <description>In this episode of the Blue Hat Podcast, hosts Nic Fillingham and Wendy Zenone interview each other to give listeners insight into their personal and professional backgrounds. Nic recounts his unique career journey, which began with jobs like working as a chicken butcher and selling CDs, before joining Microsoft as an Xbox demo specialist. His career with Microsoft spanned various roles, ultimately leading him to work on the Blue Hat program, where he was captivated by the concept of ethical hacking. Wendy, on the other hand, shares her transition from PR into security, with stops at Netflix and Salesforce, and her current role at Microsoft leading the Strike program. 
 

In This Episode You Will Learn:     

Wendy’s experience buying chicken from a stranger in a parking lot 

Nic’s encounter with The Rock during a wrestling game demo 

Wendy starting in public relations before transitioning to the security world 

 

Some Questions We Ask:      

How did attending an all-women’s software engineering school influence your career shift? 

What do you enjoy most about working in the security field? 

What advice do you have for women looking to enter the security industry?  

 

Resources:  
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 


Related Microsoft Podcasts:  


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 
The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </description>
      <pubDate>Wed, 16 Oct 2024 07:10:00 -0000</pubDate>
      <itunes:title>Host vs Host: Get to Know Nic and Wendy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>39</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In this episode of the Blue Hat Podcast, hosts Nic Fillingham and Wendy Zenone interview each other to give listeners insight into their personal and professional backgrounds. Nic recounts his unique career journey, which began with jobs like working as a chicken butcher and selling CDs, before joining Microsoft as an Xbox demo specialist. His career with Microsoft spanned various roles, ultimately leading him to work on the Blue Hat program, where he was captivated by the concept of ethical hacking. Wendy, on the other hand, shares her transition from PR into security, with stops at Netflix and Salesforce, and her current role at Microsoft leading the Strike program. 
 

In This Episode You Will Learn:     

Wendy’s experience buying chicken from a stranger in a parking lot 

Nic’s encounter with The Rock during a wrestling game demo 

Wendy starting in public relations before transitioning to the security world 

 

Some Questions We Ask:      

How did attending an all-women’s software engineering school influence your career shift? 

What do you enjoy most about working in the security field? 

What advice do you have for women looking to enter the security industry?  

 

Resources:  
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 


Related Microsoft Podcasts:  


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 
The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of the Blue Hat Podcast, hosts Nic Fillingham and Wendy Zenone interview each other to give listeners insight into their personal and professional backgrounds. Nic recounts his unique career journey, which began with jobs like working as a chicken butcher and selling CDs, before joining Microsoft as an Xbox demo specialist. His career with Microsoft spanned various roles, ultimately leading him to work on the Blue Hat program, where he was captivated by the concept of ethical hacking. Wendy, on the other hand, shares her transition from PR into security, with stops at Netflix and Salesforce, and her current role at Microsoft leading the Strike program. </p><p> </p><h3>
<strong>In This Episode You Will Learn</strong>:     </h3><ul>
<li>Wendy’s experience buying chicken from a stranger in a parking lot </li>
<li>Nic’s encounter with The Rock during a wrestling game demo </li>
<li>Wendy starting in public relations before transitioning to the security world </li>
</ul><p> </p><h3>
<strong>Some Questions We Ask: </strong>     </h3><ul>
<li>How did attending an all-women’s software engineering school influence your career shift? </li>
<li>What do you enjoy most about working in the security field? </li>
<li>What advice do you have for women looking to enter the security industry?  </li>
</ul><p> </p><h3>
<strong>Resources:</strong>  </h3><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><br></p><h3>
<strong>Related Microsoft Podcasts:</strong>  </h3><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><p> </p><p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em> </p>]]>
      </content:encoded>
      <itunes:duration>2152</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[860c39ca-3d54-11ef-ab80-a77655c31292]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1872867041.mp3?updated=1729109528" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Behind the Scenes and Best Practices for Submitting to MSRC with Jim Hull</title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/38/notes</link>
      <description>Jim Hull, Program Manager at MSRC joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast to share insights into his role in reviewing vulnerability reports and managing cases. They dive into the submission process, detailing the types of reports accepted by MSRC and what happens after a researcher submits a potential vulnerability. The conversation also highlights the accessibility of the portal for anyone interested in identifying security issues, whether they are professionals or hobbyists. Jim explains the importance of providing clear proof of concept when submitting a vulnerability and walks through the steps MSRC takes to triage, reproduce, and resolve reports. 
 

In This Episode You Will Learn:    
 

Why a detailed proof of concept is essential when submitting a vulnerability 

How the MSRC collaborates with engineers at Microsoft to resolve vulnerabilities 

The importance of including video or image documentation to support reports 

 

Some Questions We Ask:     
 

What is the vulnerability triage process at MSRC? 

How long does it take to fix a vulnerability after it’s been reported? 

Why is it important to use the researcher portal instead of email or social media? 

  

Resources:  
Microsoft Security Response Center  
 
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 

Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 
The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </description>
      <pubDate>Wed, 02 Oct 2024 07:10:00 -0000</pubDate>
      <itunes:title>Behind the Scenes and Best Practices for Submitting to MSRC with Jim Hull</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Jim Hull, Program Manager at MSRC joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast to share insights into his role in reviewing vulnerability reports and managing cases. They dive into the submission process, detailing the types of reports accepted by MSRC and what happens after a researcher submits a potential vulnerability. The conversation also highlights the accessibility of the portal for anyone interested in identifying security issues, whether they are professionals or hobbyists. Jim explains the importance of providing clear proof of concept when submitting a vulnerability and walks through the steps MSRC takes to triage, reproduce, and resolve reports. 
 

In This Episode You Will Learn:    
 

Why a detailed proof of concept is essential when submitting a vulnerability 

How the MSRC collaborates with engineers at Microsoft to resolve vulnerabilities 

The importance of including video or image documentation to support reports 

 

Some Questions We Ask:     
 

What is the vulnerability triage process at MSRC? 

How long does it take to fix a vulnerability after it’s been reported? 

Why is it important to use the researcher portal instead of email or social media? 

  

Resources:  
Microsoft Security Response Center  
 
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 

Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 
The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jim Hull, Program Manager at MSRC joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast to share insights into his role in reviewing vulnerability reports and managing cases. They dive into the submission process, detailing the types of reports accepted by MSRC and what happens after a researcher submits a potential vulnerability. The conversation also highlights the accessibility of the portal for anyone interested in identifying security issues, whether they are professionals or hobbyists. Jim explains the importance of providing clear proof of concept when submitting a vulnerability and walks through the steps MSRC takes to triage, reproduce, and resolve reports. </p><p> </p><h3>
<strong>In This Episode You Will Learn</strong>:    </h3><p> </p><ul>
<li>Why a detailed proof of concept is essential when submitting a vulnerability </li>
<li>How the MSRC collaborates with engineers at Microsoft to resolve vulnerabilities </li>
<li>The importance of including video or image documentation to support reports </li>
</ul><p> </p><h3>
<strong>Some Questions We Ask: </strong>    </h3><p> </p><ul>
<li>What is the vulnerability triage process at MSRC? </li>
<li>How long does it take to fix a vulnerability after it’s been reported? </li>
<li>Why is it important to use the researcher portal instead of email or social media? </li>
</ul><p>  </p><h3>
<strong>Resources:</strong>  </h3><p><a href="https://www.microsoft.com/en-us/msrc">Microsoft Security Response Center </a> </p><p> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><h3>
<strong>Related Microsoft Podcasts:</strong>  </h3><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><p> </p><p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em> </p>]]>
      </content:encoded>
      <itunes:duration>2339</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[85efdf28-3d54-11ef-ab80-537b4fa61f8f]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6107564423.mp3?updated=1727462716" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Guy Arazi on the Art and Science of Variant Hunting </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/37/notes</link>
      <description>Guy Arazi, a UK-based security expert at Microsoft, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Guy discusses his journey in security, which began in 2018 when he joined Microsoft, and his current role focusing on online services vulnerabilities within the MSRC (Microsoft Security Response Center). They delve into the concept of variant hunting, a critical process in identifying and mitigating repeated patterns of security vulnerabilities across multiple products and services. Guy explains that while static analysis tools are useful, they often require more complex, tailored approaches to detect these recurring issues. He emphasizes the importance of understanding the root cause of vulnerabilities and using both human insight and automated tools to address them across the vast codebase of Microsoft's offerings. 
 

In This Episode You Will Learn:     

The challenges of variant hunting and its significant impact on improving overall security 

Growing complexity of variant hunting and the necessity of thorough documentation 

What is important to consider when approaching a security vulnerability 

 

Some Questions We Ask:      

Are there industry tools or publicly available resources you recommend for variant hunting? 

How can you identify the security boundary a vulnerability affects? 

Is variant hunting something only humans can do, or can tools and automation help? 

 

Resources:  
View Guy Arazi on LinkedIn     
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 

Related Microsoft Podcasts:   


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 
The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </description>
      <pubDate>Wed, 18 Sep 2024 07:10:00 -0000</pubDate>
      <itunes:title>Guy Arazi on the Art and Science of Variant Hunting </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Guy Arazi, a UK-based security expert at Microsoft, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Guy discusses his journey in security, which began in 2018 when he joined Microsoft, and his current role focusing on online services vulnerabilities within the MSRC (Microsoft Security Response Center). They delve into the concept of variant hunting, a critical process in identifying and mitigating repeated patterns of security vulnerabilities across multiple products and services. Guy explains that while static analysis tools are useful, they often require more complex, tailored approaches to detect these recurring issues. He emphasizes the importance of understanding the root cause of vulnerabilities and using both human insight and automated tools to address them across the vast codebase of Microsoft's offerings. 
 

In This Episode You Will Learn:     

The challenges of variant hunting and its significant impact on improving overall security 

Growing complexity of variant hunting and the necessity of thorough documentation 

What is important to consider when approaching a security vulnerability 

 

Some Questions We Ask:      

Are there industry tools or publicly available resources you recommend for variant hunting? 

How can you identify the security boundary a vulnerability affects? 

Is variant hunting something only humans can do, or can tools and automation help? 

 

Resources:  
View Guy Arazi on LinkedIn     
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 

Related Microsoft Podcasts:   


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 
The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/guy-arazi-8b0aba83/?originalSubdomain=il">Guy Arazi</a>, a UK-based security expert at Microsoft, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Guy discusses his journey in security, which began in 2018 when he joined Microsoft, and his current role focusing on online services vulnerabilities within the MSRC (Microsoft Security Response Center). They delve into the concept of variant hunting, a critical process in identifying and mitigating repeated patterns of security vulnerabilities across multiple products and services. Guy explains that while static analysis tools are useful, they often require more complex, tailored approaches to detect these recurring issues. He emphasizes the importance of understanding the root cause of vulnerabilities and using both human insight and automated tools to address them across the vast codebase of Microsoft's offerings. </p><p> </p><h3>
<strong>In This Episode You Will Learn</strong>:     </h3><ul>
<li>The challenges of variant hunting and its significant impact on improving overall security </li>
<li>Growing complexity of variant hunting and the necessity of thorough documentation </li>
<li>What is important to consider when approaching a security vulnerability </li>
</ul><p> </p><h3>
<strong>Some Questions We Ask: </strong>     </h3><ul>
<li>Are there industry tools or publicly available resources you recommend for variant hunting? </li>
<li>How can you identify the security boundary a vulnerability affects? </li>
<li>Is variant hunting something only humans can do, or can tools and automation help? </li>
</ul><p> </p><h3>
<strong>Resources:</strong>  </h3><p><a href="https://www.linkedin.com/in/guy-arazi-8b0aba83/?originalSubdomain=il">View Guy Arazi on LinkedIn </a>    </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><h3>
<strong>Related Microsoft Podcasts:</strong>   </h3><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><p> </p><p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em> </p>]]>
      </content:encoded>
      <itunes:duration>2641</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[85d1803c-3d54-11ef-ab80-5b4baf87bc2b]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4489726095.mp3?updated=1726255528" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ryen Macababbad on How Security Can Empower Productivity </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/36/notes</link>
      <description>Ryen Macababbad, Principal Security Program Manager at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Ryen discusses their career journey, including the return to Microsoft after working in security architecture and customer trust engineering. Ryen shares insights from their time at Hacker Summer Camp 2024 in Las Vegas, emphasizing the importance of creating frictionless security measures that don't hinder productivity. They explain that when security becomes a barrier, users will find workarounds, potentially compromising security. The conversation touches on the evolving relationship between security and productivity teams, highlighting the need for security to be an enabler rather than an obstacle. 
 
 

In This Episode You Will Learn:    
 

How investing in security helps maintain customer trust and protects revenue 

Why security should be built-in by default so users don't need to be security experts 

The importance of incorporating feedback and diverse viewpoints to enhance security 

 
 

Some Questions We Ask:     
 

How is a seamless security and productivity experience provided for end users? 

Can security researchers contribute to identifying gaps and improving product security? 

What motivated the shift from a focus on identity and program management to defensive security? 

 

Resources:  
View Ryen Macababbad on LinkedIn     
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 

Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  </description>
      <pubDate>Wed, 04 Sep 2024 07:10:00 -0000</pubDate>
      <itunes:title>Ryen Macababbad on How Security Can Empower Productivity </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Ryen Macababbad, Principal Security Program Manager at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Ryen discusses their career journey, including the return to Microsoft after working in security architecture and customer trust engineering. Ryen shares insights from their time at Hacker Summer Camp 2024 in Las Vegas, emphasizing the importance of creating frictionless security measures that don't hinder productivity. They explain that when security becomes a barrier, users will find workarounds, potentially compromising security. The conversation touches on the evolving relationship between security and productivity teams, highlighting the need for security to be an enabler rather than an obstacle. 
 
 

In This Episode You Will Learn:    
 

How investing in security helps maintain customer trust and protects revenue 

Why security should be built-in by default so users don't need to be security experts 

The importance of incorporating feedback and diverse viewpoints to enhance security 

 
 

Some Questions We Ask:     
 

How is a seamless security and productivity experience provided for end users? 

Can security researchers contribute to identifying gaps and improving product security? 

What motivated the shift from a focus on identity and program management to defensive security? 

 

Resources:  
View Ryen Macababbad on LinkedIn     
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 

Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  </itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/ryen-macababbad/">Ryen Macababbad</a>, Principal Security Program Manager at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Ryen discusses their career journey, including the return to Microsoft after working in security architecture and customer trust engineering. Ryen shares insights from their time at Hacker Summer Camp 2024 in Las Vegas, emphasizing the importance of creating frictionless security measures that don't hinder productivity. They explain that when security becomes a barrier, users will find workarounds, potentially compromising security. The conversation touches on the evolving relationship between security and productivity teams, highlighting the need for security to be an enabler rather than an obstacle. </p><p> </p><p> </p><h3>
<strong>In This Episode You Will Learn</strong>:    </h3><p> </p><ul>
<li>How investing in security helps maintain customer trust and protects revenue </li>
<li>Why security should be built-in by default so users don't need to be security experts </li>
<li>The importance of incorporating feedback and diverse viewpoints to enhance security </li>
</ul><p> </p><p> </p><h3>
<strong>Some Questions We Ask: </strong>    </h3><p> </p><ul>
<li>How is a seamless security and productivity experience provided for end users? </li>
<li>Can security researchers contribute to identifying gaps and improving product security? </li>
<li>What motivated the shift from a focus on identity and program management to defensive security? </li>
</ul><p> </p><h3>
<strong>Resources:</strong>  </h3><p><a href="https://www.linkedin.com/in/ryen-macababbad/">View Ryen Macababbad on LinkedIn</a>     </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><h3>
<strong>Related Microsoft Podcasts:</strong>  </h3><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p>]]>
      </content:encoded>
      <itunes:duration>2442</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[85b40c0a-3d54-11ef-ab80-e328dded0cda]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW8406216155.mp3?updated=1725371508" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Michael Howard on Secure by Design vs Secure by Default </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/35/notes</link>
      <description>Michael Howard, Senior Director at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Michael shares his journey at Microsoft, starting from his early days in New Zealand as part of a small team of ten. He discusses his extensive career, his contributions to cybersecurity, and his role in the development of essential security books like "Writing Secure Code" and "The Security Development Lifecycle." Michael reflects on the importance of fundamental security principles and how they remain relevant today. He also touches on his recent move within Microsoft to John Lambert's team, where he continues to focus on security culture and education. The conversation delves into the origins of the Blue Hat conference, Michael's experiences at the first event, and the ongoing significance of secure coding practices and mitigations. 
 
 

In This Episode You Will Learn:    

Critical aspects of secure software development and pivotal moments in Microsoft's security 

The importance of using specific coding constructs and libraries to improve security 

Findings on vulnerabilities that spurred significant security improvements in SQL Server 

 

Some Questions We Ask:      

How do you deploy security patches effectively while minimizing disruptions? 

What coding constructs and compiler flags did you recommend for better security? 

How did external researchers at Blue Hat conferences impact Microsoft's culture? 

 

Resources:  
View Michael Howard on LinkedIn    
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 
The Microsoft Azure Security Podcast  
Michael Howard (@michael_howard) on X (twitter.com) 
Latest book: Designing and Developing Secure Azure Solutions (Developer Best Practices): Howard, Michael, Simone, Curzi, Heinrich, Gantenbein: 9780137908752: Amazon.com: Books 
 

Related Microsoft Podcasts:   


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</description>
      <pubDate>Tue, 27 Aug 2024 22:29:00 -0000</pubDate>
      <itunes:title>Michael Howard on Secure by Design vs Secure by Default </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Michael Howard, Senior Director at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Michael shares his journey at Microsoft, starting from his early days in New Zealand as part of a small team of ten. He discusses his extensive career, his contributions to cybersecurity, and his role in the development of essential security books like "Writing Secure Code" and "The Security Development Lifecycle." Michael reflects on the importance of fundamental security principles and how they remain relevant today. He also touches on his recent move within Microsoft to John Lambert's team, where he continues to focus on security culture and education. The conversation delves into the origins of the Blue Hat conference, Michael's experiences at the first event, and the ongoing significance of secure coding practices and mitigations. 
 
 

In This Episode You Will Learn:    

Critical aspects of secure software development and pivotal moments in Microsoft's security 

The importance of using specific coding constructs and libraries to improve security 

Findings on vulnerabilities that spurred significant security improvements in SQL Server 

 

Some Questions We Ask:      

How do you deploy security patches effectively while minimizing disruptions? 

What coding constructs and compiler flags did you recommend for better security? 

How did external researchers at Blue Hat conferences impact Microsoft's culture? 

 

Resources:  
View Michael Howard on LinkedIn    
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 
The Microsoft Azure Security Podcast  
Michael Howard (@michael_howard) on X (twitter.com) 
Latest book: Designing and Developing Secure Azure Solutions (Developer Best Practices): Howard, Michael, Simone, Curzi, Heinrich, Gantenbein: 9780137908752: Amazon.com: Books 
 

Related Microsoft Podcasts:   


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/mikehow/">Michael Howard</a>, Senior Director at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Michael shares his journey at Microsoft, starting from his early days in New Zealand as part of a small team of ten. He discusses his extensive career, his contributions to cybersecurity, and his role in the development of essential security books like "Writing Secure Code" and "The Security Development Lifecycle." Michael reflects on the importance of fundamental security principles and how they remain relevant today. He also touches on his recent move within Microsoft to John Lambert's team, where he continues to focus on security culture and education. The conversation delves into the origins of the Blue Hat conference, Michael's experiences at the first event, and the ongoing significance of secure coding practices and mitigations. </p><p> </p><p> </p><h3>
<strong>In This Episode You Will Learn</strong>:    </h3><ul>
<li>Critical aspects of secure software development and pivotal moments in Microsoft's security </li>
<li>The importance of using specific coding constructs and libraries to improve security </li>
<li>Findings on vulnerabilities that spurred significant security improvements in SQL Server </li>
</ul><p> </p><h3>
<strong>Some Questions We Ask: </strong>     </h3><ul>
<li>How do you deploy security patches effectively while minimizing disruptions? </li>
<li>What coding constructs and compiler flags did you recommend for better security? </li>
<li>How did external researchers at Blue Hat conferences impact Microsoft's culture? </li>
</ul><p> </p><h3>
<strong>Resources:</strong>  </h3><p><a href="https://www.linkedin.com/in/mikehow/">View Michael Howard on LinkedIn</a>    </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><a href="https://azuresecuritypodcast.azurewebsites.net/">The Microsoft Azure Security Podcast</a>  </p><p><a href="https://twitter.com/michael_howard">Michael Howard (@michael_howard) on X (twitter.com)</a> </p><p>Latest book: <a href="https://www.amazon.com/Designing-Developing-Solutions-Developer-Practices/dp/013790875X">Designing and Developing Secure Azure Solutions (Developer Best Practices): Howard, Michael, Simone, Curzi, Heinrich, Gantenbein: 9780137908752: Amazon.com: Books</a> </p><p> </p><h3>
<strong>Related Microsoft Podcasts:</strong>   </h3><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><p><br></p><p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.</em></p>]]>
      </content:encoded>
      <itunes:duration>2894</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[85968fd6-3d54-11ef-ab80-1b639aabb170]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW9735594475.mp3?updated=1724798085" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Navigating AI Safety and Security Challenges with Yonatan Zunger</title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/34/notes</link>
      <description>Yonatan Zunger, CVP of AI Safety &amp; Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. 
 
 

In This Episode You Will Learn:    
 

How predictive AI anticipates outcomes based on historical data 

The difficulties and strategies involved in making AI systems safe and secure from misuse 

How role-playing exercises help developers understand the behavior of AI systems 

 

Some Questions We Ask:     
 

What distinguishes predictive AI from generative AI? 

Can generative AI be used to improve decision-making processes? 

What is the role of unit testing and test cases in policy and AI system development? 


 

Resources:  
View Yonatan Zunger on LinkedIn     
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 

 

Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  </description>
      <pubDate>Wed, 07 Aug 2024 07:10:00 -0000</pubDate>
      <itunes:title>Navigating AI Safety and Security Challenges with Yonatan Zunger</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Yonatan Zunger, CVP of AI Safety &amp; Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. 
 
 

In This Episode You Will Learn:    
 

How predictive AI anticipates outcomes based on historical data 

The difficulties and strategies involved in making AI systems safe and secure from misuse 

How role-playing exercises help developers understand the behavior of AI systems 

 

Some Questions We Ask:     
 

What distinguishes predictive AI from generative AI? 

Can generative AI be used to improve decision-making processes? 

What is the role of unit testing and test cases in policy and AI system development? 


 

Resources:  
View Yonatan Zunger on LinkedIn     
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 

 

Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  </itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/yonatanzunger/">Yonatan Zunger</a>, CVP of AI Safety &amp; Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. </p><p> </p><p> </p><h3>
<strong>In This Episode You Will Learn</strong>:    </h3><p> </p><ul>
<li>How predictive AI anticipates outcomes based on historical data </li>
<li>The difficulties and strategies involved in making AI systems safe and secure from misuse </li>
<li>How role-playing exercises help developers understand the behavior of AI systems </li>
</ul><p> </p><h3>
<strong>Some Questions We Ask: </strong>    </h3><p> </p><ul>
<li>What distinguishes predictive AI from generative AI? </li>
<li>Can generative AI be used to improve decision-making processes? </li>
<li>What is the role of unit testing and test cases in policy and AI system development? </li>
</ul><p><br></p><p> </p><h3>
<strong>Resources:</strong>  </h3><p><a href="https://www.linkedin.com/in/yonatanzunger/">View Yonatan Zunger on LinkedIn</a>     </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><br></p><p> </p><h3>
<strong>Related Microsoft Podcasts:</strong>  </h3><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p>]]>
      </content:encoded>
      <itunes:duration>3214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[857b8542-3d54-11ef-ab80-c78ca7045254]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4336681504.mp3?updated=1722887049" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Craig Nelson on Simulating Attacks with Microsoft’s Red Team</title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/33/notes</link>
      <description>Craig Nelson, leader of Microsoft's Red Team joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Craig explains how the Red Team simulates attacks on Microsoft's infrastructure to identify vulnerabilities and protect customer data stored in the cloud. He emphasizes the importance of these simulated attacks in preparing for real threats and describes the collaborative efforts with other security teams at Microsoft, such as the Azure penetration testing team and the Microsoft Security Response Center. Craig shares his personal journey into cybersecurity, highlighting his early fascination with cryptography and computer security. He also discusses the unique challenges and strategies of Red Teaming at Microsoft, including the need to influence engineering teams and the importance of systemic thinking to create durable security solutions. 
 

In This Episode You Will Learn:    

The need for early detection of vulnerabilities during the development lifecycle 

Why a mix of technical and persuasive skill build successful red teams 

Significance of internal security education and training initiatives 

 

Some Questions We Ask:     

What projects are you pursuing in AI and security? 

How do you have conversations with engineers to influence their security decisions? 

What skills are important for someone aspiring to join the Red Team? 

  

Resources:  
View Craig Nelson on LinkedIn   
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 



Related Microsoft Podcasts:   


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  </description>
      <pubDate>Wed, 24 Jul 2024 07:10:00 -0000</pubDate>
      <itunes:title>Craig Nelson on Simulating Attacks with Microsoft’s Red Team</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Craig Nelson, leader of Microsoft's Red Team joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Craig explains how the Red Team simulates attacks on Microsoft's infrastructure to identify vulnerabilities and protect customer data stored in the cloud. He emphasizes the importance of these simulated attacks in preparing for real threats and describes the collaborative efforts with other security teams at Microsoft, such as the Azure penetration testing team and the Microsoft Security Response Center. Craig shares his personal journey into cybersecurity, highlighting his early fascination with cryptography and computer security. He also discusses the unique challenges and strategies of Red Teaming at Microsoft, including the need to influence engineering teams and the importance of systemic thinking to create durable security solutions. 
 

In This Episode You Will Learn:    

The need for early detection of vulnerabilities during the development lifecycle 

Why a mix of technical and persuasive skill build successful red teams 

Significance of internal security education and training initiatives 

 

Some Questions We Ask:     

What projects are you pursuing in AI and security? 

How do you have conversations with engineers to influence their security decisions? 

What skills are important for someone aspiring to join the Red Team? 

  

Resources:  
View Craig Nelson on LinkedIn   
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 



Related Microsoft Podcasts:   


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  </itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/craigmsft/">Craig Nelson</a>, leader of Microsoft's Red Team joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Craig explains how the Red Team simulates attacks on Microsoft's infrastructure to identify vulnerabilities and protect customer data stored in the cloud. He emphasizes the importance of these simulated attacks in preparing for real threats and describes the collaborative efforts with other security teams at Microsoft, such as the Azure penetration testing team and the Microsoft Security Response Center. Craig shares his personal journey into cybersecurity, highlighting his early fascination with cryptography and computer security. He also discusses the unique challenges and strategies of Red Teaming at Microsoft, including the need to influence engineering teams and the importance of systemic thinking to create durable security solutions. </p><p> </p><h3>
<strong>In This Episode You Will Learn</strong>:    </h3><ul>
<li>The need for early detection of vulnerabilities during the development lifecycle </li>
<li>Why a mix of technical and persuasive skill build successful red teams </li>
<li>Significance of internal security education and training initiatives </li>
</ul><p> </p><h3>
<strong>Some Questions We Ask: </strong>    </h3><ul>
<li>What projects are you pursuing in AI and security? </li>
<li>How do you have conversations with engineers to influence their security decisions? </li>
<li>What skills are important for someone aspiring to join the Red Team? </li>
</ul><p>  </p><h3>
<strong>Resources:</strong>  </h3><p><a href="https://www.linkedin.com/in/craigmsft/">View Craig Nelson on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><br></p><p><br></p><h3>
<strong>Related Microsoft Podcasts:</strong>   </h3><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p>]]>
      </content:encoded>
      <itunes:duration>2269</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8561391c-3d54-11ef-ab80-cff240188cfa]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4336962624.mp3?updated=1721415959" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unlocking Backdoor AI Poisoning with Dmitrijs Trizna </title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/32/notes</link>
      <description>Dmitrijs Trizna, Security Researcher at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Dmitrijs explains his role at Microsoft, focusing on AI-based cyber threat detection for Kubernetes and Linux platforms. Dmitrijs explores the complex landscape of securing AI systems, focusing on the emerging challenges of Trustworthy AI. He delves into how threat actors exploit vulnerabilities through techniques like backdoor poisoning, using gradual benign inputs to deceive AI models. Dmitrijs highlights the multidisciplinary approach required for effective AI security, combining AI expertise with rigorous security practices. He also discusses the resilience of gradient-boosted decision trees against such attacks and shares insights from his recent presentation at Blue Hat India, where he noted a strong interest in AI security.  
 
 

In This Episode You Will Learn:    
 

The concept of Trustworthy AI and its importance in today's technology landscape 

How threat actors exploit AI vulnerabilities using backdoor poisoning techniques 

The role of frequency and unusual inputs in compromising AI model integrity 

 
 

Some Questions We Ask:     
 

Could you elaborate on the resilience of gradient-boosted decision trees in AI security? 

What interdisciplinary approaches are necessary for effective AI security? 

How do we determine acceptable thresholds for AI model degradation in security contexts? 

  
 

Resources:  
View Dmitrijs Trizna on LinkedIn  
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 

Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </description>
      <pubDate>Wed, 10 Jul 2024 07:10:00 -0000</pubDate>
      <itunes:title>Unlocking Backdoor AI Poisoning with Dmitrijs Trizna </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Dmitrijs Trizna, Security Researcher at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Dmitrijs explains his role at Microsoft, focusing on AI-based cyber threat detection for Kubernetes and Linux platforms. Dmitrijs explores the complex landscape of securing AI systems, focusing on the emerging challenges of Trustworthy AI. He delves into how threat actors exploit vulnerabilities through techniques like backdoor poisoning, using gradual benign inputs to deceive AI models. Dmitrijs highlights the multidisciplinary approach required for effective AI security, combining AI expertise with rigorous security practices. He also discusses the resilience of gradient-boosted decision trees against such attacks and shares insights from his recent presentation at Blue Hat India, where he noted a strong interest in AI security.  
 
 

In This Episode You Will Learn:    
 

The concept of Trustworthy AI and its importance in today's technology landscape 

How threat actors exploit AI vulnerabilities using backdoor poisoning techniques 

The role of frequency and unusual inputs in compromising AI model integrity 

 
 

Some Questions We Ask:     
 

Could you elaborate on the resilience of gradient-boosted decision trees in AI security? 

What interdisciplinary approaches are necessary for effective AI security? 

How do we determine acceptable thresholds for AI model degradation in security contexts? 

  
 

Resources:  
View Dmitrijs Trizna on LinkedIn  
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 
 

Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network.  </itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/ditrizna/?originalSubdomain=cz">Dmitrijs Trizna</a>, Security Researcher at Microsoft joins Nic Fillingham on this week's episode of The BlueHat Podcast. Dmitrijs explains his role at Microsoft, focusing on AI-based cyber threat detection for Kubernetes and Linux platforms. Dmitrijs explores the complex landscape of securing AI systems, focusing on the emerging challenges of Trustworthy AI. He delves into how threat actors exploit vulnerabilities through techniques like backdoor poisoning, using gradual benign inputs to deceive AI models. Dmitrijs highlights the multidisciplinary approach required for effective AI security, combining AI expertise with rigorous security practices. He also discusses the resilience of gradient-boosted decision trees against such attacks and shares insights from his recent presentation at Blue Hat India, where he noted a strong interest in AI security.  </p><p> </p><p> </p><h3>
<strong>In This Episode You Will Learn</strong>:    </h3><p> </p><ul>
<li>The concept of Trustworthy AI and its importance in today's technology landscape </li>
<li>How threat actors exploit AI vulnerabilities using backdoor poisoning techniques </li>
<li>The role of frequency and unusual inputs in compromising AI model integrity </li>
</ul><p> </p><p> </p><h3>
<strong>Some Questions We Ask: </strong>    </h3><p> </p><ul>
<li>Could you elaborate on the resilience of gradient-boosted decision trees in AI security? </li>
<li>What interdisciplinary approaches are necessary for effective AI security? </li>
<li>How do we determine acceptable thresholds for AI model degradation in security contexts? </li>
</ul><p>  </p><p> </p><h3>
<strong>Resources:</strong>  </h3><p><a href="https://www.linkedin.com/in/ditrizna/?originalSubdomain=cz">View Dmitrijs Trizna on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><h3>
<strong>Related Microsoft Podcasts:</strong>  </h3><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><p><br></p><p><em>The BlueHat Podcast is produced by Microsoft and distributed as part of N2K media network. </em> </p>]]>
      </content:encoded>
      <itunes:duration>2813</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8542c2e8-3d54-11ef-ab80-2f91fef482fa]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2033705705.mp3?updated=1720535698" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From Morris to Azure: Shawn Hernan’s Three Decades in Security </title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/from-morris-to-azure-shawn-hernans-three-decades-in-security</link>
      <description>Shawn Hernan, Partner Security Engineering Group Manager at Microsoft joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Shawn leads Microsoft Cloud &amp; AI Security Assurance, overseeing an international team of security professionals dedicated to proactively addressing security challenges through vulnerability research, penetration testing, and threat modeling. Drawing from his extensive experience in early cybersecurity, Shawn shares valuable insights into the evolving landscape, stressing the significance of academic knowledge and practical experience. From navigating intricate technical terrains to fostering a growth mindset, this episode provides a compelling glimpse into the ongoing pursuit of security excellence in today's digital era. 
 
 
In This Episode You Will Learn:    
 

Addressing root causes of vulnerabilities reported by third parties or found internally 

Developing tools and a deep understanding of specific classes of vulnerabilities 

Research on areas like crypto hygiene and missing integrity vulnerabilities 

 
Some Questions We Ask:     
 

How does your team handle variant hunting for critical cases? 

When researchers find issues in Azure, how does your team get involved? 

How do you foster a security culture within Microsoft and your team? 

 
Resources:  
View Shawn Hernan on LinkedIn     
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 26 Jun 2024 07:10:00 -0000</pubDate>
      <itunes:title>From Morris to Azure: Shawn Hernan’s Three Decades in Security </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b4a02856-33fd-11ef-88d1-73dfbae0e072/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;&lt;a href="https://www.linkedin.com/in/shawnhernan/" rel="noopener noreferrer" target="_blank"&gt;Shawn Hernan&lt;/a&gt;, Partner Security Engineering Group Manager at Microsoft joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Shawn leads Microsoft Cloud &amp;amp; AI Security Assurance, overseeing an international team of security professionals dedicated to proactively addressing security challenges through vulnerability research, penetration testing, and threat modeling. Drawing from his extensive experience in early cybersecurity, Shawn shares valuable insights into the evolving landscape, stressing the significance of academic knowledge and practical experience. From navigating intricate technical terrains to fostering a growth mindset, this episode provides a compelling glimpse into the ongoing pursuit of security excellence in today's digital era.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Addressing root causes of vulnerabilities reported by third parties or found internally&amp;nbsp;&lt;/li&gt;&lt;li&gt;Developing tools and a deep understanding of specific classes of vulnerabilities&amp;nbsp;&lt;/li&gt;&lt;li&gt;Research on areas like crypto hygiene and missing integrity vulnerabilities&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How does your team handle variant hunting for critical cases?&amp;nbsp;&lt;/li&gt;&lt;li&gt;When researchers find issues in Azure, how does your team get involved?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How do you foster a security culture within Microsoft and your team?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/shawnhernan/" rel="noopener noreferrer" target="_blank"&gt;View Shawn Hernan on LinkedIn&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Shawn Hernan, Partner Security Engineering Group Manager at Microsoft joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Shawn leads Microsoft Cloud &amp; AI Security Assurance, overseeing an international team of security professionals dedicated to proactively addressing security challenges through vulnerability research, penetration testing, and threat modeling. Drawing from his extensive experience in early cybersecurity, Shawn shares valuable insights into the evolving landscape, stressing the significance of academic knowledge and practical experience. From navigating intricate technical terrains to fostering a growth mindset, this episode provides a compelling glimpse into the ongoing pursuit of security excellence in today's digital era. 
 
 
In This Episode You Will Learn:    
 

Addressing root causes of vulnerabilities reported by third parties or found internally 

Developing tools and a deep understanding of specific classes of vulnerabilities 

Research on areas like crypto hygiene and missing integrity vulnerabilities 

 
Some Questions We Ask:     
 

How does your team handle variant hunting for critical cases? 

When researchers find issues in Azure, how does your team get involved? 

How do you foster a security culture within Microsoft and your team? 

 
Resources:  
View Shawn Hernan on LinkedIn     
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/shawnhernan/">Shawn Hernan</a>, Partner Security Engineering Group Manager at Microsoft joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Shawn leads Microsoft Cloud &amp; AI Security Assurance, overseeing an international team of security professionals dedicated to proactively addressing security challenges through vulnerability research, penetration testing, and threat modeling. Drawing from his extensive experience in early cybersecurity, Shawn shares valuable insights into the evolving landscape, stressing the significance of academic knowledge and practical experience. From navigating intricate technical terrains to fostering a growth mindset, this episode provides a compelling glimpse into the ongoing pursuit of security excellence in today's digital era. </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>Addressing root causes of vulnerabilities reported by third parties or found internally </li>
<li>Developing tools and a deep understanding of specific classes of vulnerabilities </li>
<li>Research on areas like crypto hygiene and missing integrity vulnerabilities </li>
</ul><p> </p><p><strong>Some Questions We Ask: </strong>    </p><p> </p><ul>
<li>How does your team handle variant hunting for critical cases? </li>
<li>When researchers find issues in Azure, how does your team get involved? </li>
<li>How do you foster a security culture within Microsoft and your team? </li>
</ul><p> </p><br><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/shawnhernan/">View Shawn Hernan on LinkedIn</a>     </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><br><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><br><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2629</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6670b5a29e45e1a3117fc251]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW9417154947.mp3?updated=1719435322" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MSRC VP Tom Gallagher on 25 Years of Security at Microsoft</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/msrc-vp-tom-gallagher-on-25-years-of-security-at-microsoft</link>
      <description>Tom Gallagher, VP of Engineering and head of MSRC, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. After nearly 25 years at Microsoft, Tom reflects on his early days at the company, where he started as a penetration tester on SharePoint, offering insights into the evolving landscape of cybersecurity since 1999. Tom shares a few different experiences from his journey, including auditing a local ISP's security in exchange for a job, and his transition from an intern working on Internet Explorer's rendering engine to key roles in Office and eventually MSRC. Through Tom's experiences, you’ll gain a unique perspective on Microsoft's cybersecurity evolution and the broader industry landscape.  
 
 
In This Episode You Will Learn:    
 

A Clippy vulnerability that exemplifies the importance of external insights 

How you can support teams when they find vulnerabilities in their code 

Tom's experiences attending early Black Hat and DEFCON conferences 

 
 
Some Questions We Ask:     
 

How does your experience as a bug hunter influence your role at MSRC? 

Can you elaborate on the process of mitigating vulnerabilities quickly within SFI? 

Will you explain Trustworthy Computing and its significance in Microsoft's history? 

  
Resources:  
View Tom Gallagher on LinkedIn      
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 12 Jun 2024 07:10:00 -0000</pubDate>
      <itunes:title>MSRC VP Tom Gallagher on 25 Years of Security at Microsoft</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b4eb2450-33fd-11ef-88d1-d737f76d70e3/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;&lt;a href="https://www.linkedin.com/in/togallagher/" rel="noopener noreferrer" target="_blank"&gt;Tom Gallagher&lt;/a&gt;, VP of Engineering and head of MSRC, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. After nearly 25 years at Microsoft, Tom reflects on his early days at the company, where he started as a penetration tester on SharePoint, offering insights into the evolving landscape of cybersecurity since 1999. Tom shares a few different experiences from his journey, including auditing a local ISP's security in exchange for a job, and his transition from an intern working on Internet Explorer's rendering engine to key roles in Office and eventually MSRC. Through Tom's experiences, you’ll gain a unique perspective on Microsoft's cybersecurity evolution and the broader industry landscape.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;A Clippy vulnerability that exemplifies the importance of external insights&amp;nbsp;&lt;/li&gt;&lt;li&gt;How you can support teams when they find vulnerabilities in their code&amp;nbsp;&lt;/li&gt;&lt;li&gt;Tom's experiences attending early Black Hat and DEFCON conferences&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How does your experience as a bug hunter influence your role at MSRC?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Can you elaborate on the process of mitigating vulnerabilities quickly within SFI?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Will you explain Trustworthy Computing and its significance in Microsoft's history?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/togallagher/" rel="noopener noreferrer" target="_blank"&gt;View Tom Gallagher on LinkedIn&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Tom Gallagher, VP of Engineering and head of MSRC, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. After nearly 25 years at Microsoft, Tom reflects on his early days at the company, where he started as a penetration tester on SharePoint, offering insights into the evolving landscape of cybersecurity since 1999. Tom shares a few different experiences from his journey, including auditing a local ISP's security in exchange for a job, and his transition from an intern working on Internet Explorer's rendering engine to key roles in Office and eventually MSRC. Through Tom's experiences, you’ll gain a unique perspective on Microsoft's cybersecurity evolution and the broader industry landscape.  
 
 
In This Episode You Will Learn:    
 

A Clippy vulnerability that exemplifies the importance of external insights 

How you can support teams when they find vulnerabilities in their code 

Tom's experiences attending early Black Hat and DEFCON conferences 

 
 
Some Questions We Ask:     
 

How does your experience as a bug hunter influence your role at MSRC? 

Can you elaborate on the process of mitigating vulnerabilities quickly within SFI? 

Will you explain Trustworthy Computing and its significance in Microsoft's history? 

  
Resources:  
View Tom Gallagher on LinkedIn      
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/togallagher/">Tom Gallagher</a>, VP of Engineering and head of MSRC, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. After nearly 25 years at Microsoft, Tom reflects on his early days at the company, where he started as a penetration tester on SharePoint, offering insights into the evolving landscape of cybersecurity since 1999. Tom shares a few different experiences from his journey, including auditing a local ISP's security in exchange for a job, and his transition from an intern working on Internet Explorer's rendering engine to key roles in Office and eventually MSRC. Through Tom's experiences, you’ll gain a unique perspective on Microsoft's cybersecurity evolution and the broader industry landscape.  </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>A Clippy vulnerability that exemplifies the importance of external insights </li>
<li>How you can support teams when they find vulnerabilities in their code </li>
<li>Tom's experiences attending early Black Hat and DEFCON conferences </li>
</ul><p> </p><p> </p><p><strong>Some Questions We Ask: </strong>    </p><p> </p><ul>
<li>How does your experience as a bug hunter influence your role at MSRC? </li>
<li>Can you elaborate on the process of mitigating vulnerabilities quickly within SFI? </li>
<li>Will you explain Trustworthy Computing and its significance in Microsoft's history? </li>
</ul><p>  </p><br><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/togallagher/">View Tom Gallagher on LinkedIn</a>      </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>1900</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[66677ae0347d8700125f5aab]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW7313235254.mp3?updated=1719435323" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Educating the Future: Aaron Tng's Cybersecurity Blueprint</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/educating-the-future-aaron-tngs-cybersecurity-blueprint</link>
      <description>Aaron Tng, a Microsoft Student Ambassador and BlueHat Conference Speaker, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Aaron shares how his curiosity during the pandemic in 2020, sparked by the surge in cyber-attacks, propelled him into the world of cybersecurity. Through dedicated self-learning and leveraging resources like the Microsoft Learn website, Aaron achieved multiple certifications, laying the foundation for his expertise in cybersecurity.  Aaron is also passionate about the impact of Cybersecurity on society and actively promoting K-12 Cybersecurity Awareness and Education. He unveils his comprehensive four-point plan, which encompasses fundamental courses, advanced studies, educator training, and real-life internship opportunities. Aaron emphasizes the importance of moving beyond surface-level internet safety education, advocating for a deeper understanding of secure coding and threat modeling.  
 
 
In This Episode You Will Learn:    
 

The different resources utilized for Aaron’s cybersecurity education 

Aspirations for the future of cybersecurity education 

How Aaron founded a student-led nonprofit called Cyber Secure it 

 
 
Some Questions We Ask:     
 

What challenges did you face presenting to the Washington State Board of Education? 

How did you earn multiple cybersecurity certifications while still in high school? 

Why do you believe it's crucial to move beyond surface-level internet safety? 

 
 
Resources:  
View Aaron Tng on LinkedIn    
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 29 May 2024 07:10:00 -0000</pubDate>
      <itunes:title>Educating the Future: Aaron Tng's Cybersecurity Blueprint</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b53649da-33fd-11ef-88d1-37b62afff347/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;&lt;a href="https://www.linkedin.com/in/aaron-tng-80825722a/" rel="noopener noreferrer" target="_blank"&gt;Aaron Tng&lt;/a&gt;, a Microsoft Student Ambassador and BlueHat Conference Speaker, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Aaron shares how his curiosity during the pandemic in 2020, sparked by the surge in cyber-attacks, propelled him into the world of cybersecurity. Through dedicated self-learning and leveraging resources like the Microsoft Learn website, Aaron achieved multiple certifications, laying the foundation for his expertise in cybersecurity.&amp;nbsp; Aaron is also passionate about the impact of Cybersecurity on society and actively promoting K-12 Cybersecurity Awareness and Education. He unveils his comprehensive four-point plan, which encompasses fundamental courses, advanced studies, educator training, and real-life internship opportunities. Aaron emphasizes the importance of moving beyond surface-level internet safety education, advocating for a deeper understanding of secure coding and threat modeling.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The different resources utilized for Aaron’s cybersecurity education&amp;nbsp;&lt;/li&gt;&lt;li&gt;Aspirations for the future of cybersecurity education&amp;nbsp;&lt;/li&gt;&lt;li&gt;How Aaron founded a student-led nonprofit called Cyber Secure it&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What challenges did you face presenting to the Washington State Board of Education?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How did you earn multiple cybersecurity certifications while still in high school?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why do you believe it's crucial to move beyond surface-level internet safety?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/aaron-tng-80825722a/" rel="noopener noreferrer" target="_blank"&gt;View Aaron Tng on LinkedIn&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Aaron Tng, a Microsoft Student Ambassador and BlueHat Conference Speaker, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Aaron shares how his curiosity during the pandemic in 2020, sparked by the surge in cyber-attacks, propelled him into the world of cybersecurity. Through dedicated self-learning and leveraging resources like the Microsoft Learn website, Aaron achieved multiple certifications, laying the foundation for his expertise in cybersecurity.  Aaron is also passionate about the impact of Cybersecurity on society and actively promoting K-12 Cybersecurity Awareness and Education. He unveils his comprehensive four-point plan, which encompasses fundamental courses, advanced studies, educator training, and real-life internship opportunities. Aaron emphasizes the importance of moving beyond surface-level internet safety education, advocating for a deeper understanding of secure coding and threat modeling.  
 
 
In This Episode You Will Learn:    
 

The different resources utilized for Aaron’s cybersecurity education 

Aspirations for the future of cybersecurity education 

How Aaron founded a student-led nonprofit called Cyber Secure it 

 
 
Some Questions We Ask:     
 

What challenges did you face presenting to the Washington State Board of Education? 

How did you earn multiple cybersecurity certifications while still in high school? 

Why do you believe it's crucial to move beyond surface-level internet safety? 

 
 
Resources:  
View Aaron Tng on LinkedIn    
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/aaron-tng-80825722a/">Aaron Tng</a>, a Microsoft Student Ambassador and BlueHat Conference Speaker, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Aaron shares how his curiosity during the pandemic in 2020, sparked by the surge in cyber-attacks, propelled him into the world of cybersecurity. Through dedicated self-learning and leveraging resources like the Microsoft Learn website, Aaron achieved multiple certifications, laying the foundation for his expertise in cybersecurity.  Aaron is also passionate about the impact of Cybersecurity on society and actively promoting K-12 Cybersecurity Awareness and Education. He unveils his comprehensive four-point plan, which encompasses fundamental courses, advanced studies, educator training, and real-life internship opportunities. Aaron emphasizes the importance of moving beyond surface-level internet safety education, advocating for a deeper understanding of secure coding and threat modeling.  </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>The different resources utilized for Aaron’s cybersecurity education </li>
<li>Aspirations for the future of cybersecurity education </li>
<li>How Aaron founded a student-led nonprofit called Cyber Secure it </li>
</ul><p> </p><p> </p><p><strong>Some Questions We Ask: </strong>    </p><p> </p><ul>
<li>What challenges did you face presenting to the Washington State Board of Education? </li>
<li>How did you earn multiple cybersecurity certifications while still in high school? </li>
<li>Why do you believe it's crucial to move beyond surface-level internet safety? </li>
</ul><p> </p><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/aaron-tng-80825722a/">View Aaron Tng on LinkedIn</a>    </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>1973</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[665631a62287560012abc95a]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1347849540.mp3?updated=1719435323" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From Specs to Security</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/from-specs-to-security</link>
      <description>Dor Dali, Head of Security Research at Cyolo, joins Nic Fillingham on this week's episode of The BlueHat Podcast. They delve into Dor's journey into cybersecurity, from pranking friends as a teenager to his professional roles, including his involvement in the Blue Hat conference through GE, where he helped create the Capture The Flag (CTF) challenge. Dor details the vulnerabilities in the RDP protocol by closely following the protocol specifications and identifying discrepancies that led to security flaws. They detail a vulnerability related to RDP Gateway's UDP cookie authentication process, the implications of Dor's research for other security researchers and hackers and the importance of leveraging available resources, such as protocol specifications and open-source implementations, to understand closed-source systems better and potentially uncover vulnerabilities. 
 
 
In This Episode You Will Learn:    
 

The unique perspective Dor has with RDP security research 

How to approach security research when following the protocol specifications 

The importance of clear documentation in preventing security vulnerabilities 

 
 
Some Questions We Ask:     
 

How did you design and build the Capture the Flag event? 

Did you face any unexpected hurdles while researching the RDP protocol's security? 

Have you found other security vulnerabilities by closely adhering to protocol specifications? 

 
 
Resources:  
View Dor Dali on LinkedIn   
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 15 May 2024 07:10:00 -0000</pubDate>
      <itunes:title>From Specs to Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b57d5bb8-33fd-11ef-88d1-27227a075d51/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;&lt;a href="https://www.linkedin.com/in/dordali/" rel="noopener noreferrer" target="_blank"&gt;Dor Dali&lt;/a&gt;, Head of Security Research at Cyolo, joins Nic Fillingham on this week's episode of The BlueHat Podcast. They delve into Dor's journey into cybersecurity, from pranking friends as a teenager to his professional roles, including his involvement in the Blue Hat conference through GE, where he helped create the Capture The Flag (CTF) challenge. Dor details the vulnerabilities in the RDP protocol by closely following the protocol specifications and identifying discrepancies that led to security flaws. They detail a vulnerability related to RDP Gateway's UDP cookie authentication process, the implications of Dor's research for other security researchers and hackers and the importance of leveraging available resources, such as protocol specifications and open-source implementations, to understand closed-source systems better and potentially uncover vulnerabilities.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The unique perspective Dor has with RDP security research&amp;nbsp;&lt;/li&gt;&lt;li&gt;How to approach security research when following the protocol specifications&amp;nbsp;&lt;/li&gt;&lt;li&gt;The importance of clear documentation in preventing security vulnerabilities&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How did you design and build the Capture the Flag event?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Did you face any unexpected hurdles while researching the RDP protocol's security?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Have you found other security vulnerabilities by closely adhering to protocol specifications?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/dordali/" rel="noopener noreferrer" target="_blank"&gt;View Dor Dali on LinkedIn&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Dor Dali, Head of Security Research at Cyolo, joins Nic Fillingham on this week's episode of The BlueHat Podcast. They delve into Dor's journey into cybersecurity, from pranking friends as a teenager to his professional roles, including his involvement in the Blue Hat conference through GE, where he helped create the Capture The Flag (CTF) challenge. Dor details the vulnerabilities in the RDP protocol by closely following the protocol specifications and identifying discrepancies that led to security flaws. They detail a vulnerability related to RDP Gateway's UDP cookie authentication process, the implications of Dor's research for other security researchers and hackers and the importance of leveraging available resources, such as protocol specifications and open-source implementations, to understand closed-source systems better and potentially uncover vulnerabilities. 
 
 
In This Episode You Will Learn:    
 

The unique perspective Dor has with RDP security research 

How to approach security research when following the protocol specifications 

The importance of clear documentation in preventing security vulnerabilities 

 
 
Some Questions We Ask:     
 

How did you design and build the Capture the Flag event? 

Did you face any unexpected hurdles while researching the RDP protocol's security? 

Have you found other security vulnerabilities by closely adhering to protocol specifications? 

 
 
Resources:  
View Dor Dali on LinkedIn   
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/dordali/">Dor Dali</a>, Head of Security Research at Cyolo, joins Nic Fillingham on this week's episode of The BlueHat Podcast. They delve into Dor's journey into cybersecurity, from pranking friends as a teenager to his professional roles, including his involvement in the Blue Hat conference through GE, where he helped create the Capture The Flag (CTF) challenge. Dor details the vulnerabilities in the RDP protocol by closely following the protocol specifications and identifying discrepancies that led to security flaws. They detail a vulnerability related to RDP Gateway's UDP cookie authentication process, the implications of Dor's research for other security researchers and hackers and the importance of leveraging available resources, such as protocol specifications and open-source implementations, to understand closed-source systems better and potentially uncover vulnerabilities. </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>The unique perspective Dor has with RDP security research </li>
<li>How to approach security research when following the protocol specifications </li>
<li>The importance of clear documentation in preventing security vulnerabilities </li>
</ul><p> </p><p> </p><p><strong>Some Questions We Ask: </strong>    </p><p> </p><ul>
<li>How did you design and build the Capture the Flag event? </li>
<li>Did you face any unexpected hurdles while researching the RDP protocol's security? </li>
<li>Have you found other security vulnerabilities by closely adhering to protocol specifications? </li>
</ul><p> </p><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/dordali/">View Dor Dali on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2020</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[66427dd1e18d8b00132b852a]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4381172275.mp3?updated=1719435324" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beyond the Code: Ethics and AI with Katie Paxton-Fear</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/beyond-the-code-ethics-and-ai-with-katie-paxton-fear</link>
      <description>Cyber Security Content Creator, Speaker &amp; Ethical Hacker, Katie Paxton-Fear, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Katie holds a PhD in defense and security AI plus cybersecurity and works as an academic, teaching undergraduate students cybersecurity topics. She also runs a popular YouTube channel focused on bug bounty hunting, hacking, and pen testing. Katie shares her journey into cybersecurity, reflects on her initial interest in undeciphered languages and how it parallels her approach to cybersecurity, both involving a fascination with solving mysteries and uncovering hidden meanings.  
 
In This Episode You Will Learn:    
 

Approaching AI systems with caution when translating less-documented languages 

Concerns surrounding the use of copyrighted training data in AI systems 

Recognizing and addressing AI system limitations and biases in real-world deployments. 

 
Some Questions We Ask:     
 

Can fine-tuning AI models prevent degradation and improve performance? 

What are the ethical implications of putting sensitive information into AI systems 

How does relying on niche or obscure training data impact AI models? 

 
Resources:  
View Katie Paxton-Fear on LinkedIn  
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 01 May 2024 07:10:00 -0000</pubDate>
      <itunes:title>Beyond the Code: Ethics and AI with Katie Paxton-Fear</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b5c26a5a-33fd-11ef-88d1-1fcd29acce56/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Cyber Security Content Creator, Speaker &amp;amp; Ethical Hacker, &lt;a href="https://www.linkedin.com/in/katiepf/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank"&gt;Katie Paxton-Fear&lt;/a&gt;, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Katie holds a PhD in defense and security AI plus cybersecurity and works as an academic, teaching undergraduate students cybersecurity topics. She also runs a popular YouTube channel focused on bug bounty hunting, hacking, and pen testing. Katie shares her journey into cybersecurity, reflects on her initial interest in undeciphered languages and how it parallels her approach to cybersecurity, both involving a fascination with solving mysteries and uncovering hidden meanings.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Approaching AI systems with caution when translating less-documented languages&amp;nbsp;&lt;/li&gt;&lt;li&gt;Concerns surrounding the use of copyrighted training data in AI systems&amp;nbsp;&lt;/li&gt;&lt;li&gt;Recognizing and addressing AI system limitations and biases in real-world deployments.&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Can fine-tuning AI models prevent degradation and improve performance?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What are the ethical implications of putting sensitive information into AI systems&amp;nbsp;&lt;/li&gt;&lt;li&gt;How does relying on niche or obscure training data impact AI models?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/katiepf/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank"&gt;View Katie Paxton-Fear on LinkedIn&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Cyber Security Content Creator, Speaker &amp; Ethical Hacker, Katie Paxton-Fear, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Katie holds a PhD in defense and security AI plus cybersecurity and works as an academic, teaching undergraduate students cybersecurity topics. She also runs a popular YouTube channel focused on bug bounty hunting, hacking, and pen testing. Katie shares her journey into cybersecurity, reflects on her initial interest in undeciphered languages and how it parallels her approach to cybersecurity, both involving a fascination with solving mysteries and uncovering hidden meanings.  
 
In This Episode You Will Learn:    
 

Approaching AI systems with caution when translating less-documented languages 

Concerns surrounding the use of copyrighted training data in AI systems 

Recognizing and addressing AI system limitations and biases in real-world deployments. 

 
Some Questions We Ask:     
 

Can fine-tuning AI models prevent degradation and improve performance? 

What are the ethical implications of putting sensitive information into AI systems 

How does relying on niche or obscure training data impact AI models? 

 
Resources:  
View Katie Paxton-Fear on LinkedIn  
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber Security Content Creator, Speaker &amp; Ethical Hacker, <a href="https://www.linkedin.com/in/katiepf/?originalSubdomain=uk">Katie Paxton-Fear</a>, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Katie holds a PhD in defense and security AI plus cybersecurity and works as an academic, teaching undergraduate students cybersecurity topics. She also runs a popular YouTube channel focused on bug bounty hunting, hacking, and pen testing. Katie shares her journey into cybersecurity, reflects on her initial interest in undeciphered languages and how it parallels her approach to cybersecurity, both involving a fascination with solving mysteries and uncovering hidden meanings.  </p><p> </p><br><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>Approaching AI systems with caution when translating less-documented languages </li>
<li>Concerns surrounding the use of copyrighted training data in AI systems </li>
<li>Recognizing and addressing AI system limitations and biases in real-world deployments. </li>
</ul><p> </p><p><strong>Some Questions We Ask: </strong>    </p><p> </p><ul>
<li>Can fine-tuning AI models prevent degradation and improve performance? </li>
<li>What are the ethical implications of putting sensitive information into AI systems </li>
<li>How does relying on niche or obscure training data impact AI models? </li>
</ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/katiepf/?originalSubdomain=uk">View Katie Paxton-Fear on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2625</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[662c1188437bd7001268b935]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6414243998.mp3?updated=1719435324" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SaaS Exposed: Unmasking Cyber Risks in Cloud Integrations</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/saas-exposed-unmasking-cyber-risks-in-cloud-integrations</link>
      <description>Luke Jennings, VP of Research &amp; Development at Push Security joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Luke explains his recent presentation on a new SaaS cyber kill chain, exploring how attackers might target modern organizations heavily reliant on cloud and SaaS services, even when traditional infrastructure is minimal. The latest kill chain involves developing attack techniques specific to this environment, covering topics like lateral movement without conventional network infrastructure and adapting known techniques such as password guessing attacks to the SaaS landscape. Luke, Wendy, and Nic discuss the complexities of SaaS security, the intricacies of evil twin integrations, detection challenges, mitigation strategies, and the overall impact of these security issues on organizations. 
  
 
In This Episode You Will Learn:    
 

Identifying malicious activities and understanding normal application behavior 

The importance of having structured methodologies for approving SaaS app usage 

Challenges organizations face in detecting and preventing SaaS application threats 

 
 
Some Questions We Ask:     
 

How can an organization create alerts for new, unknown SaaS app integrations? 

What happens when a SaaS app integration is duplicated by an attacker? 

Would having a structured methodology for SaaS app usage help minimize risk? 

 
Resources:  
View Luke Jennings on LinkedIn  
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 17 Apr 2024 07:05:00 -0000</pubDate>
      <itunes:title>SaaS Exposed: Unmasking Cyber Risks in Cloud Integrations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b60acfac-33fd-11ef-88d1-a7d1edde8d2f/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;&lt;a href="https://www.linkedin.com/in/luke-jennings-042b5619b/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank"&gt;Luke Jennings&lt;/a&gt;, VP of Research &amp;amp; Development at Push Security joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Luke explains his recent presentation on a new SaaS cyber kill chain, exploring how attackers might target modern organizations heavily reliant on cloud and SaaS services, even when traditional infrastructure is minimal. The latest kill chain involves developing attack techniques specific to this environment, covering topics like lateral movement without conventional network infrastructure and adapting known techniques such as password guessing attacks to the SaaS landscape. Luke, Wendy, and Nic discuss the complexities of SaaS security, the intricacies of evil twin integrations, detection challenges, mitigation strategies, and the overall impact of these security issues on organizations.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Identifying malicious activities and understanding normal application behavior&amp;nbsp;&lt;/li&gt;&lt;li&gt;The importance of having structured methodologies for approving SaaS app usage&amp;nbsp;&lt;/li&gt;&lt;li&gt;Challenges organizations face in detecting and preventing SaaS application threats&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How can an organization create alerts for new, unknown SaaS app integrations?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What happens when a SaaS app integration is duplicated by an attacker?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Would having a structured methodology for SaaS app usage help minimize risk?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/luke-jennings-042b5619b/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank"&gt;View Luke Jennings on LinkedIn&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Luke Jennings, VP of Research &amp; Development at Push Security joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Luke explains his recent presentation on a new SaaS cyber kill chain, exploring how attackers might target modern organizations heavily reliant on cloud and SaaS services, even when traditional infrastructure is minimal. The latest kill chain involves developing attack techniques specific to this environment, covering topics like lateral movement without conventional network infrastructure and adapting known techniques such as password guessing attacks to the SaaS landscape. Luke, Wendy, and Nic discuss the complexities of SaaS security, the intricacies of evil twin integrations, detection challenges, mitigation strategies, and the overall impact of these security issues on organizations. 
  
 
In This Episode You Will Learn:    
 

Identifying malicious activities and understanding normal application behavior 

The importance of having structured methodologies for approving SaaS app usage 

Challenges organizations face in detecting and preventing SaaS application threats 

 
 
Some Questions We Ask:     
 

How can an organization create alerts for new, unknown SaaS app integrations? 

What happens when a SaaS app integration is duplicated by an attacker? 

Would having a structured methodology for SaaS app usage help minimize risk? 

 
Resources:  
View Luke Jennings on LinkedIn  
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/luke-jennings-042b5619b/?originalSubdomain=uk">Luke Jennings</a>, VP of Research &amp; Development at Push Security joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Luke explains his recent presentation on a new SaaS cyber kill chain, exploring how attackers might target modern organizations heavily reliant on cloud and SaaS services, even when traditional infrastructure is minimal. The latest kill chain involves developing attack techniques specific to this environment, covering topics like lateral movement without conventional network infrastructure and adapting known techniques such as password guessing attacks to the SaaS landscape. Luke, Wendy, and Nic discuss the complexities of SaaS security, the intricacies of evil twin integrations, detection challenges, mitigation strategies, and the overall impact of these security issues on organizations. </p><p>  </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>Identifying malicious activities and understanding normal application behavior </li>
<li>The importance of having structured methodologies for approving SaaS app usage </li>
<li>Challenges organizations face in detecting and preventing SaaS application threats </li>
</ul><p> </p><p> </p><p><strong>Some Questions We Ask: </strong>    </p><p> </p><ul>
<li>How can an organization create alerts for new, unknown SaaS app integrations? </li>
<li>What happens when a SaaS app integration is duplicated by an attacker? </li>
<li>Would having a structured methodology for SaaS app usage help minimize risk? </li>
</ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/luke-jennings-042b5619b/?originalSubdomain=uk">View Luke Jennings on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p>   </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[661d85767b6cf200178bd4cb]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW5318549514.mp3?updated=1719435325" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Decoding Conference Proposals with Lea Snyder</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/decoding-conference-proposals</link>
      <description>Lea Snyder, Principal Security Engineer at Microsoft joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Lea is a security leader focused on security strategy and helping organizations mature their security posture and security programs, focusing on areas including IAM, product security, and risk management. Lea explains her unique role as a security architect, highlighting problem-solving across various domains within Microsoft. She shares her unconventional path to cybersecurity, starting with a background in economics and an MBA, and how she transitioned from IT roles to security. Lea, Wendy, and Nic discuss the importance of diverse backgrounds in the industry and offer advice on entering the cybersecurity field. Lea also discusses her involvement in community-driven conferences, particularly B-sides, highlighting their diverse and unique content. 
  
 
In This Episode You Will Learn:    
 

Tips for submitting conference proposals 

Challenges when balancing anonymity during a submission 

The importance of a supportive approach in the conference submission process 

 
Some Questions We Ask:     
 

Is there a typical anonymization process to ensure fairness and inclusivity? 

What are some challenges when selecting talks that resonate with an audience? 

Can you elaborate on the value behind B-sides conferences and the unique atmosphere?  

 
Resources:  
View Lea Snyder on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 03 Apr 2024 07:10:00 -0000</pubDate>
      <itunes:title>Decoding Conference Proposals with Lea Snyder</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b653f1c8-33fd-11ef-88d1-479d70bfdbe6/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;&lt;a href="https://www.linkedin.com/in/leasnyder/" rel="noopener noreferrer" target="_blank"&gt;Lea Snyder&lt;/a&gt;, Principal Security Engineer at Microsoft joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Lea is a security leader focused on security strategy and helping organizations mature their security posture and security programs, focusing on areas including IAM, product security, and risk management. Lea explains her unique role as a security architect, highlighting problem-solving across various domains within Microsoft. She shares her unconventional path to cybersecurity, starting with a background in economics and an MBA, and how she transitioned from IT roles to security. Lea, Wendy, and Nic discuss the importance of diverse backgrounds in the industry and offer advice on entering the cybersecurity field. Lea also discusses her involvement in community-driven conferences, particularly B-sides, highlighting their diverse and unique content.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Tips for submitting conference proposals&amp;nbsp;&lt;/li&gt;&lt;li&gt;Challenges when balancing anonymity during a submission&amp;nbsp;&lt;/li&gt;&lt;li&gt;The importance of a supportive approach in the conference submission process&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Is there a typical anonymization process to ensure fairness and inclusivity?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What are some challenges when selecting talks that resonate with an audience?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Can you elaborate on the value behind B-sides conferences and the unique atmosphere?&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/leasnyder/" rel="noopener noreferrer" target="_blank"&gt;View Lea Snyder on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Lea Snyder, Principal Security Engineer at Microsoft joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Lea is a security leader focused on security strategy and helping organizations mature their security posture and security programs, focusing on areas including IAM, product security, and risk management. Lea explains her unique role as a security architect, highlighting problem-solving across various domains within Microsoft. She shares her unconventional path to cybersecurity, starting with a background in economics and an MBA, and how she transitioned from IT roles to security. Lea, Wendy, and Nic discuss the importance of diverse backgrounds in the industry and offer advice on entering the cybersecurity field. Lea also discusses her involvement in community-driven conferences, particularly B-sides, highlighting their diverse and unique content. 
  
 
In This Episode You Will Learn:    
 

Tips for submitting conference proposals 

Challenges when balancing anonymity during a submission 

The importance of a supportive approach in the conference submission process 

 
Some Questions We Ask:     
 

Is there a typical anonymization process to ensure fairness and inclusivity? 

What are some challenges when selecting talks that resonate with an audience? 

Can you elaborate on the value behind B-sides conferences and the unique atmosphere?  

 
Resources:  
View Lea Snyder on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/leasnyder/">Lea Snyder</a>, Principal Security Engineer at Microsoft joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Lea is a security leader focused on security strategy and helping organizations mature their security posture and security programs, focusing on areas including IAM, product security, and risk management. Lea explains her unique role as a security architect, highlighting problem-solving across various domains within Microsoft. She shares her unconventional path to cybersecurity, starting with a background in economics and an MBA, and how she transitioned from IT roles to security. Lea, Wendy, and Nic discuss the importance of diverse backgrounds in the industry and offer advice on entering the cybersecurity field. Lea also discusses her involvement in community-driven conferences, particularly B-sides, highlighting their diverse and unique content. </p><p>  </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>Tips for submitting conference proposals </li>
<li>Challenges when balancing anonymity during a submission </li>
<li>The importance of a supportive approach in the conference submission process </li>
</ul><p> </p><p><strong>Some Questions We Ask: </strong>    </p><p> </p><ul>
<li>Is there a typical anonymization process to ensure fairness and inclusivity? </li>
<li>What are some challenges when selecting talks that resonate with an audience? </li>
<li>Can you elaborate on the value behind B-sides conferences and the unique atmosphere?  </li>
</ul><p> </p><br><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/leasnyder/">View Lea Snyder on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p>   </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2877</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[660c57815ad9410016ccfd21]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1914360812.mp3?updated=1719435325" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Securing the Past with Dustin Heywood</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/securing-the-past-with-dustin-heywood</link>
      <description>Dustin Heywood, Hacker, Researcher, and Senior Leader at IBM, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Dustin provided a live demonstration of cracking NTLM version 1 during his BlueHat presentation, showcasing the process of responding to challenges, using coercion techniques, and ultimately extracting and cracking the NTLM hash. Dustin, Nic, and Wendy discuss checking group policies, auditing every object, ensuring relevant systems, and managing IT assets effectively. They emphasize the importance of IT asset management and recommend quarantining legacy systems with restricted access. 
  
 
In This Episode You Will Learn:    
 

Why security professionals need business skills for effective communication 

Advice for auditing legacy systems with vulnerable protocols  

Extracting DPAPI keys and decrypting browser session history 

 
 
Some Questions We Ask:     
 

How do you manage risk for legacy systems deemed necessary for business? 

Can you discuss some of the outdated protocols in current IT environments? 

What guidance would you offer to IT professionals looking to audit their systems? 


 
Resources:  
View Dustin Heywood on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 20 Mar 2024 07:05:00 -0000</pubDate>
      <itunes:title>Securing the Past with Dustin Heywood</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b69f8f8e-33fd-11ef-88d1-ff743705d6ed/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;&lt;a href="https://www.linkedin.com/in/evilmog/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank"&gt;Dustin Heywood&lt;/a&gt;, Hacker, Researcher, and Senior Leader at IBM, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Dustin provided a live demonstration of cracking NTLM version 1 during his BlueHat presentation, showcasing the process of responding to challenges, using coercion techniques, and ultimately extracting and cracking the NTLM hash. Dustin, Nic, and Wendy discuss checking group policies, auditing every object, ensuring relevant systems, and managing IT assets effectively. They emphasize the importance of IT asset management and recommend quarantining legacy systems with restricted access.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Why security professionals need business skills for effective communication&amp;nbsp;&lt;/li&gt;&lt;li&gt;Advice for auditing legacy systems with vulnerable protocols&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Extracting DPAPI keys and decrypting browser session history&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How do you manage risk for legacy systems deemed necessary for business?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Can you discuss some of the outdated protocols in current IT environments?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What guidance would you offer to IT professionals looking to audit their systems?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/evilmog/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank"&gt;View Dustin Heywood on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Dustin Heywood, Hacker, Researcher, and Senior Leader at IBM, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Dustin provided a live demonstration of cracking NTLM version 1 during his BlueHat presentation, showcasing the process of responding to challenges, using coercion techniques, and ultimately extracting and cracking the NTLM hash. Dustin, Nic, and Wendy discuss checking group policies, auditing every object, ensuring relevant systems, and managing IT assets effectively. They emphasize the importance of IT asset management and recommend quarantining legacy systems with restricted access. 
  
 
In This Episode You Will Learn:    
 

Why security professionals need business skills for effective communication 

Advice for auditing legacy systems with vulnerable protocols  

Extracting DPAPI keys and decrypting browser session history 

 
 
Some Questions We Ask:     
 

How do you manage risk for legacy systems deemed necessary for business? 

Can you discuss some of the outdated protocols in current IT environments? 

What guidance would you offer to IT professionals looking to audit their systems? 


 
Resources:  
View Dustin Heywood on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/evilmog/?originalSubdomain=ca">Dustin Heywood</a>, Hacker, Researcher, and Senior Leader at IBM, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Dustin provided a live demonstration of cracking NTLM version 1 during his BlueHat presentation, showcasing the process of responding to challenges, using coercion techniques, and ultimately extracting and cracking the NTLM hash. Dustin, Nic, and Wendy discuss checking group policies, auditing every object, ensuring relevant systems, and managing IT assets effectively. They emphasize the importance of IT asset management and recommend quarantining legacy systems with restricted access. </p><p>  </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>Why security professionals need business skills for effective communication </li>
<li>Advice for auditing legacy systems with vulnerable protocols  </li>
<li>Extracting DPAPI keys and decrypting browser session history </li>
</ul><p> </p><p> </p><p><strong>Some Questions We Ask: </strong>    </p><p> </p><ul>
<li>How do you manage risk for legacy systems deemed necessary for business? </li>
<li>Can you discuss some of the outdated protocols in current IT environments? </li>
<li>What guidance would you offer to IT professionals looking to audit their systems? </li>
</ul><p><br></p><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/evilmog/?originalSubdomain=ca">View Dustin Heywood on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><br><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2516</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65f8dc4fc44f31001721fe75]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW3893859577.mp3?updated=1719435326" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaking Bias: Tera Joyce and Tina Zhang-Powell on Celebrating Women in Cybersecurity</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/breaking-bias-tera-joyce-and-tina-zhang-powell-on-celebratin</link>
      <description>Microsoft Principal Security Engineering, Tera Joyce and Senior Security Program Manager at Microsoft, Tina Zhang-Powell join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. As we celebrate International Women's Day and Women's History Month, Tina and Tera join the show to discuss the importance of allies in promoting inclusivity and diversity within the industry. They both  provide valuable perspectives on assumptions made about women in cybersecurity and offer guidance on fostering an inclusive environment. They highlight the importance of leaders being aware of representation and ensuring diverse perspectives are considered in the decision-making processes and share internal resources like mentoring programs and external opportunities such as conferences to support women in the field. Tina and Tera also offer advice to allies, encouraging them to actively include diverse voices and how they can contribute to creating a more inclusive cybersecurity community. 
 
 
In This Episode You Will Learn:    
 

The significance of allies in promoting diversity and inclusivity 

How we can address small instances of unconscious bias 

The importance of discovering one's calling within the security field 

 
 
Some Questions We Ask:     
 

Can you share any resources or ways to support women in cybersecurity? 

How can allies better support women in the cybersecurity industry? 

Any advice for women or individuals interested in entering the tech and cybersecurity field? 

 
Resources:  
View Tera Joyce on LinkedIn 
View Tina Zhang-Powell on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Fri, 08 Mar 2024 07:05:00 -0000</pubDate>
      <itunes:title>Breaking Bias: Tera Joyce and Tina Zhang-Powell on Celebrating Women in Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b6ea155e-33fd-11ef-88d1-a3ccba4d0991/image/ced297b993d2f42cd4eda90626beeace.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Microsoft Principal Security Engineering, &lt;a href="https://www.linkedin.com/in/terajoyce/" rel="noopener noreferrer" target="_blank"&gt;Tera Joyce&lt;/a&gt; and Senior Security Program Manager at Microsoft, &lt;a href="https://www.linkedin.com/in/tina-zhang-powell/" rel="noopener noreferrer" target="_blank"&gt;Tina Zhang-Powell&lt;/a&gt; join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. As we celebrate International Women's Day and Women's History Month, Tina and Tera join the show to discuss the importance of allies in promoting inclusivity and diversity within the industry. They both&amp;nbsp; provide valuable perspectives on assumptions made about women in cybersecurity and offer guidance on fostering an inclusive environment. They highlight the importance of leaders being aware of representation and ensuring diverse perspectives are considered in the decision-making processes and share internal resources like mentoring programs and external opportunities such as conferences to support women in the field. Tina and Tera also offer advice to allies, encouraging them to actively include diverse voices and how they can contribute to creating a more inclusive cybersecurity community.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The significance of allies in promoting diversity and inclusivity&amp;nbsp;&lt;/li&gt;&lt;li&gt;How we can address small instances of unconscious bias&amp;nbsp;&lt;/li&gt;&lt;li&gt;The importance of discovering one's calling within the security field&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Can you share any resources or ways to support women in cybersecurity?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How can allies better support women in the cybersecurity industry?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Any advice for women or individuals interested in entering the tech and cybersecurity field?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/terajoyce/" rel="noopener noreferrer" target="_blank"&gt;View Tera Joyce on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/tina-zhang-powell/" rel="noopener noreferrer" target="_blank"&gt;View Tina Zhang-Powell on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Microsoft Principal Security Engineering, Tera Joyce and Senior Security Program Manager at Microsoft, Tina Zhang-Powell join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. As we celebrate International Women's Day and Women's History Month, Tina and Tera join the show to discuss the importance of allies in promoting inclusivity and diversity within the industry. They both  provide valuable perspectives on assumptions made about women in cybersecurity and offer guidance on fostering an inclusive environment. They highlight the importance of leaders being aware of representation and ensuring diverse perspectives are considered in the decision-making processes and share internal resources like mentoring programs and external opportunities such as conferences to support women in the field. Tina and Tera also offer advice to allies, encouraging them to actively include diverse voices and how they can contribute to creating a more inclusive cybersecurity community. 
 
 
In This Episode You Will Learn:    
 

The significance of allies in promoting diversity and inclusivity 

How we can address small instances of unconscious bias 

The importance of discovering one's calling within the security field 

 
 
Some Questions We Ask:     
 

Can you share any resources or ways to support women in cybersecurity? 

How can allies better support women in the cybersecurity industry? 

Any advice for women or individuals interested in entering the tech and cybersecurity field? 

 
Resources:  
View Tera Joyce on LinkedIn 
View Tina Zhang-Powell on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft Principal Security Engineering, <a href="https://www.linkedin.com/in/terajoyce/">Tera Joyce</a> and Senior Security Program Manager at Microsoft, <a href="https://www.linkedin.com/in/tina-zhang-powell/">Tina Zhang-Powell</a> join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. As we celebrate International Women's Day and Women's History Month, Tina and Tera join the show to discuss the importance of allies in promoting inclusivity and diversity within the industry. They both  provide valuable perspectives on assumptions made about women in cybersecurity and offer guidance on fostering an inclusive environment. They highlight the importance of leaders being aware of representation and ensuring diverse perspectives are considered in the decision-making processes and share internal resources like mentoring programs and external opportunities such as conferences to support women in the field. Tina and Tera also offer advice to allies, encouraging them to actively include diverse voices and how they can contribute to creating a more inclusive cybersecurity community. </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>The significance of allies in promoting diversity and inclusivity </li>
<li>How we can address small instances of unconscious bias </li>
<li>The importance of discovering one's calling within the security field </li>
</ul><p> </p><p> </p><p><strong>Some Questions We Ask: </strong>    </p><p> </p><ul>
<li>Can you share any resources or ways to support women in cybersecurity? </li>
<li>How can allies better support women in the cybersecurity industry? </li>
<li>Any advice for women or individuals interested in entering the tech and cybersecurity field? </li>
</ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/terajoyce/">View Tera Joyce on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/tina-zhang-powell/">View Tina Zhang-Powell on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>3080</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65e901b785840a0017a24b38]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6991233352.mp3?updated=1719435326" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Black Voices Matter: The Role of Allyship in Cybersecurity with Devin Price and Derrick Love</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/black-voices-matter-the-role-of-allyship-in-cybersecurity-wi</link>
      <description>Microsoft Security Technical Program Manager Devin Price and Sr. Program Manager Derrick Love join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. The discussion delves into the experience of being Black in the cybersecurity field. Derrick and Devin share their thoughts on the representation of Black individuals in tech, noting the underrepresentation in the field. The significance of representation and allyship is also discussed while emphasizing the importance of paying it forward, mentoring others, and highlighting the responsibility to support those coming up in the field. Devin and Derrick share the importance of involvement with events that promote the black community, black businesses, and black-led nonprofits. These events aim to create a supportive network within the community, particularly for those working in the technology sector. It underlines the significance of adopting a growth mindset, fostering a sense of community, and actively contributing to the empowerment of individuals within the cybersecurity landscape.  
   
In This Episode You Will Learn:    
 

How mentorship can help the growth of underrepresented individuals in security 

Actionable advice for fostering diversity in the industry 

Why representation and allyship is so vital for Cybersecurity 

 
Some Questions We Ask:     
 

What challenges and rewards come with working in cybersecurity? 

How can we positively affect and support the Black community in tech? 

Can you share actionable advice for fostering diversity in the industry? 

 
Resources:  
View Devin Price on LinkedIn  
View Derrick Love on LinkedIn  
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
Beam Foundation  
Sync Seattle  
 
The Talking Tech Podcast  
BAM Scholarship 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 21 Feb 2024 07:05:00 -0000</pubDate>
      <itunes:title>Black Voices Matter: The Role of Allyship in Cybersecurity with Devin Price and Derrick Love</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b738cd0c-33fd-11ef-88d1-a788503b028d/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Microsoft Security Technical Program Manager &lt;a href="https://www.linkedin.com/in/pricedevin/" rel="noopener noreferrer" target="_blank"&gt;Devin Price&lt;/a&gt; and Sr. Program Manager &lt;a href="https://www.linkedin.com/in/derricklove/" rel="noopener noreferrer" target="_blank"&gt;Derrick Love&lt;/a&gt; join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. The discussion delves into the experience of being Black in the cybersecurity field. Derrick and Devin share their thoughts on the representation of Black individuals in tech, noting the underrepresentation in the field. The significance of representation and allyship is also discussed while emphasizing the importance of paying it forward, mentoring others, and highlighting the responsibility to support those coming up in the field. Devin and Derrick share the importance of involvement with events that promote the black community, black businesses, and black-led nonprofits. These events aim to create a supportive network within the community, particularly for those working in the technology sector. It underlines the significance of adopting a growth mindset, fostering a sense of community, and actively contributing to the empowerment of individuals within the cybersecurity landscape.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How mentorship can help the growth of underrepresented individuals in security&amp;nbsp;&lt;/li&gt;&lt;li&gt;Actionable advice for fostering diversity in the industry&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why representation and allyship is so vital for Cybersecurity&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What challenges and rewards come with working in cybersecurity?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How can we positively affect and support the Black community in tech?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Can you share actionable advice for fostering diversity in the industry?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/pricedevin/" rel="noopener noreferrer" target="_blank"&gt;View Devin Price on LinkedIn&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/derricklove/" rel="noopener noreferrer" target="_blank"&gt;View Derrick Love on LinkedIn&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;a href="https://beamfoundationcharlotte.org/codingacademy/" rel="noopener noreferrer" target="_blank"&gt;Beam Foundation&amp;nbsp;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://syncseattle.com/" rel="noopener noreferrer" target="_blank"&gt;Sync Seattle&amp;nbsp;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.youtube.com/channel/UCuNEzfzu2Q2g1aQ3mqvr0eQ" rel="noopener noreferrer" target="_blank"&gt;The Talking Tech Podcast&amp;nbsp;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.microsoft.com/en-us/diversity/programs/bam-scholarship.aspx" rel="noopener noreferrer" target="_blank"&gt;BAM Scholarship&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Microsoft Security Technical Program Manager Devin Price and Sr. Program Manager Derrick Love join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. The discussion delves into the experience of being Black in the cybersecurity field. Derrick and Devin share their thoughts on the representation of Black individuals in tech, noting the underrepresentation in the field. The significance of representation and allyship is also discussed while emphasizing the importance of paying it forward, mentoring others, and highlighting the responsibility to support those coming up in the field. Devin and Derrick share the importance of involvement with events that promote the black community, black businesses, and black-led nonprofits. These events aim to create a supportive network within the community, particularly for those working in the technology sector. It underlines the significance of adopting a growth mindset, fostering a sense of community, and actively contributing to the empowerment of individuals within the cybersecurity landscape.  
   
In This Episode You Will Learn:    
 

How mentorship can help the growth of underrepresented individuals in security 

Actionable advice for fostering diversity in the industry 

Why representation and allyship is so vital for Cybersecurity 

 
Some Questions We Ask:     
 

What challenges and rewards come with working in cybersecurity? 

How can we positively affect and support the Black community in tech? 

Can you share actionable advice for fostering diversity in the industry? 

 
Resources:  
View Devin Price on LinkedIn  
View Derrick Love on LinkedIn  
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
Beam Foundation  
Sync Seattle  
 
The Talking Tech Podcast  
BAM Scholarship 
 
Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

  
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft Security Technical Program Manager <a href="https://www.linkedin.com/in/pricedevin/">Devin Price</a> and Sr. Program Manager <a href="https://www.linkedin.com/in/derricklove/">Derrick Love</a> join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. The discussion delves into the experience of being Black in the cybersecurity field. Derrick and Devin share their thoughts on the representation of Black individuals in tech, noting the underrepresentation in the field. The significance of representation and allyship is also discussed while emphasizing the importance of paying it forward, mentoring others, and highlighting the responsibility to support those coming up in the field. Devin and Derrick share the importance of involvement with events that promote the black community, black businesses, and black-led nonprofits. These events aim to create a supportive network within the community, particularly for those working in the technology sector. It underlines the significance of adopting a growth mindset, fostering a sense of community, and actively contributing to the empowerment of individuals within the cybersecurity landscape.  </p><p>   </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>How mentorship can help the growth of underrepresented individuals in security </li>
<li>Actionable advice for fostering diversity in the industry </li>
<li>Why representation and allyship is so vital for Cybersecurity </li>
</ul><p> </p><p><strong>Some Questions We Ask: </strong>    </p><p> </p><ul>
<li>What challenges and rewards come with working in cybersecurity? </li>
<li>How can we positively affect and support the Black community in tech? </li>
<li>Can you share actionable advice for fostering diversity in the industry? </li>
</ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/pricedevin/">View Devin Price on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/derricklove/">View Derrick Love on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><br><p><a href="https://beamfoundationcharlotte.org/codingacademy/">Beam Foundation </a> </p><p><a href="https://syncseattle.com/">Sync Seattle </a> </p><p> </p><p><a href="https://www.youtube.com/channel/UCuNEzfzu2Q2g1aQ3mqvr0eQ">The Talking Tech Podcast </a> </p><p><a href="https://www.microsoft.com/en-us/diversity/programs/bam-scholarship.aspx">BAM Scholarship</a> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p>  </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a></p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>3504</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65d51d3d5c901e0017909e02]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6143935417.mp3?updated=1719435327" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No Women; No Problem: Katelyn Falk on Creating an ERG for Women in Security</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/no-women-no-problem-katelyn-falk-on-creating-an-erg-for-wome</link>
      <description>Katelyn Falk, Principal Security TPM at Zoom, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Katelyn is a security technical program manager with 11+ years of experience across IT and security, both cyber and physical, and is also co-founder of Zoom's Women in Security group. Katelyn, Wendy, and Nic discuss the growth of Zoom, the challenges of fostering a sense of community in a rapidly expanding organization, and the importance of diversity and representation in the cybersecurity industry. Katelyn explains the inspiration behind her Blue Hat conference lightning talk, "No Women in Security Group, No Problem," and her role in creating the Women in Security Group. 

In This Episode You Will Learn:  


Practical steps for starting a Women in Security employee resource group

Advice on overcoming self-doubt when considering a leadership role

Examples of allyship, offering resources and support in meetings


Some Questions We Ask:   


How important is executive sponsorship, and how did you navigate securing it?

Can you outline the process of establishing a group leadership team?

How do you keep the members engaged and connected in a virtual setting?


Resources: 
View Katelyn Falk on LinkedIn
View Wendy Zenone on LinkedIn
View Nic Fillingham on LinkedIn
katelynfalk.com
Related Microsoft Podcasts: 


Microsoft Threat Intelligence Podcast 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks 


Discover and follow other Microsoft podcasts at microsoft.com/podcasts 
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 07 Feb 2024 07:05:00 -0000</pubDate>
      <itunes:title>No Women; No Problem: Katelyn Falk on Creating an ERG for Women in Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b78d5750-33fd-11ef-88d1-f729d3d88d5d/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;&lt;a href="https://www.linkedin.com/in/katelyn-falk/" rel="noopener noreferrer" target="_blank"&gt;Katelyn Falk&lt;/a&gt;, Principal Security TPM at Zoom, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Katelyn is a security technical program manager with 11+ years of experience across IT and security, both cyber and physical, and is also co-founder of Zoom's Women in Security group. Katelyn, Wendy, and Nic discuss the growth of Zoom, the challenges of fostering a sense of community in a rapidly expanding organization, and the importance of diversity and representation in the cybersecurity industry. Katelyn explains the inspiration behind her Blue Hat conference lightning talk, "No Women in Security Group, No Problem," and her role in creating the Women in Security Group.&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Practical steps for starting a Women in Security employee resource group&lt;/li&gt;&lt;li&gt;Advice on overcoming self-doubt when considering a leadership role&lt;/li&gt;&lt;li&gt;Examples of allyship, offering resources and support in meetings&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask: &lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How important is executive sponsorship, and how did you navigate securing it?&lt;/li&gt;&lt;li&gt;Can you outline the process of establishing a group leadership team?&lt;/li&gt;&lt;li&gt;How do you keep the members engaged and connected in a virtual setting?&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/katelyn-falk/" rel="noopener noreferrer" target="_blank"&gt;View Katelyn Falk on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;a href="https://katelynfalk.com" rel="noopener noreferrer" target="_blank"&gt;katelynfalk.com&lt;/a&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Katelyn Falk, Principal Security TPM at Zoom, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Katelyn is a security technical program manager with 11+ years of experience across IT and security, both cyber and physical, and is also co-founder of Zoom's Women in Security group. Katelyn, Wendy, and Nic discuss the growth of Zoom, the challenges of fostering a sense of community in a rapidly expanding organization, and the importance of diversity and representation in the cybersecurity industry. Katelyn explains the inspiration behind her Blue Hat conference lightning talk, "No Women in Security Group, No Problem," and her role in creating the Women in Security Group. 

In This Episode You Will Learn:  


Practical steps for starting a Women in Security employee resource group

Advice on overcoming self-doubt when considering a leadership role

Examples of allyship, offering resources and support in meetings


Some Questions We Ask:   


How important is executive sponsorship, and how did you navigate securing it?

Can you outline the process of establishing a group leadership team?

How do you keep the members engaged and connected in a virtual setting?


Resources: 
View Katelyn Falk on LinkedIn
View Wendy Zenone on LinkedIn
View Nic Fillingham on LinkedIn
katelynfalk.com
Related Microsoft Podcasts: 


Microsoft Threat Intelligence Podcast 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks 


Discover and follow other Microsoft podcasts at microsoft.com/podcasts 
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/katelyn-falk/">Katelyn Falk</a>, Principal Security TPM at Zoom, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Katelyn is a security technical program manager with 11+ years of experience across IT and security, both cyber and physical, and is also co-founder of Zoom's Women in Security group. Katelyn, Wendy, and Nic discuss the growth of Zoom, the challenges of fostering a sense of community in a rapidly expanding organization, and the importance of diversity and representation in the cybersecurity industry. Katelyn explains the inspiration behind her Blue Hat conference lightning talk, "No Women in Security Group, No Problem," and her role in creating the Women in Security Group. </p><br><p><br></p><p><strong>In This Episode You Will Learn</strong>:  </p><p><br></p><ul>
<li>Practical steps for starting a Women in Security employee resource group</li>
<li>Advice on overcoming self-doubt when considering a leadership role</li>
<li>Examples of allyship, offering resources and support in meetings</li>
</ul><p><br></p><br><p><strong>Some Questions We Ask: </strong>  </p><p><br></p><ul>
<li>How important is executive sponsorship, and how did you navigate securing it?</li>
<li>Can you outline the process of establishing a group leadership team?</li>
<li>How do you keep the members engaged and connected in a virtual setting?</li>
</ul><p><br></p><br><p><strong>Resources:</strong> </p><p><a href="https://www.linkedin.com/in/katelyn-falk/">View Katelyn Falk on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a></p><br><p><a href="https://katelynfalk.com">katelynfalk.com</a></p><br><p><strong>Related Microsoft Podcasts:</strong> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a> </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a> </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a> </li>
</ul><p><br></p><br><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a> </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2681</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65bd7eba0fb47b0017c983ae]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW3970705677.mp3?updated=1719435327" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Harnessing the Power of Community in Cybersecurity with Darren Spruell</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/harnessing-the-power-of-community-in-cybersecurity-with-darr</link>
      <description>Leading Threat Intelligence at InQuest, Darren Spruell joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Darren explains InQuest's focus on Deep File Inspection® technology to identify malicious traits in files and talks about their role in serving public and private sector companies. Darren shares his cybersecurity journey, passion for combating malware and criminal activities, and his presentation at BlueHat. Wendy, Nic, and Darren highlight the evolution of threat information sharing over the years and the value of intelligence advantage over adversaries. The conversation delves into the significance of threat indicators such as IP addresses, file hashes, domain names, and much more!  
 
In This Episode You Will Learn:    
 

The challenges of exchanging threat intelligence and person-to-person sharing 

Balancing technical expertise and leadership responsibilities 

The importance of evolving manual threat intelligence sharing practices 

 
Some Questions We Ask:    
 

How can practitioners enhance the effectiveness of threat intelligence? 

What types of security roles are sharing IOCs back and forth? 

Why is community engagement in the cybersecurity industry so necessary? 

 
Resources:  
View Darren Spruell on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 24 Jan 2024 07:05:00 -0000</pubDate>
      <itunes:title>Harnessing the Power of Community in Cybersecurity with Darren Spruell</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b7dbd024-33fd-11ef-88d1-135ef113fef6/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Leading Threat Intelligence at InQuest, &lt;a href="https://www.linkedin.com/in/dspruell/" rel="noopener noreferrer" target="_blank"&gt;Darren Spruell&lt;/a&gt; joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Darren explains InQuest's focus on Deep File Inspection® technology to identify malicious traits in files and talks about their role in serving public and private sector companies. Darren shares his cybersecurity journey, passion for combating malware and criminal activities, and his presentation at BlueHat. Wendy, Nic, and Darren highlight the evolution of threat information sharing over the years and the value of intelligence advantage over adversaries. The conversation delves into the significance of threat indicators such as IP addresses, file hashes, domain names, and much more!&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The challenges of exchanging threat intelligence and person-to-person sharing&amp;nbsp;&lt;/li&gt;&lt;li&gt;Balancing technical expertise and leadership responsibilities&amp;nbsp;&lt;/li&gt;&lt;li&gt;The importance of evolving manual threat intelligence sharing practices&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How can practitioners enhance the effectiveness of threat intelligence?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What types of security roles are sharing IOCs back and forth?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why is community engagement in the cybersecurity industry so necessary?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/dspruell/" rel="noopener noreferrer" target="_blank"&gt;View Darren Spruell on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Leading Threat Intelligence at InQuest, Darren Spruell joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Darren explains InQuest's focus on Deep File Inspection® technology to identify malicious traits in files and talks about their role in serving public and private sector companies. Darren shares his cybersecurity journey, passion for combating malware and criminal activities, and his presentation at BlueHat. Wendy, Nic, and Darren highlight the evolution of threat information sharing over the years and the value of intelligence advantage over adversaries. The conversation delves into the significance of threat indicators such as IP addresses, file hashes, domain names, and much more!  
 
In This Episode You Will Learn:    
 

The challenges of exchanging threat intelligence and person-to-person sharing 

Balancing technical expertise and leadership responsibilities 

The importance of evolving manual threat intelligence sharing practices 

 
Some Questions We Ask:    
 

How can practitioners enhance the effectiveness of threat intelligence? 

What types of security roles are sharing IOCs back and forth? 

Why is community engagement in the cybersecurity industry so necessary? 

 
Resources:  
View Darren Spruell on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:  


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Leading Threat Intelligence at InQuest, <a href="https://www.linkedin.com/in/dspruell/">Darren Spruell</a> joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Darren explains InQuest's focus on Deep File Inspection® technology to identify malicious traits in files and talks about their role in serving public and private sector companies. Darren shares his cybersecurity journey, passion for combating malware and criminal activities, and his presentation at BlueHat. Wendy, Nic, and Darren highlight the evolution of threat information sharing over the years and the value of intelligence advantage over adversaries. The conversation delves into the significance of threat indicators such as IP addresses, file hashes, domain names, and much more!  </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>The challenges of exchanging threat intelligence and person-to-person sharing </li>
<li>Balancing technical expertise and leadership responsibilities </li>
<li>The importance of evolving manual threat intelligence sharing practices </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>How can practitioners enhance the effectiveness of threat intelligence? </li>
<li>What types of security roles are sharing IOCs back and forth? </li>
<li>Why is community engagement in the cybersecurity industry so necessary? </li>
</ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/dspruell/">View Darren Spruell on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong>  </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65aaf7a3afb8f400168bf697]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW8633555244.mp3?updated=1719435328" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Canary (Tokens) in the Code Mine with Casey Smith</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/canary-tokens-in-the-code-mine-with-casey-smith</link>
      <description>Thinkst Canary, Cyber Security Researcher Casey Smith joins Nic Fillingham on this week's episode of The BlueHat Podcast. Nic and Casey discuss his background in security, his experience presenting at Blue Hat, and his session on building a Canary token to monitor Windows process execution. The Canary token project is an open-source initiative that creates artifacts on a network to alert defenders when an attacker interacts with them. The tokens can take various forms, such as documents, cloud credentials, QR codes, or executables, providing an early warning system for potential breaches. They also cover the importance of failure in the research process and the evolution of the canary token project to adapt to new attack techniques. 
 
 
In This Episode You Will Learn:    
 

The need for defenders to explore new features in the Windows operating system 

Challenges of keeping ahead of more sophisticated adversaries 

The use of legitimate binaries for malicious activities 

 
 
Some Questions We Ask:    
 

How do you balance curiosity-driven research with practical security concerns? 

What challenges do you see in the current state of endpoint security? 

How do you navigate working with customers and using what you learn for research? 

 
Resources:  
View Casey Smith on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:                 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks    


The Microsoft Threat Intelligence Podcast  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 10 Jan 2024 07:05:00 -0000</pubDate>
      <itunes:title>Canary (Tokens) in the Code Mine with Casey Smith</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b826644a-33fd-11ef-88d1-139fbc3d8a4d/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Thinkst Canary, Cyber Security Researcher Casey Smith joins Nic Fillingham on this week's episode of The BlueHat Podcast. Nic and Casey discuss his background in security, his experience presenting at Blue Hat, and his session on building a Canary token to monitor Windows process execution. The Canary token project is an open-source initiative that creates artifacts on a network to alert defenders when an attacker interacts with them. The tokens can take various forms, such as documents, cloud credentials, QR codes, or executables, providing an early warning system for potential breaches. They also cover the importance of failure in the research process and the evolution of the canary token project to adapt to new attack techniques.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The need for defenders to explore new features in the Windows operating system&amp;nbsp;&lt;/li&gt;&lt;li&gt;Challenges of keeping ahead of more sophisticated adversaries&amp;nbsp;&lt;/li&gt;&lt;li&gt;The use of legitimate binaries for malicious activities&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How do you balance curiosity-driven research with practical security concerns?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What challenges do you see in the current state of endpoint security?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How do you navigate working with customers and using what you learn for research?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/casey-smith-066702282/" rel="noopener noreferrer" target="_blank"&gt;View Casey Smith on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://thecyberwire.com/podcasts/uncovering-hidden-risks" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence" rel="noopener noreferrer" target="_blank"&gt;The Microsoft Threat Intelligence Podcast&amp;nbsp;&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Thinkst Canary, Cyber Security Researcher Casey Smith joins Nic Fillingham on this week's episode of The BlueHat Podcast. Nic and Casey discuss his background in security, his experience presenting at Blue Hat, and his session on building a Canary token to monitor Windows process execution. The Canary token project is an open-source initiative that creates artifacts on a network to alert defenders when an attacker interacts with them. The tokens can take various forms, such as documents, cloud credentials, QR codes, or executables, providing an early warning system for potential breaches. They also cover the importance of failure in the research process and the evolution of the canary token project to adapt to new attack techniques. 
 
 
In This Episode You Will Learn:    
 

The need for defenders to explore new features in the Windows operating system 

Challenges of keeping ahead of more sophisticated adversaries 

The use of legitimate binaries for malicious activities 

 
 
Some Questions We Ask:    
 

How do you balance curiosity-driven research with practical security concerns? 

What challenges do you see in the current state of endpoint security? 

How do you navigate working with customers and using what you learn for research? 

 
Resources:  
View Casey Smith on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:                 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks    


The Microsoft Threat Intelligence Podcast  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thinkst Canary, Cyber Security Researcher Casey Smith joins Nic Fillingham on this week's episode of The BlueHat Podcast. Nic and Casey discuss his background in security, his experience presenting at Blue Hat, and his session on building a Canary token to monitor Windows process execution. The Canary token project is an open-source initiative that creates artifacts on a network to alert defenders when an attacker interacts with them. The tokens can take various forms, such as documents, cloud credentials, QR codes, or executables, providing an early warning system for potential breaches. They also cover the importance of failure in the research process and the evolution of the canary token project to adapt to new attack techniques. </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>The need for defenders to explore new features in the Windows operating system </li>
<li>Challenges of keeping ahead of more sophisticated adversaries </li>
<li>The use of legitimate binaries for malicious activities </li>
</ul><p> </p><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>How do you balance curiosity-driven research with practical security concerns? </li>
<li>What challenges do you see in the current state of endpoint security? </li>
<li>How do you navigate working with customers and using what you learn for research? </li>
</ul><p> </p><br><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/casey-smith-066702282/">View Casey Smith on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:             </strong>    </p><ul>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a> </li>
<li>
<a href="https://thecyberwire.com/podcasts/uncovering-hidden-risks">Uncovering Hidden Risks</a>    </li>
<li>
<a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence">The Microsoft Threat Intelligence Podcast </a> </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2243</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6595addca136eb001785ec5a]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW9438537625.mp3?updated=1719435328" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mastering the Bug Hunt: Insights and Ethics with Nestori Syynimaa</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/mastering-the-bug-hunt-insights-and-ethics-with-nestori-syyn</link>
      <description>Senior Principal Security Researcher Nestori Syynimaa joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Nestori is an ICT professional with a strong practical and academic background. Since April 2021, Nestori has worked as a Senior Principal Security Researcher at Secureworks' Counter Threat Unit. Before joining Secureworks, he worked as a joint CIO for eight cities and municipalities surrounding Tampere, the largest inland city in Scandinavia. Nestori, Wendy, and Nic discuss the importance of understanding the dynamics between researchers and organizations in addressing security concerns, Nestori's journey as a researcher, his academic background, and his experiences speaking at various conferences worldwide. 
 
 
In This Episode You Will Learn:    
 

Challenges and successes in the bug bounty process 

The importance of researchers confirming fixes to make the process more efficient  

Ethical considerations for researchers and motivations within the hacking community 

 
 
Some Questions We Ask:    
 

What challenges do many organizations face running bug bounty programs? 

How can you find a trustworthy peer or seasoned researcher to get feedback on your work? 

Has encountering different cases shaped your understanding of bug bounty programs?  

 
Resources:  
View Nestori Syynimaa on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:                 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks    


The Microsoft Threat Intelligence Podcast  

 
   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 13 Dec 2023 07:05:00 -0000</pubDate>
      <itunes:title>Mastering the Bug Hunt: Insights and Ethics with Nestori Syynimaa</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b8718768-33fd-11ef-88d1-4786d8bd4e6f/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Senior Principal Security Researcher &lt;a href="https://www.linkedin.com/in/nestori/?originalSubdomain=fi" rel="noopener noreferrer" target="_blank"&gt;Nestori Syynimaa&lt;/a&gt; joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Nestori is an ICT professional with a strong practical and academic background. Since April 2021, Nestori has worked as a Senior Principal Security Researcher at Secureworks' Counter Threat Unit. Before joining Secureworks, he worked as a joint CIO for eight cities and municipalities surrounding Tampere, the largest inland city in Scandinavia. Nestori, Wendy, and Nic discuss the importance of understanding the dynamics between researchers and organizations in addressing security concerns, Nestori's journey as a researcher, his academic background, and his experiences speaking at various conferences worldwide.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Challenges and successes in the bug bounty process&amp;nbsp;&lt;/li&gt;&lt;li&gt;The importance of researchers confirming fixes to make the process more efficient&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Ethical considerations for researchers and motivations within the hacking community&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What challenges do many organizations face running bug bounty programs?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How can you find a trustworthy peer or seasoned researcher to get feedback on your work?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Has encountering different cases shaped your understanding of bug bounty programs?&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nestori/?originalSubdomain=fi" rel="noopener noreferrer" target="_blank"&gt;View Nestori Syynimaa on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://thecyberwire.com/podcasts/uncovering-hidden-risks" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence" rel="noopener noreferrer" target="_blank"&gt;The Microsoft Threat Intelligence Podcast&amp;nbsp;&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Senior Principal Security Researcher Nestori Syynimaa joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Nestori is an ICT professional with a strong practical and academic background. Since April 2021, Nestori has worked as a Senior Principal Security Researcher at Secureworks' Counter Threat Unit. Before joining Secureworks, he worked as a joint CIO for eight cities and municipalities surrounding Tampere, the largest inland city in Scandinavia. Nestori, Wendy, and Nic discuss the importance of understanding the dynamics between researchers and organizations in addressing security concerns, Nestori's journey as a researcher, his academic background, and his experiences speaking at various conferences worldwide. 
 
 
In This Episode You Will Learn:    
 

Challenges and successes in the bug bounty process 

The importance of researchers confirming fixes to make the process more efficient  

Ethical considerations for researchers and motivations within the hacking community 

 
 
Some Questions We Ask:    
 

What challenges do many organizations face running bug bounty programs? 

How can you find a trustworthy peer or seasoned researcher to get feedback on your work? 

Has encountering different cases shaped your understanding of bug bounty programs?  

 
Resources:  
View Nestori Syynimaa on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:                 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks    


The Microsoft Threat Intelligence Podcast  

 
   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior Principal Security Researcher <a href="https://www.linkedin.com/in/nestori/?originalSubdomain=fi">Nestori Syynimaa</a> joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Nestori is an ICT professional with a strong practical and academic background. Since April 2021, Nestori has worked as a Senior Principal Security Researcher at Secureworks' Counter Threat Unit. Before joining Secureworks, he worked as a joint CIO for eight cities and municipalities surrounding Tampere, the largest inland city in Scandinavia. Nestori, Wendy, and Nic discuss the importance of understanding the dynamics between researchers and organizations in addressing security concerns, Nestori's journey as a researcher, his academic background, and his experiences speaking at various conferences worldwide. </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>Challenges and successes in the bug bounty process </li>
<li>The importance of researchers confirming fixes to make the process more efficient  </li>
<li>Ethical considerations for researchers and motivations within the hacking community </li>
</ul><p> </p><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>What challenges do many organizations face running bug bounty programs? </li>
<li>How can you find a trustworthy peer or seasoned researcher to get feedback on your work? </li>
<li>Has encountering different cases shaped your understanding of bug bounty programs?  </li>
</ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/nestori/?originalSubdomain=fi">View Nestori Syynimaa on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:             </strong>    </p><ul>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a> </li>
<li>
<a href="https://thecyberwire.com/podcasts/uncovering-hidden-risks">Uncovering Hidden Risks</a>    </li>
<li>
<a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence">The Microsoft Threat Intelligence Podcast </a> </li>
</ul><p> </p><p>   </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2384</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65778d0a1585de00120256ac]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2872139902.mp3?updated=1719435329" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Service Principles in the Spotlight: Insights from Microsoft’s Security Experts</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/service-principles-in-the-spotlight-insights-from-microsofts</link>
      <description>Senior Data Scientist Emily Yale and Senior Threat Hunt Analyst at Microsoft Chris Bukavich join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Chris focuses on incident response, investigation, and detection of major incidents, while Emily works on developing and improving detections for Microsoft's internal security. Emily and Chris were co-presenters at this year's BlueHat conference. They discussed unmasking Azure-based adversaries with an emphasis on monitoring service principles,  how their respective expertise in data science and cybersecurity contributed to the session, and the challenges of monitoring service principles in Azure. This concept has evolved from traditional service accounts. 
 
 
In This Episode You Will Learn:    
 

The importance of monitoring spikes in activity 

Criteria for identifying malicious behavior targeting service principles 

Historical context of service principles and their increasing relevance 

 
Some Questions We Ask:    
 

How can you proactively monitor and detect anomalies related to service principles? 

What challenges arise when profiling service principles based on past behavior? 

When can service principles be tied to user authentication? 

 
Resources:  
View Emily Yale on LinkedIn 
View Chris Bukavich on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts: 


Microsoft Threat Intelligence Podcast 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks 


      
Discover and follow other Microsoft podcasts at microsoft.com/podcasts 
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 29 Nov 2023 07:05:00 -0000</pubDate>
      <itunes:title>Service Principles in the Spotlight: Insights from Microsoft’s Security Experts</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b8bed072-33fd-11ef-88d1-ef1f14085363/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Senior Data Scientist &lt;a href="https://www.linkedin.com/in/emilyyale2a2516182/" rel="noopener noreferrer" target="_blank"&gt;Emily Yale&lt;/a&gt; and Senior Threat Hunt Analyst at Microsoft &lt;a href="https://www.linkedin.com/in/christopher-bukavich-7534b09b/" rel="noopener noreferrer" target="_blank"&gt;Chris Bukavich&lt;/a&gt; join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Chris focuses on incident response, investigation, and detection of major incidents, while Emily works on developing and improving detections for Microsoft's internal security. Emily and Chris were co-presenters at this year's BlueHat conference. They discussed unmasking Azure-based adversaries with an emphasis on monitoring service principles,&amp;nbsp; how their respective expertise in data science and cybersecurity contributed to the session, and the challenges of monitoring service principles in Azure. This concept has evolved from traditional service accounts.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The importance of monitoring spikes in activity&amp;nbsp;&lt;/li&gt;&lt;li&gt;Criteria for identifying malicious behavior targeting service principles&amp;nbsp;&lt;/li&gt;&lt;li&gt;Historical context of service principles and their increasing relevance&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How can you proactively monitor and detect anomalies related to service principles?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What challenges arise when profiling service principles based on past behavior?&amp;nbsp;&lt;/li&gt;&lt;li&gt;When can service principles be tied to user authentication?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/emilyyale2a2516182/" rel="noopener noreferrer" target="_blank"&gt;View Emily Yale on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/christopher-bukavich-7534b09b/" rel="noopener noreferrer" target="_blank"&gt;View Chris Bukavich on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&lt;/strong&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Microsoft Threat Intelligence Podcast&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Senior Data Scientist Emily Yale and Senior Threat Hunt Analyst at Microsoft Chris Bukavich join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Chris focuses on incident response, investigation, and detection of major incidents, while Emily works on developing and improving detections for Microsoft's internal security. Emily and Chris were co-presenters at this year's BlueHat conference. They discussed unmasking Azure-based adversaries with an emphasis on monitoring service principles,  how their respective expertise in data science and cybersecurity contributed to the session, and the challenges of monitoring service principles in Azure. This concept has evolved from traditional service accounts. 
 
 
In This Episode You Will Learn:    
 

The importance of monitoring spikes in activity 

Criteria for identifying malicious behavior targeting service principles 

Historical context of service principles and their increasing relevance 

 
Some Questions We Ask:    
 

How can you proactively monitor and detect anomalies related to service principles? 

What challenges arise when profiling service principles based on past behavior? 

When can service principles be tied to user authentication? 

 
Resources:  
View Emily Yale on LinkedIn 
View Chris Bukavich on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts: 


Microsoft Threat Intelligence Podcast 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks 


      
Discover and follow other Microsoft podcasts at microsoft.com/podcasts 
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior Data Scientist <a href="https://www.linkedin.com/in/emilyyale2a2516182/">Emily Yale</a> and Senior Threat Hunt Analyst at Microsoft <a href="https://www.linkedin.com/in/christopher-bukavich-7534b09b/">Chris Bukavich</a> join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Chris focuses on incident response, investigation, and detection of major incidents, while Emily works on developing and improving detections for Microsoft's internal security. Emily and Chris were co-presenters at this year's BlueHat conference. They discussed unmasking Azure-based adversaries with an emphasis on monitoring service principles,  how their respective expertise in data science and cybersecurity contributed to the session, and the challenges of monitoring service principles in Azure. This concept has evolved from traditional service accounts. </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>The importance of monitoring spikes in activity </li>
<li>Criteria for identifying malicious behavior targeting service principles </li>
<li>Historical context of service principles and their increasing relevance </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>How can you proactively monitor and detect anomalies related to service principles? </li>
<li>What challenges arise when profiling service principles based on past behavior? </li>
<li>When can service principles be tied to user authentication? </li>
</ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/emilyyale2a2516182/">View Emily Yale on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/christopher-bukavich-7534b09b/">View Chris Bukavich on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:</strong> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a> </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a> </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a> </li>
</ul><p><br></p><p>      </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a> </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2635</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65669c34d7b5d40012993463]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW2585970834.mp3?updated=1719435329" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kaileigh McCrea: Navigating the Privacy Maze: Insights from the Yandex Controversy</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/kaileigh-mccrea-navigating-the-privacy-maze-insights-from-th</link>
      <description>Kaileigh McCrea, Lead Privacy Engineer at Confiant, joins Wendy Zenone on this week's episode of The BlueHat Podcast. Kaileigh explains her journey into privacy engineering, the ever-evolving nature of privacy regulations, and the challenges of defining protected data. Wendy and Kaileigh also delve into Yandex's extensive reach, connections to the Netherlands, and the complexities surrounding its ownership and compliance in the face of global sanctions. Overall, the discussion emphasizes the importance of protecting personal data and being aware of potential risks, even if one believes they have nothing to hide. 
 
 
In This Episode You Will Learn:    
 

The importance of protecting personal data, even with nothing to hide 

Implications of the Yandex data leak 

Challenges Yandex faces in trying to sell off its assets 

 
 
Some Questions We Ask:    
 

What kind of analytics data was involved in the Yandex leak? 

How could this data be misused from a national security perspective? 

Why is protecting one's data so tricky due to the scale of data collection?  

 
Resources:  
View Kaileigh McCrea on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:                 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks    


Security Unlocked     


Security Unlocked: CISO Series with Bret Arsenault 


Secure the Job: Breaking into Security 


The Microsoft Threat Intelligence Podcast  

 
   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 15 Nov 2023 07:05:00 -0000</pubDate>
      <itunes:title>Kaileigh McCrea: Navigating the Privacy Maze: Insights from the Yandex Controversy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b90eb312-33fd-11ef-88d1-134dc4b33ed0/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Kaileigh McCrea, Lead Privacy Engineer at Confiant, joins Wendy Zenone on this week's episode of The BlueHat Podcast. Kaileigh explains her journey into privacy engineering, the ever-evolving nature of privacy regulations, and the challenges of defining protected data. Wendy and Kaileigh also delve into Yandex's extensive reach, connections to the Netherlands, and the complexities surrounding its ownership and compliance in the face of global sanctions. Overall, the discussion emphasizes the importance of protecting personal data and being aware of potential risks, even if one believes they have nothing to hide.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The importance of protecting personal data, even with nothing to hide&amp;nbsp;&lt;/li&gt;&lt;li&gt;Implications of the Yandex data leak&amp;nbsp;&lt;/li&gt;&lt;li&gt;Challenges Yandex faces in trying to sell off its assets&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What kind of analytics data was involved in the Yandex leak?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How could this data be misused from a national security perspective?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why is protecting one's data so tricky due to the scale of data collection?&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/kaileighmccrea/" rel="noopener noreferrer" target="_blank"&gt;View Kaileigh McCrea on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://thecyberwire.com/podcasts/uncovering-hidden-risks" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://securityunlockedpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Security Unlocked&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://securityunlockedcisoseries.com/" rel="noopener noreferrer" target="_blank"&gt;Security Unlocked: CISO Series with Bret Arsenault&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://shows.acast.com/secure-the-job-breaking-into-security" rel="noopener noreferrer" target="_blank"&gt;Secure the Job: Breaking into Security&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence" rel="noopener noreferrer" target="_blank"&gt;The Microsoft Threat Intelligence Podcast&amp;nbsp;&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Kaileigh McCrea, Lead Privacy Engineer at Confiant, joins Wendy Zenone on this week's episode of The BlueHat Podcast. Kaileigh explains her journey into privacy engineering, the ever-evolving nature of privacy regulations, and the challenges of defining protected data. Wendy and Kaileigh also delve into Yandex's extensive reach, connections to the Netherlands, and the complexities surrounding its ownership and compliance in the face of global sanctions. Overall, the discussion emphasizes the importance of protecting personal data and being aware of potential risks, even if one believes they have nothing to hide. 
 
 
In This Episode You Will Learn:    
 

The importance of protecting personal data, even with nothing to hide 

Implications of the Yandex data leak 

Challenges Yandex faces in trying to sell off its assets 

 
 
Some Questions We Ask:    
 

What kind of analytics data was involved in the Yandex leak? 

How could this data be misused from a national security perspective? 

Why is protecting one's data so tricky due to the scale of data collection?  

 
Resources:  
View Kaileigh McCrea on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:                 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks    


Security Unlocked     


Security Unlocked: CISO Series with Bret Arsenault 


Secure the Job: Breaking into Security 


The Microsoft Threat Intelligence Podcast  

 
   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kaileigh McCrea, Lead Privacy Engineer at Confiant, joins Wendy Zenone on this week's episode of The BlueHat Podcast. Kaileigh explains her journey into privacy engineering, the ever-evolving nature of privacy regulations, and the challenges of defining protected data. Wendy and Kaileigh also delve into Yandex's extensive reach, connections to the Netherlands, and the complexities surrounding its ownership and compliance in the face of global sanctions. Overall, the discussion emphasizes the importance of protecting personal data and being aware of potential risks, even if one believes they have nothing to hide. </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>The importance of protecting personal data, even with nothing to hide </li>
<li>Implications of the Yandex data leak </li>
<li>Challenges Yandex faces in trying to sell off its assets </li>
</ul><p> </p><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>What kind of analytics data was involved in the Yandex leak? </li>
<li>How could this data be misused from a national security perspective? </li>
<li>Why is protecting one's data so tricky due to the scale of data collection?  </li>
</ul><p> </p><br><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/kaileighmccrea/">View Kaileigh McCrea on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><br><p> </p><p><strong>Related Microsoft Podcasts:             </strong>    </p><ul>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a> </li>
<li>
<a href="https://thecyberwire.com/podcasts/uncovering-hidden-risks">Uncovering Hidden Risks</a>    </li>
<li>
<a href="https://securityunlockedpodcast.com/">Security Unlocked</a>     </li>
<li>
<a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </li>
<li>
<a href="https://shows.acast.com/secure-the-job-breaking-into-security">Secure the Job: Breaking into Security</a> </li>
<li>
<a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence">The Microsoft Threat Intelligence Podcast </a> </li>
</ul><p> </p><p>   </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2736</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[655410c61a2b9300128e67a8]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4544633736.mp3?updated=1719435330" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deprecating NTLM is Easy and Other Lies We Tell Ourselves with Steve Syfuhs</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/deprecating-ntlm-is-easy-and-other-lies-we-tell-ourselves-wi</link>
      <description>Steve Syfuhs, Principal Software Engineer at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Steve has spent the last decade building secure systems and is working at Microsoft as a Principal Developer. In this episode, Steve, Nic, and Wendy discuss how continually improving hardware allows for faster brute-force attacks, the technical and security aspects of password-based authentication protocols, and why the longevity of password security can be extended through incremental improvements. 
 
 
In This Episode You Will Learn:    
 

Technical and security aspects of password-based authentication protocols 

Why passwords should not be the primary authentication mechanism  

The challenges of making significant changes to long-standing systems 

 
Some Questions We Ask:    
 

Why explore secure and user-friendly alternatives like biometrics or hardware keys? 

How quickly can you guess an 8-character password using specialized hardware? 

Will audits within Microsoft help understand and improve NTLM usage and security? 

 
Resources:  
View Steve Syfuhs on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:                 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks    


Security Unlocked     


Security Unlocked: CISO Series with Bret Arsenault 


Secure the Job: Breaking into Security 


The Microsoft Threat Intelligence Podcast  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 01 Nov 2023 07:05:00 -0000</pubDate>
      <itunes:title>Deprecating NTLM is Easy and Other Lies We Tell Ourselves with Steve Syfuhs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b965eb82-33fd-11ef-88d1-c70c70c46a70/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Steve Syfuhs, Principal Software Engineer at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Steve has spent the last decade building secure systems and is working at Microsoft as a Principal Developer. In this episode, Steve, Nic, and Wendy discuss how continually improving hardware allows for faster brute-force attacks, the technical and security aspects of password-based authentication protocols, and why the longevity of password security can be extended through incremental improvements.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Technical and security aspects of password-based authentication protocols&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why passwords should not be the primary authentication mechanism&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;The challenges of making significant changes to long-standing systems&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Why explore secure and user-friendly alternatives like biometrics or hardware keys?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How quickly can you guess an 8-character password using specialized hardware?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Will audits within Microsoft help understand and improve NTLM usage and security?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/syfuhs/" rel="noopener noreferrer" target="_blank"&gt;View Steve Syfuhs on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://thecyberwire.com/podcasts/uncovering-hidden-risks" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://securityunlockedpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Security Unlocked&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://securityunlockedcisoseries.com/" rel="noopener noreferrer" target="_blank"&gt;Security Unlocked: CISO Series with Bret Arsenault&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://shows.acast.com/secure-the-job-breaking-into-security" rel="noopener noreferrer" target="_blank"&gt;Secure the Job: Breaking into Security&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence" rel="noopener noreferrer" target="_blank"&gt;The Microsoft Threat Intelligence Podcast&amp;nbsp;&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Steve Syfuhs, Principal Software Engineer at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Steve has spent the last decade building secure systems and is working at Microsoft as a Principal Developer. In this episode, Steve, Nic, and Wendy discuss how continually improving hardware allows for faster brute-force attacks, the technical and security aspects of password-based authentication protocols, and why the longevity of password security can be extended through incremental improvements. 
 
 
In This Episode You Will Learn:    
 

Technical and security aspects of password-based authentication protocols 

Why passwords should not be the primary authentication mechanism  

The challenges of making significant changes to long-standing systems 

 
Some Questions We Ask:    
 

Why explore secure and user-friendly alternatives like biometrics or hardware keys? 

How quickly can you guess an 8-character password using specialized hardware? 

Will audits within Microsoft help understand and improve NTLM usage and security? 

 
Resources:  
View Steve Syfuhs on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Related Microsoft Podcasts:                 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks    


Security Unlocked     


Security Unlocked: CISO Series with Bret Arsenault 


Secure the Job: Breaking into Security 


The Microsoft Threat Intelligence Podcast  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Steve Syfuhs, Principal Software Engineer at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Steve has spent the last decade building secure systems and is working at Microsoft as a Principal Developer. In this episode, Steve, Nic, and Wendy discuss how continually improving hardware allows for faster brute-force attacks, the technical and security aspects of password-based authentication protocols, and why the longevity of password security can be extended through incremental improvements. </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>Technical and security aspects of password-based authentication protocols </li>
<li>Why passwords should not be the primary authentication mechanism  </li>
<li>The challenges of making significant changes to long-standing systems </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>Why explore secure and user-friendly alternatives like biometrics or hardware keys? </li>
<li>How quickly can you guess an 8-character password using specialized hardware? </li>
<li>Will audits within Microsoft help understand and improve NTLM usage and security? </li>
</ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/syfuhs/">View Steve Syfuhs on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p><strong>Related Microsoft Podcasts:             </strong>    </p><ul>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a> </li>
<li>
<a href="https://thecyberwire.com/podcasts/uncovering-hidden-risks">Uncovering Hidden Risks</a>    </li>
<li>
<a href="https://securityunlockedpodcast.com/">Security Unlocked</a>     </li>
<li>
<a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </li>
<li>
<a href="https://shows.acast.com/secure-the-job-breaking-into-security">Secure the Job: Breaking into Security</a> </li>
<li>
<a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence">The Microsoft Threat Intelligence Podcast </a> </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2614</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65415869d96b4600126925d6]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW9535803349.mp3?updated=1719435330" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlueHat Oct 23 Day 1 Keynote: John Lambert</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/bluehat-oct-23-day-1-keynote-john-lambert</link>
      <description>In this week’s special episode, we bring you the BlueHat Oct 23, day 1 keynote delivered by John Lambert, Microsoft Corporate Vice President and Security Fellow. In his BlueHat Oct day 1 keynote, John discusses the importance of incidents in the security field, strategies for finding security incidents, and the importance of looking beyond traditional defense measures to discover attackers and traces outside of one's network. John introduces the idea of "hunting until closure," which involves systematically investigating various attacker actions to learn more about their activities. He also mentions the concept of "time travel breach detection," which uses historical logs to trace and identify previous attacker actions. 
 
 
In This Episode You Will Learn:    
 

The importance of security incidents in shaping the cybersecurity field 

Why logs and telemetry data in cybersecurity are essential when tracking attacker actions 

How valuable mutual respect is in the security community 

 
Some Questions We Ask:    
 

How do escalating conflicts within teams affect productivity? 

What role did trust and collaboration play in responding to the SolarWinds incident? 

Why must the security community work together to protect customers? 

 
Resources:  
View John Lambert on LinkedIn  
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
Related Microsoft Podcasts:                 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks    


Security Unlocked     


Security Unlocked: CISO Series with Bret Arsenault 


Secure the Job: Breaking into Security 

   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 18 Oct 2023 16:55:36 -0000</pubDate>
      <itunes:title>BlueHat Oct 23 Day 1 Keynote: John Lambert</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b9b67df4-33fd-11ef-88d1-9307f3945ddb/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;In this week’s special episode, we bring you the BlueHat Oct 23, day 1 keynote delivered by John Lambert, Microsoft Corporate Vice President and Security Fellow. In his BlueHat Oct day 1 keynote, John discusses the importance of incidents in the security field, strategies for finding security incidents, and the importance of looking beyond traditional defense measures to discover attackers and traces outside of one's network. John introduces the idea of "hunting until closure," which involves systematically investigating various attacker actions to learn more about their activities. He also mentions the concept of "time travel breach detection," which uses historical logs to trace and identify previous attacker actions.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The importance of security incidents in shaping the cybersecurity field&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why logs and telemetry data in cybersecurity are essential when tracking attacker actions&amp;nbsp;&lt;/li&gt;&lt;li&gt;How valuable mutual respect is in the security community&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How do escalating conflicts within teams affect productivity?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What role did trust and collaboration play in responding to the SolarWinds incident?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why must the security community work together to protect customers?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/johnjlambert/" rel="noopener noreferrer" target="_blank"&gt;View John Lambert on LinkedIn&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Related Microsoft Podcasts:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank"&gt;Afternoon Cyber Tea with Ann Johnson&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://thecyberwire.com/podcasts/uncovering-hidden-risks" rel="noopener noreferrer" target="_blank"&gt;Uncovering Hidden Risks&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://securityunlockedpodcast.com/" rel="noopener noreferrer" target="_blank"&gt;Security Unlocked&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://securityunlockedcisoseries.com/" rel="noopener noreferrer" target="_blank"&gt;Security Unlocked: CISO Series with Bret Arsenault&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;a href="https://shows.acast.com/secure-the-job-breaking-into-security" rel="noopener noreferrer" target="_blank"&gt;Secure the Job: Breaking into Security&lt;/a&gt;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>In this week’s special episode, we bring you the BlueHat Oct 23, day 1 keynote delivered by John Lambert, Microsoft Corporate Vice President and Security Fellow. In his BlueHat Oct day 1 keynote, John discusses the importance of incidents in the security field, strategies for finding security incidents, and the importance of looking beyond traditional defense measures to discover attackers and traces outside of one's network. John introduces the idea of "hunting until closure," which involves systematically investigating various attacker actions to learn more about their activities. He also mentions the concept of "time travel breach detection," which uses historical logs to trace and identify previous attacker actions. 
 
 
In This Episode You Will Learn:    
 

The importance of security incidents in shaping the cybersecurity field 

Why logs and telemetry data in cybersecurity are essential when tracking attacker actions 

How valuable mutual respect is in the security community 

 
Some Questions We Ask:    
 

How do escalating conflicts within teams affect productivity? 

What role did trust and collaboration play in responding to the SolarWinds incident? 

Why must the security community work together to protect customers? 

 
Resources:  
View John Lambert on LinkedIn  
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
Related Microsoft Podcasts:                 


Afternoon Cyber Tea with Ann Johnson 


Uncovering Hidden Risks    


Security Unlocked     


Security Unlocked: CISO Series with Bret Arsenault 


Secure the Job: Breaking into Security 

   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this week’s special episode, we bring you the BlueHat Oct 23, day 1 keynote delivered by John Lambert, Microsoft Corporate Vice President and Security Fellow. In his BlueHat Oct day 1 keynote, John discusses the importance of incidents in the security field, strategies for finding security incidents, and the importance of looking beyond traditional defense measures to discover attackers and traces outside of one's network. John introduces the idea of "hunting until closure," which involves systematically investigating various attacker actions to learn more about their activities. He also mentions the concept of "time travel breach detection," which uses historical logs to trace and identify previous attacker actions. </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>The importance of security incidents in shaping the cybersecurity field </li>
<li>Why logs and telemetry data in cybersecurity are essential when tracking attacker actions </li>
<li>How valuable mutual respect is in the security community </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>How do escalating conflicts within teams affect productivity? </li>
<li>What role did trust and collaboration play in responding to the SolarWinds incident? </li>
<li>Why must the security community work together to protect customers? </li>
</ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/johnjlambert/">View John Lambert on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><br><p><strong>Related Microsoft Podcasts:             </strong>    </p><ul>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a> </li>
<li>
<a href="https://thecyberwire.com/podcasts/uncovering-hidden-risks">Uncovering Hidden Risks</a>    </li>
<li>
<a href="https://securityunlockedpodcast.com/">Security Unlocked</a>     </li>
<li>
<a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </li>
<li>
<a href="https://shows.acast.com/secure-the-job-breaking-into-security">Secure the Job: Breaking into Security</a> </li>
</ul><p>   </p><br><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><p><br></p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2967</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[652ef1a90a6d2b001226561e]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW5897749116.mp3?updated=1719435331" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bluehat Oct 23 Preview with Jessica Payne</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/bluehat-oct-23-preview-with-jessica-payne</link>
      <description>Microsoft Threat Intelligence Analyst Jessica Payne joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Nic, Wendy, and Jessica discuss Jessica's background in cybersecurity, her journey to Microsoft, her passion for making security more accessible, and the importance of diversity in the field. Jessica also emphasizes the need to focus on actionable threat intelligence and how ransomware has changed the security landscape while also providing insights into the process of submitting a presentation for The BlueHat Conference.   
 
 
In This Episode You Will Learn:    
 

Jessica's contributions to the Threat Intelligence Village 

Sessions and keynotes scheduled for the bluehat conference 

The importance of diversity and inclusion in the conference's selection process 

 
Some Questions We Ask:    
 

What makes BlueHat unique compared to other conferences? 

Why does BlueHat avoid marketing and encourage a research-focused atmosphere? 

What interactive activities does BlueHat have planned for the Threat Intelligence Village? 

 
Resources:   
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 04 Oct 2023 07:05:00 -0000</pubDate>
      <itunes:title>Bluehat Oct 23 Preview with Jessica Payne</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ba021692-33fd-11ef-88d1-83cea1143a45/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Microsoft Threat Intelligence Analyst Jessica Payne joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Nic, Wendy, and Jessica discuss Jessica's background in cybersecurity, her journey to Microsoft, her passion for making security more accessible, and the importance of diversity in the field. Jessica also emphasizes the need to focus on actionable threat intelligence and how ransomware has changed the security landscape while also providing insights into the process of submitting a presentation for The BlueHat Conference.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Jessica's contributions to the Threat Intelligence Village&amp;nbsp;&lt;/li&gt;&lt;li&gt;Sessions and keynotes scheduled for the bluehat conference&amp;nbsp;&lt;/li&gt;&lt;li&gt;The importance of diversity and inclusion in the conference's selection process&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What makes BlueHat unique compared to other conferences?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why does BlueHat avoid marketing and encourage a research-focused atmosphere?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What interactive activities does BlueHat have planned for the Threat Intelligence Village?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Microsoft Threat Intelligence Analyst Jessica Payne joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Nic, Wendy, and Jessica discuss Jessica's background in cybersecurity, her journey to Microsoft, her passion for making security more accessible, and the importance of diversity in the field. Jessica also emphasizes the need to focus on actionable threat intelligence and how ransomware has changed the security landscape while also providing insights into the process of submitting a presentation for The BlueHat Conference.   
 
 
In This Episode You Will Learn:    
 

Jessica's contributions to the Threat Intelligence Village 

Sessions and keynotes scheduled for the bluehat conference 

The importance of diversity and inclusion in the conference's selection process 

 
Some Questions We Ask:    
 

What makes BlueHat unique compared to other conferences? 

Why does BlueHat avoid marketing and encourage a research-focused atmosphere? 

What interactive activities does BlueHat have planned for the Threat Intelligence Village? 

 
Resources:   
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft Threat Intelligence Analyst Jessica Payne joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Nic, Wendy, and Jessica discuss Jessica's background in cybersecurity, her journey to Microsoft, her passion for making security more accessible, and the importance of diversity in the field. Jessica also emphasizes the need to focus on actionable threat intelligence and how ransomware has changed the security landscape while also providing insights into the process of submitting a presentation for The BlueHat Conference.   </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>Jessica's contributions to the Threat Intelligence Village </li>
<li>Sessions and keynotes scheduled for the bluehat conference </li>
<li>The importance of diversity and inclusion in the conference's selection process </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>What makes BlueHat unique compared to other conferences? </li>
<li>Why does BlueHat avoid marketing and encourage a research-focused atmosphere? </li>
<li>What interactive activities does BlueHat have planned for the Threat Intelligence Village? </li>
</ul><p> </p><p><strong>Resources:</strong>   </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2486</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[651c87080eed1a00110c1f4a]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4475469406.mp3?updated=1719435331" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sherrod DeGrippo on Why She Loves Cyber Crime</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/sherrod-derippo-on-why-she-loves-cyber-crime</link>
      <description>Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft and Host of The Microsoft Threat Intelligence Podcast, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Sherrod is a frequently cited threat intelligence expert in media, including televised appearances on the BBC news and commentary in the Wall Street Journal, CNN, New York Times, and more. She is a well-known public speaker, having presented at Black Hat, RSA Conference, RMISC, BrunchCon, and others. Sherrod and Nic discuss various topics, including different types of threat actors, the overlap between nation-state actors and cybercrime, and Sherrod's fascination with cybercrime, emphasizing cybercriminals' creativity and ingenuity, particularly those who use social engineering techniques.  
 
 
In This Episode You Will Learn:    
 

Why many cybercriminals don't believe they are engaging in criminal activity 

How understanding a threat actor's psychology is essential to creating detection methods 

The importance of maintaining proper security hygiene 

 
Some Questions We Ask:    
 

How can threat actors operate with impunity? 

Should individuals and small businesses worry about nation-state threat actors? 

Can we reform and convince cybercrime groups to use their talents for good? 

 
Resources:   
View Sherrod DeGrippo on LinkedIn  
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 20 Sep 2023 19:05:43 -0000</pubDate>
      <itunes:title>Sherrod DeGrippo on Why She Loves Cyber Crime</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ba4887a8-33fd-11ef-88d1-af07eb1fa57e/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft and Host of The Microsoft Threat Intelligence Podcast, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Sherrod is a frequently cited threat intelligence expert in media, including televised appearances on the BBC news and commentary in the Wall Street Journal, CNN, New York Times, and more. She is a well-known public speaker, having presented at Black Hat, RSA Conference, RMISC, BrunchCon, and others. Sherrod and Nic discuss various topics, including different types of threat actors, the overlap between nation-state actors and cybercrime, and Sherrod's fascination with cybercrime,&amp;nbsp;emphasizing cybercriminals' creativity and ingenuity, particularly those who use social engineering techniques.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Why many cybercriminals don't believe they are engaging in criminal activity&amp;nbsp;&lt;/li&gt;&lt;li&gt;How understanding a threat actor's psychology is essential to creating detection methods&amp;nbsp;&lt;/li&gt;&lt;li&gt;The importance of maintaining proper security hygiene&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How can threat actors operate with impunity?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Should individuals and small businesses worry about nation-state threat actors?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Can we reform and convince cybercrime groups to use their talents for good?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/sherroddegrippo/" rel="noopener noreferrer" target="_blank"&gt;View Sherrod DeGrippo on LinkedIn&amp;nbsp;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft and Host of The Microsoft Threat Intelligence Podcast, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Sherrod is a frequently cited threat intelligence expert in media, including televised appearances on the BBC news and commentary in the Wall Street Journal, CNN, New York Times, and more. She is a well-known public speaker, having presented at Black Hat, RSA Conference, RMISC, BrunchCon, and others. Sherrod and Nic discuss various topics, including different types of threat actors, the overlap between nation-state actors and cybercrime, and Sherrod's fascination with cybercrime, emphasizing cybercriminals' creativity and ingenuity, particularly those who use social engineering techniques.  
 
 
In This Episode You Will Learn:    
 

Why many cybercriminals don't believe they are engaging in criminal activity 

How understanding a threat actor's psychology is essential to creating detection methods 

The importance of maintaining proper security hygiene 

 
Some Questions We Ask:    
 

How can threat actors operate with impunity? 

Should individuals and small businesses worry about nation-state threat actors? 

Can we reform and convince cybercrime groups to use their talents for good? 

 
Resources:   
View Sherrod DeGrippo on LinkedIn  
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft and Host of The Microsoft Threat Intelligence Podcast, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Sherrod is a frequently cited threat intelligence expert in media, including televised appearances on the BBC news and commentary in the Wall Street Journal, CNN, New York Times, and more. She is a well-known public speaker, having presented at Black Hat, RSA Conference, RMISC, BrunchCon, and others. Sherrod and Nic discuss various topics, including different types of threat actors, the overlap between nation-state actors and cybercrime, and Sherrod's fascination with cybercrime, emphasizing cybercriminals' creativity and ingenuity, particularly those who use social engineering techniques.  </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>Why many cybercriminals don't believe they are engaging in criminal activity </li>
<li>How understanding a threat actor's psychology is essential to creating detection methods </li>
<li>The importance of maintaining proper security hygiene </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>How can threat actors operate with impunity? </li>
<li>Should individuals and small businesses worry about nation-state threat actors? </li>
<li>Can we reform and convince cybercrime groups to use their talents for good? </li>
</ul><p> </p><p><strong>Resources:</strong>   </p><p><a href="https://www.linkedin.com/in/sherroddegrippo/">View Sherrod DeGrippo on LinkedIn </a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2451</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6509f8ab848fdc0011083a3b]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1341852844.mp3?updated=1719435332" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deciphering Privacy in the Age of AI: An Expert Discussion</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/deciphering-privacy-in-the-age-of-ai-an-expert-discussion</link>
      <description>Giovanni Cherubin and Ahmed Salem join Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Giovanni is a Senior Researcher in Machine Learning and Security at Microsoft Research Cambridge, and Ahmed is a researcher in Confidential Computing at the Microsoft Research lab in Cambridge, UK. They're both interested in artificial intelligence and are researching the privacy, security, fairness, and accountability risks of the different machine learning settings. In this episode, they discuss how to identify and address privacy threats in machine learning models, the connection between privacy and information leakage, and how privacy is perceived in academia and industry.

In This Episode You Will Learn:   


Algorithmic procedures for describing threats and attacks

The rapid growth of machine learning research in attacks and defense

The framework for fostering collaboration and understanding within the field


Some Questions We Ask:   


What are the main threats you are currently focused on? 

Who will benefit from this research besides academics and researchers?

Can you explain the concept of privacy as it relates to information leakage?


Resources:  
View Giovanni Cherubin on LinkedIn
View Ahmed Salem on LinkedIn
View Wendy Zenone on LinkedIn
View Nic Fillingham on LinkedIn

Discover and follow other Microsoft podcasts at microsoft.com/podcasts 
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 06 Sep 2023 07:05:00 -0000</pubDate>
      <itunes:title>Deciphering Privacy in the Age of AI: An Expert Discussion</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ba8ef7ec-33fd-11ef-88d1-ebc8027b55dc/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Giovanni Cherubin and Ahmed Salem join Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Giovanni is a Senior Researcher in Machine Learning and Security at Microsoft Research Cambridge, and Ahmed is a researcher in Confidential Computing at the Microsoft Research lab in Cambridge, UK. They're both interested in artificial intelligence and are researching the privacy, security, fairness, and accountability risks of the different machine learning settings. In this episode, they discuss how to identify and address privacy threats in machine learning models, the connection between privacy and information leakage, and how privacy is perceived in academia and industry.&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Algorithmic procedures for describing threats and attacks&lt;/li&gt;&lt;li&gt;The rapid growth of machine learning research in attacks and defense&lt;/li&gt;&lt;li&gt;The framework for fostering collaboration and understanding within the field&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What are the main threats you are currently focused on?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Who will benefit from this research besides academics and researchers?&lt;/li&gt;&lt;li&gt;Can you explain the concept of privacy as it relates to information leakage?&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/giovanni-cherubin/?originalSubdomain=uk" rel="noopener noreferrer" target="_blank"&gt;View Giovanni Cherubin on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/ahmedgasalem/?originalSubdomain=de" rel="noopener noreferrer" target="_blank"&gt;View Ahmed Salem on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt; &lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Giovanni Cherubin and Ahmed Salem join Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Giovanni is a Senior Researcher in Machine Learning and Security at Microsoft Research Cambridge, and Ahmed is a researcher in Confidential Computing at the Microsoft Research lab in Cambridge, UK. They're both interested in artificial intelligence and are researching the privacy, security, fairness, and accountability risks of the different machine learning settings. In this episode, they discuss how to identify and address privacy threats in machine learning models, the connection between privacy and information leakage, and how privacy is perceived in academia and industry.

In This Episode You Will Learn:   


Algorithmic procedures for describing threats and attacks

The rapid growth of machine learning research in attacks and defense

The framework for fostering collaboration and understanding within the field


Some Questions We Ask:   


What are the main threats you are currently focused on? 

Who will benefit from this research besides academics and researchers?

Can you explain the concept of privacy as it relates to information leakage?


Resources:  
View Giovanni Cherubin on LinkedIn
View Ahmed Salem on LinkedIn
View Wendy Zenone on LinkedIn
View Nic Fillingham on LinkedIn

Discover and follow other Microsoft podcasts at microsoft.com/podcasts 
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Giovanni Cherubin and Ahmed Salem join Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Giovanni is a Senior Researcher in Machine Learning and Security at Microsoft Research Cambridge, and Ahmed is a researcher in Confidential Computing at the Microsoft Research lab in Cambridge, UK. They're both interested in artificial intelligence and are researching the privacy, security, fairness, and accountability risks of the different machine learning settings. In this episode, they discuss how to identify and address privacy threats in machine learning models, the connection between privacy and information leakage, and how privacy is perceived in academia and industry.</p><br><p><br></p><p><strong>In This Episode You Will Learn</strong>:   </p><p><br></p><ul>
<li>Algorithmic procedures for describing threats and attacks</li>
<li>The rapid growth of machine learning research in attacks and defense</li>
<li>The framework for fostering collaboration and understanding within the field</li>
</ul><p><br></p><p><strong>Some Questions We Ask:</strong>   </p><p><br></p><ul>
<li>What are the main threats you are currently focused on? </li>
<li>Who will benefit from this research besides academics and researchers?</li>
<li>Can you explain the concept of privacy as it relates to information leakage?</li>
</ul><p><br></p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/giovanni-cherubin/?originalSubdomain=uk">View Giovanni Cherubin on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/ahmedgasalem/?originalSubdomain=de">View Ahmed Salem on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a></p><br><p><br></p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a> </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2563</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64f112930cd0a20011b0f8ca]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW3865990915.mp3?updated=1719435332" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Not with a Bug but with a Sticker</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/not-with-a-bug-but-with-a-sticker</link>
      <description>Hyrum Anderson and Ram Shankar join Nic Fillingham and Wendy Zenone on this week’s episode of The BlueHat Podcast. Hyrum Anderson is a distinguished ML Engineer at Robust Intelligence. He received his Ph.D. in Electrical Engineering from the University of Washington, emphasizing signal processing and machine learning. Much of his technical career has focused on security, and he has directed research projects at MIT Lincoln Laboratory and Sandia National Laboratories. Ram Shankar works on the intersection of machine learning and security at Microsoft and founded the AI Red Team, bringing together an interdisciplinary group of researchers and engineers to proactively attack AI systems and defend them from attacks. 
In This Episode You Will Learn:   


The difference between AI and machine learning

Why embracing a holistic, healthy AI development is to our advantage

The security vulnerabilities and risks associated with AI and Machine Learning


Some Questions We Ask:   


Who did you write this book for, and what will the readers learn? 

What type of vulnerabilities are you finding the most concerning currently? 

How do adversarial attacks exploit vulnerabilities in AI algorithms?


Resources:  
View Hyrum Anderson on LinkedIn
View Ram Shankar on LinkedIn
View Wendy Zenone on LinkedIn
View Nic Fillingham on LinkedIn
Not with a Bug, But with a Sticker is available here
Follow Hyrum on Twitter
Follow Ram on Twitter
Discover and follow other Microsoft podcasts at microsoft.com/podcasts 
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 23 Aug 2023 07:05:00 -0000</pubDate>
      <itunes:title>Not with a Bug but with a Sticker</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/badb349a-33fd-11ef-88d1-4b1b87b2929a/image/bb898c15bd7b85ed0f42402935968f31.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Hyrum Anderson and Ram Shankar join Nic Fillingham and Wendy Zenone on this week’s episode of The BlueHat Podcast. Hyrum Anderson is a distinguished ML Engineer at Robust Intelligence. He received his Ph.D. in Electrical Engineering from the University of Washington, emphasizing signal processing and machine learning. Much of his technical career has focused on security, and he has directed research projects at MIT Lincoln Laboratory and Sandia National Laboratories. Ram Shankar works on the intersection of machine learning and security at Microsoft and founded the AI Red Team, bringing together an interdisciplinary group of researchers and engineers to proactively attack AI systems and defend them from attacks.&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The difference between AI and machine learning&lt;/li&gt;&lt;li&gt;Why embracing a holistic, healthy AI development is to our advantage&lt;/li&gt;&lt;li&gt;The security vulnerabilities and risks associated with AI and Machine Learning&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Who did you write this book for, and what will the readers learn?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What type of vulnerabilities are you finding the most concerning currently?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How do adversarial attacks exploit vulnerabilities in AI algorithms?&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/hyrumanderson/" rel="noopener noreferrer" target="_blank"&gt;View Hyrum Anderson on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/rssk/" rel="noopener noreferrer" target="_blank"&gt;View Ram Shankar on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;&lt;em&gt;Not with a Bug, But with a Sticker&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;is available &lt;a href="https://www.amazon.com/Not-Bug-But-Sticker-Learning/dp/1119883989" rel="noopener noreferrer" target="_blank"&gt;here&lt;/a&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;Follow Hyrum on &lt;a href="https://twitter.com/drhyrum" rel="noopener noreferrer" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Follow Ram on &lt;a href="https://twitter.com/ram_ssk" rel="noopener noreferrer" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt; &lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Hyrum Anderson and Ram Shankar join Nic Fillingham and Wendy Zenone on this week’s episode of The BlueHat Podcast. Hyrum Anderson is a distinguished ML Engineer at Robust Intelligence. He received his Ph.D. in Electrical Engineering from the University of Washington, emphasizing signal processing and machine learning. Much of his technical career has focused on security, and he has directed research projects at MIT Lincoln Laboratory and Sandia National Laboratories. Ram Shankar works on the intersection of machine learning and security at Microsoft and founded the AI Red Team, bringing together an interdisciplinary group of researchers and engineers to proactively attack AI systems and defend them from attacks. 
In This Episode You Will Learn:   


The difference between AI and machine learning

Why embracing a holistic, healthy AI development is to our advantage

The security vulnerabilities and risks associated with AI and Machine Learning


Some Questions We Ask:   


Who did you write this book for, and what will the readers learn? 

What type of vulnerabilities are you finding the most concerning currently? 

How do adversarial attacks exploit vulnerabilities in AI algorithms?


Resources:  
View Hyrum Anderson on LinkedIn
View Ram Shankar on LinkedIn
View Wendy Zenone on LinkedIn
View Nic Fillingham on LinkedIn
Not with a Bug, But with a Sticker is available here
Follow Hyrum on Twitter
Follow Ram on Twitter
Discover and follow other Microsoft podcasts at microsoft.com/podcasts 
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hyrum Anderson and Ram Shankar join Nic Fillingham and Wendy Zenone on this week’s episode of The BlueHat Podcast. Hyrum Anderson is a distinguished ML Engineer at Robust Intelligence. He received his Ph.D. in Electrical Engineering from the University of Washington, emphasizing signal processing and machine learning. Much of his technical career has focused on security, and he has directed research projects at MIT Lincoln Laboratory and Sandia National Laboratories. Ram Shankar works on the intersection of machine learning and security at Microsoft and founded the AI Red Team, bringing together an interdisciplinary group of researchers and engineers to proactively attack AI systems and defend them from attacks. </p><br><p><strong>In This Episode You Will Learn</strong>:   </p><p><br></p><ul>
<li>The difference between AI and machine learning</li>
<li>Why embracing a holistic, healthy AI development is to our advantage</li>
<li>The security vulnerabilities and risks associated with AI and Machine Learning</li>
</ul><p><br></p><p><strong>Some Questions We Ask:</strong>   </p><p><br></p><ul>
<li>Who did you write this book for, and what will the readers learn? </li>
<li>What type of vulnerabilities are you finding the most concerning currently? </li>
<li>How do adversarial attacks exploit vulnerabilities in AI algorithms?</li>
</ul><p><br></p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/hyrumanderson/">View Hyrum Anderson on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/rssk/">View Ram Shankar on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a></p><br><p><strong><em>Not with a Bug, But with a Sticker</em></strong><em> </em>is available <a href="https://www.amazon.com/Not-Bug-But-Sticker-Learning/dp/1119883989">here</a></p><br><p>Follow Hyrum on <a href="https://twitter.com/drhyrum">Twitter</a></p><p>Follow Ram on <a href="https://twitter.com/ram_ssk">Twitter</a></p><br><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a> </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2912</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64e50b4f57152200111a5efc]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW3803588417.mp3?updated=1719435333" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fuzzing, Forensics and Flowers with Amanda Rousseau AKA Malware Unicorn</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/fuzzing-forensics-and-flowers-with-amanda-rousseau-aka-malwa</link>
      <description>Amanda Rousseau, Offensive Security Engineer for the Microsoft Offensive Research and Security Engineering Team, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Amanda loves malware; she worked as an Offensive Security Engineer on the Red Team at Facebook, a Malware Researcher at Endgame, and the U.S. Department of Defense Cyber Crime Center. Amanda mainly focuses on vulnerability, research fuzzing, and security engineering and discusses with Nic and Wendy her time reviewing and analyzing offline digital devices, known as Dead-Box Forensics, reverse engineering malware, and how she finds success from her creative and artistic background.  
 
 
In This Episode You Will Learn:    
 

What "shift left" means as a security professional 

How to learn more about fuzzing and understand some of the tooling 

Why having a creative background helps when communicating with security teams  

 
Some Questions We Ask:    
 

How would you describe fuzzing for someone that's doesn't know the definition?   

What is Dead-Box Forensics, and can you share the investigative process? 

How can we make fuzzing and security more accessible and less intimidating for developers? 

 
Resources:   
View Amanda Rousseau on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Follow Amanda on Twitter and malwareunicorn.org
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 09 Aug 2023 07:05:00 -0000</pubDate>
      <itunes:title>Fuzzing, Forensics and Flowers with Amanda Rousseau AKA Malware Unicorn</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bb2bdb5c-33fd-11ef-88d1-d3db276ea0df/image/c4a19c614a41391f98716aa755e397af.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Amanda Rousseau, Offensive Security Engineer for the Microsoft Offensive Research and Security Engineering Team, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Amanda loves malware; she worked as an Offensive Security Engineer on the Red Team at Facebook, a Malware Researcher at Endgame, and the U.S. Department of Defense Cyber Crime Center. Amanda mainly focuses on vulnerability, research fuzzing, and security engineering and discusses with Nic and Wendy her time reviewing and analyzing offline digital devices, known as Dead-Box Forensics, reverse engineering malware, and how she finds success from her creative and artistic background.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What "shift left" means as a security professional&amp;nbsp;&lt;/li&gt;&lt;li&gt;How to learn more about fuzzing and understand some of the tooling&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why having a creative background helps when communicating with security teams&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How would you describe fuzzing for someone that's doesn't know the definition?&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;What is Dead-Box Forensics, and can you share the investigative process?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How can we make fuzzing and security more accessible and less intimidating for developers?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/malwareunicorn/" rel="noopener noreferrer" target="_blank"&gt;View Amanda Rousseau on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Follow Amanda on &lt;a href="https://twitter.com/malwareunicorn?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor" rel="noopener noreferrer" target="_blank"&gt;Twitter&lt;/a&gt;&amp;nbsp;and &lt;a href="https://malwareunicorn.org/#/" rel="noopener noreferrer" target="_blank"&gt;malwareunicorn.org&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Amanda Rousseau, Offensive Security Engineer for the Microsoft Offensive Research and Security Engineering Team, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Amanda loves malware; she worked as an Offensive Security Engineer on the Red Team at Facebook, a Malware Researcher at Endgame, and the U.S. Department of Defense Cyber Crime Center. Amanda mainly focuses on vulnerability, research fuzzing, and security engineering and discusses with Nic and Wendy her time reviewing and analyzing offline digital devices, known as Dead-Box Forensics, reverse engineering malware, and how she finds success from her creative and artistic background.  
 
 
In This Episode You Will Learn:    
 

What "shift left" means as a security professional 

How to learn more about fuzzing and understand some of the tooling 

Why having a creative background helps when communicating with security teams  

 
Some Questions We Ask:    
 

How would you describe fuzzing for someone that's doesn't know the definition?   

What is Dead-Box Forensics, and can you share the investigative process? 

How can we make fuzzing and security more accessible and less intimidating for developers? 

 
Resources:   
View Amanda Rousseau on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Follow Amanda on Twitter and malwareunicorn.org
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Amanda Rousseau, Offensive Security Engineer for the Microsoft Offensive Research and Security Engineering Team, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Amanda loves malware; she worked as an Offensive Security Engineer on the Red Team at Facebook, a Malware Researcher at Endgame, and the U.S. Department of Defense Cyber Crime Center. Amanda mainly focuses on vulnerability, research fuzzing, and security engineering and discusses with Nic and Wendy her time reviewing and analyzing offline digital devices, known as Dead-Box Forensics, reverse engineering malware, and how she finds success from her creative and artistic background.  </p><p> </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>What "shift left" means as a security professional </li>
<li>How to learn more about fuzzing and understand some of the tooling </li>
<li>Why having a creative background helps when communicating with security teams  </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>How would you describe fuzzing for someone that's doesn't know the definition?   </li>
<li>What is Dead-Box Forensics, and can you share the investigative process? </li>
<li>How can we make fuzzing and security more accessible and less intimidating for developers? </li>
</ul><p> </p><p><strong>Resources:</strong>   </p><p><a href="https://www.linkedin.com/in/malwareunicorn/">View Amanda Rousseau on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p>Follow Amanda on <a href="https://twitter.com/malwareunicorn?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Twitter</a> and <a href="https://malwareunicorn.org/#/">malwareunicorn.org</a></p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2449</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64d2c947ac2bcb001112bf0e]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW8809777745.mp3?updated=1719435333" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>You Are Eye: Why Understanding URIs is Critical to Security with Michael Hendrickx</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/wunderstanding-uris-is-critical-to-security-with-michael-hen</link>
      <description>Michael Hendrickx, Principal Security Engineering Manager at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Michael works in Azure security at Microsoft and leads a team focused on conducting penetration tests on Azure services. The team draws inspiration from the bug bounty community and external sources, leveraging their insights and findings for their research. Michael also discusses the curiosity and exploration mindset needed for both engineers and researchers when it comes to investigating and discovering security vulnerabilities, how developers can effectively protect sensitive data transmitted over insecure networks, and the potential risks and challenges associated with third-party integrations in web applications. 
In This Episode You Will Learn:   


Server-side request forgery and its importance in the context of security

Potential security vulnerabilities associated with different parts of a URI

Importance of collaboration, knowledge sharing, and investigation among developers


Some Questions We Ask:   


What is the focus and target audience for "Shift Left?" 

Should researchers engage in URL manipulation to identify potential vulnerabilities?

What security vulnerabilities should developers be aware of when designing web applications?


Resources:  
View Michael Hendrickx on LinkedIn
View Wendy Zenone on LinkedIn
View Nic Fillingham on LinkedIn

Discover and follow other Microsoft podcasts at microsoft.com/podcasts 
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 26 Jul 2023 07:05:00 -0000</pubDate>
      <itunes:title>You Are Eye: Why Understanding URIs is Critical to Security with Michael Hendrickx</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bb7ae5b2-33fd-11ef-88d1-df967c958775/image/2c64a6137141564fc53ffe835e94fe33.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Michael Hendrickx, Principal Security Engineering Manager at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Michael works in Azure security at Microsoft and leads a team focused on conducting penetration tests on Azure services. The team draws inspiration from the bug bounty community and external sources, leveraging their insights and findings for their research. Michael also discusses the curiosity and exploration mindset needed for both engineers and researchers when it comes to investigating and discovering security vulnerabilities, how developers can effectively protect sensitive data transmitted over insecure networks, and the potential risks and challenges associated with third-party integrations in web applications.&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Server-side request forgery and its importance in the context of security&lt;/li&gt;&lt;li&gt;Potential security vulnerabilities associated with different parts of a URI&lt;/li&gt;&lt;li&gt;Importance of collaboration, knowledge sharing, and investigation among developers&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What is the focus and target audience for "Shift Left?"&amp;nbsp;&lt;/li&gt;&lt;li&gt;Should researchers engage in URL manipulation to identify potential vulnerabilities?&lt;/li&gt;&lt;li&gt;What security vulnerabilities should developers be aware of when designing web applications?&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/ndrix/" rel="noopener noreferrer" target="_blank"&gt;View Michael Hendrickx on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt; &lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Michael Hendrickx, Principal Security Engineering Manager at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Michael works in Azure security at Microsoft and leads a team focused on conducting penetration tests on Azure services. The team draws inspiration from the bug bounty community and external sources, leveraging their insights and findings for their research. Michael also discusses the curiosity and exploration mindset needed for both engineers and researchers when it comes to investigating and discovering security vulnerabilities, how developers can effectively protect sensitive data transmitted over insecure networks, and the potential risks and challenges associated with third-party integrations in web applications. 
In This Episode You Will Learn:   


Server-side request forgery and its importance in the context of security

Potential security vulnerabilities associated with different parts of a URI

Importance of collaboration, knowledge sharing, and investigation among developers


Some Questions We Ask:   


What is the focus and target audience for "Shift Left?" 

Should researchers engage in URL manipulation to identify potential vulnerabilities?

What security vulnerabilities should developers be aware of when designing web applications?


Resources:  
View Michael Hendrickx on LinkedIn
View Wendy Zenone on LinkedIn
View Nic Fillingham on LinkedIn

Discover and follow other Microsoft podcasts at microsoft.com/podcasts 
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Michael Hendrickx, Principal Security Engineering Manager at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Michael works in Azure security at Microsoft and leads a team focused on conducting penetration tests on Azure services. The team draws inspiration from the bug bounty community and external sources, leveraging their insights and findings for their research. Michael also discusses the curiosity and exploration mindset needed for both engineers and researchers when it comes to investigating and discovering security vulnerabilities, how developers can effectively protect sensitive data transmitted over insecure networks, and the potential risks and challenges associated with third-party integrations in web applications. </p><br><p><strong>In This Episode You Will Learn</strong>:   </p><p><br></p><ul>
<li>Server-side request forgery and its importance in the context of security</li>
<li>Potential security vulnerabilities associated with different parts of a URI</li>
<li>Importance of collaboration, knowledge sharing, and investigation among developers</li>
</ul><p><br></p><p><strong>Some Questions We Ask:</strong>   </p><p><br></p><ul>
<li>What is the focus and target audience for "Shift Left?" </li>
<li>Should researchers engage in URL manipulation to identify potential vulnerabilities?</li>
<li>What security vulnerabilities should developers be aware of when designing web applications?</li>
</ul><p><br></p><br><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/ndrix/">View Michael Hendrickx on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a></p><br><p><br></p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a> </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2071</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64bee05b6728150011896025]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4872279643.mp3?updated=1719435334" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AAAAAAAAAAAAAAA! You Overflowed My Integer! with George Hughey and Rohit Mothe</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/aaaaaaaaaaaaaaa-you-overflowed-my-integer-with-george-hughey</link>
      <description>Rohit Mothe, Senior Security Researcher at Microsoft, and Windows Security professional George Hughey join Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. In this episode, they discuss integer overflow bugs, how they can be nuanced and often confused with other bug categories, why accurately classifying these bugs is crucial for developing effective strategies to fix them at scale, and examples of high-profile vulnerabilities caused by integer overflow.  
 
In This Episode You Will Learn:    
 

The challenges of accurately identifying integer overflow bugs 

How developers can proactively prevent integer overflow vulnerabilities in their code 

Why not all integer overflows are malicious and also necessary for certain applications  

 
Some Questions We Ask:    
 

What is an integer overflow? 

How can developers mitigate the risk of integer overflow vulnerabilities? 

What are some examples of high-profile exploits based on integer overflow vulnerabilities? 


Resources:   
View Rohit Mothe on LinkedIn 
View George Hughey on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Follow George on Twitter 
Follow Rohit on Twitter 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 12 Jul 2023 07:05:00 -0000</pubDate>
      <itunes:title>AAAAAAAAAAAAAAA! You Overflowed My Integer! with George Hughey and Rohit Mothe</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bbf109fe-33fd-11ef-88d1-07ef734acc8d/image/54302e0d49871a3bb7fab902dc6c40e5.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Rohit Mothe, Senior Security Researcher at Microsoft, and Windows Security professional George Hughey join Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. In this episode, they discuss integer overflow bugs, how they can be nuanced and often confused with other bug categories, why accurately classifying these bugs is crucial for developing effective strategies to fix them at scale, and examples of high-profile vulnerabilities caused by integer overflow.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The challenges of accurately identifying integer overflow bugs&amp;nbsp;&lt;/li&gt;&lt;li&gt;How developers can proactively prevent integer overflow vulnerabilities in their code&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why not all integer overflows are malicious and also necessary for certain applications&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What is an integer overflow?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How can developers mitigate the risk of integer overflow vulnerabilities?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What are some examples of high-profile exploits based on integer overflow vulnerabilities?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/rohit-mothe-0a047728/" rel="noopener noreferrer" target="_blank"&gt;View Rohit Mothe on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/ghughey/" rel="noopener noreferrer" target="_blank"&gt;View George Hughey on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Follow George on &lt;a href="https://twitter.com/ecthr0s" rel="noopener noreferrer" target="_blank"&gt;Twitter&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Follow Rohit on &lt;a href="https://twitter.com/rohitwas?lang=en" rel="noopener noreferrer" target="_blank"&gt;Twitter&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Rohit Mothe, Senior Security Researcher at Microsoft, and Windows Security professional George Hughey join Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. In this episode, they discuss integer overflow bugs, how they can be nuanced and often confused with other bug categories, why accurately classifying these bugs is crucial for developing effective strategies to fix them at scale, and examples of high-profile vulnerabilities caused by integer overflow.  
 
In This Episode You Will Learn:    
 

The challenges of accurately identifying integer overflow bugs 

How developers can proactively prevent integer overflow vulnerabilities in their code 

Why not all integer overflows are malicious and also necessary for certain applications  

 
Some Questions We Ask:    
 

What is an integer overflow? 

How can developers mitigate the risk of integer overflow vulnerabilities? 

What are some examples of high-profile exploits based on integer overflow vulnerabilities? 


Resources:   
View Rohit Mothe on LinkedIn 
View George Hughey on LinkedIn 
View Wendy Zenone on LinkedIn 
View Nic Fillingham on LinkedIn 
 
Follow George on Twitter 
Follow Rohit on Twitter 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rohit Mothe, Senior Security Researcher at Microsoft, and Windows Security professional George Hughey join Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. In this episode, they discuss integer overflow bugs, how they can be nuanced and often confused with other bug categories, why accurately classifying these bugs is crucial for developing effective strategies to fix them at scale, and examples of high-profile vulnerabilities caused by integer overflow.  </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>The challenges of accurately identifying integer overflow bugs </li>
<li>How developers can proactively prevent integer overflow vulnerabilities in their code </li>
<li>Why not all integer overflows are malicious and also necessary for certain applications  </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>What is an integer overflow? </li>
<li>How can developers mitigate the risk of integer overflow vulnerabilities? </li>
<li>What are some examples of high-profile exploits based on integer overflow vulnerabilities? </li>
</ul><p><br></p><p><strong>Resources:</strong>   </p><p><a href="https://www.linkedin.com/in/rohit-mothe-0a047728/">View Rohit Mothe on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/ghughey/">View George Hughey on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p> </p><p>Follow George on <a href="https://twitter.com/ecthr0s">Twitter</a> </p><p>Follow Rohit on <a href="https://twitter.com/rohitwas?lang=en">Twitter</a> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2708</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64ac40ebcf2790001113b42e]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1866124272.mp3?updated=1719435335" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rachel Giacobozzi on the Art of Threat Intelligence Storytelling</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/rachel-giacobozzi-on-the-art-of-threat-intelligence-storytel</link>
      <description>Rachel Giacobozzi, Principal Research Lead at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Rachel explains the importance of creating a cohesive story not only to convey what happened in an attack but also to explain its significance, why we need to start addressing phishing attacks through education and guidance, and how they make their content concise, clear, and understandable to a wide range of audiences.  
 
In This Episode You Will Learn:    
 

How threat intelligence be used to stay ahead of cyber attacks 

Why being open to growth benefits both security candidates and employers 

The concept of "telling stories" in threat intelligence 

 
Some Questions We Ask:    
 

What is the importance of actionable insights in threat intelligence? 

How does the team behind threat intelligence stay updated with the latest trends? 

What is the decision-making process for selecting which stories to tell? 

 
  
Resources:   
View Rachel Giacobozzi on LinkedIn 
View Nic Fillingham on LinkedIn 
View Wendy Zenone on LinkedIn 
 
Send us feedback: bluehat@microsoft.com 
Follow us on Twitter: @MSFTBlueHat 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 28 Jun 2023 07:05:00 -0000</pubDate>
      <itunes:title>Rachel Giacobozzi on the Art of Threat Intelligence Storytelling</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bc3cf1e8-33fd-11ef-88d1-efb5c12bca80/image/ebb2d92ac9a609600001acd0dfaf05ac.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Rachel Giacobozzi, Principal Research Lead at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Rachel explains the importance of creating a cohesive story not only to convey what happened in an attack but also to explain its significance, why we need to start addressing phishing attacks through education and guidance, and how they make their content concise, clear, and understandable to a wide range of audiences.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How threat intelligence be used to stay ahead of cyber attacks&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why being open to growth benefits both security candidates and employers&amp;nbsp;&lt;/li&gt;&lt;li&gt;The concept of "telling stories" in threat intelligence&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What is the importance of actionable insights in threat intelligence?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How does the team behind threat intelligence stay updated with the latest trends?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What is the decision-making process for selecting which stories to tell?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/rachel-giacobozzi-5b6513131/" rel="noopener noreferrer" target="_blank"&gt;View Rachel Giacobozzi on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Send us feedback: &lt;a href="mailto:bluehat@microsoft.com" rel="noopener noreferrer" target="_blank"&gt;bluehat@microsoft.com&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Follow us on Twitter: &lt;a href="https://twitter.com/MSFTBlueHat" rel="noopener noreferrer" target="_blank"&gt;@MSFTBlueHat&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Rachel Giacobozzi, Principal Research Lead at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Rachel explains the importance of creating a cohesive story not only to convey what happened in an attack but also to explain its significance, why we need to start addressing phishing attacks through education and guidance, and how they make their content concise, clear, and understandable to a wide range of audiences.  
 
In This Episode You Will Learn:    
 

How threat intelligence be used to stay ahead of cyber attacks 

Why being open to growth benefits both security candidates and employers 

The concept of "telling stories" in threat intelligence 

 
Some Questions We Ask:    
 

What is the importance of actionable insights in threat intelligence? 

How does the team behind threat intelligence stay updated with the latest trends? 

What is the decision-making process for selecting which stories to tell? 

 
  
Resources:   
View Rachel Giacobozzi on LinkedIn 
View Nic Fillingham on LinkedIn 
View Wendy Zenone on LinkedIn 
 
Send us feedback: bluehat@microsoft.com 
Follow us on Twitter: @MSFTBlueHat 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rachel Giacobozzi, Principal Research Lead at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Rachel explains the importance of creating a cohesive story not only to convey what happened in an attack but also to explain its significance, why we need to start addressing phishing attacks through education and guidance, and how they make their content concise, clear, and understandable to a wide range of audiences.  </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>How threat intelligence be used to stay ahead of cyber attacks </li>
<li>Why being open to growth benefits both security candidates and employers </li>
<li>The concept of "telling stories" in threat intelligence </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>What is the importance of actionable insights in threat intelligence? </li>
<li>How does the team behind threat intelligence stay updated with the latest trends? </li>
<li>What is the decision-making process for selecting which stories to tell? </li>
</ul><p> </p><p>  </p><p><strong>Resources:</strong>   </p><p><a href="https://www.linkedin.com/in/rachel-giacobozzi-5b6513131/">View Rachel Giacobozzi on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p> </p><p>Send us feedback: <a href="mailto:bluehat@microsoft.com">bluehat@microsoft.com</a> </p><p>Follow us on Twitter: <a href="https://twitter.com/MSFTBlueHat">@MSFTBlueHat</a> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2234</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[649b31593f1044001113a52f]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4882126681.mp3?updated=1719435335" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Raul Rojas: Navigating the AI-infused Security Landscape</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/raul-rojas-navigating-the-ai-infused-security-landscape</link>
      <description>Raul Rojas, Principal Security Compliance Manager at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Raul manages and leads a team of information security professionals across application security, incident response, remediation, security data science &amp; engineering. Raul discusses the importance of AI in various fields, such as healthcare, finance, and cybersecurity, the impact AI will have on privacy, and the need for regulations and governance frameworks to ensure responsible AI development and deployment.  
 
In This Episode You Will Learn:    
 

How the field of AI and machine learning in security is evolving 

The value of integrating security principles and seeking input from the security community  

Why the security community needs to develop new tools and processes for  AI and Data.  

 
Some Questions We Ask:    
 

Can you share an example of a successful project transition from research to production? 

Are there already existing fundamentals in machine learning and AI security? 

What are the potential risks of attackers manipulating AI and machine learning models? 

 
Resources:   
View Raul Rojas on LinkedIn 
View Nic Fillingham on LinkedIn 
View Wendy Zenone on LinkedIn 
 
Send us feedback: bluehat@microsoft.com 
Follow us on Twitter: @MSFTBlueHat 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 14 Jun 2023 07:05:00 -0000</pubDate>
      <itunes:title>Raul Rojas: Navigating the AI-infused Security Landscape</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bca25ce0-33fd-11ef-88d1-9b64a05966ac/image/ebb2d92ac9a609600001acd0dfaf05ac.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Raul Rojas, Principal Security Compliance Manager at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Raul manages and leads a team of information security professionals across application security, incident response, remediation, security data science &amp;amp; engineering. Raul discusses the importance of AI in various fields, such as healthcare, finance, and cybersecurity, the impact AI will have on privacy, and the need for regulations and governance frameworks to ensure responsible AI development and deployment.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How the field of AI and machine learning in security is evolving&amp;nbsp;&lt;/li&gt;&lt;li&gt;The value of integrating security principles and seeking input from the security community&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why the security community needs to develop new tools and processes for&amp;nbsp; AI and Data.&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Can you share an example of a successful project transition from research to production?&amp;nbsp;&lt;/li&gt;&lt;li&gt;Are there already existing fundamentals in machine learning and AI security?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What are the potential risks of attackers manipulating AI and machine learning models?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/eljefedsecurit/" rel="noopener noreferrer" target="_blank"&gt;View Raul Rojas on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Send us feedback: &lt;a href="mailto:bluehat@microsoft.com" rel="noopener noreferrer" target="_blank"&gt;bluehat@microsoft.com&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Follow us on Twitter: &lt;a href="https://twitter.com/MSFTBlueHat" rel="noopener noreferrer" target="_blank"&gt;@MSFTBlueHat&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Raul Rojas, Principal Security Compliance Manager at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Raul manages and leads a team of information security professionals across application security, incident response, remediation, security data science &amp; engineering. Raul discusses the importance of AI in various fields, such as healthcare, finance, and cybersecurity, the impact AI will have on privacy, and the need for regulations and governance frameworks to ensure responsible AI development and deployment.  
 
In This Episode You Will Learn:    
 

How the field of AI and machine learning in security is evolving 

The value of integrating security principles and seeking input from the security community  

Why the security community needs to develop new tools and processes for  AI and Data.  

 
Some Questions We Ask:    
 

Can you share an example of a successful project transition from research to production? 

Are there already existing fundamentals in machine learning and AI security? 

What are the potential risks of attackers manipulating AI and machine learning models? 

 
Resources:   
View Raul Rojas on LinkedIn 
View Nic Fillingham on LinkedIn 
View Wendy Zenone on LinkedIn 
 
Send us feedback: bluehat@microsoft.com 
Follow us on Twitter: @MSFTBlueHat 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Raul Rojas, Principal Security Compliance Manager at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Raul manages and leads a team of information security professionals across application security, incident response, remediation, security data science &amp; engineering. Raul discusses the importance of AI in various fields, such as healthcare, finance, and cybersecurity, the impact AI will have on privacy, and the need for regulations and governance frameworks to ensure responsible AI development and deployment.  </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>How the field of AI and machine learning in security is evolving </li>
<li>The value of integrating security principles and seeking input from the security community  </li>
<li>Why the security community needs to develop new tools and processes for  AI and Data.  </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>Can you share an example of a successful project transition from research to production? </li>
<li>Are there already existing fundamentals in machine learning and AI security? </li>
<li>What are the potential risks of attackers manipulating AI and machine learning models? </li>
</ul><p> </p><p><strong>Resources:</strong>   </p><br><p><a href="https://www.linkedin.com/in/eljefedsecurit/">View Raul Rojas on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p> </p><p>Send us feedback: <a href="mailto:bluehat@microsoft.com">bluehat@microsoft.com</a> </p><p>Follow us on Twitter: <a href="https://twitter.com/MSFTBlueHat">@MSFTBlueHat</a> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>3186</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64877f1f5921380011f529ee]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4267860372.mp3?updated=1719435336" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dan Tentler on How the Old Ways Still Work</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/dan-tentler-on-how-the-old-ways-still-work</link>
      <description>Dan Tentler, Executive Founder and CTO of Phobos Group, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Dan has a wealth of defensive and adversarial knowledge and a strong background in systems, networking, architecture, and wireless networks. Dan discusses his time at BlueHat 2023, why you should put everything behind a VPN, and how a typo and Jeff Goldblum's movie Hideaway helped create his current online handle.  
 
  
In This Episode You Will Learn:    
 

Why it's important to hold onto old techniques and knowledge  

The premise and thoughts behind Dan’s 2023 BlueHat presentation 

How people can still protect themselves with old security tools 

 
Some Questions We Ask:    
 

How did your security career start and grow into speaking at BlueHat 2023? 

What tools and techniques were available in the beginning of your career?  

What were some big takeaways from your presentation at BlueHat?  

  
Resources:   
 
View Nic Fillingham on LinkedIn 
View Wendy Zenone on LinkedIn 
 
Send us feedback: bluehat@microsoft.com 
Follow us on Twitter: @MSFTBlueHat 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 31 May 2023 07:05:00 -0000</pubDate>
      <itunes:title>Dan Tentler on How the Old Ways Still Work</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bceb2cb8-33fd-11ef-88d1-eb8c785a579a/image/ebb2d92ac9a609600001acd0dfaf05ac.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Dan Tentler, Executive Founder and CTO of Phobos Group, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Dan has a wealth of defensive and adversarial knowledge and a strong background in systems, networking, architecture, and wireless networks. Dan discusses his time at BlueHat 2023, why you should put everything behind a VPN, and how a typo and Jeff Goldblum's movie Hideaway helped create his current online handle.&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Why it's important to hold onto old techniques and knowledge&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;The premise and thoughts behind Dan’s 2023 BlueHat presentation&amp;nbsp;&lt;/li&gt;&lt;li&gt;How people can still protect themselves with old security tools&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How did your security career start and grow into speaking at BlueHat 2023?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What tools and techniques were available in the beginning of your career?&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;What were some big takeaways from your presentation at BlueHat?&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Send us feedback: &lt;a href="mailto:bluehat@microsoft.com" rel="noopener noreferrer" target="_blank"&gt;bluehat@microsoft.com&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Follow us on Twitter: &lt;a href="https://twitter.com/MSFTBlueHat" rel="noopener noreferrer" target="_blank"&gt;@MSFTBlueHat&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Dan Tentler, Executive Founder and CTO of Phobos Group, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Dan has a wealth of defensive and adversarial knowledge and a strong background in systems, networking, architecture, and wireless networks. Dan discusses his time at BlueHat 2023, why you should put everything behind a VPN, and how a typo and Jeff Goldblum's movie Hideaway helped create his current online handle.  
 
  
In This Episode You Will Learn:    
 

Why it's important to hold onto old techniques and knowledge  

The premise and thoughts behind Dan’s 2023 BlueHat presentation 

How people can still protect themselves with old security tools 

 
Some Questions We Ask:    
 

How did your security career start and grow into speaking at BlueHat 2023? 

What tools and techniques were available in the beginning of your career?  

What were some big takeaways from your presentation at BlueHat?  

  
Resources:   
 
View Nic Fillingham on LinkedIn 
View Wendy Zenone on LinkedIn 
 
Send us feedback: bluehat@microsoft.com 
Follow us on Twitter: @MSFTBlueHat 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dan Tentler, Executive Founder and CTO of Phobos Group, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Dan has a wealth of defensive and adversarial knowledge and a strong background in systems, networking, architecture, and wireless networks. Dan discusses his time at BlueHat 2023, why you should put everything behind a VPN, and how a typo and Jeff Goldblum's movie Hideaway helped create his current online handle.  </p><p> </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>Why it's important to hold onto old techniques and knowledge  </li>
<li>The premise and thoughts behind Dan’s 2023 BlueHat presentation </li>
<li>How people can still protect themselves with old security tools </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>How did your security career start and grow into speaking at BlueHat 2023? </li>
<li>What tools and techniques were available in the beginning of your career?  </li>
<li>What were some big takeaways from your presentation at BlueHat?  </li>
</ul><p>  </p><p><strong>Resources:</strong>   </p><p> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><p> </p><p>Send us feedback: <a href="mailto:bluehat@microsoft.com">bluehat@microsoft.com</a> </p><p>Follow us on Twitter: <a href="https://twitter.com/MSFTBlueHat">@MSFTBlueHat</a> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2806</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64763e9706ed1000114f2061]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4203193161.mp3?updated=1719435336" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cameron Vincent on Both Sides of Bug Hunting</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/cameron-vincent-on-both-sides-of-bug-hunting</link>
      <description>Cameron Vincent, a security researcher at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Cameron has been one of the top researchers for both Microsoft and Google programs numerous times. He now works on the V&amp;M team within the MSRC side, dealing with security issues internally. Cameron discusses with Nic and Wendy the importance of understanding your role and responsibilities in the workplace, the first bug he ever submitted, and his time presenting at BlueHat 2023. 
  
In This Episode You Will Learn:    
 

The benefits of face-to-face communication and how to balance it with technology. 

Why you should build a supportive culture of communication 

How to get involved in the world of bug bounty hunting 

 
Some Questions We Ask:    
 

How do you manage and deal with stress and burnout from your work? 

What are some practical ways to provide feedback to team members? 

How can we improve communication in a remote work environment? 

  
Resources:   
Follow Cameron Vincent on Twitter 
Watch Cameron speak at BlueHat 2023 
 
View Nic Fillingham on LinkedIn 
View Wendy Zenone on LinkedIn 
Send us feedback: bluehat@microsoft.com
Follow us on Twitter: @MSFTBlueHat
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 17 May 2023 09:05:12 -0000</pubDate>
      <itunes:title>Cameron Vincent on Both Sides of Bug Hunting</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bd3b8c3a-33fd-11ef-88d1-07ceb76cf265/image/ebb2d92ac9a609600001acd0dfaf05ac.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;Cameron Vincent, a security researcher at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Cameron has been one of the top researchers for both Microsoft and Google programs numerous times. He now works on the V&amp;amp;M team within the MSRC side, dealing with security issues internally. Cameron discusses with Nic and Wendy the importance of understanding your role and responsibilities in the workplace, the first bug he ever submitted, and his time presenting at BlueHat 2023.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The benefits of face-to-face communication and how to balance it with technology.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why you should build a supportive culture of communication&amp;nbsp;&lt;/li&gt;&lt;li&gt;How to get involved in the world of bug bounty hunting&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How do you manage and deal with stress and burnout from your work?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What are some practical ways to provide feedback to team members?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How can we improve communication in a remote work environment?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://twitter.com/secretlyhidden1?lang=en" rel="noopener noreferrer" target="_blank"&gt;&lt;em&gt;Follow Cameron Vincent on Twitter&lt;/em&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=DlDONiCvtyE" rel="noopener noreferrer" target="_blank"&gt;&lt;em&gt;Watch Cameron speak at BlueHat 2023&lt;/em&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;Send us feedback:&amp;nbsp;&lt;a href="mailto:bluehat@microsoft.com" rel="noopener noreferrer" target="_blank"&gt;bluehat@microsoft.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Follow us on Twitter: &lt;a href="https://twitter.com/MSFTBlueHat" rel="noopener noreferrer" target="_blank"&gt;@MSFTBlueHat&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>Cameron Vincent, a security researcher at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Cameron has been one of the top researchers for both Microsoft and Google programs numerous times. He now works on the V&amp;M team within the MSRC side, dealing with security issues internally. Cameron discusses with Nic and Wendy the importance of understanding your role and responsibilities in the workplace, the first bug he ever submitted, and his time presenting at BlueHat 2023. 
  
In This Episode You Will Learn:    
 

The benefits of face-to-face communication and how to balance it with technology. 

Why you should build a supportive culture of communication 

How to get involved in the world of bug bounty hunting 

 
Some Questions We Ask:    
 

How do you manage and deal with stress and burnout from your work? 

What are some practical ways to provide feedback to team members? 

How can we improve communication in a remote work environment? 

  
Resources:   
Follow Cameron Vincent on Twitter 
Watch Cameron speak at BlueHat 2023 
 
View Nic Fillingham on LinkedIn 
View Wendy Zenone on LinkedIn 
Send us feedback: bluehat@microsoft.com
Follow us on Twitter: @MSFTBlueHat
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cameron Vincent, a security researcher at Microsoft, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Cameron has been one of the top researchers for both Microsoft and Google programs numerous times. He now works on the V&amp;M team within the MSRC side, dealing with security issues internally. Cameron discusses with Nic and Wendy the importance of understanding your role and responsibilities in the workplace, the first bug he ever submitted, and his time presenting at BlueHat 2023. </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>The benefits of face-to-face communication and how to balance it with technology. </li>
<li>Why you should build a supportive culture of communication </li>
<li>How to get involved in the world of bug bounty hunting </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>How do you manage and deal with stress and burnout from your work? </li>
<li>What are some practical ways to provide feedback to team members? </li>
<li>How can we improve communication in a remote work environment? </li>
</ul><p>  </p><p><strong>Resources:</strong>   </p><p><a href="https://twitter.com/secretlyhidden1?lang=en"><em>Follow Cameron Vincent on Twitter</em></a> </p><p><a href="https://www.youtube.com/watch?v=DlDONiCvtyE"><em>Watch Cameron speak at BlueHat 2023</em></a> </p><p> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><br><p>Send us feedback: <a href="mailto:bluehat@microsoft.com">bluehat@microsoft.com</a></p><p>Follow us on Twitter: <a href="https://twitter.com/MSFTBlueHat">@MSFTBlueHat</a></p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2457</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6462eaa406ed560011f0167e]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW6139213512.mp3?updated=1719435337" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>James Forshaw on Writing Your Own Tools</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/james-forshaw-on-writing-your-own-tools</link>
      <description>James Forshaw, a security researcher at Google's Project Zero, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. James has been involved with computer hardware and software security for over ten years and has been listed as the number one researcher for MSRC, as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner. James is also the author of the book "Attacking Network Protocols" which is available from NoStarch Press. James discusses going after logic-based bugs, his time at BlueHat 2023, and how creativity and intuition help him while hunting for new bugs.   
  
In This Episode You Will Learn:    
 

Values and benefits of writing your own tooling 

Why James decided on a high-level, call-to-action presentation for BlueHat 2023 

The inspiration behind his new book “Attacking Network Protocols” 

 
Some Questions We Ask:    
 

Is there a sequence of events you follow when hunting for a logic vulnerability? 

When should someone consider writing their own tools? 

What advantages come to mind when writing your tooling for a new project? 

  
Resources:   
Watch James Forshaw at BlueHat 2023 
 
View James Forshaw on LinkedIn 
View Nic Fillingham on LinkedIn 
View Wendy Zenone on LinkedIn 
Send us feedback: bluehat@microsoft.com
Follow us on Twitter: @MSFTBlueHat
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 17 May 2023 08:05:43 -0000</pubDate>
      <itunes:title>James Forshaw on Writing Your Own Tools</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bd83cd38-33fd-11ef-88d1-8372f2b2b4a8/image/ebb2d92ac9a609600001acd0dfaf05ac.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;James Forshaw, a security researcher at Google's Project Zero, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. James has been involved with computer hardware and software security for over ten years and has been listed as the number one researcher for MSRC, as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner. James is also the author of the book "Attacking Network Protocols" which is available from NoStarch Press. James discusses going after logic-based bugs, his time at BlueHat 2023, and how creativity and intuition help him while hunting for new bugs.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Values and benefits of writing your own tooling&amp;nbsp;&lt;/li&gt;&lt;li&gt;Why James decided on a high-level, call-to-action presentation for BlueHat 2023&amp;nbsp;&lt;/li&gt;&lt;li&gt;The inspiration behind his new book “Attacking Network Protocols”&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Is there a sequence of events you follow when hunting for a logic vulnerability?&amp;nbsp;&lt;/li&gt;&lt;li&gt;When should someone consider writing their own tools?&amp;nbsp;&lt;/li&gt;&lt;li&gt;What advantages come to mind when writing your tooling for a new project?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=At-SWQyp-DY" rel="noopener noreferrer" target="_blank"&gt;&lt;em&gt;Watch James Forshaw at BlueHat 2023&lt;/em&gt;&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/james-forshaw-ab833725/" rel="noopener noreferrer" target="_blank"&gt;View James Forshaw on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;Send us feedback:&amp;nbsp;&lt;a href="mailto:bluehat@microsoft.com" rel="noopener noreferrer" target="_blank"&gt;bluehat@microsoft.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Follow us on Twitter: &lt;a href="https://twitter.com/MSFTBlueHat" rel="noopener noreferrer" target="_blank"&gt;@MSFTBlueHat&lt;/a&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>James Forshaw, a security researcher at Google's Project Zero, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. James has been involved with computer hardware and software security for over ten years and has been listed as the number one researcher for MSRC, as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner. James is also the author of the book "Attacking Network Protocols" which is available from NoStarch Press. James discusses going after logic-based bugs, his time at BlueHat 2023, and how creativity and intuition help him while hunting for new bugs.   
  
In This Episode You Will Learn:    
 

Values and benefits of writing your own tooling 

Why James decided on a high-level, call-to-action presentation for BlueHat 2023 

The inspiration behind his new book “Attacking Network Protocols” 

 
Some Questions We Ask:    
 

Is there a sequence of events you follow when hunting for a logic vulnerability? 

When should someone consider writing their own tools? 

What advantages come to mind when writing your tooling for a new project? 

  
Resources:   
Watch James Forshaw at BlueHat 2023 
 
View James Forshaw on LinkedIn 
View Nic Fillingham on LinkedIn 
View Wendy Zenone on LinkedIn 
Send us feedback: bluehat@microsoft.com
Follow us on Twitter: @MSFTBlueHat
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>James Forshaw, a security researcher at Google's Project Zero, joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. James has been involved with computer hardware and software security for over ten years and has been listed as the number one researcher for MSRC, as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner. James is also the author of the book "Attacking Network Protocols" which is available from NoStarch Press. James discusses going after logic-based bugs, his time at BlueHat 2023, and how creativity and intuition help him while hunting for new bugs.   </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>Values and benefits of writing your own tooling </li>
<li>Why James decided on a high-level, call-to-action presentation for BlueHat 2023 </li>
<li>The inspiration behind his new book “Attacking Network Protocols” </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>Is there a sequence of events you follow when hunting for a logic vulnerability? </li>
<li>When should someone consider writing their own tools? </li>
<li>What advantages come to mind when writing your tooling for a new project? </li>
</ul><p>  </p><p><strong>Resources:</strong>   </p><p><a href="https://www.youtube.com/watch?v=At-SWQyp-DY"><em>Watch James Forshaw at BlueHat 2023</em></a> </p><p> </p><p><a href="https://www.linkedin.com/in/james-forshaw-ab833725/">View James Forshaw on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><br><p>Send us feedback: <a href="mailto:bluehat@microsoft.com">bluehat@microsoft.com</a></p><p>Follow us on Twitter: <a href="https://twitter.com/MSFTBlueHat">@MSFTBlueHat</a></p><br><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2833</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6462e8f864bf1c001101edd4]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW1245234259.mp3?updated=1719435337" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>David Weston on the Importance of Security Research</title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/david-weston-on-the-importance-of-security-research</link>
      <description>David Weston, Vice President of Enterprise and OS Security at Microsoft, joins Nic Fillingham on this week's episode of The BlueHat Podcast. With over twenty years of experience in the industry, David has a deep knowledge of cybersecurity best practices and has been recognized as a thought leader. In addition to his work in cybersecurity, David also advocates for diversity and inclusion in the tech industry. He has been actively involved in initiatives to promote diversity in cybersecurity and has spoken about the need for greater diversity in the industry. David discusses with Nic the importance of having a comprehensive cybersecurity strategy, the value of creating a culture of cybersecurity within organizations, and why we need regular software updates and investing in cybersecurity tools. 
 
  
In This Episode You Will Learn:    
 

How organizations can create a culture of cybersecurity among their employees 

The most effective ways to train employees on cybersecurity best practices 

Tools and technologies that organizations can use to protect themselves 

 
Some Questions We Ask:    
 

How can organizations overcome some of their biggest challenges in security?  

Can you share some common mistakes that organizations make regarding cybersecurity? 

How do you see the cybersecurity landscape evolving in the coming years? 

  
Resources:   
 
View David Weston on LinkedIn 
View Nic Fillingham on LinkedIn 
View Wendy Zenone on LinkedIn 
Send us feedback: bluehat@microsoft.com
Follow us on Twitter: @MSFTBlueHat
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Wed, 17 May 2023 07:05:00 -0000</pubDate>
      <itunes:title>David Weston on the Importance of Security Research</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bdcd05fc-33fd-11ef-88d1-33ce7aca54a2/image/ebb2d92ac9a609600001acd0dfaf05ac.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>&lt;p&gt;David Weston, Vice President of Enterprise and OS Security at Microsoft, joins Nic Fillingham on this week's episode of The BlueHat Podcast. With over twenty years of experience in the industry, David has a deep knowledge of cybersecurity best practices and has been recognized as a thought leader. In addition to his work in cybersecurity, David also advocates for diversity and inclusion in the tech industry. He has been actively involved in initiatives to promote diversity in cybersecurity and has spoken about the need for greater diversity in the industry. David discusses with Nic the importance of having a comprehensive cybersecurity strategy, the value of creating a culture of cybersecurity within organizations, and why we need regular software updates and investing in cybersecurity tools.&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;In This Episode You Will Learn&lt;/strong&gt;:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How organizations can create a culture of cybersecurity among their employees&amp;nbsp;&lt;/li&gt;&lt;li&gt;The most effective ways to train employees on cybersecurity best practices&amp;nbsp;&lt;/li&gt;&lt;li&gt;Tools and technologies that organizations can use to protect themselves&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Some Questions We Ask:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;How can organizations overcome some of their biggest challenges in security?&amp;nbsp;&amp;nbsp;&lt;/li&gt;&lt;li&gt;Can you share some common mistakes that organizations make regarding cybersecurity?&amp;nbsp;&lt;/li&gt;&lt;li&gt;How do you see the cybersecurity landscape evolving in the coming years?&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Resources:&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/david-weston-ba87686/" rel="noopener noreferrer" target="_blank"&gt;View David Weston on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank"&gt;View Nic Fillingham on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank"&gt;View Wendy Zenone on LinkedIn&lt;/a&gt;&amp;nbsp;&lt;/p&gt;&lt;br&gt;&lt;p&gt;Send us feedback:&amp;nbsp;&lt;a href="mailto:bluehat@microsoft.com" rel="noopener noreferrer" target="_blank"&gt;bluehat@microsoft.com&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Follow us on Twitter: &lt;a href="https://twitter.com/MSFTBlueHat" rel="noopener noreferrer" target="_blank"&gt;@MSFTBlueHat&lt;/a&gt;&lt;/p&gt;&lt;br&gt;&lt;p&gt;Discover and follow other Microsoft podcasts at&lt;a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"&gt; microsoft.com/podcasts&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>David Weston, Vice President of Enterprise and OS Security at Microsoft, joins Nic Fillingham on this week's episode of The BlueHat Podcast. With over twenty years of experience in the industry, David has a deep knowledge of cybersecurity best practices and has been recognized as a thought leader. In addition to his work in cybersecurity, David also advocates for diversity and inclusion in the tech industry. He has been actively involved in initiatives to promote diversity in cybersecurity and has spoken about the need for greater diversity in the industry. David discusses with Nic the importance of having a comprehensive cybersecurity strategy, the value of creating a culture of cybersecurity within organizations, and why we need regular software updates and investing in cybersecurity tools. 
 
  
In This Episode You Will Learn:    
 

How organizations can create a culture of cybersecurity among their employees 

The most effective ways to train employees on cybersecurity best practices 

Tools and technologies that organizations can use to protect themselves 

 
Some Questions We Ask:    
 

How can organizations overcome some of their biggest challenges in security?  

Can you share some common mistakes that organizations make regarding cybersecurity? 

How do you see the cybersecurity landscape evolving in the coming years? 

  
Resources:   
 
View David Weston on LinkedIn 
View Nic Fillingham on LinkedIn 
View Wendy Zenone on LinkedIn 
Send us feedback: bluehat@microsoft.com
Follow us on Twitter: @MSFTBlueHat
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[<p>David Weston, Vice President of Enterprise and OS Security at Microsoft, joins Nic Fillingham on this week's episode of The BlueHat Podcast. With over twenty years of experience in the industry, David has a deep knowledge of cybersecurity best practices and has been recognized as a thought leader. In addition to his work in cybersecurity, David also advocates for diversity and inclusion in the tech industry. He has been actively involved in initiatives to promote diversity in cybersecurity and has spoken about the need for greater diversity in the industry. David discusses with Nic the importance of having a comprehensive cybersecurity strategy, the value of creating a culture of cybersecurity within organizations, and why we need regular software updates and investing in cybersecurity tools. </p><p> </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:    </p><p> </p><ul>
<li>How organizations can create a culture of cybersecurity among their employees </li>
<li>The most effective ways to train employees on cybersecurity best practices </li>
<li>Tools and technologies that organizations can use to protect themselves </li>
</ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><p> </p><ul>
<li>How can organizations overcome some of their biggest challenges in security?  </li>
<li>Can you share some common mistakes that organizations make regarding cybersecurity? </li>
<li>How do you see the cybersecurity landscape evolving in the coming years? </li>
</ul><p>  </p><p><strong>Resources:</strong>   </p><p> </p><p><a href="https://www.linkedin.com/in/david-weston-ba87686/">View David Weston on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a> </p><br><p>Send us feedback: <a href="mailto:bluehat@microsoft.com">bluehat@microsoft.com</a></p><p>Follow us on Twitter: <a href="https://twitter.com/MSFTBlueHat">@MSFTBlueHat</a></p><br><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>2487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6462e63164bf1c0011016869]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW4671603252.mp3?updated=1719435338" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The BlueHat Podcast </title>
      <link>https://shows.acast.com/the-bluehat-podcast/episodes/the-bluehat-podcast</link>
      <description>Get ready for The BlueHat Podcast - A new security research-focused podcast from Microsoft featuring conversations with security researchers and industry leaders, both inside and outside of Microsoft.  Hosted on Acast. See acast.com/privacy for more information.</description>
      <pubDate>Mon, 15 May 2023 22:16:20 -0000</pubDate>
      <itunes:title>The BlueHat Podcast </itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <itunes:author>Microsoft</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/be1668aa-33fd-11ef-88d1-437e85a7c6f5/image/ebb2d92ac9a609600001acd0dfaf05ac.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The BlueHat Podcast </itunes:subtitle>
      <itunes:summary>Get ready for The BlueHat Podcast - A new security research-focused podcast from Microsoft featuring conversations with security researchers and industry leaders, both inside and outside of Microsoft.  Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
      <content:encoded>
        <![CDATA[Get ready for The BlueHat Podcast - A new security research-focused podcast from Microsoft featuring conversations with security researchers and industry leaders, both inside and outside of Microsoft. <br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
      </content:encoded>
      <itunes:duration>39</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6462af34ec9f28001170e6ed]]></guid>
      <enclosure url="https://traffic.megaphone.fm/CYBW7447480783.mp3?updated=1719435338" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
