<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>Security Unlocked</title>
		<link>https://securityunlockedpodcast.com</link>
		<atom:link href="https://feeds.acast.com/public/shows/64ac54ede55ebb0011cb41b1" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>©2024 Microsoft</copyright>
		<itunes:keywords/>
		<itunes:author>Microsoft</itunes:author>
		<itunes:subtitle>The Microsoft Security Podcast</itunes:subtitle>
		<itunes:summary><![CDATA[<p>Security Unlocked presents The BlueHat Podcast</p><p>&nbsp;</p><p>From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions.</p><p>&nbsp;</p><p>Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and create a safer world for all.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[<p>Security Unlocked presents The BlueHat Podcast</p><p>&nbsp;</p><p>From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions.</p><p>&nbsp;</p><p>Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and create a safer world for all.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>false</itunes:explicit>
		<itunes:owner>
			<itunes:name>Bruce Bracken</itunes:name>
			<itunes:email>bbrack@microsoft.com</itunes:email>
		</itunes:owner>
		<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
		<acast:showUrl>security-unlocked-3</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmTHg2/BXqPr07kkpFZ5JfhvEZqggcpunI6E1w81XpUaBscFc3skEQ0jWG4GCmQYJ66w6pH6P/aGd3DnpJN6h/CD4icd8kZVl4HZn12KicA2k]]></acast:settings>
        <acast:network id="60075c7a795a1c638da14bca" slug="bruce-bracken"><![CDATA[Bruce Bracken]]></acast:network>
		<acast:importedFeed>https://feeds.megaphone.fm/security-unlocked</acast:importedFeed>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<image>
				<url>https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg</url>
				<link>https://securityunlockedpodcast.com</link>
				<title>Security Unlocked</title>
			</image>
			<itunes:new-feed-url>https://feeds.acast.com/public/shows/64ac54ede55ebb0011cb41b1</itunes:new-feed-url>
		<item>
			<title>Hunting Variants: Finding the Bugs Behind the Bug</title>
			<itunes:title>Hunting Variants: Finding the Bugs Behind the Bug</itunes:title>
			<pubDate>Wed, 09 Jul 2025 07:05:00 GMT</pubDate>
			<itunes:duration>39:51</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/686c4a8b7254eb13351994c1/media.mp3" length="95666024" type="audio/mpeg"/>
			<guid isPermaLink="false">686c4a8b7254eb13351994c1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unlocked-3/episodes/hunting-variants-finding-the-bugs</link>
			<acast:episodeId>686c4a8b7254eb13351994c1</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:episodeUrl>hunting-variants-finding-the-bugs</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCdD935eBIdvMLQXnayoAm1+W5Qwew0j+G/DM+LXCf7dZZhasEMCsRAKIQ64r2CVn2dz0Qne6Mvuf/j0iYcgNI0HiFe2nXvu3550BneQ0CrcbbLfeACFjH5hzBBRsu/0+iw4L1vbvFKIKg9u3Hwb3vBYD6ikf1s7pCUQgS4Db3cLRyO0RsNllagbCFJsN/2Kd2iJpcyPp/F15TbltbmNSfNm]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>66</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;is joined by&nbsp;<a href="https://www.linkedin.com/in/ghughey/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">George Hughey</a>&nbsp;from Microsoft who returns to discuss his Blue Hat India talk on variant hunting, explaining how MSRC uses submission data from hacking competitions like Pwn2Own and Tianfu Cup to uncover&nbsp;additional&nbsp;security vulnerabilities in Windows. George shares how incentives in competitions differ from bug bounty programs, how tools like&nbsp;CodeQL&nbsp;assist&nbsp;variant hunting, and why collaborating with the security research community is key to improving Windows security.&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>How hacking competitions help find real-world Windows vulnerabilities&nbsp;</li><li>The role of MSRC in hunting variants beyond&nbsp;submitted&nbsp;vulnerabilities&nbsp;</li><li>Why fuzzing is not always effective for modern edge cases&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>How do you decide which cases to pursue for variant hunting?&nbsp;</li><li>What advice do you have for researchers&nbsp;submitting&nbsp;variants?&nbsp;</li><li>How does the&nbsp;CodeQL&nbsp;team collaborate with your team?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/ghughey/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">View George Hughey on LinkedIn</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><p>&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;is joined by&nbsp;<a href="https://www.linkedin.com/in/ghughey/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">George Hughey</a>&nbsp;from Microsoft who returns to discuss his Blue Hat India talk on variant hunting, explaining how MSRC uses submission data from hacking competitions like Pwn2Own and Tianfu Cup to uncover&nbsp;additional&nbsp;security vulnerabilities in Windows. George shares how incentives in competitions differ from bug bounty programs, how tools like&nbsp;CodeQL&nbsp;assist&nbsp;variant hunting, and why collaborating with the security research community is key to improving Windows security.&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>How hacking competitions help find real-world Windows vulnerabilities&nbsp;</li><li>The role of MSRC in hunting variants beyond&nbsp;submitted&nbsp;vulnerabilities&nbsp;</li><li>Why fuzzing is not always effective for modern edge cases&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>How do you decide which cases to pursue for variant hunting?&nbsp;</li><li>What advice do you have for researchers&nbsp;submitting&nbsp;variants?&nbsp;</li><li>How does the&nbsp;CodeQL&nbsp;team collaborate with your team?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/ghughey/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">View George Hughey on LinkedIn</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><p>&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Securing Redirections with Mike Macelletti </title>
			<itunes:title>Securing Redirections with Mike Macelletti </itunes:title>
			<pubDate>Wed, 25 Jun 2025 07:05:00 GMT</pubDate>
			<itunes:duration>41:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/685461892b3b2092a49adb2e/media.mp3" length="99318980" type="audio/mpeg"/>
			<guid isPermaLink="false">685461892b3b2092a49adb2e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unlocked-3/episodes/securing-redirections-with-mike-macelletti</link>
			<acast:episodeId>685461892b3b2092a49adb2e</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:episodeUrl>securing-redirections-with-mike-macelletti</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsDcKOkjF4Os3j/YtUuWhwx2Xe3x3OzzXmD2tBkTDXM2Awv35nvf4MZoONhGxczG39u0T5KpxGYihMi0oijhZvvkTavRcstLaDDGFAr2RmIXSuywo2MKkSvSW1P4qeaHIO]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>65</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a>&nbsp;are joined by&nbsp;<a href="https://www.linkedin.com/in/michael-macelletti-390082a5/" rel="noopener noreferrer" target="_blank">Mike Macelletti</a>&nbsp;from Microsoft’s MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation designed to tackle a long-standing class of file path redirection vulnerabilities in Windows. Mike shares how his interest in security began, the journey behind developing Redirection Guard, and how&nbsp;it's&nbsp;helping reduce a once-common bug class across Microsoft products. He also explains how the feature works, why&nbsp;it's&nbsp;impactful, and what developers can do to adopt it. Plus, a few fun detours into Solitaire hacking, skiing, and protein powder.&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>What Redirection Guard is and how it helps prevent file system vulnerabilities&nbsp;</li><li>How Microsoft&nbsp;identifies&nbsp;and addresses common bug classes across their ecosystem&nbsp;</li><li>Why some vulnerabilities still slip past Redirection Guard and&nbsp;what’s&nbsp;out of scope&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>What is a junction and how is it different from other redirects?&nbsp;</li><li>How does&nbsp;Redirection&nbsp;Guard decide which shortcuts to block?&nbsp;</li><li>Are there vulnerabilities Redirection Guard&nbsp;doesn’t&nbsp;cover?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/michael-macelletti-390082a5/" rel="noopener noreferrer" target="_blank">View Mike Macelletti on LinkedIn</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><p>&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a>&nbsp;are joined by&nbsp;<a href="https://www.linkedin.com/in/michael-macelletti-390082a5/" rel="noopener noreferrer" target="_blank">Mike Macelletti</a>&nbsp;from Microsoft’s MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation designed to tackle a long-standing class of file path redirection vulnerabilities in Windows. Mike shares how his interest in security began, the journey behind developing Redirection Guard, and how&nbsp;it's&nbsp;helping reduce a once-common bug class across Microsoft products. He also explains how the feature works, why&nbsp;it's&nbsp;impactful, and what developers can do to adopt it. Plus, a few fun detours into Solitaire hacking, skiing, and protein powder.&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>What Redirection Guard is and how it helps prevent file system vulnerabilities&nbsp;</li><li>How Microsoft&nbsp;identifies&nbsp;and addresses common bug classes across their ecosystem&nbsp;</li><li>Why some vulnerabilities still slip past Redirection Guard and&nbsp;what’s&nbsp;out of scope&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>What is a junction and how is it different from other redirects?&nbsp;</li><li>How does&nbsp;Redirection&nbsp;Guard decide which shortcuts to block?&nbsp;</li><li>Are there vulnerabilities Redirection Guard&nbsp;doesn’t&nbsp;cover?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/michael-macelletti-390082a5/" rel="noopener noreferrer" target="_blank">View Mike Macelletti on LinkedIn</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><p>&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Ignore Ram Shankar Siva Kumar’s Previous Directions </title>
			<itunes:title>Ignore Ram Shankar Siva Kumar’s Previous Directions </itunes:title>
			<pubDate>Wed, 11 Jun 2025 07:05:00 GMT</pubDate>
			<itunes:duration>39:15</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/6840cf46c8835d385c4c1e7c/media.mp3" length="94211732" type="audio/mpeg"/>
			<guid isPermaLink="false">6840cf46c8835d385c4c1e7c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unlocked-3/episodes/ignore-ram-shankar-siva-kumars-previous-directions</link>
			<acast:episodeId>6840cf46c8835d385c4c1e7c</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:episodeUrl>ignore-ram-shankar-siva-kumars-previous-directions</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCeeAaETuKzn8UWlmX+0p7VkqX3Smw0EkXm4TFHJRF8jgKZODZGzQmOVW2IUNZuRc9aCkr4gmJgAT8vb2ub4TTgfQ4qK5OzO/0I8jRn8QHVpwpAnjK9TNzrd19owrFN/62td8lqAAmookaSd9EVHDHyMJssbdF/2F++XVCBcmWkyRVM496/dDl6nVdwbxn/6LNOypJrQBt2sKECQtpyPqneL3RK+ce8eBFMQsOkZdunppg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>64</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a>&nbsp;share&nbsp;<a href="https://www.linkedin.com/in/rssk/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">Ram Shankar Siva Kumar’s</a>&nbsp;dynamic keynote from&nbsp;BlueHat&nbsp;India&nbsp;2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world case studies, including prompt injection, content safety violations, and memory poisoning in AI agents.&nbsp;Ram&nbsp;underscores the urgent need for robust red teaming practices to secure AI systems against traditional security flaws and emerging threats across images, text, audio, and autonomous agents.&nbsp;</p><p>&nbsp;</p><br><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>Why old-school security flaws still break modern AI systems&nbsp;</li><li>Real-world AI red teaming in action, from&nbsp;scams&nbsp;to memory hacks&nbsp;</li><li>How small input tweaks can fool AI across images, audio, and text&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>Can attackers fool AI using just slight image changes?&nbsp;</li><li>Are generative AI systems vulnerable to prompt manipulation?&nbsp;</li><li>Do you need to be an expert to break an AI model?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/rssk/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">View Ram Shankar Siva Kumar on LinkedIn</a>&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><br><p>Watch&nbsp;Ram’s&nbsp;BlueHat&nbsp;India 2025 Keynote:&nbsp;<a href="https://www.youtube.com/watch?v=SalQD4Kio0U" rel="noopener noreferrer" target="_blank">BlueHat India 2025 Day 2 Keynote - Ram Shankar Siva Kumar</a>&nbsp;</p><p>Listen&nbsp;to Ram’s Previous Appearance on The&nbsp;BlueHat&nbsp;Podcast:&nbsp;<a href="https://thecyberwire.com/podcasts/the-bluehat-podcast/10/notes" rel="noopener noreferrer" target="_blank">Not with a Bug but with a Sticker</a>&nbsp;</p><p>&nbsp;</p><br><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a>&nbsp;share&nbsp;<a href="https://www.linkedin.com/in/rssk/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">Ram Shankar Siva Kumar’s</a>&nbsp;dynamic keynote from&nbsp;BlueHat&nbsp;India&nbsp;2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world case studies, including prompt injection, content safety violations, and memory poisoning in AI agents.&nbsp;Ram&nbsp;underscores the urgent need for robust red teaming practices to secure AI systems against traditional security flaws and emerging threats across images, text, audio, and autonomous agents.&nbsp;</p><p>&nbsp;</p><br><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>Why old-school security flaws still break modern AI systems&nbsp;</li><li>Real-world AI red teaming in action, from&nbsp;scams&nbsp;to memory hacks&nbsp;</li><li>How small input tweaks can fool AI across images, audio, and text&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>Can attackers fool AI using just slight image changes?&nbsp;</li><li>Are generative AI systems vulnerable to prompt manipulation?&nbsp;</li><li>Do you need to be an expert to break an AI model?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/rssk/?utm_source=chatgpt.com" rel="noopener noreferrer" target="_blank">View Ram Shankar Siva Kumar on LinkedIn</a>&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><br><p>Watch&nbsp;Ram’s&nbsp;BlueHat&nbsp;India 2025 Keynote:&nbsp;<a href="https://www.youtube.com/watch?v=SalQD4Kio0U" rel="noopener noreferrer" target="_blank">BlueHat India 2025 Day 2 Keynote - Ram Shankar Siva Kumar</a>&nbsp;</p><p>Listen&nbsp;to Ram’s Previous Appearance on The&nbsp;BlueHat&nbsp;Podcast:&nbsp;<a href="https://thecyberwire.com/podcasts/the-bluehat-podcast/10/notes" rel="noopener noreferrer" target="_blank">Not with a Bug but with a Sticker</a>&nbsp;</p><p>&nbsp;</p><br><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Protecting AI at the Edge with David Weston </title>
			<itunes:title>Protecting AI at the Edge with David Weston </itunes:title>
			<pubDate>Wed, 28 May 2025 07:05:00 GMT</pubDate>
			<itunes:duration>38:36</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/6830bdbe9cad4906be9c61aa/media.mp3" length="92647820" type="audio/mpeg"/>
			<guid isPermaLink="false">6830bdbe9cad4906be9c61aa</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unlocked-3/episodes/protecting-ai-at-the-edge-with-david-weston</link>
			<acast:episodeId>6830bdbe9cad4906be9c61aa</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:episodeUrl>protecting-ai-at-the-edge-with-david-weston</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCeoZNIL3qJbXWQ6p12J3kJgxbghujV6cryxgHlMjHWJxeow0GY+ILgQKGhHsdply6PlOiv24WrYHoYpe9qIwrQ4rFv8kG/eg0vzQfGgU0C7X6D03kt4WnxKkz/PQXtBz/y8/K3WpO9VPLJiMXDogzWr5Gr8DVRPSuITbGeAr+qz9xxOGHVhRqAwDjJUvqj14MGlJBhJmnRhmzRWShPDZWUjVh/iRzz6OFfbcF3J6u85Mg==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>63</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a>&nbsp;share&nbsp;<a href="https://www.linkedin.com/in/dwizzzle/" rel="noopener noreferrer" target="_blank">David Weston’s</a>&nbsp;keynote from&nbsp;BlueHat&nbsp;India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-powered malware. He also shares insights on innovations like Windows Recall, biometric protection, and the future of secure, agentic operating systems.&nbsp;</p><br><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>How AI integration in Windows (like Windows Recall and MS Paint) is&nbsp;evolving&nbsp;</li><li>Emerging threats from protocols like MCP and CUAs&nbsp;</li><li>What a “confused deputy” attack is, and how Microsoft is protecting users&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>What are the biggest security threats in on-device AI—data, model, or runtime?&nbsp;</li><li>Can AI be used to&nbsp;accelerate post-compromise attacks?&nbsp;</li><li>What will it take to bring Azure-level confidential computing to the consumer device?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/dwizzzle/" rel="noopener noreferrer" target="_blank">View David Weston on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><p>&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a>&nbsp;share&nbsp;<a href="https://www.linkedin.com/in/dwizzzle/" rel="noopener noreferrer" target="_blank">David Weston’s</a>&nbsp;keynote from&nbsp;BlueHat&nbsp;India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-powered malware. He also shares insights on innovations like Windows Recall, biometric protection, and the future of secure, agentic operating systems.&nbsp;</p><br><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>How AI integration in Windows (like Windows Recall and MS Paint) is&nbsp;evolving&nbsp;</li><li>Emerging threats from protocols like MCP and CUAs&nbsp;</li><li>What a “confused deputy” attack is, and how Microsoft is protecting users&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>What are the biggest security threats in on-device AI—data, model, or runtime?&nbsp;</li><li>Can AI be used to&nbsp;accelerate post-compromise attacks?&nbsp;</li><li>What will it take to bring Azure-level confidential computing to the consumer device?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/dwizzzle/" rel="noopener noreferrer" target="_blank">View David Weston on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><p>&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Hacking at the Weeds with Felix Boulet </title>
			<itunes:title>Hacking at the Weeds with Felix Boulet </itunes:title>
			<pubDate>Wed, 14 May 2025 10:05:00 GMT</pubDate>
			<itunes:duration>32:43</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/681d1fc75acb8b715f37b808/media.mp3" length="78547556" type="audio/mpeg"/>
			<guid isPermaLink="false">681d1fc75acb8b715f37b808</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unlocked-3/episodes/hacking-at-the-weeds-with-felix-boulet</link>
			<acast:episodeId>681d1fc75acb8b715f37b808</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:episodeUrl>hacking-at-the-weeds-with-felix-boulet</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCewW5mitO2J5IiXSGuywB1zJSV3WI/NljsAp++G6LHvP2FuB9oBt/pgTg1xfhiY02l56q9MUmaOUS2OBNR5KKxXevgjuHRAP2N+3jjrJXqEyCv7pc3wyGi8xm9MIXjRdILttp8jOrcMYStooa3mHPAq9ElJBQjOSY385E+y94C8Lyg3lyNXOS053MLK5SrfAuroKdb2hv4eRfuRsWJ52nSD3K31ZoDPNX0JqmXMi5NHfw==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>62</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a>&nbsp;are joined by&nbsp;<a href="https://www.linkedin.com/in/felix-boulet/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">Felix Boulet</a>&nbsp;fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to becoming a full-time vulnerability researcher, and how that background fuels his passion for hacking and bug bounty work. He explains his method for finding bugs in Microsoft products—particularly in identity systems—and why identity is such a valuable target for attackers. Felix also shares highlights from the Zero Day Quest event, where he focused on building connections, learning from Microsoft engineers, and experiencing the collaborative side of the security community.</p><p>&nbsp;&nbsp;</p><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:</p><p>&nbsp;</p><ul><li>Why identity-based bugs are especially valuable and dangerous in the security world</li><li>When breaking identity controls can be the key to pivoting through an entire system</li><li>How SharePoint's concept of "virtual files" impacts vulnerability validation</li></ul><p>&nbsp;</p><p><strong>Some Questions We&nbsp;Ask:</strong></p><p>&nbsp;</p><ul><li>What was your first bug bounty experience?</li><li>Can you explain what the flash challenges were and what your experience was like?</li><li>Do you think sharing bug ideas could cost you a bounty?</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong></p><p><a href="https://www.linkedin.com/in/felix-boulet/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">View Felix Boulet on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a></p><p>&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong></p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a>&nbsp;are joined by&nbsp;<a href="https://www.linkedin.com/in/felix-boulet/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">Felix Boulet</a>&nbsp;fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to becoming a full-time vulnerability researcher, and how that background fuels his passion for hacking and bug bounty work. He explains his method for finding bugs in Microsoft products—particularly in identity systems—and why identity is such a valuable target for attackers. Felix also shares highlights from the Zero Day Quest event, where he focused on building connections, learning from Microsoft engineers, and experiencing the collaborative side of the security community.</p><p>&nbsp;&nbsp;</p><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:</p><p>&nbsp;</p><ul><li>Why identity-based bugs are especially valuable and dangerous in the security world</li><li>When breaking identity controls can be the key to pivoting through an entire system</li><li>How SharePoint's concept of "virtual files" impacts vulnerability validation</li></ul><p>&nbsp;</p><p><strong>Some Questions We&nbsp;Ask:</strong></p><p>&nbsp;</p><ul><li>What was your first bug bounty experience?</li><li>Can you explain what the flash challenges were and what your experience was like?</li><li>Do you think sharing bug ideas could cost you a bounty?</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong></p><p><a href="https://www.linkedin.com/in/felix-boulet/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">View Felix Boulet on LinkedIn</a></p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a></p><p>&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong></p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Evolutions in Hacking with Marco Ivaldi </title>
			<itunes:title>Evolutions in Hacking with Marco Ivaldi </itunes:title>
			<pubDate>Wed, 30 Apr 2025 19:05:00 GMT</pubDate>
			<itunes:duration>48:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/680aa6203e9267867b439163/media.mp3" length="117009560" type="audio/mpeg"/>
			<guid isPermaLink="false">680aa6203e9267867b439163</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unlocked-3/episodes/evolutions-in-hacking-with-marco-ivaldi</link>
			<acast:episodeId>680aa6203e9267867b439163</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:episodeUrl>evolutions-in-hacking-with-marco-ivaldi</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZsDcKOkjF4Os3j/YtUuWhwx2Xe3x3OzzXmD2tBkTDXM2CB75o3BiaVd6CiInCoOSg19xd+n2jWER/NE6DgW2NcRmBSS6lRn0/gLxwlXUamGCuxS7XeFRVBFfbfukoVw2zv]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>61</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a>&nbsp;are joined by&nbsp;<a href="https://www.linkedin.com/in/raptor/?originalSubdomain=it" rel="noopener noreferrer" target="_blank">Marco Ivaldi</a>, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With&nbsp;nearly three&nbsp;decades of experience in cybersecurity, Marco&nbsp;digs&nbsp;into&nbsp;the ongoing&nbsp;challenges, particularly in Active Directory and password security, highlighting vulnerabilities that continue to pose significant risks today. He recounts his unexpected path into bug bounty hunting, including his involvement in Microsoft's Zero Day Quest and his passion for auditing real-time operating systems like Azure RTOS.&nbsp;&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>How Marco taught himself BASIC and assembly through cassette tapes and trips to local libraries&nbsp;</li><li>Why mentorship and positive leadership can catapult your cybersecurity career&nbsp;</li><li>When measuring network response times can unintentionally leak valuable info&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We&nbsp;Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>Do you remember the first&nbsp;time you made code do something unexpected?&nbsp;</li><li>What was your experience like in the Zero Day Quest building for those three days?&nbsp;</li><li>How are you thinking of approaching fuzzing after Zero Day Quest?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/raptor/?originalSubdomain=it" rel="noopener noreferrer" target="_blank">View Marco Ivaldi on LinkedIn</a>&nbsp;&nbsp;&nbsp;<a href="https://www.linkedin.com/in/joe-bialek-21118626/" rel="noopener noreferrer" target="_blank">&nbsp;</a>&nbsp;</p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><p>&nbsp;</p><p><a href="https://security.humanativaspa.it/" rel="noopener noreferrer" target="_blank">HN SECURITY</a>&nbsp;</p><p><a href="https://0xdeadbeef.info/" rel="noopener noreferrer" target="_blank">Learn More About Marco</a>&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p><em>The&nbsp;BlueHat&nbsp;Podcast is produced by Microsoft and distributed as part of N2K media network.</em>&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a>&nbsp;are joined by&nbsp;<a href="https://www.linkedin.com/in/raptor/?originalSubdomain=it" rel="noopener noreferrer" target="_blank">Marco Ivaldi</a>, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With&nbsp;nearly three&nbsp;decades of experience in cybersecurity, Marco&nbsp;digs&nbsp;into&nbsp;the ongoing&nbsp;challenges, particularly in Active Directory and password security, highlighting vulnerabilities that continue to pose significant risks today. He recounts his unexpected path into bug bounty hunting, including his involvement in Microsoft's Zero Day Quest and his passion for auditing real-time operating systems like Azure RTOS.&nbsp;&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>How Marco taught himself BASIC and assembly through cassette tapes and trips to local libraries&nbsp;</li><li>Why mentorship and positive leadership can catapult your cybersecurity career&nbsp;</li><li>When measuring network response times can unintentionally leak valuable info&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We&nbsp;Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>Do you remember the first&nbsp;time you made code do something unexpected?&nbsp;</li><li>What was your experience like in the Zero Day Quest building for those three days?&nbsp;</li><li>How are you thinking of approaching fuzzing after Zero Day Quest?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/raptor/?originalSubdomain=it" rel="noopener noreferrer" target="_blank">View Marco Ivaldi on LinkedIn</a>&nbsp;&nbsp;&nbsp;<a href="https://www.linkedin.com/in/joe-bialek-21118626/" rel="noopener noreferrer" target="_blank">&nbsp;</a>&nbsp;</p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><p>&nbsp;</p><p><a href="https://security.humanativaspa.it/" rel="noopener noreferrer" target="_blank">HN SECURITY</a>&nbsp;</p><p><a href="https://0xdeadbeef.info/" rel="noopener noreferrer" target="_blank">Learn More About Marco</a>&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;</p><p><em>The&nbsp;BlueHat&nbsp;Podcast is produced by Microsoft and distributed as part of N2K media network.</em>&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>From Facebook-Phished to MVR Top 5 with Dhiral Patel </title>
			<itunes:title>From Facebook-Phished to MVR Top 5 with Dhiral Patel </itunes:title>
			<pubDate>Wed, 16 Apr 2025 07:05:00 GMT</pubDate>
			<itunes:duration>41:07</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/67f85e3c5302bfe4452864d1/media.mp3" length="98681096" type="audio/mpeg"/>
			<guid isPermaLink="false">67f85e3c5302bfe4452864d1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unlocked-3/episodes/from-facebook-phished-to-mvr-top-5-with-dhiral-patel</link>
			<acast:episodeId>67f85e3c5302bfe4452864d1</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:episodeUrl>from-facebook-phished-to-mvr-top-5-with-dhiral-patel</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCelT2okDMt7L6ONthGKI2L3U0BNmR+V7s5JdYFOr0uh8QmCffil0cdGn/dn4KWx9I77J1tw5KCtqcj99pUiexrbX7LYj7FiUmYp1M6AnqhgG7SBEyXX5/7mm67vwtwpJURcb6FvLYvgXtVu16nBCDsCW2Ofu4QAy1ha3frnrGxntdSnVkMSjhVrOlnXHjwvIzHI3qUxMaZjAs+Fuw5T0d4MepL9Xwd+6jQfxAKWq1DetA==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>60</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a>&nbsp;are joined by&nbsp;<a href="https://www.linkedin.com/in/dhiral1994/" rel="noopener noreferrer" target="_blank">Dhiral Patel</a>,&nbsp;Senior Security&nbsp;Engineer at ZoomInfo and&nbsp;one of&nbsp;MSRC’s&nbsp;Most Valuable Researchers&nbsp;(MVR).&nbsp;Dhiral&nbsp;shares&nbsp;how a&nbsp;hacked Facebook account sparked his passion for ethical hacking. From web development to penetration testing,&nbsp;Dhiral&nbsp;has&nbsp;become a top bug hunter, landing multiple spots on the MSRC leaderboards.&nbsp;Dhiral&nbsp;reflects on his early MSRC submissions and lessons learned. He also&nbsp;discusses&nbsp;the importance of mastering web security basics, practicing on platforms like&nbsp;TryHackMe&nbsp;and Hack the Box, and staying connected with the bug bounty community.&nbsp;&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>The importance of mastering web security basics before diving into bug bounty hunting&nbsp;</li><li>Why hands-on platforms like&nbsp;TryHackMe&nbsp;and Hack the Box are perfect for beginners&nbsp;</li><li>Dhiral’s&nbsp;journey from blogging to freelancing and security research&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>How do you balance competition and collaboration in the bug bounty community?&nbsp;</li><li>Can you explain what clickjacking is and if it still works today?&nbsp;</li><li>Why did you start with Power BI, and how did it lead to your journey in security?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/dhiral1994/" rel="noopener noreferrer" target="_blank">View Dhiral Patel on LinkedIn</a>&nbsp;&nbsp;<a href="https://www.linkedin.com/in/joe-bialek-21118626/" rel="noopener noreferrer" target="_blank">&nbsp;</a>&nbsp;</p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a>&nbsp;and&nbsp;<a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a>&nbsp;are joined by&nbsp;<a href="https://www.linkedin.com/in/dhiral1994/" rel="noopener noreferrer" target="_blank">Dhiral Patel</a>,&nbsp;Senior Security&nbsp;Engineer at ZoomInfo and&nbsp;one of&nbsp;MSRC’s&nbsp;Most Valuable Researchers&nbsp;(MVR).&nbsp;Dhiral&nbsp;shares&nbsp;how a&nbsp;hacked Facebook account sparked his passion for ethical hacking. From web development to penetration testing,&nbsp;Dhiral&nbsp;has&nbsp;become a top bug hunter, landing multiple spots on the MSRC leaderboards.&nbsp;Dhiral&nbsp;reflects on his early MSRC submissions and lessons learned. He also&nbsp;discusses&nbsp;the importance of mastering web security basics, practicing on platforms like&nbsp;TryHackMe&nbsp;and Hack the Box, and staying connected with the bug bounty community.&nbsp;&nbsp;</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>The importance of mastering web security basics before diving into bug bounty hunting&nbsp;</li><li>Why hands-on platforms like&nbsp;TryHackMe&nbsp;and Hack the Box are perfect for beginners&nbsp;</li><li>Dhiral’s&nbsp;journey from blogging to freelancing and security research&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>How do you balance competition and collaboration in the bug bounty community?&nbsp;</li><li>Can you explain what clickjacking is and if it still works today?&nbsp;</li><li>Why did you start with Power BI, and how did it lead to your journey in security?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/dhiral1994/" rel="noopener noreferrer" target="_blank">View Dhiral Patel on LinkedIn</a>&nbsp;&nbsp;<a href="https://www.linkedin.com/in/joe-bialek-21118626/" rel="noopener noreferrer" target="_blank">&nbsp;</a>&nbsp;</p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[AI & the Hunt for Hidden Vulnerabilities with Tobias Diehl]]></title>
			<itunes:title><![CDATA[AI & the Hunt for Hidden Vulnerabilities with Tobias Diehl]]></itunes:title>
			<pubDate>Wed, 02 Apr 2025 07:05:00 GMT</pubDate>
			<itunes:duration>33:53</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/67e709e85fb59eadfc021c43/media.mp3" length="81336080" type="audio/mpeg"/>
			<guid isPermaLink="false">67e709e85fb59eadfc021c43</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://shows.acast.com/security-unlocked-3/episodes/ai-the-hunt-for-hidden-vulnerabilities-with-tobias-diehl</link>
			<acast:episodeId>67e709e85fb59eadfc021c43</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:episodeUrl>ai-the-hunt-for-hidden-vulnerabilities-with-tobias-diehl</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCd+sDwyIPZ5GnfvQM9TwN5g2POQsRG3jWHNgHD3nJbms/CEYyDaHq8xvt2DNIgfw+qJywrnFpew9ZAvQoBRAEdOAY+LM27IllQ240Hd7om3ptFqB12uSQFsEK9+BHEsAFWnD7HbBpOPgtYTj2D+vNGgHsqoe14HXEZkuLa56Cp86RJFxzQVd1gEgS2shaAKAqw2947oPVVnPv40GHAMXJSyVwGv+G9dOJ7jzISwHSMF1A==]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>59</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode of The BlueHat Podcast, host <a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a> are joined by security researcher <a href="https://www.linkedin.com/in/tobias-diehl-19ba901b5/" rel="noopener noreferrer" target="_blank">Tobias Diehl</a>, a top contributor to the Microsoft Security Research Center (MSRC) leaderboards and a Most Valuable Researcher. Tobias shares his journey from IT support to uncovering vulnerabilities in Microsoft products. He discusses his participation in the upcoming Zero Day Quest hacking challenge and breaks down a recent discovery involving Power Automate, where he identified a security flaw that could be exploited via malicious URLs. Tobias explains how developers can mitigate such risks and the importance of strong proof-of-concept submissions in security research.&nbsp;</p><br><p><br></p><p><strong>In This Episode You Will Learn</strong>:&nbsp;</p><p><br></p><ul><li>Researching vulnerabilities in Power Automate, Power Automate Desktop, and Azure</li><li>The importance of user prompts to prevent unintended application behavior</li><li>Key vulnerabilities Tobias looks for when researching Microsoft products</li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><p><br></p><ul><li>Have you submitted any AI-related findings to Microsoft or other bug bounty programs?</li><li>How does the lack of visibility into AI models impact the research process?</li><li>Has your approach to security research changed when working with AI versus traditional systems?</li></ul><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/tobias-diehl-19ba901b5/" rel="noopener noreferrer" target="_blank">View Tobias Diehl on LinkedIn</a>&nbsp;&nbsp; </p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;</p><br><p><br></p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;</li></ul><p><br></p><br><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"> microsoft.com/podcasts</a>&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode of The BlueHat Podcast, host <a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">Wendy Zenone</a> are joined by security researcher <a href="https://www.linkedin.com/in/tobias-diehl-19ba901b5/" rel="noopener noreferrer" target="_blank">Tobias Diehl</a>, a top contributor to the Microsoft Security Research Center (MSRC) leaderboards and a Most Valuable Researcher. Tobias shares his journey from IT support to uncovering vulnerabilities in Microsoft products. He discusses his participation in the upcoming Zero Day Quest hacking challenge and breaks down a recent discovery involving Power Automate, where he identified a security flaw that could be exploited via malicious URLs. Tobias explains how developers can mitigate such risks and the importance of strong proof-of-concept submissions in security research.&nbsp;</p><br><p><br></p><p><strong>In This Episode You Will Learn</strong>:&nbsp;</p><p><br></p><ul><li>Researching vulnerabilities in Power Automate, Power Automate Desktop, and Azure</li><li>The importance of user prompts to prevent unintended application behavior</li><li>Key vulnerabilities Tobias looks for when researching Microsoft products</li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><p><br></p><ul><li>Have you submitted any AI-related findings to Microsoft or other bug bounty programs?</li><li>How does the lack of visibility into AI models impact the research process?</li><li>Has your approach to security research changed when working with AI versus traditional systems?</li></ul><p>&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/tobias-diehl-19ba901b5/" rel="noopener noreferrer" target="_blank">View Tobias Diehl on LinkedIn</a>&nbsp;&nbsp; </p><p><a href="https://www.linkedin.com/in/wendyzenone/" rel="noopener noreferrer" target="_blank">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;</p><p><a href="https://www.linkedin.com/in/nicfill/" rel="noopener noreferrer" target="_blank">View Nic Fillingham on LinkedIn</a>&nbsp;</p><br><p><br></p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li><a href="https://msthreatintelpodcast.com/" rel="noopener noreferrer" target="_blank">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;</li><li><a href="https://afternooncybertea.com/" rel="noopener noreferrer" target="_blank">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;</li><li><a href="https://uncoveringhiddenrisks.com/" rel="noopener noreferrer" target="_blank">Uncovering Hidden Risks</a>&nbsp;&nbsp;</li></ul><p><br></p><br><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/" rel="noopener noreferrer" target="_blank"> microsoft.com/podcasts</a>&nbsp;&nbsp;</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cryptojacking, and Farewell for Now!</title>
			<itunes:title>Cryptojacking, and Farewell for Now!</itunes:title>
			<pubDate>Wed, 16 Feb 2022 08:05:00 GMT</pubDate>
			<itunes:duration>35:57</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/c252b39a-3be6-11ec-9b3d-bb667d45b8a4/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">c252b39a-3be6-11ec-9b3d-bb667d45b8a4</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/58/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b71</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790BYxoW2lbcBVliLrviIHl/]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>58</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to explain what a bitcoin is. Unfortunately, it also created the world of cryptojacking, a form of cybercrime that remains completely hidden from the target and can infect millions of computers with cryptojacking malware. Which brings us to the fundamental question: What can organizations do to protect themselves?  </p><p>In this episode of Security Unlocked, hosts<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia Godyla</a> and<a href="https://www.linkedin.com/in/nicfill/"> Nic Fillingham</a> are joined by Microsoft senior software engineer Amitrajit Banerjee and senior staff architect at Intel Rahul Ghosh to discuss the history and prevalence of cryptojacking. The push behind a cryptojacking attack is almost always motivated by money. Mining cryptocurrencies can be very lucrative, but making a profit is challenging unless you cover high costs. They discuss the importance of understanding the actual concept of mining, how victims' CPU power and computing resources can be used, and why it isn't easy in general to detect crypto miners. </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>How prevalent is cryptojacking and who should be worried </li><li>When and how people are exposed to these new types of threats </li><li>Why you should be familiar with cryptojacking </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>How are victims' CPU power and computing resources used to mine cryptocurrencies? </li><li>What created this environment where cryptojacking is possible? </li><li>What are some general techniques when trying to identify cryptojacking? </li></ul><p>  </p><p><strong>Resources:</strong>   </p><p><a href="https://www.microsoft.com/security/blog/2018/03/13/invisible-resource-thieves-the-increasing-threat-of-cryptocurrency-miners/"><em>The increasing threat of cryptocurrency miners</em></a> </p><p><a href="https://www.microsoft.com/security/blog/2021/04/26/defending-against-cryptojacking-with-microsoft-defender-for-endpoint-and-intel-tdt/"><em>Defending against cryptojacking</em></a> </p><p><a href="https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/"><em>Guidance for preventing, detecting, and hunting for exploitation</em></a> </p><p> </p><p>View <a href="https://www.linkedin.com/in/amitrajitb/">Amitrajit Banerjee on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/rahul-ghosh-90297b/">Rahul Ghosh on LinkedIn</a> </p><p>View<a href="https://www.linkedin.com/in/nicfill/"> Nic on LinkedIn</a>  </p><p>View<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia on LinkedIn</a>  </p><p>  </p><p><strong>Related: </strong>  </p><p>Listen to:<a href="https://securityunlockedcisoseries.com/"> Security Unlocked: CISO Series with Bret Arsenault</a>     </p><p>Listen to:<a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"> Afternoon Cyber Tea with Ann Johnson</a>    </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.  </em>   </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; digital currencies are here to stay, no matter how many times you have to explain what a bitcoin is. Unfortunately, it also created the world of cryptojacking, a form of cybercrime that remains completely hidden from the target and can infect millions of computers with cryptojacking malware. Which brings us to the fundamental question: What can organizations do to protect themselves?  </p><p>In this episode of Security Unlocked, hosts<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia Godyla</a> and<a href="https://www.linkedin.com/in/nicfill/"> Nic Fillingham</a> are joined by Microsoft senior software engineer Amitrajit Banerjee and senior staff architect at Intel Rahul Ghosh to discuss the history and prevalence of cryptojacking. The push behind a cryptojacking attack is almost always motivated by money. Mining cryptocurrencies can be very lucrative, but making a profit is challenging unless you cover high costs. They discuss the importance of understanding the actual concept of mining, how victims' CPU power and computing resources can be used, and why it isn't easy in general to detect crypto miners. </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>How prevalent is cryptojacking and who should be worried </li><li>When and how people are exposed to these new types of threats </li><li>Why you should be familiar with cryptojacking </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>How are victims' CPU power and computing resources used to mine cryptocurrencies? </li><li>What created this environment where cryptojacking is possible? </li><li>What are some general techniques when trying to identify cryptojacking? </li></ul><p>  </p><p><strong>Resources:</strong>   </p><p><a href="https://www.microsoft.com/security/blog/2018/03/13/invisible-resource-thieves-the-increasing-threat-of-cryptocurrency-miners/"><em>The increasing threat of cryptocurrency miners</em></a> </p><p><a href="https://www.microsoft.com/security/blog/2021/04/26/defending-against-cryptojacking-with-microsoft-defender-for-endpoint-and-intel-tdt/"><em>Defending against cryptojacking</em></a> </p><p><a href="https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation/"><em>Guidance for preventing, detecting, and hunting for exploitation</em></a> </p><p> </p><p>View <a href="https://www.linkedin.com/in/amitrajitb/">Amitrajit Banerjee on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/rahul-ghosh-90297b/">Rahul Ghosh on LinkedIn</a> </p><p>View<a href="https://www.linkedin.com/in/nicfill/"> Nic on LinkedIn</a>  </p><p>View<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia on LinkedIn</a>  </p><p>  </p><p><strong>Related: </strong>  </p><p>Listen to:<a href="https://securityunlockedcisoseries.com/"> Security Unlocked: CISO Series with Bret Arsenault</a>     </p><p>Listen to:<a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"> Afternoon Cyber Tea with Ann Johnson</a>    </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.  </em>   </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>A look at Cybercrime in 2021</title>
			<itunes:title>A look at Cybercrime in 2021</itunes:title>
			<pubDate>Wed, 02 Feb 2022 08:05:00 GMT</pubDate>
			<itunes:duration>41:12</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/c233c7f0-3be6-11ec-9b3d-5ff2639535be/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">c233c7f0-3be6-11ec-9b3d-5ff2639535be</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/57/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b72</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA793fuG7SaHkYf6cG+Q73ijwO]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>57</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more apparent than ever that the cybercrime economy and services it provides are stronger and more complex than ever. Cryptocurrency, malware, and adversarial machine learning are just a few of the topics we believe need to be covered in more detail.  </p><br><p>In this episode of Security Unlocked, host’s<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia Godyla</a> and<a href="https://www.linkedin.com/in/nicfill/"> Nic Fillingham</a> are joined by <a href="https://www.linkedin.com/in/jason-lyons-85022a4/">Jason Lyons</a>, principal investigator in the digital crimes unit at Microsoft. Jason is an experienced investigator specializing in computer investigations. He is trained and experienced in hacker methodology/techniques, computer forensics, and incident response. Jason joined the show to discuss Chapter two of the Microsoft Digital Defense Report, which focuses on the state of cybercrime. He also speaks on how cryptocurrency has created new challenges in ransomware, why ransomware continues to grow, and recent trends we are currently seeing in malware.  </p><p>  </p><p>In This Episode You Will Learn:     </p><ul><li>How to decide whether to pay the ransomware or not </li><li>New ways for security teams to protect against malware </li><li>Why we are seeing a rise in cybercrime due to cryptocurrency.  </li></ul><p> </p><p>Some Questions We Ask:    </p><ul><li>What's new in the way the cybercrime economy operates?  </li><li>Why is ransomware still such a big thing and maybe even getting bigger? </li><li>What trends are we seeing with malware right now? </li></ul><p>  </p><p>Resources:   </p><p><a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi"><em>Microsoft Digital Defense Report</em></a>  </p><br><p>View <a href="https://www.linkedin.com/in/jason-lyons-85022a4/">Jason Lyons on LinkedIn </a> </p><p>View<a href="https://www.linkedin.com/in/nicfill/"> Nic on LinkedIn</a>  </p><p>View<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia on LinkedIn</a>  </p><p>  </p><p>Related:   </p><p>Listen to:<a href="https://securityunlockedcisoseries.com/"> Security Unlocked: CISO Series with Bret Arsenault</a>     </p><p>Listen to:<a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"> Afternoon Cyber Tea with Ann Johnson</a>    </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.     </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime is covered in great detail. As we continue to go over the MDDR, it's more apparent than ever that the cybercrime economy and services it provides are stronger and more complex than ever. Cryptocurrency, malware, and adversarial machine learning are just a few of the topics we believe need to be covered in more detail.  </p><br><p>In this episode of Security Unlocked, host’s<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia Godyla</a> and<a href="https://www.linkedin.com/in/nicfill/"> Nic Fillingham</a> are joined by <a href="https://www.linkedin.com/in/jason-lyons-85022a4/">Jason Lyons</a>, principal investigator in the digital crimes unit at Microsoft. Jason is an experienced investigator specializing in computer investigations. He is trained and experienced in hacker methodology/techniques, computer forensics, and incident response. Jason joined the show to discuss Chapter two of the Microsoft Digital Defense Report, which focuses on the state of cybercrime. He also speaks on how cryptocurrency has created new challenges in ransomware, why ransomware continues to grow, and recent trends we are currently seeing in malware.  </p><p>  </p><p>In This Episode You Will Learn:     </p><ul><li>How to decide whether to pay the ransomware or not </li><li>New ways for security teams to protect against malware </li><li>Why we are seeing a rise in cybercrime due to cryptocurrency.  </li></ul><p> </p><p>Some Questions We Ask:    </p><ul><li>What's new in the way the cybercrime economy operates?  </li><li>Why is ransomware still such a big thing and maybe even getting bigger? </li><li>What trends are we seeing with malware right now? </li></ul><p>  </p><p>Resources:   </p><p><a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi"><em>Microsoft Digital Defense Report</em></a>  </p><br><p>View <a href="https://www.linkedin.com/in/jason-lyons-85022a4/">Jason Lyons on LinkedIn </a> </p><p>View<a href="https://www.linkedin.com/in/nicfill/"> Nic on LinkedIn</a>  </p><p>View<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia on LinkedIn</a>  </p><p>  </p><p>Related:   </p><p>Listen to:<a href="https://securityunlockedcisoseries.com/"> Security Unlocked: CISO Series with Bret Arsenault</a>     </p><p>Listen to:<a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"> Afternoon Cyber Tea with Ann Johnson</a>    </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.     </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>What’s a BISO?</title>
			<itunes:title>What’s a BISO?</itunes:title>
			<pubDate>Wed, 19 Jan 2022 08:05:00 GMT</pubDate>
			<itunes:duration>39:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/c214b928-3be6-11ec-9b3d-839fb7dd36f3/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">c214b928-3be6-11ec-9b3d-839fb7dd36f3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/56/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b73</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790fp7+rirbVoaU370Uvi/6d]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>56</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Everything is exciting and new when you're a kid, and curiosity inspires many of us to branch out and try new things. For some, that means drawing from our imagination or trying all kinds of sports. And for others it means spending days at the library, checking out books on modem communications, and eventually hacking into the local dial-up community service. That's just a random example, of course... Either way, curiosity can be a powerful tool, even at a young age. To the point that it may help kickstart a career, you didn't even know existed.  </p><p>In this episode of Security Unlocked, host<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia Godyla</a> is joined by S&amp;P Global Ratings BISO <a href="https://www.linkedin.com/in/alyssam-infosec/">Alyssa Miller</a>. Alyssa is a life-long hacker and highly experienced security executive. She runs the security strategy for S&amp;P Global Ratings as the Business Information Security Officer (BISO), bringing together corporate security objectives and business objectives. Natalia and Alyssa discuss her journey in security from a young and curious hacker to a BISO of the largest credit-rating agency, and how she is shaping what the role of the BISO will be for future generations.  </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>What are the roles and responsibilities of a BISO  </li><li>How a BISO should interact with the rest of the organization </li><li>How to put yourself on track to become a BISO   </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>What are the gaps that the BISO function is trying to address? </li><li>What other roles should exist in security, but don’t?  </li><li>How will the BISO role evolve over time? </li></ul><p>  </p><p><strong>Resources:</strong>   </p><p>View <a href="https://www.linkedin.com/in/alyssam-infosec/">Alyssa Miller on LinkedIn</a> </p><p>View<a href="https://www.linkedin.com/in/nicfill/"> Nic on LinkedIn</a>  </p><p>View<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia on LinkedIn</a>  </p><p>  </p><p><strong>Related: </strong>  </p><p>Listen to:<a href="https://securityunlockedcisoseries.com/"> Security Unlocked: CISO Series with Bret Arsenault</a>     </p><p>Listen to:<a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"> Afternoon Cyber Tea with Ann Johnson</a>    </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.  </em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Everything is exciting and new when you're a kid, and curiosity inspires many of us to branch out and try new things. For some, that means drawing from our imagination or trying all kinds of sports. And for others it means spending days at the library, checking out books on modem communications, and eventually hacking into the local dial-up community service. That's just a random example, of course... Either way, curiosity can be a powerful tool, even at a young age. To the point that it may help kickstart a career, you didn't even know existed.  </p><p>In this episode of Security Unlocked, host<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia Godyla</a> is joined by S&amp;P Global Ratings BISO <a href="https://www.linkedin.com/in/alyssam-infosec/">Alyssa Miller</a>. Alyssa is a life-long hacker and highly experienced security executive. She runs the security strategy for S&amp;P Global Ratings as the Business Information Security Officer (BISO), bringing together corporate security objectives and business objectives. Natalia and Alyssa discuss her journey in security from a young and curious hacker to a BISO of the largest credit-rating agency, and how she is shaping what the role of the BISO will be for future generations.  </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>What are the roles and responsibilities of a BISO  </li><li>How a BISO should interact with the rest of the organization </li><li>How to put yourself on track to become a BISO   </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>What are the gaps that the BISO function is trying to address? </li><li>What other roles should exist in security, but don’t?  </li><li>How will the BISO role evolve over time? </li></ul><p>  </p><p><strong>Resources:</strong>   </p><p>View <a href="https://www.linkedin.com/in/alyssam-infosec/">Alyssa Miller on LinkedIn</a> </p><p>View<a href="https://www.linkedin.com/in/nicfill/"> Nic on LinkedIn</a>  </p><p>View<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia on LinkedIn</a>  </p><p>  </p><p><strong>Related: </strong>  </p><p>Listen to:<a href="https://securityunlockedcisoseries.com/"> Security Unlocked: CISO Series with Bret Arsenault</a>     </p><p>Listen to:<a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"> Afternoon Cyber Tea with Ann Johnson</a>    </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.  </em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Disinformation in the Enterprise</title>
			<itunes:title>Disinformation in the Enterprise</itunes:title>
			<pubDate>Wed, 05 Jan 2022 08:05:00 GMT</pubDate>
			<itunes:duration>35:00</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/c1f634f8-3be6-11ec-9b3d-cb95315fb2b3/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">c1f634f8-3be6-11ec-9b3d-cb95315fb2b3</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/55/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b74</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA792Qm+xyiIn7W0jU3QdYUXZm]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>55</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Disinformation refers to the calculated use of false information to influence others and has been a steadily growing form of information warfare. Unfortunately, disinformation is everywhere these days, often hidden in plain sight. Criminals will also adapt and take advantage of technologies, such as AI and deepfakes, to increase the effectiveness of disinformation campaigns. Of course, there are ways to combat these types of attacks, and we cover recommendations for protecting the enterprise in the 2021 Microsoft Digital Defense Report (MDDR).  </p><p>In this episode of Security Unlocked, hosts<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia Godyla</a> and<a href="https://www.linkedin.com/in/nicfill/"> Nic Fillingham</a> are joined by the Director of Enterprise Continuity and Resilience at Microsoft, <a href="https://www.linkedin.com/in/irfanmirzausa/">Irfan Mirza,</a> who authored the chapter on disinformation in the enterprise in the 2021 MDDR. Irfan joins to discuss what disinformation is, why the use of disinformation is growing, how cognitive hacking occurs, and how cybersecurity can start thinking about adapting their strategies. </p><br><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>How to identify disinformation campaigns  </li><li>How to train users and protect your organization from disinformation   </li><li>Why we need AI to defend against disinformation </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>What is the difference between misinformation and disinformation? </li><li>How does disinformation impact cybersecurity? </li><li>What new skills do cybersecurity professionals need to be able to protect the enterprise from this new threat? </li></ul><p> </p><p><strong>Resources:</strong>   </p><p><a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi"><em>Microsoft Digital Defense Report 2021</em></a> </p><p>View <a href="https://www.linkedin.com/in/irfanmirzausa/">Irfan Mirza on LinkedIn </a> </p><p>View<a href="https://www.linkedin.com/in/nicfill/"> Nic on LinkedIn</a>  </p><p>View<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia on LinkedIn</a>  </p><p>  </p><p><strong>Related: </strong>    </p><p>Listen to:<a href="https://securityunlockedcisoseries.com/"> Security Unlocked: CISO Series with Bret Arsenault</a>     </p><p>Listen to:<a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"> Afternoon Cyber Tea with Ann Johnson</a>    </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>﻿Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Disinformation refers to the calculated use of false information to influence others and has been a steadily growing form of information warfare. Unfortunately, disinformation is everywhere these days, often hidden in plain sight. Criminals will also adapt and take advantage of technologies, such as AI and deepfakes, to increase the effectiveness of disinformation campaigns. Of course, there are ways to combat these types of attacks, and we cover recommendations for protecting the enterprise in the 2021 Microsoft Digital Defense Report (MDDR).  </p><p>In this episode of Security Unlocked, hosts<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia Godyla</a> and<a href="https://www.linkedin.com/in/nicfill/"> Nic Fillingham</a> are joined by the Director of Enterprise Continuity and Resilience at Microsoft, <a href="https://www.linkedin.com/in/irfanmirzausa/">Irfan Mirza,</a> who authored the chapter on disinformation in the enterprise in the 2021 MDDR. Irfan joins to discuss what disinformation is, why the use of disinformation is growing, how cognitive hacking occurs, and how cybersecurity can start thinking about adapting their strategies. </p><br><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>How to identify disinformation campaigns  </li><li>How to train users and protect your organization from disinformation   </li><li>Why we need AI to defend against disinformation </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>What is the difference between misinformation and disinformation? </li><li>How does disinformation impact cybersecurity? </li><li>What new skills do cybersecurity professionals need to be able to protect the enterprise from this new threat? </li></ul><p> </p><p><strong>Resources:</strong>   </p><p><a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi"><em>Microsoft Digital Defense Report 2021</em></a> </p><p>View <a href="https://www.linkedin.com/in/irfanmirzausa/">Irfan Mirza on LinkedIn </a> </p><p>View<a href="https://www.linkedin.com/in/nicfill/"> Nic on LinkedIn</a>  </p><p>View<a href="https://www.linkedin.com/in/nataliagodyla/"> Natalia on LinkedIn</a>  </p><p>  </p><p><strong>Related: </strong>    </p><p>Listen to:<a href="https://securityunlockedcisoseries.com/"> Security Unlocked: CISO Series with Bret Arsenault</a>     </p><p>Listen to:<a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"> Afternoon Cyber Tea with Ann Johnson</a>    </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>﻿Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>I am Shroot-less</title>
			<itunes:title>I am Shroot-less</itunes:title>
			<pubDate>Wed, 22 Dec 2021 08:05:00 GMT</pubDate>
			<itunes:duration>36:09</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/c1d76f64-3be6-11ec-9b3d-c3fdea75a08a/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">c1d76f64-3be6-11ec-9b3d-c3fdea75a08a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/54/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b75</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA792ahB0+Y7KcU7L5OOcvrvux]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>54</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Microsoft works around the clock to protect their customers, no matter what product they’re using, Microsoft or otherwise. In some instances Microsoft teams up with other companies, creating an all-star cybersecurity team, to handle newly discovered vulnerabilities. It helps everyone stay more secure, and of course, that's the ultimate goal, right?  </p><p> </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are re-joined by <a href="https://www.linkedin.com/in/jonathan-bar-or-89876474/">Jonathan Bar Or,</a> Principal Security Researcher at Microsoft. Jonathan discusses the recently discovered vulnerability that could let attackers bypass System Integrity Protection (SIP) in macOS, why he believes in investing in cross-platform protection, and the importance of collaboration between security researchers, software vendors, and the larger security community. </p><p>  </p><p><strong>In This Episode You Will Learn</strong>: </p><ul><li>What is System Integrity Protection (SIP) </li><li>How attackers can bypass SIP </li><li>How attackers can use the Shrootless vulnerability </li></ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><ul><li>How did you find the Shrootless vulnerability? </li><li>How do you decide what products to assess? </li><li>How does the process of submitting a vulnerability to Apple work? </li></ul><p>  </p><p><strong>Resources:</strong>   </p><p><a href="https://www.microsoft.com/security/blog/2021/10/28/microsoft-finds-new-macos-vulnerability-shrootless-that-could-bypass-system-integrity-protection/"><em>Microsoft finds new macOS vulnerability - Shrootless</em></a> </p><p>View <a href="https://www.linkedin.com/in/jonathan-bar-or-89876474/">Jonathan Bar Or on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a>  </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a>  </p><p> </p><p><strong>Related: </strong>  </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>     </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a>    </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.  </em>   </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Microsoft works around the clock to protect their customers, no matter what product they’re using, Microsoft or otherwise. In some instances Microsoft teams up with other companies, creating an all-star cybersecurity team, to handle newly discovered vulnerabilities. It helps everyone stay more secure, and of course, that's the ultimate goal, right?  </p><p> </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are re-joined by <a href="https://www.linkedin.com/in/jonathan-bar-or-89876474/">Jonathan Bar Or,</a> Principal Security Researcher at Microsoft. Jonathan discusses the recently discovered vulnerability that could let attackers bypass System Integrity Protection (SIP) in macOS, why he believes in investing in cross-platform protection, and the importance of collaboration between security researchers, software vendors, and the larger security community. </p><p>  </p><p><strong>In This Episode You Will Learn</strong>: </p><ul><li>What is System Integrity Protection (SIP) </li><li>How attackers can bypass SIP </li><li>How attackers can use the Shrootless vulnerability </li></ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><ul><li>How did you find the Shrootless vulnerability? </li><li>How do you decide what products to assess? </li><li>How does the process of submitting a vulnerability to Apple work? </li></ul><p>  </p><p><strong>Resources:</strong>   </p><p><a href="https://www.microsoft.com/security/blog/2021/10/28/microsoft-finds-new-macos-vulnerability-shrootless-that-could-bypass-system-integrity-protection/"><em>Microsoft finds new macOS vulnerability - Shrootless</em></a> </p><p>View <a href="https://www.linkedin.com/in/jonathan-bar-or-89876474/">Jonathan Bar Or on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a>  </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a>  </p><p> </p><p><strong>Related: </strong>  </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>     </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a>    </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.  </em>   </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Decoding NOBELIUM</title>
			<itunes:title>Decoding NOBELIUM</itunes:title>
			<pubDate>Wed, 08 Dec 2021 08:05:00 GMT</pubDate>
			<itunes:duration>48:54</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/c1b8d022-3be6-11ec-9b3d-3778052ce3b0/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">c1b8d022-3be6-11ec-9b3d-3778052ce3b0</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/53/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b76</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA792Ue+7d6uENdByUVPJtido3]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>53</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In December 2020, Microsoft began sharing information with the cybersecurity industry on a group of Russia-based hackers who gained access to multiple enterprises through vulnerable software code, stolen passwords, compromised on-premises servers, and minted SAML tokens. In this supply chain attack, hackers could access the SolarWinds code, slip malicious code into a piece of the software, and use the vendor’s legitimate software updates to spread malware to customer systems.   </p><p>Security Unlocked is excited to share with you, Decoding NOBELIUM. The docuseries gives you an inside look into the NOBELIUM incident, now viewed as one of the most advanced nation-state and supply chain attacks in history, with stories from the frontline defenders who tracked and responded to the attackers. </p><p><strong>Resources:</strong> </p><p><a href="https://www.youtube.com/watch?v=VVKT8NehO_c&amp;list=PL3ZTgFEc7Lyt46DSa1sUR9YUK1OuGIeNB&amp;index=3"><em>Decoding NOBELIUM: Video Series</em></a></p><p><a href="https://www.microsoft.com/en-us/security/business/nation-state-attacks"><em>Defending Against Nation-State Attacks | Microsoft Security</em></a></p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><br><p><strong>Related:   </strong> </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>   </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a>  </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network. </em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In December 2020, Microsoft began sharing information with the cybersecurity industry on a group of Russia-based hackers who gained access to multiple enterprises through vulnerable software code, stolen passwords, compromised on-premises servers, and minted SAML tokens. In this supply chain attack, hackers could access the SolarWinds code, slip malicious code into a piece of the software, and use the vendor’s legitimate software updates to spread malware to customer systems.   </p><p>Security Unlocked is excited to share with you, Decoding NOBELIUM. The docuseries gives you an inside look into the NOBELIUM incident, now viewed as one of the most advanced nation-state and supply chain attacks in history, with stories from the frontline defenders who tracked and responded to the attackers. </p><p><strong>Resources:</strong> </p><p><a href="https://www.youtube.com/watch?v=VVKT8NehO_c&amp;list=PL3ZTgFEc7Lyt46DSa1sUR9YUK1OuGIeNB&amp;index=3"><em>Decoding NOBELIUM: Video Series</em></a></p><p><a href="https://www.microsoft.com/en-us/security/business/nation-state-attacks"><em>Defending Against Nation-State Attacks | Microsoft Security</em></a></p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><br><p><strong>Related:   </strong> </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>   </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a>  </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network. </em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Trusting Your Hybrid Workforce</title>
			<itunes:title>Trusting Your Hybrid Workforce</itunes:title>
			<pubDate>Wed, 24 Nov 2021 08:05:00 GMT</pubDate>
			<itunes:duration>41:10</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/c199caa6-3be6-11ec-9b3d-53f44c0a6a62/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">c199caa6-3be6-11ec-9b3d-53f44c0a6a62</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/52/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b77</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA7937vf/CzaEELu1nyUeCt61A]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>52</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>We are back, covering more of the 2021 Microsoft Digital Defense Report, and this time we’re taking a deep dive into chapter five on Hybrid Workforce Security and Zero Trust. Zero Trust means precisely what it sounds like, never assuming any device or identity is secure; it's like having major trust issues, but in a professional way. With most businesses moving to remote work because of the pandemic, cybercriminals, of course, found new ways to take advantage, especially since most people are now moving between business and personal activity online. For the first time, we’re going to cover a full 12-month recap of what securing the hybrid workforce has been like. </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by <a href="https://www.linkedin.com/in/carmichaelpatton/">Carmichael Patton</a>, Lead Architect for Microsoft's Internal Zero Trust Deployment. Carmichael joins the show to discuss security challenges and trends impacting the hybrid workforce, the three most significant insider risk vulnerabilities, and why some customers are still not using MFA. </p><br><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>Security challenges and trends impacting the hybrid workforce </li><li>How Microsoft approached their Zero Trust journey  </li><li>Prioritizing security initiatives during a time of massive change </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>What were some of the major hybrid workforce attacks?  </li><li>Why are some customers still not using MFA? </li><li>When and how should you deal with insider risk? </li></ul><p><br></p><p><strong>Resources:</strong>   </p><p><a href="http://www.microsoft.com/en-us/security/business/zero-trust"><em>Zero Trust Adoption Report</em></a> </p><p><a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi"><em>The 2021 Microsoft Digital Defense Report</em></a>  </p><p>View <a href="https://www.linkedin.com/in/carmichaelpatton/">Carmichael Patton on LinkedIn </a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a>  </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a>  </p><br><p><strong>Related:</strong> </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>   </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a>  </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.  </em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>We are back, covering more of the 2021 Microsoft Digital Defense Report, and this time we’re taking a deep dive into chapter five on Hybrid Workforce Security and Zero Trust. Zero Trust means precisely what it sounds like, never assuming any device or identity is secure; it's like having major trust issues, but in a professional way. With most businesses moving to remote work because of the pandemic, cybercriminals, of course, found new ways to take advantage, especially since most people are now moving between business and personal activity online. For the first time, we’re going to cover a full 12-month recap of what securing the hybrid workforce has been like. </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by <a href="https://www.linkedin.com/in/carmichaelpatton/">Carmichael Patton</a>, Lead Architect for Microsoft's Internal Zero Trust Deployment. Carmichael joins the show to discuss security challenges and trends impacting the hybrid workforce, the three most significant insider risk vulnerabilities, and why some customers are still not using MFA. </p><br><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>Security challenges and trends impacting the hybrid workforce </li><li>How Microsoft approached their Zero Trust journey  </li><li>Prioritizing security initiatives during a time of massive change </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>What were some of the major hybrid workforce attacks?  </li><li>Why are some customers still not using MFA? </li><li>When and how should you deal with insider risk? </li></ul><p><br></p><p><strong>Resources:</strong>   </p><p><a href="http://www.microsoft.com/en-us/security/business/zero-trust"><em>Zero Trust Adoption Report</em></a> </p><p><a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi"><em>The 2021 Microsoft Digital Defense Report</em></a>  </p><p>View <a href="https://www.linkedin.com/in/carmichaelpatton/">Carmichael Patton on LinkedIn </a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a>  </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a>  </p><br><p><strong>Related:</strong> </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>   </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a>  </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.  </em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>When Privacy Meets Security</title>
			<itunes:title>When Privacy Meets Security</itunes:title>
			<pubDate>Wed, 10 Nov 2021 08:05:00 GMT</pubDate>
			<itunes:duration>38:30</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/7bec7faa-3ced-11ec-93ee-2b13ac2efc92/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">7bec7faa-3ced-11ec-93ee-2b13ac2efc92</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/51/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b78</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA7914U+rxh4GCF0JuHhIIJ+qX]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>51</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>The way most people operate online these days, what would you even consider private anymore? We are so quick to share details about our job, home, friends, and family without even thinking about how much personal info we're giving away. Privacy and user agreements are a part of almost everyone's life at this point, and what do you know about them? For the most part, we often see a user agreement pop up, click agree and move on, but do you know what you just agreed to? Privacy choices have become routine, though they shouldn’t be. </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by Privacy Counsel and Data Protection Officer at Asana, <a href="https://www.linkedin.com/in/whitney-merrill-5ab05012/">Whitney Merrill</a>. She is an accomplished attorney with 7+ years of privacy, data security, and data governance experience. Whitney discusses how to avoid common privacy mistakes, current privacy attack trends, and the importance of thinking like an attacker.  </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>The role of encryption in privacy  </li><li>Privacy attack trends you should be paying attention to </li><li>Why some organizations have different approaches to privacy </li></ul><p>  </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>How, and when, do privacy and security come together?  </li><li>Why has a common framework been so difficult to establish?  </li><li>Should regulators play a role in establishing a baseline of privacy awareness? </li></ul><p>  </p><p><strong>Resources:</strong>   </p><p>View <a href="https://www.linkedin.com/in/whitney-merrill-5ab05012/">Whitney Merrill on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a>  </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a>  </p><p> </p><p><strong>Related:    </strong> </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>   </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a>  </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network. </em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>The way most people operate online these days, what would you even consider private anymore? We are so quick to share details about our job, home, friends, and family without even thinking about how much personal info we're giving away. Privacy and user agreements are a part of almost everyone's life at this point, and what do you know about them? For the most part, we often see a user agreement pop up, click agree and move on, but do you know what you just agreed to? Privacy choices have become routine, though they shouldn’t be. </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by Privacy Counsel and Data Protection Officer at Asana, <a href="https://www.linkedin.com/in/whitney-merrill-5ab05012/">Whitney Merrill</a>. She is an accomplished attorney with 7+ years of privacy, data security, and data governance experience. Whitney discusses how to avoid common privacy mistakes, current privacy attack trends, and the importance of thinking like an attacker.  </p><p> </p><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>The role of encryption in privacy  </li><li>Privacy attack trends you should be paying attention to </li><li>Why some organizations have different approaches to privacy </li></ul><p>  </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>How, and when, do privacy and security come together?  </li><li>Why has a common framework been so difficult to establish?  </li><li>Should regulators play a role in establishing a baseline of privacy awareness? </li></ul><p>  </p><p><strong>Resources:</strong>   </p><p>View <a href="https://www.linkedin.com/in/whitney-merrill-5ab05012/">Whitney Merrill on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a>  </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a>  </p><p> </p><p><strong>Related:    </strong> </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>   </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a>  </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network. </em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Securing Modern Software</title>
			<itunes:title>Securing Modern Software</itunes:title>
			<pubDate>Wed, 27 Oct 2021 07:05:00 GMT</pubDate>
			<itunes:duration>21:31</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/68a95944-320d-11ec-897b-ef3d1e0b824b/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">68a95944-320d-11ec-897b-ef3d1e0b824b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/50/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b79</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790fU94bSourSzUY1GjUWLnf]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>50</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>The newfound popularity of the internet in the nineties spurned an obsession with hacking. Unfortunately, most movies believed that it wasn't possible to show real hacking and still be entertaining; hence all the awkward video game graphics and characters living in sketchy basements regularly yelling out, "We're in!" while pounding on their keyboards. I'd also like to address their outfit choices but now is not the appropriate time. The point is, hackers have been portrayed as the same character repeatedly when in reality, there are many possibilities to turn these skills into a legitimate career.    </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by Co-Founder and Chief Technology Officer at Veracode <a href="https://www.linkedin.com/in/wysopal">Chris Wysopal</a>. In the ’90s, Chris was one of the first vulnerability researchers at The L0pht, a hacker think tank, where he publicized his findings on the dangers of insecure software. Chris shares guidance for anyone getting started with modern secure software development, the best tools to monitor for vulnerabilities in open-source code, and shares what he believes is one of the greatest threats to software development. </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>How to use open-source code safely </li><li>Best tools for monitoring vulnerabilities </li><li>How to detect and respond to threats to insecure software </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>What is modern secure software development?  </li><li>What are the biggest threats to software today?  </li><li>How should companies allocate ownership of secure code across the software development lifecycle? </li></ul><p> </p><p><strong>Resources:</strong>   </p><p>View <a href="https://www.linkedin.com/in/wysopal">Chris Wysopal on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a>  </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a>  </p><br><p><strong>Related:   </strong> </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a>  </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>  </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>The newfound popularity of the internet in the nineties spurned an obsession with hacking. Unfortunately, most movies believed that it wasn't possible to show real hacking and still be entertaining; hence all the awkward video game graphics and characters living in sketchy basements regularly yelling out, "We're in!" while pounding on their keyboards. I'd also like to address their outfit choices but now is not the appropriate time. The point is, hackers have been portrayed as the same character repeatedly when in reality, there are many possibilities to turn these skills into a legitimate career.    </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by Co-Founder and Chief Technology Officer at Veracode <a href="https://www.linkedin.com/in/wysopal">Chris Wysopal</a>. In the ’90s, Chris was one of the first vulnerability researchers at The L0pht, a hacker think tank, where he publicized his findings on the dangers of insecure software. Chris shares guidance for anyone getting started with modern secure software development, the best tools to monitor for vulnerabilities in open-source code, and shares what he believes is one of the greatest threats to software development. </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>How to use open-source code safely </li><li>Best tools for monitoring vulnerabilities </li><li>How to detect and respond to threats to insecure software </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>What is modern secure software development?  </li><li>What are the biggest threats to software today?  </li><li>How should companies allocate ownership of secure code across the software development lifecycle? </li></ul><p> </p><p><strong>Resources:</strong>   </p><p>View <a href="https://www.linkedin.com/in/wysopal">Chris Wysopal on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a>  </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a>  </p><br><p><strong>Related:   </strong> </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a>  </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>  </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The 2021 Microsoft Digital Defense Report</title>
			<itunes:title>The 2021 Microsoft Digital Defense Report</itunes:title>
			<pubDate>Wed, 20 Oct 2021 07:05:00 GMT</pubDate>
			<itunes:duration>39:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/25d41588-2c71-11ec-b2ce-873df08f470c/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">25d41588-2c71-11ec-b2ce-873df08f470c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/49/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b7a</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA792D5LCDVEkSwCLsaXVWpnIp]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>49</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Okay, look, we know you plan on reading the entire 2021 MDDR at some point. But you're busy. Life gets in the way. We get it. Who has the time! Well, we've got the time, but that's beside the point, and honestly... fortunate for you. We've read the report front to back and have decided to cover some of it today on the podcast, but you'll still need to read all 134 pages yourself if you truly want to grasp the entire piece. Unless you want to be that person who listens to a single podcast and pretends they read the whole thing... then go ahead; we won't tell. </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by <a href="https://uk.linkedin.com/in/sian-john">Sian John</a>, Microsoft's director of strategic growth. Sian is currently working with the business development team, exploring growth opportunities for Microsoft to strengthen security, compliance, and identity offerings that address unfulfilled needs in the market. As a security professional with over 25 years of experience, Sian accompanies us as we discuss the 2021 Microsoft Digital Defense Report, which she personally contributed to.   </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>The history and analysis of the 2021 Microsoft Digital Defense Report </li><li>The evolution of cybercrime services that are for sale </li><li>What's providing new attackers with access to deeper data </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>How did Microsoft settle on the topics and themes of the 2021 MDDR?   </li><li>What are some takeaways from the newly added disinformation chapter? </li><li>Why isn't Zero Trust being implemented, considering the conversations we've had that it's more critical than ever?   </li></ul><p> </p><p><strong>Resources:</strong>   </p><p> <a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi"><em>2021 Microsoft Digital Defense Report</em></a> </p><p>View <a href="https://uk.linkedin.com/in/sian-john">Sian John on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a>  </p><br><p><strong>Related:  </strong>  </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>  </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em>  </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Okay, look, we know you plan on reading the entire 2021 MDDR at some point. But you're busy. Life gets in the way. We get it. Who has the time! Well, we've got the time, but that's beside the point, and honestly... fortunate for you. We've read the report front to back and have decided to cover some of it today on the podcast, but you'll still need to read all 134 pages yourself if you truly want to grasp the entire piece. Unless you want to be that person who listens to a single podcast and pretends they read the whole thing... then go ahead; we won't tell. </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by <a href="https://uk.linkedin.com/in/sian-john">Sian John</a>, Microsoft's director of strategic growth. Sian is currently working with the business development team, exploring growth opportunities for Microsoft to strengthen security, compliance, and identity offerings that address unfulfilled needs in the market. As a security professional with over 25 years of experience, Sian accompanies us as we discuss the 2021 Microsoft Digital Defense Report, which she personally contributed to.   </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:    </p><ul><li>The history and analysis of the 2021 Microsoft Digital Defense Report </li><li>The evolution of cybercrime services that are for sale </li><li>What's providing new attackers with access to deeper data </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>    </p><ul><li>How did Microsoft settle on the topics and themes of the 2021 MDDR?   </li><li>What are some takeaways from the newly added disinformation chapter? </li><li>Why isn't Zero Trust being implemented, considering the conversations we've had that it's more critical than ever?   </li></ul><p> </p><p><strong>Resources:</strong>   </p><p> <a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi"><em>2021 Microsoft Digital Defense Report</em></a> </p><p>View <a href="https://uk.linkedin.com/in/sian-john">Sian John on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a>  </p><br><p><strong>Related:  </strong>  </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>  </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em>  </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Mobile 4N6 101</title>
			<itunes:title>Mobile 4N6 101</itunes:title>
			<pubDate>Wed, 13 Oct 2021 07:05:00 GMT</pubDate>
			<itunes:duration>34:58</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/1f90e32a-22ff-11ec-a075-f715933cc9a7/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">1f90e32a-22ff-11ec-a075-f715933cc9a7</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/48/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b7b</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA793/RgIrHmEV+xpC4EF/XKYf]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>48</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals from high school. And if you do, this is your reminder that it might be time to let those go. It's become increasingly apparent lately how much info our phones collect from us, from the first app you check in the morning after waking up, recent calendar entries, and your actual heart rate by 9 am. The crazy part is most people don't give it a second thought. It doesn't interest us... until something or someone goes missing, then it becomes a road map to whatever it is you did. </p><p>In this episode of Security Unlocked, host's <a href="https://www.linkedin.com/in/nataliagodyla">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill">Nic Fillingham</a> are joined by Senior Digital Forensics Researcher at Cellebrite, SANS Author and Senior Instructor <a href="https://www.linkedin.com/in/sledwards">Sarah Edwards</a>. Sarah walks us through the world of mobile digital forensics while also crushing our dreams on how not so relatable it is to our favorite CSI television shows. She explains what makes mobile forensics unique while incredibly intimate and how a mobile device can be used as part of an attack chain.  </p><br><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>The specific tools used during a digital forensics investigation </li><li>What the typical threat landscape looks like for mobile devices </li><li>Big trends and changes happening in the past few years </li></ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><ul><li>How is mobile forensics particularly unique? </li><li>​​What is typically looked for during an investigation?  </li><li>How is a mobile device used as part of an attack chain? </li></ul><p><br></p><p><strong>Resources:</strong> </p><p><a href="https://www.mac4n6.com/"><em>mac4n6.com</em></a> </p><p>View <a href="https://www.linkedin.com/in/sledwards">Sarah Edwards on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>View<em> </em><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a> </p><br><p><strong>Related:  </strong> </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a> </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals from high school. And if you do, this is your reminder that it might be time to let those go. It's become increasingly apparent lately how much info our phones collect from us, from the first app you check in the morning after waking up, recent calendar entries, and your actual heart rate by 9 am. The crazy part is most people don't give it a second thought. It doesn't interest us... until something or someone goes missing, then it becomes a road map to whatever it is you did. </p><p>In this episode of Security Unlocked, host's <a href="https://www.linkedin.com/in/nataliagodyla">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill">Nic Fillingham</a> are joined by Senior Digital Forensics Researcher at Cellebrite, SANS Author and Senior Instructor <a href="https://www.linkedin.com/in/sledwards">Sarah Edwards</a>. Sarah walks us through the world of mobile digital forensics while also crushing our dreams on how not so relatable it is to our favorite CSI television shows. She explains what makes mobile forensics unique while incredibly intimate and how a mobile device can be used as part of an attack chain.  </p><br><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>The specific tools used during a digital forensics investigation </li><li>What the typical threat landscape looks like for mobile devices </li><li>Big trends and changes happening in the past few years </li></ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><ul><li>How is mobile forensics particularly unique? </li><li>​​What is typically looked for during an investigation?  </li><li>How is a mobile device used as part of an attack chain? </li></ul><p><br></p><p><strong>Resources:</strong> </p><p><a href="https://www.mac4n6.com/"><em>mac4n6.com</em></a> </p><p>View <a href="https://www.linkedin.com/in/sledwards">Sarah Edwards on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>View<em> </em><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a> </p><br><p><strong>Related:  </strong> </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a> </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Untangling Botnets</title>
			<itunes:title>Untangling Botnets</itunes:title>
			<pubDate>Wed, 06 Oct 2021 07:05:00 GMT</pubDate>
			<itunes:duration>37:03</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/15de4efc-1cbb-11ec-87ee-bb483c90746c/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">15de4efc-1cbb-11ec-87ee-bb483c90746c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/47/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b7c</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790RtaPcMqimFo33dsSXuAdB]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>47</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>You're back home celebrating the holidays with friends and family, sharing stories, catching up, and discussing your plans for the year ahead. Next thing you know, that cousin who wouldn't stop sending you emails about the "future of bitcoin" and coin mining kicks the door open, and he's ready to spread some holiday knowledge. Oh yeah, he's also going to cut you in on a sweet deal he has going on with his buddy Carl, who he met at dollar wing night. Unfortunately, Carl is one of the bad guys. He is secretly infecting multiple devices with botnets, collecting crypto-cash at the expense of the naive device owners who don't know that their machines are being used.   </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill">Nic Fillingham</a> are re-joined by Microsoft Defender 365 threat intelligence team member <a href="https://www.linkedin.com/in/bumblebreaches/">Elif Kaya</a>, whose current primary focus is with botnets, commodity threats, and phishing delivered malware. Elif explains some of the new techniques from botnets, how they're being used for financial theft via cryptocurrency mining, and the impact on the defender's view of these actions.  </p><br><p><strong>In This Episode You Will Learn:  </strong></p><ul><li>An overview and detailed description of what botnets are </li><li>The fundamentals of cryptocurrency mining &amp; botnets on a machine</li><li>Best practices when trying to identify new botnets</li></ul><p><br></p><p><strong>Some Questions We Ask:   </strong> </p><ul><li>How can Microsoft contribute to helping take down these botnets?  </li><li>What direction are the new botnets moving towards? </li><li>How common is competition-killing activity within new botnets and crypto mining? </li></ul><p><br></p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/security/blog/2021/05/20/phorpiex-morphs-how-a-longstanding-botnet-persists-and-thrives-in-the-current-threat-environment/"><em>Phorpiex morphs: How a longstanding botnet persists and thrives in the current threat environment</em></a> </p><p><a href="https://www.microsoft.com/security/blog/2021/07/22/when-coin-miners-evolve-part-1-exposing-lemonduck-and-lemoncat-modern-mining-malware-infrastructure/"><em>When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure</em></a> </p><p><a href="https://www.microsoft.com/security/blog/2021/07/29/when-coin-miners-evolve-part-2-hunting-down-lemonduck-and-lemoncat-attacks/"><em>When coin miners evolve, Part 2: Hunting down LemonDuck and LemonCat attacks</em></a> </p><p>View <a href="http://elif%20kaya%20on%20linkedin/">Elif Kaya on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><p> </p><p><strong>Related:  </strong> </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>You're back home celebrating the holidays with friends and family, sharing stories, catching up, and discussing your plans for the year ahead. Next thing you know, that cousin who wouldn't stop sending you emails about the "future of bitcoin" and coin mining kicks the door open, and he's ready to spread some holiday knowledge. Oh yeah, he's also going to cut you in on a sweet deal he has going on with his buddy Carl, who he met at dollar wing night. Unfortunately, Carl is one of the bad guys. He is secretly infecting multiple devices with botnets, collecting crypto-cash at the expense of the naive device owners who don't know that their machines are being used.   </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill">Nic Fillingham</a> are re-joined by Microsoft Defender 365 threat intelligence team member <a href="https://www.linkedin.com/in/bumblebreaches/">Elif Kaya</a>, whose current primary focus is with botnets, commodity threats, and phishing delivered malware. Elif explains some of the new techniques from botnets, how they're being used for financial theft via cryptocurrency mining, and the impact on the defender's view of these actions.  </p><br><p><strong>In This Episode You Will Learn:  </strong></p><ul><li>An overview and detailed description of what botnets are </li><li>The fundamentals of cryptocurrency mining &amp; botnets on a machine</li><li>Best practices when trying to identify new botnets</li></ul><p><br></p><p><strong>Some Questions We Ask:   </strong> </p><ul><li>How can Microsoft contribute to helping take down these botnets?  </li><li>What direction are the new botnets moving towards? </li><li>How common is competition-killing activity within new botnets and crypto mining? </li></ul><p><br></p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/security/blog/2021/05/20/phorpiex-morphs-how-a-longstanding-botnet-persists-and-thrives-in-the-current-threat-environment/"><em>Phorpiex morphs: How a longstanding botnet persists and thrives in the current threat environment</em></a> </p><p><a href="https://www.microsoft.com/security/blog/2021/07/22/when-coin-miners-evolve-part-1-exposing-lemonduck-and-lemoncat-modern-mining-malware-infrastructure/"><em>When coin miners evolve, Part 1: Exposing LemonDuck and LemonCat, modern mining malware infrastructure</em></a> </p><p><a href="https://www.microsoft.com/security/blog/2021/07/29/when-coin-miners-evolve-part-2-hunting-down-lemonduck-and-lemoncat-attacks/"><em>When coin miners evolve, Part 2: Hunting down LemonDuck and LemonCat attacks</em></a> </p><p>View <a href="http://elif%20kaya%20on%20linkedin/">Elif Kaya on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><p> </p><p><strong>Related:  </strong> </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Listen to: <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea with Ann Johnson</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>What the Fuzz?!</title>
			<itunes:title>What the Fuzz?!</itunes:title>
			<pubDate>Wed, 29 Sep 2021 07:05:00 GMT</pubDate>
			<itunes:duration>36:21</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/1dc85296-17ea-11ec-87ab-bfda9de8d93d/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">1dc85296-17ea-11ec-87ab-bfda9de8d93d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/46/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b7d</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA791t9QuCyAXMezfKA1UoLr1d]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>46</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Do you have a data science or engineering background? If so, you're in luck. If not, you're also in luck because today's guest found a way to make a few complex subjects understandable for everyone. The first of many topics... Fuzzy hashing. It might sound like an adorable, adventurous Muppet character, but I promise you the reason behind it is not cute at all. The short explanation is "fighting crime with math," and honestly, the short version is all I've got for you. So, sit back and pay attention to an episode even the hosts plan on listening to twice. </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla">Natalia Godyla</a> are joined by <a href="https://www.linkedin.com/in/edirgarcia">Edir Garcia Lazo</a>, a data scientist currently working for the Microsoft Defender Cybersecurity Artificial Intelligence Team. Edir specializes in writing cloud machine learning models for the Malware Classification sub-team, working with threat hunters, reverse engineers, or security researchers. Edir talks us through character changes in malicious payloads, polymorphic malware, and the difference between fuzzing and fuzzy hashing.   </p><br><p><strong>Questions we ask:</strong> </p><ul><li>What inspired the team to look at fuzzy hashing and deep learning as techniques for detection instead of some of the more traditional methods? </li><li>Is there a limit to how much change the fuzzy hashing methodology can recognize? </li><li>What are some of the major differences between fuzzing and fuzzy hashing? </li></ul><p><br></p><p><strong>What you’ll learn:</strong> </p><ul><li>Why fuzzy hashes aren't a cure-all and continue to have problems with radically new malware. </li><li>Differences between perceptron and a multilayer perceptron. </li><li>The compatibility between deep learning and fuzzy hashing. </li></ul><p><br></p><p><strong>Resources:</strong>  </p><p><a href="https://www.microsoft.com/security/blog/2021/07/27/combing-through-the-fuzz-using-fuzzy-hashing-and-deep-learning-to-counter-malware-detection-evasion-techniques/"><em>Combing through the fuzz: Using fuzzy hashing and deep learning to counter malware detection evasion techniques</em></a> </p><p>View <a href="https://www.linkedin.com/in/edirgarcia">Edir on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Do you have a data science or engineering background? If so, you're in luck. If not, you're also in luck because today's guest found a way to make a few complex subjects understandable for everyone. The first of many topics... Fuzzy hashing. It might sound like an adorable, adventurous Muppet character, but I promise you the reason behind it is not cute at all. The short explanation is "fighting crime with math," and honestly, the short version is all I've got for you. So, sit back and pay attention to an episode even the hosts plan on listening to twice. </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla">Natalia Godyla</a> are joined by <a href="https://www.linkedin.com/in/edirgarcia">Edir Garcia Lazo</a>, a data scientist currently working for the Microsoft Defender Cybersecurity Artificial Intelligence Team. Edir specializes in writing cloud machine learning models for the Malware Classification sub-team, working with threat hunters, reverse engineers, or security researchers. Edir talks us through character changes in malicious payloads, polymorphic malware, and the difference between fuzzing and fuzzy hashing.   </p><br><p><strong>Questions we ask:</strong> </p><ul><li>What inspired the team to look at fuzzy hashing and deep learning as techniques for detection instead of some of the more traditional methods? </li><li>Is there a limit to how much change the fuzzy hashing methodology can recognize? </li><li>What are some of the major differences between fuzzing and fuzzy hashing? </li></ul><p><br></p><p><strong>What you’ll learn:</strong> </p><ul><li>Why fuzzy hashes aren't a cure-all and continue to have problems with radically new malware. </li><li>Differences between perceptron and a multilayer perceptron. </li><li>The compatibility between deep learning and fuzzy hashing. </li></ul><p><br></p><p><strong>Resources:</strong>  </p><p><a href="https://www.microsoft.com/security/blog/2021/07/27/combing-through-the-fuzz-using-fuzzy-hashing-and-deep-learning-to-counter-malware-detection-evasion-techniques/"><em>Combing through the fuzz: Using fuzzy hashing and deep learning to counter malware detection evasion techniques</em></a> </p><p>View <a href="https://www.linkedin.com/in/edirgarcia">Edir on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The ‘Three E’s’ of Scam Disruption</title>
			<itunes:title>The ‘Three E’s’ of Scam Disruption</itunes:title>
			<pubDate>Wed, 22 Sep 2021 07:05:00 GMT</pubDate>
			<itunes:duration>35:49</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/76e3c116-17dc-11ec-a223-dfef6476a044/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">76e3c116-17dc-11ec-a223-dfef6476a044</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/45/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b7e</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA791YjA2WNYe7oBNV8DgOFF2i]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>45</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Juan Hardoy leads an international team of investigators, analysts, and lawyers inside the Digital Crimes Unit who share a joint mission to protect customers and promote trust in Microsoft technologies. Hearing that might take your imagination to a place where Juan is deputized to fight crime in digital space, and you wouldn't be completely wrong. Still, unfortunately, he's not sitting at his desk with a sheriff's badge and a cowboy hat. It's not as simple as the days in the west, where you can challenge someone to a duel because of a simple "Pop Up" and claim victory with a glass of whiskey, moving on to the next town with problems. Because in every organization, there's at least one person that will click on anything. These issues will continue to grow and evolve in a world where international and national law enforcement are needed, along with a team of investigators creating what some would call the "secret sauce" for tackling cybercrime.  </p><p> </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by <a href="https://www.linkedin.com/in/juan-hardoy-ab4b639a">Juan Hardoy</a>, an assistant general counsel with the DCU, to discuss his partnership with governments, elected officials, and policymakers. Juan explains the proactive action against cybercriminals trying to hurt our customers, why people aren't going to use our technology or the internet if they don't trust it, and how they bring them to justice in the form of criminal referrals with civil actions.  </p><p> </p><p><strong>In this episode you will learn:</strong> </p><ul><li>How Juan earned the role of assistant general counsel </li><li>What new services and technology criminals are using  </li><li>Why education is the best defense against cybercrime and tech scams </li></ul><p> </p><p><strong>Some questions we ask:</strong> </p><ul><li>Are there any tactics that Microsoft tried in the past that didn't successfully stop the tech support scammers? </li><li>What is the mission of the digital crimes unit and how do they partner with government and elected officials?  </li><li>Why do tech support scammers seem to target consumers and individuals instead of enterprises and organizations? </li></ul><p><br></p><p><strong>Resources:</strong> </p><p>Visit <a href="https://www.linkedin.com/in/juan-hardoy-ab4b639a">Juan Hardoy on LinkedIn</a> </p><p>Visit <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>Visit <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><p>Visit <a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a> </p><p> </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedpodcast.com/">Security Unlocked</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Juan Hardoy leads an international team of investigators, analysts, and lawyers inside the Digital Crimes Unit who share a joint mission to protect customers and promote trust in Microsoft technologies. Hearing that might take your imagination to a place where Juan is deputized to fight crime in digital space, and you wouldn't be completely wrong. Still, unfortunately, he's not sitting at his desk with a sheriff's badge and a cowboy hat. It's not as simple as the days in the west, where you can challenge someone to a duel because of a simple "Pop Up" and claim victory with a glass of whiskey, moving on to the next town with problems. Because in every organization, there's at least one person that will click on anything. These issues will continue to grow and evolve in a world where international and national law enforcement are needed, along with a team of investigators creating what some would call the "secret sauce" for tackling cybercrime.  </p><p> </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by <a href="https://www.linkedin.com/in/juan-hardoy-ab4b639a">Juan Hardoy</a>, an assistant general counsel with the DCU, to discuss his partnership with governments, elected officials, and policymakers. Juan explains the proactive action against cybercriminals trying to hurt our customers, why people aren't going to use our technology or the internet if they don't trust it, and how they bring them to justice in the form of criminal referrals with civil actions.  </p><p> </p><p><strong>In this episode you will learn:</strong> </p><ul><li>How Juan earned the role of assistant general counsel </li><li>What new services and technology criminals are using  </li><li>Why education is the best defense against cybercrime and tech scams </li></ul><p> </p><p><strong>Some questions we ask:</strong> </p><ul><li>Are there any tactics that Microsoft tried in the past that didn't successfully stop the tech support scammers? </li><li>What is the mission of the digital crimes unit and how do they partner with government and elected officials?  </li><li>Why do tech support scammers seem to target consumers and individuals instead of enterprises and organizations? </li></ul><p><br></p><p><strong>Resources:</strong> </p><p>Visit <a href="https://www.linkedin.com/in/juan-hardoy-ab4b639a">Juan Hardoy on LinkedIn</a> </p><p>Visit <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>Visit <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><p>Visit <a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a> </p><p> </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedpodcast.com/">Security Unlocked</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Entering the Virtual Battlefield</title>
			<itunes:title>Entering the Virtual Battlefield</itunes:title>
			<pubDate>Wed, 15 Sep 2021 07:05:00 GMT</pubDate>
			<itunes:duration>35:09</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/eed04448-0a9d-11ec-89a3-bb49d7464367/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">eed04448-0a9d-11ec-89a3-bb49d7464367</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/44/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b7f</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA791AwImcR+8Zbf8HFV0u27sQ]]></acast:settings>
			<itunes:subtitle>Justin Underwood</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>44</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Have you ever thought about a career in threat intelligence or cyber security? Possibly finishing school with a degree in computer programming and feel overwhelmed with what to do next? Don't worry; we've all experienced this. Maybe not specifically with computer programming, but the figuring it out aspect. You could be ending active military service and working in cyber operations, helping offensive and defensive cyberspace operations, wondering about the next step. The thought of making the transition from military to private industry can be exciting but also nerve-racking. The good news is that there are many different roads to travel, and with the experience and education you've obtained, you'll most likely have more options than you could have ever imagined.</p><p>In this episode of Security Unlocked, host <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> is joined by Senior Threat Intelligence Analyst <a href="https://www.linkedin.com/in/justin-underwood-0907a646/">Justin Underwood</a>, an army veteran with the personality and charm to calm your nerves. Currently working for a group known as OPTIC, the Operational Threat Intelligence Center at Microsoft, Justin and Natalia discuss his time at Bank of America and Xbox. He explains how it gave him a better understanding of cybersecurity, how he obtained the title of Human Intelligence Collector, and what helped him transition from the army into the world of threat intelligence and cyber security. </p><p> </p><p><strong>In This Episode You Will Learn:   </strong></p><ul><li>How to find your place in the world of cybersecurity </li><li>The challenges faced when making the transition from military to private industry</li><li>What the role of a Human Intelligence Collector is</li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>   </p><ul><li>How does military experience help you succeed in the private industry?   </li><li>What military tools are used and overlap in the private sector?  </li><li>What are some big projects currently being worked on?  </li></ul><p> </p><p><strong>Resources:</strong>  </p><p>View <a href="https://www.linkedin.com/in/justin-underwood-0907a646/">Justin Underwood on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>Visit <a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a> </p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedpodcast.com/">Security Unlocked</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Have you ever thought about a career in threat intelligence or cyber security? Possibly finishing school with a degree in computer programming and feel overwhelmed with what to do next? Don't worry; we've all experienced this. Maybe not specifically with computer programming, but the figuring it out aspect. You could be ending active military service and working in cyber operations, helping offensive and defensive cyberspace operations, wondering about the next step. The thought of making the transition from military to private industry can be exciting but also nerve-racking. The good news is that there are many different roads to travel, and with the experience and education you've obtained, you'll most likely have more options than you could have ever imagined.</p><p>In this episode of Security Unlocked, host <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> is joined by Senior Threat Intelligence Analyst <a href="https://www.linkedin.com/in/justin-underwood-0907a646/">Justin Underwood</a>, an army veteran with the personality and charm to calm your nerves. Currently working for a group known as OPTIC, the Operational Threat Intelligence Center at Microsoft, Justin and Natalia discuss his time at Bank of America and Xbox. He explains how it gave him a better understanding of cybersecurity, how he obtained the title of Human Intelligence Collector, and what helped him transition from the army into the world of threat intelligence and cyber security. </p><p> </p><p><strong>In This Episode You Will Learn:   </strong></p><ul><li>How to find your place in the world of cybersecurity </li><li>The challenges faced when making the transition from military to private industry</li><li>What the role of a Human Intelligence Collector is</li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>   </p><ul><li>How does military experience help you succeed in the private industry?   </li><li>What military tools are used and overlap in the private sector?  </li><li>What are some big projects currently being worked on?  </li></ul><p> </p><p><strong>Resources:</strong>  </p><p>View <a href="https://www.linkedin.com/in/justin-underwood-0907a646/">Justin Underwood on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>Visit <a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a> </p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedpodcast.com/">Security Unlocked</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Battling BazaCall BuzzKill</title>
			<itunes:title>Battling BazaCall BuzzKill</itunes:title>
			<pubDate>Wed, 01 Sep 2021 07:05:00 GMT</pubDate>
			<itunes:duration>35:07</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/36f738e6-0786-11ec-9f45-13663883d158/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">36f738e6-0786-11ec-9f45-13663883d158</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/43/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b80</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA793dc+5wiV2PNSL9aL9wowlM]]></acast:settings>
			<itunes:subtitle>Justin Carroll + Emily Hacker</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>43</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>It's finally Friday. You successfully made it through another week and the weekend is so close you can taste it. You pour yourself a bowl of your favorite cereal, but before you can get that first bite your phone rings. It's a random number, but for some reason you're feeling chatty and decide to answer. Unfortunately, it's a robot that somehow knows your name and is asking for your social security number, home address, and password from that first AOL account you made in 1998!  It’s easy to recognize classic scams like these, but some of the newer, creative scams can be more challenging to identify.  One of these is called BazaCall, and they don’t call you – oh, no.  BazaCall will have YOU calling THEM! </p><p>In this episode of Security Unlocked, host <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> is re-joined by Microsoft Threat Analysts <a href="https://www.linkedin.com/in/emilydhacker/">Emily Hacker</a> and <a href="https://www.linkedin.com/in/justin-carroll-20616574/">Justin Carroll</a> to talk about a relatively new delivery method for malware and ransomware called BazaCall campaigns. They discuss the different delivery methods used, how attackers evade detection, and where the attack chain begins.     </p><p> </p><p><strong>In This Episode You Will Learn:  </strong> </p><ul><li>What makes BazaCall campaigns unique from other email/phone scams </li><li>How the delivery system works </li><li>About a new technique called “double extorsion”  </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>   </p><ul><li>What is the flow of the attack chain? </li><li>What are some new tactics used by BazaCall centers? </li><li>How can organizations mitigate attacks? </li></ul><p><br></p><p><strong>Resources:</strong>  </p><p><a href="https://www.microsoft.com/security/blog/2021/07/29/bazacall-phony-call-centers-lead-to-exfiltration-and-ransomware/">BazaCall: Phony call centers lead to exfiltration and ransomware</a> </p><p>View <a href="https://www.linkedin.com/in/emilydhacker/">Emily on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/justin-carroll-20616574/">Justin on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><br><p><strong>Related:</strong></p><p><strong>Listen to: </strong><a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p><strong>Listen to: </strong><a href="https://securityunlockedpodcast.com/">Security Unlocked</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>It's finally Friday. You successfully made it through another week and the weekend is so close you can taste it. You pour yourself a bowl of your favorite cereal, but before you can get that first bite your phone rings. It's a random number, but for some reason you're feeling chatty and decide to answer. Unfortunately, it's a robot that somehow knows your name and is asking for your social security number, home address, and password from that first AOL account you made in 1998!  It’s easy to recognize classic scams like these, but some of the newer, creative scams can be more challenging to identify.  One of these is called BazaCall, and they don’t call you – oh, no.  BazaCall will have YOU calling THEM! </p><p>In this episode of Security Unlocked, host <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> is re-joined by Microsoft Threat Analysts <a href="https://www.linkedin.com/in/emilydhacker/">Emily Hacker</a> and <a href="https://www.linkedin.com/in/justin-carroll-20616574/">Justin Carroll</a> to talk about a relatively new delivery method for malware and ransomware called BazaCall campaigns. They discuss the different delivery methods used, how attackers evade detection, and where the attack chain begins.     </p><p> </p><p><strong>In This Episode You Will Learn:  </strong> </p><ul><li>What makes BazaCall campaigns unique from other email/phone scams </li><li>How the delivery system works </li><li>About a new technique called “double extorsion”  </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>   </p><ul><li>What is the flow of the attack chain? </li><li>What are some new tactics used by BazaCall centers? </li><li>How can organizations mitigate attacks? </li></ul><p><br></p><p><strong>Resources:</strong>  </p><p><a href="https://www.microsoft.com/security/blog/2021/07/29/bazacall-phony-call-centers-lead-to-exfiltration-and-ransomware/">BazaCall: Phony call centers lead to exfiltration and ransomware</a> </p><p>View <a href="https://www.linkedin.com/in/emilydhacker/">Emily on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/justin-carroll-20616574/">Justin on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><br><p><strong>Related:</strong></p><p><strong>Listen to: </strong><a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p><strong>Listen to: </strong><a href="https://securityunlockedpodcast.com/">Security Unlocked</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Turning to the Purple Side</title>
			<itunes:title>Turning to the Purple Side</itunes:title>
			<pubDate>Wed, 25 Aug 2021 07:05:00 GMT</pubDate>
			<itunes:duration>24:47</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/f148f532-013b-11ec-8f48-c73334f507af/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">f148f532-013b-11ec-8f48-c73334f507af</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/42/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b81</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA791UCUQi2FYeOvBANIJfEP6w]]></acast:settings>
			<itunes:subtitle>Tanya Janca</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>42</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Picture this: you’re working on a new software that will revolutionize your industry. You’ve got your work cut out for you, from design to programming to integration. But what about security? Keeping your software secure should be in the conversation from day one, but not all developers are well-versed in application security. The good news is that you’re not alone, and even if this picture that we’ve painted isn’t of you, there are still very accessible ways to learn about application security and information security. One of these ways is We Hack Purple, created by a Microsoft alumnus.  </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by the founder of We Hack Purple and former Microsoft Senior Cloud Advocate, <a href="https://www.linkedin.com/in/tanya-janca/?originalSubdomain=ca">Tanya Janca</a>, to discuss her company, trainings, and why it’s so important to keep up with the newest movements in the world of security. Before founding her company, Tanya found herself red-teaming and blue-teaming, and declared herself in the world of Purple. She brings us into that world, breaks down app-sec framework, and even gives a few sci-fi book recommendations.  </p><br><p><strong>In This Episode You Will Learn:</strong>   </p><ul><li>How to keep up with new practices for security professionals </li><li>The frame work for application security </li><li>How to work with and communicate effectively with software developers </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>   </p><ul><li>How do we bridge the gap between developers and the security world? </li><li>What are the pros and cons of threat modeling? </li><li>Who should get involved in application security?  </li></ul><p><br></p><p><strong>Resources:</strong>  </p><p><a href="https://wehackpurple.com/"><em>We Hack Purple</em></a> </p><p>View <a href="https://www.linkedin.com/in/tanya-janca/?originalSubdomain=ca">Tanya on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><p> </p><p><strong>Related:</strong></p><p><strong>Listen to: </strong><a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p><strong>Listen to: </strong><a href="https://securityunlockedpodcast.com/">Security Unlocked</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Picture this: you’re working on a new software that will revolutionize your industry. You’ve got your work cut out for you, from design to programming to integration. But what about security? Keeping your software secure should be in the conversation from day one, but not all developers are well-versed in application security. The good news is that you’re not alone, and even if this picture that we’ve painted isn’t of you, there are still very accessible ways to learn about application security and information security. One of these ways is We Hack Purple, created by a Microsoft alumnus.  </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by the founder of We Hack Purple and former Microsoft Senior Cloud Advocate, <a href="https://www.linkedin.com/in/tanya-janca/?originalSubdomain=ca">Tanya Janca</a>, to discuss her company, trainings, and why it’s so important to keep up with the newest movements in the world of security. Before founding her company, Tanya found herself red-teaming and blue-teaming, and declared herself in the world of Purple. She brings us into that world, breaks down app-sec framework, and even gives a few sci-fi book recommendations.  </p><br><p><strong>In This Episode You Will Learn:</strong>   </p><ul><li>How to keep up with new practices for security professionals </li><li>The frame work for application security </li><li>How to work with and communicate effectively with software developers </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>   </p><ul><li>How do we bridge the gap between developers and the security world? </li><li>What are the pros and cons of threat modeling? </li><li>Who should get involved in application security?  </li></ul><p><br></p><p><strong>Resources:</strong>  </p><p><a href="https://wehackpurple.com/"><em>We Hack Purple</em></a> </p><p>View <a href="https://www.linkedin.com/in/tanya-janca/?originalSubdomain=ca">Tanya on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><p> </p><p><strong>Related:</strong></p><p><strong>Listen to: </strong><a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p><strong>Listen to: </strong><a href="https://securityunlockedpodcast.com/">Security Unlocked</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Protecting the Power Grid</title>
			<itunes:title>Protecting the Power Grid</itunes:title>
			<pubDate>Wed, 18 Aug 2021 07:05:00 GMT</pubDate>
			<itunes:duration>35:33</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/df0d6ce2-fbbc-11eb-b1a7-af8e27084475/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">df0d6ce2-fbbc-11eb-b1a7-af8e27084475</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/41/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b82</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790DUkP+s6TQuAkrj2X3P6BM]]></acast:settings>
			<itunes:subtitle>Hafid Elabdellaoui</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>41</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Electricity is all around us. In fact, you’re using it to read this right now. It powers (no pun intended) our everyday lives, and it works without us having to think about it. It’s kind of like breathing. I mean, you don’t have to tell your lungs “Hey! Start breathing right now!” But just like with breathing, the problems that can follow an interruption of electricity can be deadly. It shouldn’t be shocking (pun intended) that keeping power grids secure is an international priority.</p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by Microsoft’s Chief Security Advisor, <a href="https://www.linkedin.com/in/hafid-elabdellaoui-mba-6a0809167/">Hafid Elabdellaoui</a>, to talk about making our power grids safe and stable. So much relies on the stability of our power grids, it’s easy to forget how dependent we are. Hafid discusses the growing concerns with supply chain attacks and explains the importance of cyber hygiene at all levels of an organization.</p><br><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>The challenges of bringing new security practices to the old field of utilities</li><li>Where cybersecurity meets physical security when utilities companies are under threats</li><li>Why keeping a software inventory is crucial to your security</li></ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul><li>How do current power grid risks and threats compare to concerns 20 years ago?</li><li>How do utilities companies work with the government to prevent large-scale power grid failures?</li><li>How does Microsoft prepare for potential threats, and practice their responses?</li></ul><p> </p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/security/blog/2020/02/18/defending-the-power-grid-against-supply-chain-attacks-part-1-the-risk-defined/"><em>Defending the power grid against supply chain attacks—Part 1: The risk defined</em></a></p><p><a href="https://www.microsoft.com/security/blog/2020/03/23/defending-power-grid-against-supply-chain-attacks-part-2-securing-hardware-software/"><em>Defending the power grid against supply chain attacks—Part 2: Securing hardware and software</em></a></p><p><a href="https://www.microsoft.com/security/blog/2020/04/22/defending-power-grid-against-supply-chain-attacks-3-risk-management-strategies-utilities-industry/"><em>Defending the power grid against supply chain attacks—Part 3: Risk management strategies for the utilities industry</em></a></p><p>View <a href="https://www.linkedin.com/in/hafid-elabdellaoui-mba-6a0809167/">Hafid Elabdellaoui on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedpodcast.com/">Security Unlocked</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Electricity is all around us. In fact, you’re using it to read this right now. It powers (no pun intended) our everyday lives, and it works without us having to think about it. It’s kind of like breathing. I mean, you don’t have to tell your lungs “Hey! Start breathing right now!” But just like with breathing, the problems that can follow an interruption of electricity can be deadly. It shouldn’t be shocking (pun intended) that keeping power grids secure is an international priority.</p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> are joined by Microsoft’s Chief Security Advisor, <a href="https://www.linkedin.com/in/hafid-elabdellaoui-mba-6a0809167/">Hafid Elabdellaoui</a>, to talk about making our power grids safe and stable. So much relies on the stability of our power grids, it’s easy to forget how dependent we are. Hafid discusses the growing concerns with supply chain attacks and explains the importance of cyber hygiene at all levels of an organization.</p><br><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>The challenges of bringing new security practices to the old field of utilities</li><li>Where cybersecurity meets physical security when utilities companies are under threats</li><li>Why keeping a software inventory is crucial to your security</li></ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul><li>How do current power grid risks and threats compare to concerns 20 years ago?</li><li>How do utilities companies work with the government to prevent large-scale power grid failures?</li><li>How does Microsoft prepare for potential threats, and practice their responses?</li></ul><p> </p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/security/blog/2020/02/18/defending-the-power-grid-against-supply-chain-attacks-part-1-the-risk-defined/"><em>Defending the power grid against supply chain attacks—Part 1: The risk defined</em></a></p><p><a href="https://www.microsoft.com/security/blog/2020/03/23/defending-power-grid-against-supply-chain-attacks-part-2-securing-hardware-software/"><em>Defending the power grid against supply chain attacks—Part 2: Securing hardware and software</em></a></p><p><a href="https://www.microsoft.com/security/blog/2020/04/22/defending-power-grid-against-supply-chain-attacks-3-risk-management-strategies-utilities-industry/"><em>Defending the power grid against supply chain attacks—Part 3: Risk management strategies for the utilities industry</em></a></p><p>View <a href="https://www.linkedin.com/in/hafid-elabdellaoui-mba-6a0809167/">Hafid Elabdellaoui on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedpodcast.com/">Security Unlocked</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Making the Leap to the Cloud</title>
			<itunes:title>Making the Leap to the Cloud</itunes:title>
			<pubDate>Wed, 11 Aug 2021 07:05:00 GMT</pubDate>
			<itunes:duration>36:37</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/87d7c564-f971-11eb-9a42-0b2494c1cb09/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">87d7c564-f971-11eb-9a42-0b2494c1cb09</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/40/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b83</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790HcuaRz6ahPB0ZnticL7Jl]]></acast:settings>
			<itunes:subtitle>Sarah Armstrong-Smith</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>40</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>8 trillion. It’s kind of a big number, right? That’s how many signals are collected, processed, and analyzed by Microsoft’s security team every single day. Those signals are travelling from the cloud, coming through endpoints, coming through Bing, coming through Xbox. All of these signals are turned into intelligence, and if you’re a cloud user, that intelligence is an asset to your security. By making the leap to the cloud, the power, size, and flexibility of Microsoft’s threat intelligence becomes your resource.   </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> are re-joined by Microsoft’s Chief Security Advisor, <a href="https://www.linkedin.com/in/sarah-armstrong-smith/%20">Sarah Armstrong-Smith</a>, to dive deeper into the back half of her four-part series on Becoming Resilient. We explore different cloud models, the shared responsibility of your cloud service provider, and the growing risks of insider threats.  </p><br><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>Best practices on switching to the cloud and ensuring utmost security </li><li>Why you need to adapt to stay ahead of threats </li><li>How to build security cleanly into your foundation and keep from it being a messy afterthought </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>What do new users gain by moving to the cloud?  </li><li>What errors are organizations making when moving to the cloud? </li><li>How do we effectively communicate with our security team about business decisions? </li></ul><p><br></p><p> <strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/security/blog/2020/10/13/becoming-resilient-by-understanding-cybersecurity-risks-part-1/"><em>Becoming resilient by understanding cybersecurity risks: Part 1</em></a></p><p><a href="https://www.microsoft.com/security/blog/2020/12/17/becoming-resilient-by-understanding-cybersecurity-risks-part-2/"><em>Becoming resilient by understanding cybersecurity risks: Part 2</em></a></p><p><a href="https://www.microsoft.com/security/blog/2021/02/24/becoming-resilient-by-understanding-cybersecurity-risks-part-3-a-security-pros-perspective/"><em>Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective</em></a></p><p><a href="https://www.microsoft.com/security/blog/2021/05/26/becoming-resilient-by-understanding-cybersecurity-risks-part-4-navigating-current-threats/"><em>Becoming resilient by understanding cybersecurity risks: Part 4—navigating current threats</em></a></p><p><a href="https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/">Cloud Adoption Framework</a> </p><p>View <a href="https://www.linkedin.com/in/sarah-armstrong-smith/">Sarah Armstrong-Smith on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedpodcast.com/">Security Unlocked</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>8 trillion. It’s kind of a big number, right? That’s how many signals are collected, processed, and analyzed by Microsoft’s security team every single day. Those signals are travelling from the cloud, coming through endpoints, coming through Bing, coming through Xbox. All of these signals are turned into intelligence, and if you’re a cloud user, that intelligence is an asset to your security. By making the leap to the cloud, the power, size, and flexibility of Microsoft’s threat intelligence becomes your resource.   </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> are re-joined by Microsoft’s Chief Security Advisor, <a href="https://www.linkedin.com/in/sarah-armstrong-smith/%20">Sarah Armstrong-Smith</a>, to dive deeper into the back half of her four-part series on Becoming Resilient. We explore different cloud models, the shared responsibility of your cloud service provider, and the growing risks of insider threats.  </p><br><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>Best practices on switching to the cloud and ensuring utmost security </li><li>Why you need to adapt to stay ahead of threats </li><li>How to build security cleanly into your foundation and keep from it being a messy afterthought </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>What do new users gain by moving to the cloud?  </li><li>What errors are organizations making when moving to the cloud? </li><li>How do we effectively communicate with our security team about business decisions? </li></ul><p><br></p><p> <strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/security/blog/2020/10/13/becoming-resilient-by-understanding-cybersecurity-risks-part-1/"><em>Becoming resilient by understanding cybersecurity risks: Part 1</em></a></p><p><a href="https://www.microsoft.com/security/blog/2020/12/17/becoming-resilient-by-understanding-cybersecurity-risks-part-2/"><em>Becoming resilient by understanding cybersecurity risks: Part 2</em></a></p><p><a href="https://www.microsoft.com/security/blog/2021/02/24/becoming-resilient-by-understanding-cybersecurity-risks-part-3-a-security-pros-perspective/"><em>Becoming resilient by understanding cybersecurity risks: Part 3—a security pro’s perspective</em></a></p><p><a href="https://www.microsoft.com/security/blog/2021/05/26/becoming-resilient-by-understanding-cybersecurity-risks-part-4-navigating-current-threats/"><em>Becoming resilient by understanding cybersecurity risks: Part 4—navigating current threats</em></a></p><p><a href="https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/">Cloud Adoption Framework</a> </p><p>View <a href="https://www.linkedin.com/in/sarah-armstrong-smith/">Sarah Armstrong-Smith on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedpodcast.com/">Security Unlocked</a></p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Mary Had a Little Scam Report</title>
			<itunes:title>Mary Had a Little Scam Report</itunes:title>
			<pubDate>Wed, 04 Aug 2021 07:05:00 GMT</pubDate>
			<itunes:duration>37:15</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/54806d16-f3da-11eb-b34d-2f3da65310e1/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">54806d16-f3da-11eb-b34d-2f3da65310e1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/39/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b84</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA791/J1o03/x70qP3NLJ8ewcw]]></acast:settings>
			<itunes:subtitle>Mary Jo Schrade</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>39</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>How likely are you to fall for a scam? Survey Says… depends on your demographic. Scammers are evolving, from cold calls on the phone, to computer desktop pop-ups with nagging alarm sounds, to buying out search terms like “email support.” Tech support scams have become an ever-present threat in our online world with 3 out of 5 people globally experiencing them and 1 out of 6 people actually giving their money or personal information to the scammers. Even though there are some honorable people who do what they can to help prevent others from being scammed, the prevalence of these frauds shows they aren’t going away anytime soon.</p><p>On this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> chat with <a href="https://www.linkedin.com/in/mary-jo-schrade/">Mary Jo Schrade</a>, the Asia Regional Lead for Microsoft’s Digital Crimes Unit, about the most recent Global Tech Support Scam Research. The survey covers over 16,000 people in 16 countries and reveals some insights that will leave some feeling hopeful, and some feeling... a little concerned. It’s a relief to know that scam awareness is on the rise globally; however, the groups most susceptible to giving money to scammers may shock you.</p><p> </p><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>Which regions are being targeted most</li><li>How to help those you think are susceptible</li><li>How to recover your money after you’ve been scammed</li></ul><p> </p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>Who is falling for these scams?</li><li>How has the public’s awareness shifted over the past few years?</li><li>Is it ok to pretend to fall for a scam in order to waste a scammer’s time?</li></ul><p><br></p><p><strong>Resources: </strong></p><p><a href="https://blogs.microsoft.com/wp-content/uploads/prod/sites/5/2021/07/MSFT-2021-Global-Tech-Support-Scam-Research-Report.pdf">Global Tech Support Scam Research</a></p><p><a href="https://www.microsoft.com/en-us/concern/scam?rtc=1">Report a scam</a></p><p><a href="https://www.linkedin.com/in/mary-jo-schrade/">Mary Jo Schrade’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>How likely are you to fall for a scam? Survey Says… depends on your demographic. Scammers are evolving, from cold calls on the phone, to computer desktop pop-ups with nagging alarm sounds, to buying out search terms like “email support.” Tech support scams have become an ever-present threat in our online world with 3 out of 5 people globally experiencing them and 1 out of 6 people actually giving their money or personal information to the scammers. Even though there are some honorable people who do what they can to help prevent others from being scammed, the prevalence of these frauds shows they aren’t going away anytime soon.</p><p>On this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> chat with <a href="https://www.linkedin.com/in/mary-jo-schrade/">Mary Jo Schrade</a>, the Asia Regional Lead for Microsoft’s Digital Crimes Unit, about the most recent Global Tech Support Scam Research. The survey covers over 16,000 people in 16 countries and reveals some insights that will leave some feeling hopeful, and some feeling... a little concerned. It’s a relief to know that scam awareness is on the rise globally; however, the groups most susceptible to giving money to scammers may shock you.</p><p> </p><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>Which regions are being targeted most</li><li>How to help those you think are susceptible</li><li>How to recover your money after you’ve been scammed</li></ul><p> </p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>Who is falling for these scams?</li><li>How has the public’s awareness shifted over the past few years?</li><li>Is it ok to pretend to fall for a scam in order to waste a scammer’s time?</li></ul><p><br></p><p><strong>Resources: </strong></p><p><a href="https://blogs.microsoft.com/wp-content/uploads/prod/sites/5/2021/07/MSFT-2021-Global-Tech-Support-Scam-Research-Report.pdf">Global Tech Support Scam Research</a></p><p><a href="https://www.microsoft.com/en-us/concern/scam?rtc=1">Report a scam</a></p><p><a href="https://www.linkedin.com/in/mary-jo-schrade/">Mary Jo Schrade’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Talking Security With Non-Security Professionals</title>
			<itunes:title>Talking Security With Non-Security Professionals</itunes:title>
			<pubDate>Wed, 28 Jul 2021 07:05:00 GMT</pubDate>
			<itunes:duration>37:38</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/61001ad8839c510012110e6f/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">61001ad8839c510012110e6f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/38/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b85</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA792tfEgQSK3WIPbiRvEdRXQF]]></acast:settings>
			<itunes:subtitle>Sarah Armstrong-Smith</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>38</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Every occupation has its unique jargon that allows professionals to speak their own language and understand each other’s shorthand.  Those of us in the world of cybersecurity are no exception as we frequently toss around acronyms and abbreviations, but how can we cybersecurity professionals communicate all of this crucial ingrained knowledge to people who haven’t the faintest idea about technology, security, or what our conversational shorthand even means?  </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with Microsoft’s Chief Security Advisor, <a href="https://www.linkedin.com/in/sarah-armstrong-smith/%20">Sarah Armstrong-Smith</a>, about the most effective ways to communicate high-level security topics with non-security professionals. In order to create a more secure world, it’s paramount that the non-tech savvy are equally informed and protected, and Sarah has some excellent tips in achieving that goal. </p><p> </p><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>How important it is to define ‘risk’  </li><li>Why it's a mistake to think of cyber protections as a necessary evil in a corporation</li><li>The value of introducing topics by asking questions rather than lecturing </li></ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><ul><li>Who should be driving security conversations in an organization? </li><li>How should we introduce cybersecurity concepts non-cybersecurity professionals? </li><li>What are some tips for complex organizations introducing their teams to cybersecurity concepts? </li></ul><p> </p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/security/blog/2020/10/13/becoming-resilient-by-understanding-cybersecurity-risks-part-1/%20">Sarah Armstrong-Smith's Blog post part 1</a></p><p><a href="https://www.microsoft.com/security/blog/2020/12/17/becoming-resilient-by-understanding-cybersecurity-risks-part-2/%20">Sarah Armstrong-Smith's Blog post part 2</a></p><p><a href="https://www.microsoft.com/security/blog/2021/02/24/becoming-resilient-by-understanding-cybersecurity-risks-part-3-a-security-pros-perspective/%20">Sarah Armstrong-Smith's Blog post part 3</a></p><p><a href="https://www.microsoft.com/security/blog/2021/05/26/becoming-resilient-by-understanding-cybersecurity-risks-part-4-navigating-current-threats/%20">Sarah Armstrong-Smith's Blog post part 4</a></p><p><a href="https://www.linkedin.com/in/sarah-armstrong-smith/%20">Sarah Armstrong-Smith's LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p><strong> </strong></p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Every occupation has its unique jargon that allows professionals to speak their own language and understand each other’s shorthand.  Those of us in the world of cybersecurity are no exception as we frequently toss around acronyms and abbreviations, but how can we cybersecurity professionals communicate all of this crucial ingrained knowledge to people who haven’t the faintest idea about technology, security, or what our conversational shorthand even means?  </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with Microsoft’s Chief Security Advisor, <a href="https://www.linkedin.com/in/sarah-armstrong-smith/%20">Sarah Armstrong-Smith</a>, about the most effective ways to communicate high-level security topics with non-security professionals. In order to create a more secure world, it’s paramount that the non-tech savvy are equally informed and protected, and Sarah has some excellent tips in achieving that goal. </p><p> </p><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>How important it is to define ‘risk’  </li><li>Why it's a mistake to think of cyber protections as a necessary evil in a corporation</li><li>The value of introducing topics by asking questions rather than lecturing </li></ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><ul><li>Who should be driving security conversations in an organization? </li><li>How should we introduce cybersecurity concepts non-cybersecurity professionals? </li><li>What are some tips for complex organizations introducing their teams to cybersecurity concepts? </li></ul><p> </p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/security/blog/2020/10/13/becoming-resilient-by-understanding-cybersecurity-risks-part-1/%20">Sarah Armstrong-Smith's Blog post part 1</a></p><p><a href="https://www.microsoft.com/security/blog/2020/12/17/becoming-resilient-by-understanding-cybersecurity-risks-part-2/%20">Sarah Armstrong-Smith's Blog post part 2</a></p><p><a href="https://www.microsoft.com/security/blog/2021/02/24/becoming-resilient-by-understanding-cybersecurity-risks-part-3-a-security-pros-perspective/%20">Sarah Armstrong-Smith's Blog post part 3</a></p><p><a href="https://www.microsoft.com/security/blog/2021/05/26/becoming-resilient-by-understanding-cybersecurity-risks-part-4-navigating-current-threats/%20">Sarah Armstrong-Smith's Blog post part 4</a></p><p><a href="https://www.linkedin.com/in/sarah-armstrong-smith/%20">Sarah Armstrong-Smith's LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p><strong> </strong></p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Discovering Router Vulnerabilities with Anomaly Detection</title>
			<itunes:title>Discovering Router Vulnerabilities with Anomaly Detection</itunes:title>
			<pubDate>Wed, 21 Jul 2021 07:05:00 GMT</pubDate>
			<itunes:duration>32:23</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60f79c298b29e00013c4cd2d/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60f79c298b29e00013c4cd2d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/37/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b86</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790ZUL5oyDWDrJHX5JtmroPQ]]></acast:settings>
			<itunes:subtitle>Jonathan Bar Or</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>37</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Ready for a riddle? What do 40 hypothetical high school students and our guest on this episode have in common? Why they can help you understand complex cyber-attack methodology, of course! </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> are brought back to school by Principal Security Researcher, <a href="https://www.linkedin.com/in/jonathan-bar-or-89876474/">Jonathan Bar Or</a> who discusses vulnerabilities in NETGEAR Firmware. During the conversation Jonathan walks through how his team recognized the vulnerabilities and worked with NETGEAR to secure the issue, and helps us understand exactly how the attack worked using an ingenious metaphor.  </p><p> </p><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>How a side-channel attack works </li><li>Why attackers are moving away from operating systems and towards network equipment </li><li>Why routers are an easy access point for attacks </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul><li>How do you distinguish an anomaly from an attack? </li><li>What are the differences between a side-channel attack and an authentication bypass? </li><li>What can regular users do to protect themselves from similar attacks? </li></ul><p> </p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/security/blog/2021/06/30/microsoft-finds-new-netgear-firmware-vulnerabilities-that-could-lead-to-identity-theft-and-full-system-compromise/%20">Jonathan Bar Or’s Blog Post</a></p><p><a href="https://www.linkedin.com/in/jonathan-bar-or-89876474/%20">Jonathan Bar Or’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p> </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Ready for a riddle? What do 40 hypothetical high school students and our guest on this episode have in common? Why they can help you understand complex cyber-attack methodology, of course! </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> are brought back to school by Principal Security Researcher, <a href="https://www.linkedin.com/in/jonathan-bar-or-89876474/">Jonathan Bar Or</a> who discusses vulnerabilities in NETGEAR Firmware. During the conversation Jonathan walks through how his team recognized the vulnerabilities and worked with NETGEAR to secure the issue, and helps us understand exactly how the attack worked using an ingenious metaphor.  </p><p> </p><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>How a side-channel attack works </li><li>Why attackers are moving away from operating systems and towards network equipment </li><li>Why routers are an easy access point for attacks </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul><li>How do you distinguish an anomaly from an attack? </li><li>What are the differences between a side-channel attack and an authentication bypass? </li><li>What can regular users do to protect themselves from similar attacks? </li></ul><p> </p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/security/blog/2021/06/30/microsoft-finds-new-netgear-firmware-vulnerabilities-that-could-lead-to-identity-theft-and-full-system-compromise/%20">Jonathan Bar Or’s Blog Post</a></p><p><a href="https://www.linkedin.com/in/jonathan-bar-or-89876474/%20">Jonathan Bar Or’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p> </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Securing the Internet of Things</title>
			<itunes:title>Securing the Internet of Things</itunes:title>
			<pubDate>Wed, 14 Jul 2021 07:05:00 GMT</pubDate>
			<itunes:duration>36:26</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60ede725b5c326001372c6e5/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60ede725b5c326001372c6e5</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/36/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b87</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA7917K2aEp/X4UWQhHsqh4GbT]]></acast:settings>
			<itunes:subtitle>Arjmand Samuel</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>36</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>There used to be a time when our appliances didn’t talk back to us, but it seems like nowadays everything in our home is getting smarter. Smart watches, smart appliances, smart lights - smart everything! This connectivity to the internet is what we call the Internet of Things (IoT). It’s becoming increasingly common for our everyday items to be “smart,” and while that may provide a lot of benefits, like your fridge reminding you when you may need to get more milk, it also means that all of those devices become susceptible to cyber attacks.</p><p>On this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> talk to <a href="https://www.linkedin.com/in/arjmandsamuel/">Arjmand Samuel</a> about protecting IoT devices, especially with a zero trust approach. Listen in to learn not only about the importance of IoT security, but also what Microsoft is doing to protect against such attacks and how you can better secure these devices.  </p><p> </p><p><strong>In This Episode You Will Learn: </strong> </p><ul><li>What the techniques are to verify explicitly on IoT devices </li><li>How to apply the zero trust model in IoT </li><li>What Microsoft is doing to protect against attacks on IoT </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong></p><ul><li>What is the difference between IoT and IT? </li><li>Why is IoT security so important? </li><li>What are the best practices for protecting IoT? </li></ul><p> </p><p><strong>Resources:</strong> </p><p><a href="https://www.linkedin.com/in/arjmandsamuel/%20">Arjmand Samuel’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>There used to be a time when our appliances didn’t talk back to us, but it seems like nowadays everything in our home is getting smarter. Smart watches, smart appliances, smart lights - smart everything! This connectivity to the internet is what we call the Internet of Things (IoT). It’s becoming increasingly common for our everyday items to be “smart,” and while that may provide a lot of benefits, like your fridge reminding you when you may need to get more milk, it also means that all of those devices become susceptible to cyber attacks.</p><p>On this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> talk to <a href="https://www.linkedin.com/in/arjmandsamuel/">Arjmand Samuel</a> about protecting IoT devices, especially with a zero trust approach. Listen in to learn not only about the importance of IoT security, but also what Microsoft is doing to protect against such attacks and how you can better secure these devices.  </p><p> </p><p><strong>In This Episode You Will Learn: </strong> </p><ul><li>What the techniques are to verify explicitly on IoT devices </li><li>How to apply the zero trust model in IoT </li><li>What Microsoft is doing to protect against attacks on IoT </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong></p><ul><li>What is the difference between IoT and IT? </li><li>Why is IoT security so important? </li><li>What are the best practices for protecting IoT? </li></ul><p> </p><p><strong>Resources:</strong> </p><p><a href="https://www.linkedin.com/in/arjmandsamuel/%20">Arjmand Samuel’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Looking a Gift Card Horse in the Mouth</title>
			<itunes:title>Looking a Gift Card Horse in the Mouth</itunes:title>
			<pubDate>Wed, 07 Jul 2021 07:05:00 GMT</pubDate>
			<itunes:duration>31:00</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60e4821c344e3e0014bdf159/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60e4821c344e3e0014bdf159</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/35/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b88</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA791Y+h4lEvlgYt6STPJwN7qv]]></acast:settings>
			<itunes:subtitle>Emily Hacker</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>35</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Is it just me, or do you also miss the good ole days of fraudulent activity? You remember the kind I’m talking about, the emails from princes around the world asking for just a couple hundred dollars to help them unfreeze or retrieve their massive fortune which they would share with you. Attacks have grown more nuanced, complex, and invasive since then, but because of the unbelievable talent at Microsoft, we’re constantly getting better at defending against it.  </p><p>On this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill/%20%20">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/%20%20">Natalia Godyla</a> sit down with returning champion, <a href="https://www.linkedin.com/in/emilydhacker/%20">Emily Hacker</a>, to discuss Business Email Compromise (BEC), an attack that has perpetrators pretending to be someone from the victim’s place of work and instructs them to purchase gift cards and send them to the scammer. Maybe it’s good to look a gift card horse in the mouth?  </p><p> </p><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>Why BEC is such an effective and pervasive attack </li><li>What are the key things to look out for to protect yourself against one </li><li>Why BEC emails are difficult to track </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>How do the attackers mimic a true-to-form email from a colleague? </li><li>Why do we classify this type of email attack separately from others? </li><li>Why are they asking for gift cards rather than cash? </li></ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/emilydhacker/%20">Emily Hacker’s LinkedIn</a></p><p><a href="https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf%20">FBI’s 2020 Internet Crime Report</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p>  </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Is it just me, or do you also miss the good ole days of fraudulent activity? You remember the kind I’m talking about, the emails from princes around the world asking for just a couple hundred dollars to help them unfreeze or retrieve their massive fortune which they would share with you. Attacks have grown more nuanced, complex, and invasive since then, but because of the unbelievable talent at Microsoft, we’re constantly getting better at defending against it.  </p><p>On this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nicfill/%20%20">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/%20%20">Natalia Godyla</a> sit down with returning champion, <a href="https://www.linkedin.com/in/emilydhacker/%20">Emily Hacker</a>, to discuss Business Email Compromise (BEC), an attack that has perpetrators pretending to be someone from the victim’s place of work and instructs them to purchase gift cards and send them to the scammer. Maybe it’s good to look a gift card horse in the mouth?  </p><p> </p><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>Why BEC is such an effective and pervasive attack </li><li>What are the key things to look out for to protect yourself against one </li><li>Why BEC emails are difficult to track </li></ul><p> </p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>How do the attackers mimic a true-to-form email from a colleague? </li><li>Why do we classify this type of email attack separately from others? </li><li>Why are they asking for gift cards rather than cash? </li></ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/emilydhacker/%20">Emily Hacker’s LinkedIn</a></p><p><a href="https://www.ic3.gov/Media/PDF/AnnualReport/2020_IC3Report.pdf%20">FBI’s 2020 Internet Crime Report</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p>  </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Simulating the Enemy</title>
			<itunes:title>Simulating the Enemy</itunes:title>
			<pubDate>Wed, 30 Jun 2021 07:05:00 GMT</pubDate>
			<itunes:duration>34:57</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60db5e81f5a2bf001363d020/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60db5e81f5a2bf001363d020</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/34/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b89</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA7916t7aEaIVpk4gj/3ViLQPZ]]></acast:settings>
			<itunes:subtitle>Roberto Rodriguez</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>34</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>How does that old saying go? Keep your friends close and keep your understanding of a threat actor’s underlying behavior and functionality of tradecraft closer? As new tools are developed and implemented for individuals and businesses to protect themselves, wouldn’t it be great to see how they hold up against different attacks without actually having to wait for an attack to happen? Microsoft’s new open-source tool, Simuland, allows users to simulate attacks on their own infrastructure to see where their own weaknesses lie.  </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/%20%20">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/%20%20">Nic Fillingham</a> sit down with <a href="https://www.linkedin.com/in/roberto-rodriguez-96b86a58/%20">Roberto Rodriguez</a>, Principle Threat Researcher for the Microsoft Threat Intelligence Center (MSTIC) and Simuland’s developer, to understand how the project came to life, and what users can expect as they use it.  </p><br><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>How community involvement will help Simuland grow </li><li>How individuals can use Simuland to see examples of actions threat actors can take against their infrastructure </li><li>What other projects and libraries went into Simuland’s development </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>What exactly is being simulated in Simuland? </li><li>What do does Roberto hope for users to take away from Simuland? </li><li>What is next for the Simuland project? </li></ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/roberto-rodriguez-96b86a58/%20">Roberto Rodriguez’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/2021/05/20/simuland-understand-adversary-tradecraft-and-improve-detection-strategies/%20">Roberto’s blog post, SimuLand: Understand adversary tradecraft and improve detection strategies</a></p><p><a href="https://twitter.com/Cyb3rWard0g%20">Roberto’s Twitter: Cyb3rWard0g</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p>  </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>How does that old saying go? Keep your friends close and keep your understanding of a threat actor’s underlying behavior and functionality of tradecraft closer? As new tools are developed and implemented for individuals and businesses to protect themselves, wouldn’t it be great to see how they hold up against different attacks without actually having to wait for an attack to happen? Microsoft’s new open-source tool, Simuland, allows users to simulate attacks on their own infrastructure to see where their own weaknesses lie.  </p><p>In this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/%20%20">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/%20%20">Nic Fillingham</a> sit down with <a href="https://www.linkedin.com/in/roberto-rodriguez-96b86a58/%20">Roberto Rodriguez</a>, Principle Threat Researcher for the Microsoft Threat Intelligence Center (MSTIC) and Simuland’s developer, to understand how the project came to life, and what users can expect as they use it.  </p><br><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>How community involvement will help Simuland grow </li><li>How individuals can use Simuland to see examples of actions threat actors can take against their infrastructure </li><li>What other projects and libraries went into Simuland’s development </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>What exactly is being simulated in Simuland? </li><li>What do does Roberto hope for users to take away from Simuland? </li><li>What is next for the Simuland project? </li></ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/roberto-rodriguez-96b86a58/%20">Roberto Rodriguez’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/2021/05/20/simuland-understand-adversary-tradecraft-and-improve-detection-strategies/%20">Roberto’s blog post, SimuLand: Understand adversary tradecraft and improve detection strategies</a></p><p><a href="https://twitter.com/Cyb3rWard0g%20">Roberto’s Twitter: Cyb3rWard0g</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p>  </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Dial 'T' for Tech Support Fraud]]></title>
			<itunes:title><![CDATA[Dial 'T' for Tech Support Fraud]]></itunes:title>
			<pubDate>Wed, 23 Jun 2021 07:05:00 GMT</pubDate>
			<itunes:duration>37:21</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60d21f3ca7ff5f001ba7bd58/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60d21f3ca7ff5f001ba7bd58</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/33/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b8a</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA7927qUZfmXJk8Cx39erUwOtI]]></acast:settings>
			<itunes:subtitle>Anup Kumar</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>33</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>We’ve all had a family dinner, Netflix binge, or otherwise relaxing moment ruined by a telemarketer trying to sell you something you didn't need – a magazine subscription, insurance, you name it! But recently, people have been getting calls that are much more sinister in nature; people claiming to be employees of Microsoft, or Apple, or Amazon, have been calling unsuspecting victims and urging them to pay the caller in exchange for cleaning their computer of viruses. Viruses that don’t exist. None of these people work for the companies they claim to, but rather are a small cog in a larger machine working to defraud the public. </p><p>On this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> kick off a three-episode arc discussing tech support scams. To get started, they speak with <a href="https://www.linkedin.com/in/anupbk/">Anup B Kumar</a>, Microsoft’s Digital Crime Unit’s Asia lead of investigation and analytics, to get a better sense of who is behind these scams, what their motivations are, and some ideas on how to stop them.  </p><p> </p><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>Who these scammers target and why </li><li>How the scammers trick victims into trusting them.  </li><li>Why working with law enforcement is crucial to stopping the problem </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>Do the scammers know that they are scamming?  </li><li>How pervasive is this scam? </li><li>Can we stop the scam by helping to facilitate legitimate employment? </li></ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/anupbk/%20">Anup Kumar’s LinkedIn</a></p><p><a href="https://microsoft.com/reportascam">Microsoft Report a Scam</a></p><p><a href="https://www.microsoft.com">Microsoft Security Services</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p>  </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em>  </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>We’ve all had a family dinner, Netflix binge, or otherwise relaxing moment ruined by a telemarketer trying to sell you something you didn't need – a magazine subscription, insurance, you name it! But recently, people have been getting calls that are much more sinister in nature; people claiming to be employees of Microsoft, or Apple, or Amazon, have been calling unsuspecting victims and urging them to pay the caller in exchange for cleaning their computer of viruses. Viruses that don’t exist. None of these people work for the companies they claim to, but rather are a small cog in a larger machine working to defraud the public. </p><p>On this episode of Security Unlocked, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> kick off a three-episode arc discussing tech support scams. To get started, they speak with <a href="https://www.linkedin.com/in/anupbk/">Anup B Kumar</a>, Microsoft’s Digital Crime Unit’s Asia lead of investigation and analytics, to get a better sense of who is behind these scams, what their motivations are, and some ideas on how to stop them.  </p><p> </p><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>Who these scammers target and why </li><li>How the scammers trick victims into trusting them.  </li><li>Why working with law enforcement is crucial to stopping the problem </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>Do the scammers know that they are scamming?  </li><li>How pervasive is this scam? </li><li>Can we stop the scam by helping to facilitate legitimate employment? </li></ul><p> </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/anupbk/%20">Anup Kumar’s LinkedIn</a></p><p><a href="https://microsoft.com/reportascam">Microsoft Report a Scam</a></p><p><a href="https://www.microsoft.com">Microsoft Security Services</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p>  </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em>  </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>A Day in the Life of a Microsoft Principal Architect</title>
			<itunes:title>A Day in the Life of a Microsoft Principal Architect</itunes:title>
			<pubDate>Wed, 16 Jun 2021 07:05:00 GMT</pubDate>
			<itunes:duration>34:17</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60c95c93f09c7500190083ea/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60c95c93f09c7500190083ea</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/32/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b8b</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA7907YDHOFkgoBXoyfCct3k48]]></acast:settings>
			<itunes:subtitle>Hyrum Anderson</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>32</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>We’re formally sending out a petition to change the phrase “Jack of all trades” to “Hyrum of all trades” in honor of this episode’s guest, <a href="https://www.linkedin.com/in/hyrumanderson/">Hyrum Anderson</a>. In this episode, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> sit down with <a href="https://www.linkedin.com/in/hyrumanderson/">Hyrum Anderson</a> who, when he’s not fulfilling his duties as the Principal Architect of the Azure Trustworthy ML group, spends his time playing accordions, making cheese, and founding <a href="https://www.camlis.org/">impressive technology conferences.</a> He does it all!  </p><p>Rather than chatting with Hyrum about a specific capability that he’s helped to develop, or a blog post that he co-authored – because, believe us, the episode would last for hours – we decided to have a chat with him about his life, how he first got into the world of technology, and his thoughts on the current state of cyber security.  </p><br><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>The differences between a risk and a threat </li><li>Why it’s easier to attack than defend </li><li>What a Principal Architect of the Azure Trustworthy ML group does in his spare time </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>How does Hyrum think about adversarial machine learning and protecting A.I. systems? </li><li>What is it like for Hyrum to oversee both the red teaming and defensive side of operations? </li><li>Why are we better at finding holes in security than we are at making sure they don’t exist in the first place? </li></ul><p>  </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/hyrumanderson/%20">Hyrum Anderson’s LinkedIn</a></p><p><a href="https://twitter.com/drhyrum?s=20%20">Hyrum Anderson’s Twitter</a></p><p><a href="https://www.camlis.org/%20">Conference on Applied Machine Learning in Information Security (CAMLIS)</a></p><p><a href="http://mlsec.io/">Machine Learning Security Evasion Competition</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p>  </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>We’re formally sending out a petition to change the phrase “Jack of all trades” to “Hyrum of all trades” in honor of this episode’s guest, <a href="https://www.linkedin.com/in/hyrumanderson/">Hyrum Anderson</a>. In this episode, hosts <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> sit down with <a href="https://www.linkedin.com/in/hyrumanderson/">Hyrum Anderson</a> who, when he’s not fulfilling his duties as the Principal Architect of the Azure Trustworthy ML group, spends his time playing accordions, making cheese, and founding <a href="https://www.camlis.org/">impressive technology conferences.</a> He does it all!  </p><p>Rather than chatting with Hyrum about a specific capability that he’s helped to develop, or a blog post that he co-authored – because, believe us, the episode would last for hours – we decided to have a chat with him about his life, how he first got into the world of technology, and his thoughts on the current state of cyber security.  </p><br><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>The differences between a risk and a threat </li><li>Why it’s easier to attack than defend </li><li>What a Principal Architect of the Azure Trustworthy ML group does in his spare time </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>How does Hyrum think about adversarial machine learning and protecting A.I. systems? </li><li>What is it like for Hyrum to oversee both the red teaming and defensive side of operations? </li><li>Why are we better at finding holes in security than we are at making sure they don’t exist in the first place? </li></ul><p>  </p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/hyrumanderson/%20">Hyrum Anderson’s LinkedIn</a></p><p><a href="https://twitter.com/drhyrum?s=20%20">Hyrum Anderson’s Twitter</a></p><p><a href="https://www.camlis.org/%20">Conference on Applied Machine Learning in Information Security (CAMLIS)</a></p><p><a href="http://mlsec.io/">Machine Learning Security Evasion Competition</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p>  </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Red-teaming AI with CounterFit</title>
			<itunes:title>Red-teaming AI with CounterFit</itunes:title>
			<pubDate>Wed, 09 Jun 2021 07:05:00 GMT</pubDate>
			<itunes:duration>32:04</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60c0b4bb1884a8001a580bc5/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60c0b4bb1884a8001a580bc5</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/31/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b8c</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA791sDzeNC3jhxMRF0N7729hX]]></acast:settings>
			<itunes:subtitle>Will Pearce</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>31</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>It’s an all out offensive on today’s episode while we talk about how the best defense is a good offense. But before we plan our attack, we need to know our vulnerabilities, and that’s where our guest comes in.  </p><p>On this episode, hosts <a href="https://www.linkedin.com/in/nicfill/%20%20">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/%20%20">Natalia Godyla</a> are joined by <a href="https://www.linkedin.com/in/will-pearce-a62331135/%20%20">Will Pearce</a>, who discusses his role as AI Red Team Lead from the Azure Trustworthy ML Group and how he works to find weaknesses in security infrastructure to better develop ways to prevent against attacks.  </p><br><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>The three main functions of counterfeit  </li><li>Why the best defense is a good offense </li><li>Why Will and his team aren’t worried about showing their hand by releasing this software as open source  </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>What previously developed infrastructure was the counterfeit tool built upon? </li><li>How AI red teaming differs from traditional specops red teaming </li><li>How did the counterfeit project evolve from conception to release? </li></ul><p><br></p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/will-pearce-a62331135/%20%20">Will Pearce’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/2021/05/03/ai-security-risk-assessment-using-counterfit/%20%20">AI security risk assessment using Counterfit </a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p>  </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>It’s an all out offensive on today’s episode while we talk about how the best defense is a good offense. But before we plan our attack, we need to know our vulnerabilities, and that’s where our guest comes in.  </p><p>On this episode, hosts <a href="https://www.linkedin.com/in/nicfill/%20%20">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/%20%20">Natalia Godyla</a> are joined by <a href="https://www.linkedin.com/in/will-pearce-a62331135/%20%20">Will Pearce</a>, who discusses his role as AI Red Team Lead from the Azure Trustworthy ML Group and how he works to find weaknesses in security infrastructure to better develop ways to prevent against attacks.  </p><br><p><strong>In This Episode You Will Learn:</strong>  </p><ul><li>The three main functions of counterfeit  </li><li>Why the best defense is a good offense </li><li>Why Will and his team aren’t worried about showing their hand by releasing this software as open source  </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>What previously developed infrastructure was the counterfeit tool built upon? </li><li>How AI red teaming differs from traditional specops red teaming </li><li>How did the counterfeit project evolve from conception to release? </li></ul><p><br></p><p><strong>Resources:</strong>  </p><p><a href="https://www.linkedin.com/in/will-pearce-a62331135/%20%20">Will Pearce’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/2021/05/03/ai-security-risk-assessment-using-counterfit/%20%20">AI security risk assessment using Counterfit </a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p>  </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Pearls of Wisdom in the Security Signals Report</title>
			<itunes:title>Pearls of Wisdom in the Security Signals Report</itunes:title>
			<pubDate>Wed, 02 Jun 2021 07:05:00 GMT</pubDate>
			<itunes:duration>30:21</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60b6a55957e99c00199ca36e/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60b6a55957e99c00199ca36e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/30/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b8d</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA7925KMlNoyb4o8nHxWCwxQO3]]></acast:settings>
			<itunes:subtitle>Nazmus Sakib</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>30</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>It’s our 30th episode! And in keeping with the traditional anniversary gift guide, the 30th anniversary means a gift of pearls. So from us to you, dear listener, we’ve got an episode with some <em>pearls </em>of wisdom!  </p><p>On today’s episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> bring back returning champion, <a href="https://www.linkedin.com/in/nazmus-sakib-5aa8a6123/">Nazmus Sakib</a>, to take us through the new <a href="https://www.microsoft.com/security/blog/2021/03/30/new-security-signals-study-shows-firmware-attacks-on-the-rise-heres-how-microsoft-is-working-to-help-eliminate-this-entire-class-of-threats/">Security Signals Report</a>. Sakib walks us through why the report was done and then helps us understand the findings and what they mean for security.  </p><br><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>How pervasive firmware is in our everyday lives </li><li>Why many people were vulnerable to firmware attacks </li><li>How companies are spending the money they allocate towards digital protection </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul><li>What was the hypothesis going into the Security Signals Report? </li><li>How do we protect ourselves from vulnerabilities that don’t exist yet? </li><li>Were any of the findings from the report unexpected? </li></ul><p><br></p><p><strong>Resources </strong></p><p><a href="https://www.linkedin.com/in/nazmus-sakib-5aa8a6123/%20%5C">Nazmus Sakib’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/2021/03/30/new-security-signals-study-shows-firmware-attacks-on-the-rise-heres-how-microsoft-is-working-to-help-eliminate-this-entire-class-of-threats/%20">Security Signals Report</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>It’s our 30th episode! And in keeping with the traditional anniversary gift guide, the 30th anniversary means a gift of pearls. So from us to you, dear listener, we’ve got an episode with some <em>pearls </em>of wisdom!  </p><p>On today’s episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> bring back returning champion, <a href="https://www.linkedin.com/in/nazmus-sakib-5aa8a6123/">Nazmus Sakib</a>, to take us through the new <a href="https://www.microsoft.com/security/blog/2021/03/30/new-security-signals-study-shows-firmware-attacks-on-the-rise-heres-how-microsoft-is-working-to-help-eliminate-this-entire-class-of-threats/">Security Signals Report</a>. Sakib walks us through why the report was done and then helps us understand the findings and what they mean for security.  </p><br><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>How pervasive firmware is in our everyday lives </li><li>Why many people were vulnerable to firmware attacks </li><li>How companies are spending the money they allocate towards digital protection </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul><li>What was the hypothesis going into the Security Signals Report? </li><li>How do we protect ourselves from vulnerabilities that don’t exist yet? </li><li>Were any of the findings from the report unexpected? </li></ul><p><br></p><p><strong>Resources </strong></p><p><a href="https://www.linkedin.com/in/nazmus-sakib-5aa8a6123/%20%5C">Nazmus Sakib’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/2021/03/30/new-security-signals-study-shows-firmware-attacks-on-the-rise-heres-how-microsoft-is-working-to-help-eliminate-this-entire-class-of-threats/%20">Security Signals Report</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Securing Hybrid Work: Venki Krishnababu, lululemon</title>
			<itunes:title>Securing Hybrid Work: Venki Krishnababu, lululemon</itunes:title>
			<pubDate>Wed, 26 May 2021 07:05:00 GMT</pubDate>
			<itunes:duration>32:10</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60ad35668b0ea1001a7a9765/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60ad35668b0ea1001a7a9765</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/29/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b8e</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790ja7yrQfE8/XPwgy6I68VB]]></acast:settings>
			<itunes:subtitle>Venki Krishnababu</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>29</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>On this week’s Security Unlocked we’re featuring for the second and final time, a special crossover episode of our sister-podcast, Security Unlocked: CISO Series with <a href="https://www.linkedin.com/in/bret-arsenault-97593b60/%20">Bret Arsenault.</a>  </p><p>Lululemon has been on the forefront of athleisure wear since its founding in 1998, but while many of its customers look at it exclusively as a fashion brand,  at a deeper level this fashion empire is bolstered by a well thought out and maintained digital infrastructure that relies on a hard working team to run it.  </p><p>On today’s episode, Microsoft CISO <a href="https://www.linkedin.com/in/bret-arsenault-97593b60/%20">Bret Arsenault</a> sits down with <a href="https://www.linkedin.com/in/vkrishnababu/%20">Venki Krishnababu</a>, SVP of Global Technology Services at Lululemon. They discuss the ways in which technology plays into the brand, how Venki lead a seamless transition into the remote work caused by the pandemic, and how he’s using the experiences of the past year to influence future growth in the company. </p><br><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>Why Venki feels so passionately about leading with empathy </li><li>Why Venki saw moving to remote work as only the tip of the iceberg; and how he handled what laid below. </li><li>Specific tools and practices that have lead to Venki’s success </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul><li>What is the biggest lesson learned during the pandemic? </li><li>How does one facilitate effective management during this time? </li><li>How does Lululemon view the future of in-person versus remote work? </li></ul><p><br></p><p><strong>Resources:</strong> </p><p><a href="https://www.linkedin.com/in/vkrishnababu/%20">Venki Krishnababu’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/bret-arsenault-97593b60/%20">Brett Arsenault’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p> </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>On this week’s Security Unlocked we’re featuring for the second and final time, a special crossover episode of our sister-podcast, Security Unlocked: CISO Series with <a href="https://www.linkedin.com/in/bret-arsenault-97593b60/%20">Bret Arsenault.</a>  </p><p>Lululemon has been on the forefront of athleisure wear since its founding in 1998, but while many of its customers look at it exclusively as a fashion brand,  at a deeper level this fashion empire is bolstered by a well thought out and maintained digital infrastructure that relies on a hard working team to run it.  </p><p>On today’s episode, Microsoft CISO <a href="https://www.linkedin.com/in/bret-arsenault-97593b60/%20">Bret Arsenault</a> sits down with <a href="https://www.linkedin.com/in/vkrishnababu/%20">Venki Krishnababu</a>, SVP of Global Technology Services at Lululemon. They discuss the ways in which technology plays into the brand, how Venki lead a seamless transition into the remote work caused by the pandemic, and how he’s using the experiences of the past year to influence future growth in the company. </p><br><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>Why Venki feels so passionately about leading with empathy </li><li>Why Venki saw moving to remote work as only the tip of the iceberg; and how he handled what laid below. </li><li>Specific tools and practices that have lead to Venki’s success </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul><li>What is the biggest lesson learned during the pandemic? </li><li>How does one facilitate effective management during this time? </li><li>How does Lululemon view the future of in-person versus remote work? </li></ul><p><br></p><p><strong>Resources:</strong> </p><p><a href="https://www.linkedin.com/in/vkrishnababu/%20">Venki Krishnababu’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/bret-arsenault-97593b60/%20">Brett Arsenault’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p> </p><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Contact Us; Phish You!</title>
			<itunes:title>Contact Us; Phish You!</itunes:title>
			<pubDate>Wed, 19 May 2021 07:05:00 GMT</pubDate>
			<itunes:duration>30:22</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60a4855c75de930019caf52d/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60a4855c75de930019caf52d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/28/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b8f</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790rfAonhUjX+3x4YxjZTks2]]></acast:settings>
			<itunes:subtitle>Emily Hacker</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>28</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Threat actors are pesky and, once again, they’re up to no good. A new methodology has schemers compromising online forms where users submit their information like their names, email addresses, and, depending on the type of site, some queries relating to their life. This new method indicates that the attackers have figured out a way around the CAPTCHA’s that have been making us all prove we’re not robots by identifying fire hydrants since 1997. And what’s more, we’re not quite sure how they’ve done it.  </p><p>In this episode, hosts Natalia Godyla and Nic Fillingham sit down with Microsoft threat analyst, Emily Hacker, to discuss what’s going on behind the scenes as Microsoft begins to dig into this new threat and sort through how best to stop it.  </p><p> </p><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>Why this attack seems to be more effective against specific professionals. </li><li>Why this new method of attack has a high rate of success. </li><li>How to better prepare yourself for this method of attack </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul><li>What is the endgame for these attacks?  </li><li>What are we doing to protect against IceID in these attacks? </li><li>Are we in need of a more advanced replacement for CAPTCHA? </li></ul><p><br></p><p><strong>Resources:</strong> </p><p><a href="https://www.linkedin.com/in/emilydhacker/%20">Emily Hacker</a></p><p><a href="https://www.microsoft.com/security/blog/2021/04/09/investigating-a-unique-form-of-email-delivery-for-icedid-malware/%20">Investigating a Unique ‘Form’ of Email Delivery for IcedID Malware</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Threat actors are pesky and, once again, they’re up to no good. A new methodology has schemers compromising online forms where users submit their information like their names, email addresses, and, depending on the type of site, some queries relating to their life. This new method indicates that the attackers have figured out a way around the CAPTCHA’s that have been making us all prove we’re not robots by identifying fire hydrants since 1997. And what’s more, we’re not quite sure how they’ve done it.  </p><p>In this episode, hosts Natalia Godyla and Nic Fillingham sit down with Microsoft threat analyst, Emily Hacker, to discuss what’s going on behind the scenes as Microsoft begins to dig into this new threat and sort through how best to stop it.  </p><p> </p><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>Why this attack seems to be more effective against specific professionals. </li><li>Why this new method of attack has a high rate of success. </li><li>How to better prepare yourself for this method of attack </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul><li>What is the endgame for these attacks?  </li><li>What are we doing to protect against IceID in these attacks? </li><li>Are we in need of a more advanced replacement for CAPTCHA? </li></ul><p><br></p><p><strong>Resources:</strong> </p><p><a href="https://www.linkedin.com/in/emilydhacker/%20">Emily Hacker</a></p><p><a href="https://www.microsoft.com/security/blog/2021/04/09/investigating-a-unique-form-of-email-delivery-for-icedid-malware/%20">Investigating a Unique ‘Form’ of Email Delivery for IcedID Malware</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Securing the Cloud with Mark Russinovich</title>
			<itunes:title>Securing the Cloud with Mark Russinovich</itunes:title>
			<pubDate>Wed, 12 May 2021 07:05:00 GMT</pubDate>
			<itunes:duration>29:32</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/609b3ef4842d91402c3e89f1/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">609b3ef4842d91402c3e89f1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/27/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b90</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA793FEkkaE+Rh63rsQHH6p6EZ]]></acast:settings>
			<itunes:subtitle>Mark Russinovich</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>27</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>On this week’s Security Unlocked, we’re pulling a bait and switch! Instead of our regularly scheduled programming, we’re going to be featuring the first episode of our new podcast, Security Unlocked: CISO Series with Bret Arsenault. Each episode is going to feature Microsoft’s CISO Bret Arsenault sitting down with other top techies in Microsoft and other companies in the industry.  </p><p>In its inaugural episode – which we’re featuring on this episode – Bret sits down with Mark Russinovich, Chief Technology Officer of Microsoft’s Azure. Mark has a unique perspective on cloud technologies and offers insight into the changes that have occurred over the past few years due to advancing technology and the unique challenges brought about during the coronavirus pandemic. Enjoy this first episode of the new series and remember to subscribe so you catch all the rest that are yet to come.  </p><br><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>The initialism FFUUEE and why it’s important in understanding people’s resistance to adopting newer security capabilities </li><li>Mark Russinovich’s three points of advice for those looking to become more secure </li><li>Theories on improving MFA adoption across the board </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong></p><ul><li>How do we think of cloud security now versus ten years ago? </li><li>What does a leading engineer think of moving toward a hybrid workforce? </li><li>How do you find and screen potential new team members in a remote world? </li></ul><p><br></p><p><strong>Resources </strong></p><p><a href="https://securityunlockedcisoseries.com/">CISO Series with Bret Arsenault</a></p><p><a href="https://www.linkedin.com/in/bret-arsenault-97593b60/%20">Brett Arsenault’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/markrussinovich/%20">Mark Russinovich’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>On this week’s Security Unlocked, we’re pulling a bait and switch! Instead of our regularly scheduled programming, we’re going to be featuring the first episode of our new podcast, Security Unlocked: CISO Series with Bret Arsenault. Each episode is going to feature Microsoft’s CISO Bret Arsenault sitting down with other top techies in Microsoft and other companies in the industry.  </p><p>In its inaugural episode – which we’re featuring on this episode – Bret sits down with Mark Russinovich, Chief Technology Officer of Microsoft’s Azure. Mark has a unique perspective on cloud technologies and offers insight into the changes that have occurred over the past few years due to advancing technology and the unique challenges brought about during the coronavirus pandemic. Enjoy this first episode of the new series and remember to subscribe so you catch all the rest that are yet to come.  </p><br><p><strong>In This Episode You Will Learn:</strong> </p><ul><li>The initialism FFUUEE and why it’s important in understanding people’s resistance to adopting newer security capabilities </li><li>Mark Russinovich’s three points of advice for those looking to become more secure </li><li>Theories on improving MFA adoption across the board </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong></p><ul><li>How do we think of cloud security now versus ten years ago? </li><li>What does a leading engineer think of moving toward a hybrid workforce? </li><li>How do you find and screen potential new team members in a remote world? </li></ul><p><br></p><p><strong>Resources </strong></p><p><a href="https://securityunlockedcisoseries.com/">CISO Series with Bret Arsenault</a></p><p><a href="https://www.linkedin.com/in/bret-arsenault-97593b60/%20">Brett Arsenault’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/markrussinovich/%20">Mark Russinovich’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Ready or Not, Here A.I. Come!</title>
			<itunes:title>Ready or Not, Here A.I. Come!</itunes:title>
			<pubDate>Wed, 05 May 2021 07:05:00 GMT</pubDate>
			<itunes:duration>35:21</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/6091b9c569ee58325ebbe346/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">6091b9c569ee58325ebbe346</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/26/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b91</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790U/d5lEuyvMTfAHzbkFbnG]]></acast:settings>
			<itunes:subtitle><![CDATA[Christian Seifert & Joshua Neil]]></itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>26</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Remember the good ole days when we spent youthful hours playing hide and seek with our friends in the park? Well it turns out that game of hide and seek isn’t just for humans anymore. Researchers have begun putting A.I. to the test by having it play this favorite childhood game over and over and having the software optimize its strategies through automated reinforcement training.  </p><p>In today’s episode, hosts <a href="https://www.linkedin.com/in/nicfill/%20">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/%20">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/christian-seifert-phd-6080b51/%20">Christian Seifert</a> and <a href="https://www.linkedin.com/in/josh-neil/%20">Joshua Neil</a> about their blog post <a href="https://www.microsoft.com/security/blog/2021/04/08/gamifying-machine-learning-for-stronger-security-and-ai-models/%22%20/"><em>Gamifying machine learning for stronger security and AI models</em></a><em>, </em>and how Microsoft is releasing this new open-sourced code to help it learn and grow.  </p><br><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>What is Microsoft’s CyberBattleSim? </li><li>What reinforcement learning is and how it is used in training A.I. </li><li>How the OpenAI Gym allowed for AI to be trained and rewarded for learning  </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><ul><li>Is an A.I. threat actor science fiction or an incoming reality? </li><li>What are the next steps in training the A.I.? </li><li>Who was the CyberBattleSim created for? </li></ul><p><br></p><p><strong>Resources:</strong></p><p><a href="https://youtu.be/Lu56xVlZ40M%22%20/">OpenAI Plays Hide and Seek…and Breaks The Game! 🤖</a> </p><p><a href="https://www.microsoft.com/security/blog/2021/04/08/gamifying-machine-learning-for-stronger-security-and-ai-models/">Gamifying Machine Learning for Stronger Security and AI Models </a></p><p>Christian Seifert’s <a href="https://www.linkedin.com/in/christian-seifert-phd-6080b51/">LinkedIn</a></p><p>Joshua Neil’s <a href="https://www.linkedin.com/in/josh-neil/">LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Remember the good ole days when we spent youthful hours playing hide and seek with our friends in the park? Well it turns out that game of hide and seek isn’t just for humans anymore. Researchers have begun putting A.I. to the test by having it play this favorite childhood game over and over and having the software optimize its strategies through automated reinforcement training.  </p><p>In today’s episode, hosts <a href="https://www.linkedin.com/in/nicfill/%20">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/%20">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/christian-seifert-phd-6080b51/%20">Christian Seifert</a> and <a href="https://www.linkedin.com/in/josh-neil/%20">Joshua Neil</a> about their blog post <a href="https://www.microsoft.com/security/blog/2021/04/08/gamifying-machine-learning-for-stronger-security-and-ai-models/%22%20/"><em>Gamifying machine learning for stronger security and AI models</em></a><em>, </em>and how Microsoft is releasing this new open-sourced code to help it learn and grow.  </p><br><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>What is Microsoft’s CyberBattleSim? </li><li>What reinforcement learning is and how it is used in training A.I. </li><li>How the OpenAI Gym allowed for AI to be trained and rewarded for learning  </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><ul><li>Is an A.I. threat actor science fiction or an incoming reality? </li><li>What are the next steps in training the A.I.? </li><li>Who was the CyberBattleSim created for? </li></ul><p><br></p><p><strong>Resources:</strong></p><p><a href="https://youtu.be/Lu56xVlZ40M%22%20/">OpenAI Plays Hide and Seek…and Breaks The Game! 🤖</a> </p><p><a href="https://www.microsoft.com/security/blog/2021/04/08/gamifying-machine-learning-for-stronger-security-and-ai-models/">Gamifying Machine Learning for Stronger Security and AI Models </a></p><p>Christian Seifert’s <a href="https://www.linkedin.com/in/christian-seifert-phd-6080b51/">LinkedIn</a></p><p>Joshua Neil’s <a href="https://www.linkedin.com/in/josh-neil/">LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Knowing Your Enemy: Anticipating Attackers’ Next Moves</title>
			<itunes:title>Knowing Your Enemy: Anticipating Attackers’ Next Moves</itunes:title>
			<pubDate>Wed, 28 Apr 2021 07:05:00 GMT</pubDate>
			<itunes:duration>39:54</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/6088cab4701a181d53b0db77/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">6088cab4701a181d53b0db77</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/25/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b92</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA792pGqUfa1oUILj6y/rNOEy/]]></acast:settings>
			<itunes:subtitle>Cole Sodja, Melissa Turcotte, and Justin Carroll</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>25</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Anyone who’s ever watched boxing knows that great reflexes can be the difference between a championship belt and a black eye. The flexing of an opponent’s shoulder, the pivot of their hip - a good boxer will know enough not only to predict and avoid the incoming upper-cut, but will know how to turn the attack back on their opponent.  Microsoft’s newest capabilities in Defender puts cyber attackers in the ring and predicts their next attacks as the fight is happening.</p><p>On today’s episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/cole-sodja-a255361b/">Cole Sodja</a>, <a href="https://www.linkedin.com/in/mturcotte/">Melissa Turcotte</a>, and <a href="https://www.linkedin.com/in/justin-carroll-20616574/">Justin Carroll</a> (and maybe even a secret, fourth guest!) about <a href="https://www.microsoft.com/security/blog/2021/04/01/automating-threat-actor-tracking-understanding-attacker-behavior-for-intelligence-and-contextual-alerting/">their blog post</a> on Microsoft’s Security blog about the new capabilities of using an A.I. to see the attacker’s next move. </p><br><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>What kind of data is needed for this level of threat detection and prevention? </li><li>The crucial nature of probabilistic graphical modeling in this process </li><li>The synergistic relationship between the automated capabilities and the human analyst </li></ul><p> </p><p><strong>Some Questions We Ask:</strong></p><ul><li>What kind of modeling is used and why? </li><li>What does the feedback loop between program and analyst look like? </li><li>What are the steps taken to identify these attacks? </li></ul><p>  </p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/security/blog/2021/04/01/automating-threat-actor-tracking-understanding-attacker-behavior-for-intelligence-and-contextual-alerting/%20">Justin, Melissa’s, and Cole’s blog post</a></p><p><a href="https://www.linkedin.com/in/justin-carroll-20616574/%20">Justin Carroll’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/mturcotte/%20">Melissa Turcotte’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/cole-sodja-a255361b/%20">Cole Sodja’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/josh-neil/%20">Joshua Neil’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Anyone who’s ever watched boxing knows that great reflexes can be the difference between a championship belt and a black eye. The flexing of an opponent’s shoulder, the pivot of their hip - a good boxer will know enough not only to predict and avoid the incoming upper-cut, but will know how to turn the attack back on their opponent.  Microsoft’s newest capabilities in Defender puts cyber attackers in the ring and predicts their next attacks as the fight is happening.</p><p>On today’s episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/cole-sodja-a255361b/">Cole Sodja</a>, <a href="https://www.linkedin.com/in/mturcotte/">Melissa Turcotte</a>, and <a href="https://www.linkedin.com/in/justin-carroll-20616574/">Justin Carroll</a> (and maybe even a secret, fourth guest!) about <a href="https://www.microsoft.com/security/blog/2021/04/01/automating-threat-actor-tracking-understanding-attacker-behavior-for-intelligence-and-contextual-alerting/">their blog post</a> on Microsoft’s Security blog about the new capabilities of using an A.I. to see the attacker’s next move. </p><br><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>What kind of data is needed for this level of threat detection and prevention? </li><li>The crucial nature of probabilistic graphical modeling in this process </li><li>The synergistic relationship between the automated capabilities and the human analyst </li></ul><p> </p><p><strong>Some Questions We Ask:</strong></p><ul><li>What kind of modeling is used and why? </li><li>What does the feedback loop between program and analyst look like? </li><li>What are the steps taken to identify these attacks? </li></ul><p>  </p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/security/blog/2021/04/01/automating-threat-actor-tracking-understanding-attacker-behavior-for-intelligence-and-contextual-alerting/%20">Justin, Melissa’s, and Cole’s blog post</a></p><p><a href="https://www.linkedin.com/in/justin-carroll-20616574/%20">Justin Carroll’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/mturcotte/%20">Melissa Turcotte’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/cole-sodja-a255361b/%20">Cole Sodja’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/josh-neil/%20">Joshua Neil’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Below the OS: UEFI Scanning in Defender</title>
			<itunes:title>Below the OS: UEFI Scanning in Defender</itunes:title>
			<pubDate>Wed, 21 Apr 2021 07:05:00 GMT</pubDate>
			<itunes:duration>33:59</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/607f934a9849c5791bfc605a/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">607f934a9849c5791bfc605a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/24/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b93</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA793U/20otqSQNCKaoZOa252h]]></acast:settings>
			<itunes:subtitle>Shweta Jha and Gowtham Reddy</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>24</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>All of us have seen – or at least, are familiar with – the antics of Tom and Jerry or Road Runner and Wile E. Coyote. In each one the coyote or the cat set up these elaborate plans to sabotage their foe, but time and time again, the nimble mouse and the speedy bird are able to outsmart their attackers.</p><p>In our third episode discussing Ensuring Firmware Security, hosts <a href="https://www.linkedin.com/in/nicfill/%20">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/%20">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/jhashweta/">Shweta Jha</a> and <a href="https://www.linkedin.com/in/gowtham-animi/">Gowtham Reddy</a> about developing the tools that allow for them to stay one step ahead of cybercriminals in the cat &amp; mouse game that is cyber security.  </p><p>  </p><p><strong>In this Episode You Will Learn:</strong> </p><ul><li>The new capabilities within Microsoft Defender to scan the Unified Extensible Firmware Interface (UEFI)</li><li>How the LoJax attack compromised UEFI firmware</li><li>How UEFI scanning emerged as a capability  </li></ul><p><br></p><p><strong>Some Questions that We Ask:</strong> </p><ul><li>Has UEFI scanning always been possible? </li><li>What types of signals is UEFI scanning searching for? </li><li>What are the ways bad actors may adjust to avoid UEFI scanning? </li></ul><p><br></p><p><strong>Resources:  </strong></p><p><a href="https://www.linkedin.com/in/jhashweta/%20">Shweta Jha’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/gowtham-animi/%20">Gowtham Reddy’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/2020/06/17/uefi-scanner-brings-microsoft-defender-atp-protection-to-a-new-level/%20">Defender Blog Post</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>All of us have seen – or at least, are familiar with – the antics of Tom and Jerry or Road Runner and Wile E. Coyote. In each one the coyote or the cat set up these elaborate plans to sabotage their foe, but time and time again, the nimble mouse and the speedy bird are able to outsmart their attackers.</p><p>In our third episode discussing Ensuring Firmware Security, hosts <a href="https://www.linkedin.com/in/nicfill/%20">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/%20">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/jhashweta/">Shweta Jha</a> and <a href="https://www.linkedin.com/in/gowtham-animi/">Gowtham Reddy</a> about developing the tools that allow for them to stay one step ahead of cybercriminals in the cat &amp; mouse game that is cyber security.  </p><p>  </p><p><strong>In this Episode You Will Learn:</strong> </p><ul><li>The new capabilities within Microsoft Defender to scan the Unified Extensible Firmware Interface (UEFI)</li><li>How the LoJax attack compromised UEFI firmware</li><li>How UEFI scanning emerged as a capability  </li></ul><p><br></p><p><strong>Some Questions that We Ask:</strong> </p><ul><li>Has UEFI scanning always been possible? </li><li>What types of signals is UEFI scanning searching for? </li><li>What are the ways bad actors may adjust to avoid UEFI scanning? </li></ul><p><br></p><p><strong>Resources:  </strong></p><p><a href="https://www.linkedin.com/in/jhashweta/%20">Shweta Jha’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/gowtham-animi/%20">Gowtham Reddy’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/2020/06/17/uefi-scanner-brings-microsoft-defender-atp-protection-to-a-new-level/%20">Defender Blog Post</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Inside Insider Risk</title>
			<itunes:title>Inside Insider Risk</itunes:title>
			<pubDate>Wed, 14 Apr 2021 07:05:00 GMT</pubDate>
			<itunes:duration>38:45</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60760a8cb2464536a28e9d9f/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60760a8cb2464536a28e9d9f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/23/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b94</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA7921Ws7ECZQNCjPUufy1cKym]]></acast:settings>
			<itunes:subtitle>Rob McCann</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>23</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Throughout the course of this podcast series, we’ve had an abundance of great conversations with our colleagues at Microsoft about how they’re working to better protect companies and individuals from cyber-attacks, but today we take a look at a different source of malfeasance: the insider threat. Now that most people are working remotely and have access to their company’s data in the privacy of their own home, it’s easier than ever to access, download, and share private information.</p><p>On today’s episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> sit down with Microsoft Applied Researcher, <a href="https://www.linkedin.com/in/robert-mccann-004b407/">Rob McCann</a> to talk about his work in identifying potential insider risk factors and the tools that Microsoft’s Internal Security Team are developing to stop them at the source. </p><br><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>The differences between internal and external threats in cybersecurity </li><li>Ways that A.I. can factor into anomaly detection in insider risk management </li><li>Why the rise in insider attacks is helping make it easier to address the issue</li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><ul><li>How do you identify insider risk? </li><li>How do you create a tool for customers that requires an extreme amount of case-by-case customization? </li><li>How are other organizations prioritizing internal versus external risks?</li></ul><p><br></p><p><strong>Resources:</strong></p><p><a href="https://www.linkedin.com/in/robert-mccann-004b407/">Rob McCann’s Linkedin</a></p><p>Rob McCann on <a href="https://www.audacy.com/podcasts/uncovering-hidden-risks-45444">Uncovering Hidden Risk</a></p><p><a href="https://techcommunity.microsoft.com/t5/security-compliance-identity/don-t-get-caught-off-guard-by-the-hidden-dangers-of-insider/ba-p/2157957%20">Insider Risk Blog Post</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Throughout the course of this podcast series, we’ve had an abundance of great conversations with our colleagues at Microsoft about how they’re working to better protect companies and individuals from cyber-attacks, but today we take a look at a different source of malfeasance: the insider threat. Now that most people are working remotely and have access to their company’s data in the privacy of their own home, it’s easier than ever to access, download, and share private information.</p><p>On today’s episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> sit down with Microsoft Applied Researcher, <a href="https://www.linkedin.com/in/robert-mccann-004b407/">Rob McCann</a> to talk about his work in identifying potential insider risk factors and the tools that Microsoft’s Internal Security Team are developing to stop them at the source. </p><br><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>The differences between internal and external threats in cybersecurity </li><li>Ways that A.I. can factor into anomaly detection in insider risk management </li><li>Why the rise in insider attacks is helping make it easier to address the issue</li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><ul><li>How do you identify insider risk? </li><li>How do you create a tool for customers that requires an extreme amount of case-by-case customization? </li><li>How are other organizations prioritizing internal versus external risks?</li></ul><p><br></p><p><strong>Resources:</strong></p><p><a href="https://www.linkedin.com/in/robert-mccann-004b407/">Rob McCann’s Linkedin</a></p><p>Rob McCann on <a href="https://www.audacy.com/podcasts/uncovering-hidden-risks-45444">Uncovering Hidden Risk</a></p><p><a href="https://techcommunity.microsoft.com/t5/security-compliance-identity/don-t-get-caught-off-guard-by-the-hidden-dangers-of-insider/ba-p/2157957%20">Insider Risk Blog Post</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Language of Cybercrime</title>
			<itunes:title>The Language of Cybercrime</itunes:title>
			<pubDate>Wed, 07 Apr 2021 07:05:00 GMT</pubDate>
			<itunes:duration>39:07</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/606d163f02e5a97864fc9e39/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">606d163f02e5a97864fc9e39</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/22/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b95</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA7924OMwLAHKZjPY9lR/qMoK9]]></acast:settings>
			<itunes:subtitle>Peter Anaman</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>22</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>How many languages do you speak? The average person only speaks one or two languages, and for most people that’s plenty because even as communities are becoming more global, languages are still very much tied to geographic boundaries. But what happens when you go on the internet where those regions don’t exist the same way they do in real life? Because the internet connects people from every corner of the world, cybercriminals can perpetrate scams in countries thousands of miles away. So how do organizations like Microsoft’s Digital Crime Unit combat cybercrime when they don’t even speak the language of the perpetrators?  </p><p>On today’s episode of <em>Security Unlocked</em>, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla </a>sit down with <a href="https://www.linkedin.com/in/anamanp/%20">Peter Anaman</a>, Principal Investigator on the Digital Crimes Unit, to discuss how Peter looks at digital crimes in a very interconnected world and how language and culture play into the crimes being committed, who’s behind them, and how to stop them.  </p><br><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>Some of the tools the Digital Crime Unit at Microsoft uses to catch criminals.  </li><li>How language and cultural factors into cyber crime </li><li>Why cyber crime has been on the rise since Covid began </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><ul><li>How has understanding a specific culture helped crack a case? </li><li>How does a lawyer who served as an officer in the French Army wind up working at Microsoft? </li><li>Are there best practices for content creators to stay safe from cyber crime? </li></ul><p><br></p><p><strong>Resources</strong></p><p><a href="https://www.linkedin.com/in/anamanp/%20">Peter Anaman’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>How many languages do you speak? The average person only speaks one or two languages, and for most people that’s plenty because even as communities are becoming more global, languages are still very much tied to geographic boundaries. But what happens when you go on the internet where those regions don’t exist the same way they do in real life? Because the internet connects people from every corner of the world, cybercriminals can perpetrate scams in countries thousands of miles away. So how do organizations like Microsoft’s Digital Crime Unit combat cybercrime when they don’t even speak the language of the perpetrators?  </p><p>On today’s episode of <em>Security Unlocked</em>, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla </a>sit down with <a href="https://www.linkedin.com/in/anamanp/%20">Peter Anaman</a>, Principal Investigator on the Digital Crimes Unit, to discuss how Peter looks at digital crimes in a very interconnected world and how language and culture play into the crimes being committed, who’s behind them, and how to stop them.  </p><br><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>Some of the tools the Digital Crime Unit at Microsoft uses to catch criminals.  </li><li>How language and cultural factors into cyber crime </li><li>Why cyber crime has been on the rise since Covid began </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><ul><li>How has understanding a specific culture helped crack a case? </li><li>How does a lawyer who served as an officer in the French Army wind up working at Microsoft? </li><li>Are there best practices for content creators to stay safe from cyber crime? </li></ul><p><br></p><p><strong>Resources</strong></p><p><a href="https://www.linkedin.com/in/anamanp/%20">Peter Anaman’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Human Element with Valecia Maclin</title>
			<itunes:title>The Human Element with Valecia Maclin</itunes:title>
			<pubDate>Wed, 31 Mar 2021 07:05:00 GMT</pubDate>
			<itunes:duration>35:55</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/6063e13ca82bb269a1c6c53b/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">6063e13ca82bb269a1c6c53b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/21/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b96</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790MxASzkQWo61o0x5eJcQez]]></acast:settings>
			<itunes:subtitle>Valecia Maclin</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>21</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>For Women’s History Month, we wanted to share the stories of just a few of the amazing women who make Microsoft the powerhouse that it is. To wrap up the month, we speak with <a href="https://www.linkedin.com/in/valeciamaclin/">Valecia Maclin</a>, brilliant General Engineering Manager of Customer Security &amp; Trust, about the human element of cybersecurity. </p><p>In discussion with hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a>, Valecia speaks to how she transitioned into cybersecurity after originally planning on becoming a mechanical engineer, and how she oversees her teams with a sense of humanity - from understanding that working from home brings unique challenges, to going the extra mile to ensure that no member of the team feels like an insignificant cog in a big machine <em>- </em>Valecia is a shining example of what leadership should look like, and maybe humanity too. </p><p> </p><p><strong>In this Episode You Will Learn:</strong> </p><ul><li>The importance of who is behind cybersecurity protocols </li><li>How Microsoft’s Engineering, Customer Security &amp; Trust team successfully transitioned to remote work under Valecia’s leadership </li><li>Tips on being a more inclusive leader in the security space </li></ul><p> </p><p><strong>Some Questions that We Ask:</strong> </p><ul><li>What excites Valecia Maclin about the future of Cybersecurity </li><li>How does a mechanical engineering background affect a GM’s role in Infosec </li><li>How Valecia Maclin, General Manager of Engineering, Customer Security &amp; Trust, got to where she is today </li></ul><p> </p><p><strong>Resources</strong>:  </p><p><a href="https://www.linkedin.com/in/valeciamaclin/%20">Valecia’s LinkedIn</a></p><p><a href="https://www.amiepartnerships.org/">Advancing Minorities’ Interest in Engineering</a></p><p><a href="https://safecode.org/%20">SAFECode</a></p><p><a href="https://www.microsoft.com/en-us/teals">Microsoft’s TEALS</a></p><p><a href="https://www.microsoft.com/en-us/diversity/programs/digigirlz/default.aspx">Microsoft’s DigiGirlz</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>For Women’s History Month, we wanted to share the stories of just a few of the amazing women who make Microsoft the powerhouse that it is. To wrap up the month, we speak with <a href="https://www.linkedin.com/in/valeciamaclin/">Valecia Maclin</a>, brilliant General Engineering Manager of Customer Security &amp; Trust, about the human element of cybersecurity. </p><p>In discussion with hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a>, Valecia speaks to how she transitioned into cybersecurity after originally planning on becoming a mechanical engineer, and how she oversees her teams with a sense of humanity - from understanding that working from home brings unique challenges, to going the extra mile to ensure that no member of the team feels like an insignificant cog in a big machine <em>- </em>Valecia is a shining example of what leadership should look like, and maybe humanity too. </p><p> </p><p><strong>In this Episode You Will Learn:</strong> </p><ul><li>The importance of who is behind cybersecurity protocols </li><li>How Microsoft’s Engineering, Customer Security &amp; Trust team successfully transitioned to remote work under Valecia’s leadership </li><li>Tips on being a more inclusive leader in the security space </li></ul><p> </p><p><strong>Some Questions that We Ask:</strong> </p><ul><li>What excites Valecia Maclin about the future of Cybersecurity </li><li>How does a mechanical engineering background affect a GM’s role in Infosec </li><li>How Valecia Maclin, General Manager of Engineering, Customer Security &amp; Trust, got to where she is today </li></ul><p> </p><p><strong>Resources</strong>:  </p><p><a href="https://www.linkedin.com/in/valeciamaclin/%20">Valecia’s LinkedIn</a></p><p><a href="https://www.amiepartnerships.org/">Advancing Minorities’ Interest in Engineering</a></p><p><a href="https://safecode.org/%20">SAFECode</a></p><p><a href="https://www.microsoft.com/en-us/teals">Microsoft’s TEALS</a></p><p><a href="https://www.microsoft.com/en-us/diversity/programs/digigirlz/default.aspx">Microsoft’s DigiGirlz</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Identity Threats, Tokens, and Tacos</title>
			<itunes:title>Identity Threats, Tokens, and Tacos</itunes:title>
			<pubDate>Wed, 24 Mar 2021 07:05:00 GMT</pubDate>
			<itunes:duration>40:46</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/605aa9b34db68c7c91f6412a/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">605aa9b34db68c7c91f6412a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/20/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b97</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA793/oSJ1YrZaNYDnuwSuMOmY]]></acast:settings>
			<itunes:subtitle>Maria Puertos Calvo</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>20</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Every day there are literally billions of authentications across Microsoft – whether it’s someone checking their email, logging onto their Xbox, or hopping into a Teams call – and while there are tools like Multi-Factor Authentication in place to ensure the person behind the keyboard is the actual owner of the account, cyber-criminals can still manipulate systems. Catching one of these instances should be like catching the smallest needle in the largest haystack, but with the algorithms put into place by the Identity Security team at Microsoft, that haystack becomes much smaller, and that needle, much larger.</p><p>On today’s episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> invite back <a href="https://www.linkedin.com/in/mariapuertas/">Maria Puertos Calvo</a>, the Lead Data Scientist in Identity Security and Protection at Microsoft, to talk with us about how her team monitors such a massive scale of authentications on any given day. They also look deeper into Maria’s background and find out what got her into the field of security analytics and A.I. in the first place, and how her past in academia helped that trajectory.  </p><br><p><strong>In this Episode You Will Learn:</strong></p><ul><li>How the Identity Security team uses AI to authenticate billions of logins across Microsoft</li><li>Why Fingerprints are fallible security tools</li><li>How machine learning infrastructure has changed over the past couple of decades at Microsoft</li></ul><p><br></p><p><strong>Some Questions that We Ask:</strong></p><ul><li>Is the sheer scale of authentications throughout Microsoft a dream come true or a nightmare for a data analyst?</li><li>Do today’s threat-detection models share common threads with the threat-detection of previous decades?</li><li>How does someone become Microsoft’s Lead Data Scientist for Identity Security and Protection?</li></ul><p><br></p><p><strong>Resources:</strong></p><p><a href="https://careers.microsoft.com/us/en/search-results?keywords=%23identityjobs">#IdentityJobs at Microsoft</a></p><p><a href="https://aka.ms/SecurityUnlockedEp08">Maria’s First Appearance on Security Unlocked, Tackling Identity Threats with A.I.</a></p><p><a href="https://www.linkedin.com/in/mariapuertas/">Maria’s Linkedin</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Every day there are literally billions of authentications across Microsoft – whether it’s someone checking their email, logging onto their Xbox, or hopping into a Teams call – and while there are tools like Multi-Factor Authentication in place to ensure the person behind the keyboard is the actual owner of the account, cyber-criminals can still manipulate systems. Catching one of these instances should be like catching the smallest needle in the largest haystack, but with the algorithms put into place by the Identity Security team at Microsoft, that haystack becomes much smaller, and that needle, much larger.</p><p>On today’s episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> invite back <a href="https://www.linkedin.com/in/mariapuertas/">Maria Puertos Calvo</a>, the Lead Data Scientist in Identity Security and Protection at Microsoft, to talk with us about how her team monitors such a massive scale of authentications on any given day. They also look deeper into Maria’s background and find out what got her into the field of security analytics and A.I. in the first place, and how her past in academia helped that trajectory.  </p><br><p><strong>In this Episode You Will Learn:</strong></p><ul><li>How the Identity Security team uses AI to authenticate billions of logins across Microsoft</li><li>Why Fingerprints are fallible security tools</li><li>How machine learning infrastructure has changed over the past couple of decades at Microsoft</li></ul><p><br></p><p><strong>Some Questions that We Ask:</strong></p><ul><li>Is the sheer scale of authentications throughout Microsoft a dream come true or a nightmare for a data analyst?</li><li>Do today’s threat-detection models share common threads with the threat-detection of previous decades?</li><li>How does someone become Microsoft’s Lead Data Scientist for Identity Security and Protection?</li></ul><p><br></p><p><strong>Resources:</strong></p><p><a href="https://careers.microsoft.com/us/en/search-results?keywords=%23identityjobs">#IdentityJobs at Microsoft</a></p><p><a href="https://aka.ms/SecurityUnlockedEp08">Maria’s First Appearance on Security Unlocked, Tackling Identity Threats with A.I.</a></p><p><a href="https://www.linkedin.com/in/mariapuertas/">Maria’s Linkedin</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Re: Tracking Attacker Email Infrastructure</title>
			<itunes:title>Re: Tracking Attacker Email Infrastructure</itunes:title>
			<pubDate>Wed, 17 Mar 2021 07:05:00 GMT</pubDate>
			<itunes:duration>39:07</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/605171f5f1b7dd46e880a2b7/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">605171f5f1b7dd46e880a2b7</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/19/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b98</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA793kWKui672qZGuhkj2FV+dd]]></acast:settings>
			<itunes:subtitle>Elif Kaya</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>19</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>If you use email, there is a good chance you’re familiar with email scams. Who hasn’t gotten a shady chain letter or suspicious offer in their inbox? Cybercriminals have been using email to spread malware for decades and today’s methods are more sophisticated than ever. In order to stop these attacks from ever hitting our inboxes in the first place, threat analysts have to always be one step ahead of these cybercriminals, deploying advanced and ever-evolving tactics to stop them.</p><p>On today’s podcast, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> are joined by <a href="https://www.linkedin.com/in/elifcyber/">Elif Kaya</a>, a Threat Analyst at Microsoft. Elif speaks with us about attacker email infrastructure. We learn what it is, how it’s used, and how her team is combating it. She explains how the intelligence her team gathers is helping to predict how a domain is going to be used, even before any malicious email campaigns begin. It’s a fascinating conversation that dives deep into Elif’s research and her unique perspective on combating cybercrime. </p><br><p><strong>In This Episode, You Will Learn:</strong>  </p><ul><li>The meaning of the terms “RandomU” and “StrangeU” </li><li>The research and techniques used when gathering intelligence on attacker email structure </li><li>How sophisticated malware campaigns evade machine learning, phish filters, and other automated technology </li><li>The history behind service infrastructure, the Netcurs takedown, Agent Tesla, Diamond Fox, Dridox, and more </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><ul><li>What is attacker email infrastructure and how is it used by cybercriminals? </li><li>How does gaining intelligence on email infrastructures help us improve protection against malware campaigns? </li><li>What is the difference between “attacker-owned infrastructure” and “compromised infrastructure”? </li><li>Why wasn’t machine learning or unsupervised learning a technique used when gathering intelligence on attacker email campaigns? </li><li>What should organizations do to protect themselves? What solutions should they have in place? </li></ul><p>  </p><p><strong>Resources: </strong></p><p><a href="https://www.microsoft.com/security/blog/2021/02/01/what-tracking-an-attacker-email-infrastructure-tells-us-about-persistent-cybercriminal-operations/%20">What tracking an attacker email infrastructure tells us about persistent cybercriminal operations</a></p><p><a href="https://www.linkedin.com/in/elifcyber/%20">Elif Kaya</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>If you use email, there is a good chance you’re familiar with email scams. Who hasn’t gotten a shady chain letter or suspicious offer in their inbox? Cybercriminals have been using email to spread malware for decades and today’s methods are more sophisticated than ever. In order to stop these attacks from ever hitting our inboxes in the first place, threat analysts have to always be one step ahead of these cybercriminals, deploying advanced and ever-evolving tactics to stop them.</p><p>On today’s podcast, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> are joined by <a href="https://www.linkedin.com/in/elifcyber/">Elif Kaya</a>, a Threat Analyst at Microsoft. Elif speaks with us about attacker email infrastructure. We learn what it is, how it’s used, and how her team is combating it. She explains how the intelligence her team gathers is helping to predict how a domain is going to be used, even before any malicious email campaigns begin. It’s a fascinating conversation that dives deep into Elif’s research and her unique perspective on combating cybercrime. </p><br><p><strong>In This Episode, You Will Learn:</strong>  </p><ul><li>The meaning of the terms “RandomU” and “StrangeU” </li><li>The research and techniques used when gathering intelligence on attacker email structure </li><li>How sophisticated malware campaigns evade machine learning, phish filters, and other automated technology </li><li>The history behind service infrastructure, the Netcurs takedown, Agent Tesla, Diamond Fox, Dridox, and more </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><ul><li>What is attacker email infrastructure and how is it used by cybercriminals? </li><li>How does gaining intelligence on email infrastructures help us improve protection against malware campaigns? </li><li>What is the difference between “attacker-owned infrastructure” and “compromised infrastructure”? </li><li>Why wasn’t machine learning or unsupervised learning a technique used when gathering intelligence on attacker email campaigns? </li><li>What should organizations do to protect themselves? What solutions should they have in place? </li></ul><p>  </p><p><strong>Resources: </strong></p><p><a href="https://www.microsoft.com/security/blog/2021/02/01/what-tracking-an-attacker-email-infrastructure-tells-us-about-persistent-cybercriminal-operations/%20">What tracking an attacker email infrastructure tells us about persistent cybercriminal operations</a></p><p><a href="https://www.linkedin.com/in/elifcyber/%20">Elif Kaya</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Celebrating Women in Security</title>
			<itunes:title>Celebrating Women in Security</itunes:title>
			<pubDate>Mon, 08 Mar 2021 08:05:00 GMT</pubDate>
			<itunes:duration>35:59</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60451f6e3224c55da42f9a7b/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60451f6e3224c55da42f9a7b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/18/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b99</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA792ac2dYLGY6PNjYQMRnonLo]]></acast:settings>
			<itunes:subtitle>Holly Stewart, Dr. Anna Bertiger, and Sam Schwartz</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>18</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/64ac54f84d889200102d1b99.jpeg"/>
			<description><![CDATA[<p>Today is International Women’s Day, and we are celebrating with a very special episode of Security Unlocked. Hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> revisit their favorite interviews with some of the prominent women featured previously on the podcast.</p><p>We speak with <a href="https://www.linkedin.com/in/hollyjstewart/">Holly Stewart</a>, a Principal Research Lead at Microsoft and known in the Defender organization as “The Queen of AI.” Holly shares how building a security team with different perspectives helps to better understand and stop threats.</p><p>Next, we talk with <a href="https://www.linkedin.com/in/bertiger/">Dr. Anna Bertiger</a>, a Senior Applied Scientist at Microsoft. Anna has an incredible passion for math and explains how she’s using math to catch villains and make computer networks safer. </p><p>Finally, we explore what it’s like to hunt down threats with <a href="https://www.linkedin.com/in/scschwa/">Sam Schwartz</a>, a Program Manager with Microsoft Threat Experts. She came to Microsoft right out of college and didn’t even know what malware was; now she’s helping coordinate a team of threat hunters on the cutting edge of attack prevention. </p><p>Security Unlocked will be highlighting female security leaders at Microsoft throughout the month of March. Subscribe now to make sure you don’t miss an episode! </p><br><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>How math is used to help analyze attack trends </li><li>How AI and ML help identify patterns that can stop attacks </li><li>How threat hunters are tracking down the newest security risks </li><li>Why Microsoft Threat Experts are focused on human adversaries, not malware </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><ul><li>How do AI and ML factor into solving complicated security problems? </li><li>What’s next on the horizon for data science? </li><li>How do you use math to determine if an action is dangerous or benign? </li><li>Why do threat hunters need to limit the scope of their work? </li><li>What skills do you need to be a security program manager? </li></ul><p><br></p><p><strong>Resources: </strong></p><p><a href="https://www.linkedin.com/in/scschwa/">Sam Schwartz’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/bertiger/">Dr. Anna Bertiger’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/hollyjstewart/">Holly Stewart’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Today is International Women’s Day, and we are celebrating with a very special episode of Security Unlocked. Hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> revisit their favorite interviews with some of the prominent women featured previously on the podcast.</p><p>We speak with <a href="https://www.linkedin.com/in/hollyjstewart/">Holly Stewart</a>, a Principal Research Lead at Microsoft and known in the Defender organization as “The Queen of AI.” Holly shares how building a security team with different perspectives helps to better understand and stop threats.</p><p>Next, we talk with <a href="https://www.linkedin.com/in/bertiger/">Dr. Anna Bertiger</a>, a Senior Applied Scientist at Microsoft. Anna has an incredible passion for math and explains how she’s using math to catch villains and make computer networks safer. </p><p>Finally, we explore what it’s like to hunt down threats with <a href="https://www.linkedin.com/in/scschwa/">Sam Schwartz</a>, a Program Manager with Microsoft Threat Experts. She came to Microsoft right out of college and didn’t even know what malware was; now she’s helping coordinate a team of threat hunters on the cutting edge of attack prevention. </p><p>Security Unlocked will be highlighting female security leaders at Microsoft throughout the month of March. Subscribe now to make sure you don’t miss an episode! </p><br><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>How math is used to help analyze attack trends </li><li>How AI and ML help identify patterns that can stop attacks </li><li>How threat hunters are tracking down the newest security risks </li><li>Why Microsoft Threat Experts are focused on human adversaries, not malware </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><ul><li>How do AI and ML factor into solving complicated security problems? </li><li>What’s next on the horizon for data science? </li><li>How do you use math to determine if an action is dangerous or benign? </li><li>Why do threat hunters need to limit the scope of their work? </li><li>What skills do you need to be a security program manager? </li></ul><p><br></p><p><strong>Resources: </strong></p><p><a href="https://www.linkedin.com/in/scschwa/">Sam Schwartz’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/bertiger/">Dr. Anna Bertiger’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/hollyjstewart/">Holly Stewart’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Digital Crimes Investigates: Counterfeit Tales</title>
			<itunes:title>Digital Crimes Investigates: Counterfeit Tales</itunes:title>
			<pubDate>Wed, 03 Mar 2021 08:05:00 GMT</pubDate>
			<itunes:duration>34:32</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/603f02e065c8b56ed141e655/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">603f02e065c8b56ed141e655</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/17/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b9a</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790Bn/hXHKEJzj9HKUsv1cWU]]></acast:settings>
			<itunes:subtitle>Donal Keating</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>17</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Digital crime-fighter <a href="https://www.linkedin.com/in/donal-keating/">Donal Keating</a> revisits the podcast, but this time… it’s personal. *cue dramatic crime-fighting music* The Director of Innovation and Research of the Digital Crimes Unit (DCU) at Microsoft joins hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> to regale us with the origin story of the DCU and his captivating career exploits. Whether it’s tales of his early days preventing Windows 98 counterfeits in Ireland or the many international law enforcement raids he’s participated in…there’s no shortage to Donal’s crime-fighting adventures.</p><br><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>The mission of Microsoft’s DCU and the techniques used to combat fraud</li><li>The events and needs that led to the creation of a forensic analytic lab at Microsoft</li><li>How counterfeiting and intellectual property crime have evolved over the years with advanced technology</li><li>What it’s like partnering with law enforcement to take down criminals around the world</li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><ul><li>What does a day in the life of Donal look like in the DCU?</li><li>Was there ever a counterfeit example that shocked Donal at just how good it was?</li><li>With so many shifts in Donal’s work, what in his background has prepared him to stay on top of the changes?</li><li>What does a digital crime fighter do in their time off?</li></ul><p><br></p><p><strong>Resources: </strong> </p><p><a href="https://www.linkedin.com/in/donal-keating/%20%20">Donal’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Digital crime-fighter <a href="https://www.linkedin.com/in/donal-keating/">Donal Keating</a> revisits the podcast, but this time… it’s personal. *cue dramatic crime-fighting music* The Director of Innovation and Research of the Digital Crimes Unit (DCU) at Microsoft joins hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> to regale us with the origin story of the DCU and his captivating career exploits. Whether it’s tales of his early days preventing Windows 98 counterfeits in Ireland or the many international law enforcement raids he’s participated in…there’s no shortage to Donal’s crime-fighting adventures.</p><br><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>The mission of Microsoft’s DCU and the techniques used to combat fraud</li><li>The events and needs that led to the creation of a forensic analytic lab at Microsoft</li><li>How counterfeiting and intellectual property crime have evolved over the years with advanced technology</li><li>What it’s like partnering with law enforcement to take down criminals around the world</li></ul><p><br></p><p><strong>Some Questions We Ask:</strong></p><ul><li>What does a day in the life of Donal look like in the DCU?</li><li>Was there ever a counterfeit example that shocked Donal at just how good it was?</li><li>With so many shifts in Donal’s work, what in his background has prepared him to stay on top of the changes?</li><li>What does a digital crime fighter do in their time off?</li></ul><p><br></p><p><strong>Resources: </strong> </p><p><a href="https://www.linkedin.com/in/donal-keating/%20%20">Donal’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Judging a Bug by Its Title</title>
			<itunes:title>Judging a Bug by Its Title</itunes:title>
			<pubDate>Wed, 24 Feb 2021 22:16:00 GMT</pubDate>
			<itunes:duration>39:29</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/6036d0366e013d05dbbfd803/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">6036d0366e013d05dbbfd803</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/16/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b9b</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA791ux5Lm5hCaNf3dKh7TTQzI]]></acast:settings>
			<itunes:subtitle>Mayana Pereira</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>16</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Most people know the age-old adage, “Don’t judge a book by its cover.” I can still see my grandmother wagging her finger at me when I was younger as she said it. But what if it's not the book cover we’re judging, but the title? And what if it’s not a book we’re analyzing, but instead a security bug? The times have changed, and age-old adages don’t always translate well in the digital landscape. In this case, we’re using machine learning (ML) to identify and “judge” security bugs based solely on their titles. And, believe it or not, it works! (Sorry, Grandma!) </p><p><a href="https://www.linkedin.com/in/mayana-pereira-2aa284b0">Mayana Pereira</a>, Data Scientist at Microsoft, joins hosts <a href="https://www.linkedin.com/in/nicfill">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla">Natalia Godyla</a> to dig into the endeavors that are saving security experts’ time. Mayana explains how data science and security teams have come together to explore ways that ML can help software developers identify and classify security bugs more efficiently. A task that, without machine learning, has traditionally provided false positives or led developers to overlook misclassified critical security vulnerabilities. </p><p> </p><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>How data science and ML can improve security protocols and identify and classify bugs for software developers </li><li>How to determine the appropriate amount of data needed to create an accurate ML training model </li><li>The techniques used to classify bugs based simply on their title </li></ul><p> </p><p><strong>Some Questions We Ask:</strong></p><ul><li>What questions need to be asked in order to obtain the right data to train a security model? </li><li>How does Microsoft utilize the outputs of these data-driven security models?  </li><li>What is AI for Good and how is it using AI to foster positive change in protecting children, data and privacy online? </li></ul><p> </p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/en-us/security/business/security-intelligence-report%20">Microsoft Digital Defense Report</a></p><p><a href="https://docs.microsoft.com/en-us/security/engineering/identifying-security-bug-reports%20">Article: “Identifying Security Bug Reports Based Solely on Report Titles and Noisy Data”</a></p><p><a href="https://www.linkedin.com/in/mayana-pereira-2aa284b0%20">Mayana’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Most people know the age-old adage, “Don’t judge a book by its cover.” I can still see my grandmother wagging her finger at me when I was younger as she said it. But what if it's not the book cover we’re judging, but the title? And what if it’s not a book we’re analyzing, but instead a security bug? The times have changed, and age-old adages don’t always translate well in the digital landscape. In this case, we’re using machine learning (ML) to identify and “judge” security bugs based solely on their titles. And, believe it or not, it works! (Sorry, Grandma!) </p><p><a href="https://www.linkedin.com/in/mayana-pereira-2aa284b0">Mayana Pereira</a>, Data Scientist at Microsoft, joins hosts <a href="https://www.linkedin.com/in/nicfill">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla">Natalia Godyla</a> to dig into the endeavors that are saving security experts’ time. Mayana explains how data science and security teams have come together to explore ways that ML can help software developers identify and classify security bugs more efficiently. A task that, without machine learning, has traditionally provided false positives or led developers to overlook misclassified critical security vulnerabilities. </p><p> </p><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>How data science and ML can improve security protocols and identify and classify bugs for software developers </li><li>How to determine the appropriate amount of data needed to create an accurate ML training model </li><li>The techniques used to classify bugs based simply on their title </li></ul><p> </p><p><strong>Some Questions We Ask:</strong></p><ul><li>What questions need to be asked in order to obtain the right data to train a security model? </li><li>How does Microsoft utilize the outputs of these data-driven security models?  </li><li>What is AI for Good and how is it using AI to foster positive change in protecting children, data and privacy online? </li></ul><p> </p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/en-us/security/business/security-intelligence-report%20">Microsoft Digital Defense Report</a></p><p><a href="https://docs.microsoft.com/en-us/security/engineering/identifying-security-bug-reports%20">Article: “Identifying Security Bug Reports Based Solely on Report Titles and Noisy Data”</a></p><p><a href="https://www.linkedin.com/in/mayana-pereira-2aa284b0%20">Mayana’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Enterprise Resiliency: Breakfast of Champions</title>
			<itunes:title>Enterprise Resiliency: Breakfast of Champions</itunes:title>
			<pubDate>Wed, 17 Feb 2021 08:05:00 GMT</pubDate>
			<itunes:duration>45:43</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/602c5fe4306ae62756ee2051/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">602c5fe4306ae62756ee2051</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/15/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b9c</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA793GDNoblxzueQLNSVAIUjW8]]></acast:settings>
			<itunes:subtitle>Irfan Mirza and Andrew Paverd</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>15</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Prior to the pandemic, workdays used to look a whole lot different. If you had a break, you could take a walk to stretch your legs, shake the hands of your co-workers, or get some 1-on-1 face time with the boss. Ahh... those were the days. That close contact we once had is now something that many of us yearn for as we’ve had to abruptly lift and shift from living in our office to working from our home. But communicating and socializing aren’t the only things that were easier back then. The walls of your office have expanded, and with them, the boundaries of your security protocols. Small in-office tasks like patching a server have now become multi-step processes that require remote management, remote updates, and remote administrative control. With that comes the prioritization of resilience and what it means for enterprises, customers, and security teams alike. That’s where remote enterprise resiliency comes into play.  </p><p>Today on the pod, we explore the final chapter of the MDDR. <a href="https://www.linkedin.com/in/irfanmirzausa/">Irfan Mirza</a>, Director of Enterprise Continuity and Resilience at Microsoft, wraps up the observations from the report by giving hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalya Godyla</a> the rundown on enterprise resiliency and discusses how we can ensure the highest levels of security while working from home. Irfan explains the <a href="https://www.microsoft.com/en-us/security/business/zero-trust">Zero trust</a> model and how Microsoft is working to extend security benefits to your kitchen or home office, or...  that make-shift workspace in your closet.  </p><p>In the second segment, <a href="https://www.linkedin.com/in/andrewpaverd/">Andrew Paverd</a>, Senior Researcher on the Microsoft Security Response Center Team and jack of all trades, stops by… and we’re not convinced he’s fully human. He’s here to tell us about the many hats he wears, from safe systems programming to leveraging AI to help with processes within the MSRC, and shares how he has to think like a hacker to prevent attacks. Spoiler alert: he’s a big follower of Murphy’s Law.   </p><br><p><strong>In This Episode, You Will Learn: </strong> </p><ul><li>How classical security models are being challenged </li><li>What the Zero Trust Model is and how it works  </li><li>The three critical areas of resilience: extending the enterprise boundary, prioritizing resilient performance, and validating the resilience of our human infrastructure.  </li><li>How hackers approach our systems and technologies </li></ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><ul><li>How has security changed as a product of the pandemic? </li><li>Do we feel like we have secured the remote workforce? </li><li>What frameworks exist to put a metric around where an organization is in terms of its resiliency? </li><li>What is Control Flow Guard (CFG) and Control-Flow Integrity? </li><li>What’s the next stage for the Rust programming language?  </li></ul><p><br></p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/en-us/security/business/security-intelligence-report%20">Microsoft Digital Defense Report</a></p><p><a href="https://www.linkedin.com/in/irfanmirzausa/">Irfan’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/andrewpaverd/%20">Andrew’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Prior to the pandemic, workdays used to look a whole lot different. If you had a break, you could take a walk to stretch your legs, shake the hands of your co-workers, or get some 1-on-1 face time with the boss. Ahh... those were the days. That close contact we once had is now something that many of us yearn for as we’ve had to abruptly lift and shift from living in our office to working from our home. But communicating and socializing aren’t the only things that were easier back then. The walls of your office have expanded, and with them, the boundaries of your security protocols. Small in-office tasks like patching a server have now become multi-step processes that require remote management, remote updates, and remote administrative control. With that comes the prioritization of resilience and what it means for enterprises, customers, and security teams alike. That’s where remote enterprise resiliency comes into play.  </p><p>Today on the pod, we explore the final chapter of the MDDR. <a href="https://www.linkedin.com/in/irfanmirzausa/">Irfan Mirza</a>, Director of Enterprise Continuity and Resilience at Microsoft, wraps up the observations from the report by giving hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalya Godyla</a> the rundown on enterprise resiliency and discusses how we can ensure the highest levels of security while working from home. Irfan explains the <a href="https://www.microsoft.com/en-us/security/business/zero-trust">Zero trust</a> model and how Microsoft is working to extend security benefits to your kitchen or home office, or...  that make-shift workspace in your closet.  </p><p>In the second segment, <a href="https://www.linkedin.com/in/andrewpaverd/">Andrew Paverd</a>, Senior Researcher on the Microsoft Security Response Center Team and jack of all trades, stops by… and we’re not convinced he’s fully human. He’s here to tell us about the many hats he wears, from safe systems programming to leveraging AI to help with processes within the MSRC, and shares how he has to think like a hacker to prevent attacks. Spoiler alert: he’s a big follower of Murphy’s Law.   </p><br><p><strong>In This Episode, You Will Learn: </strong> </p><ul><li>How classical security models are being challenged </li><li>What the Zero Trust Model is and how it works  </li><li>The three critical areas of resilience: extending the enterprise boundary, prioritizing resilient performance, and validating the resilience of our human infrastructure.  </li><li>How hackers approach our systems and technologies </li></ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><ul><li>How has security changed as a product of the pandemic? </li><li>Do we feel like we have secured the remote workforce? </li><li>What frameworks exist to put a metric around where an organization is in terms of its resiliency? </li><li>What is Control Flow Guard (CFG) and Control-Flow Integrity? </li><li>What’s the next stage for the Rust programming language?  </li></ul><p><br></p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/en-us/security/business/security-intelligence-report%20">Microsoft Digital Defense Report</a></p><p><a href="https://www.linkedin.com/in/irfanmirzausa/">Irfan’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/andrewpaverd/%20">Andrew’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Pluton: The New Bedrock for Device Security</title>
			<itunes:title>Pluton: The New Bedrock for Device Security</itunes:title>
			<pubDate>Wed, 10 Feb 2021 08:05:00 GMT</pubDate>
			<itunes:duration>48:12</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/60231604bc42e74b116f1424/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">60231604bc42e74b116f1424</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/14/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b9d</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA792ugD84FRizY+zUHGlSQRdY]]></acast:settings>
			<itunes:subtitle>Peter Waxman and Madeline Carmichael</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>14</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Close your eyes, and imagine a world where booting up your computer wasn’t a susceptibility point for attacks. Imagine a Root of Trust that’s integrated into the CPU. Imagine all of your devices being protected against advanced attacks. Now, what if I told you there’s a cutting-edge processor that’s battle-tested for hardware penetrations, easy to update, and protects credentials, encryption keys, and personal data all at once? What if I told you it was already here, and your systems might already be using it?! Open your eyes, and get ready to be amazed! It’s Pluton, baby! <a href="https://www.linkedin.com/in/peter-waxman-ba5555/">Peter Waxman</a>, Group Program Manager at Microsoft, joins hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> in a tell-all about Pluton. Trust us, Pluton is sure to knock your SOCs off (that’s System on a Chip)!</p><p>Now that your eyes have been opened to a more secure system, we’d like to ask you to keep the volume down, because you’ve just entered the Library of Threats. While it may sound like inspiration for the next installment of National Treasure, you won’t find Nicolas Cage in this library (at least you shouldn’t). However, you will find <a href="https://www.linkedin.com/in/madeline-carmichael-081540b2/">Madeline Carmichael</a>, MSTIC’s Threat Intel Librarian, whose movie-worthy title is just as impressive as it sounds. To be honest though, you might not find anyone <em>in</em> the library, as it bears more resemblance to Professor X’s Cerebro than it does your local hardcover sanctuary.  </p><p> </p><p><strong>In This Episode, You Will Learn:</strong>   </p><ul><li>What the Pluton Security Processor is and how it was created </li><li>The architecture of the Pluton Security Processor </li><li>What challenges were faced while bringing the Pluton Security Processor to life </li><li>The Root of Trust today vs. The Future with Pluton </li><li>The naming systems for threat actors, from periodic elements to volcanoes </li></ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><ul><li>What differentiates the Pluton Security Processor from previous methodologies? </li><li>Why is the Pluton Processor better than what we have used in the past?   </li><li>What challenges lie ahead with the next steps around Pluton? </li><li>What has changed since Pluton was in Xbox to where it is now? </li><li>What tools and platforms does a Threat Intel Librarian utilize? </li></ul><p> </p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/security/blog/2020/11/17/meet-the-microsoft-pluton-processor-the-security-chip-designed-for-the-future-of-windows-pcs/%20">Microsoft Pluton Announcement</a></p><p><a href="https://www.linkedin.com/in/peter-waxman-ba5555/%20%20">Peter’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/madeline-carmichael-081540b2/">Madeline’s LinkedIn</a> </p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Close your eyes, and imagine a world where booting up your computer wasn’t a susceptibility point for attacks. Imagine a Root of Trust that’s integrated into the CPU. Imagine all of your devices being protected against advanced attacks. Now, what if I told you there’s a cutting-edge processor that’s battle-tested for hardware penetrations, easy to update, and protects credentials, encryption keys, and personal data all at once? What if I told you it was already here, and your systems might already be using it?! Open your eyes, and get ready to be amazed! It’s Pluton, baby! <a href="https://www.linkedin.com/in/peter-waxman-ba5555/">Peter Waxman</a>, Group Program Manager at Microsoft, joins hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> in a tell-all about Pluton. Trust us, Pluton is sure to knock your SOCs off (that’s System on a Chip)!</p><p>Now that your eyes have been opened to a more secure system, we’d like to ask you to keep the volume down, because you’ve just entered the Library of Threats. While it may sound like inspiration for the next installment of National Treasure, you won’t find Nicolas Cage in this library (at least you shouldn’t). However, you will find <a href="https://www.linkedin.com/in/madeline-carmichael-081540b2/">Madeline Carmichael</a>, MSTIC’s Threat Intel Librarian, whose movie-worthy title is just as impressive as it sounds. To be honest though, you might not find anyone <em>in</em> the library, as it bears more resemblance to Professor X’s Cerebro than it does your local hardcover sanctuary.  </p><p> </p><p><strong>In This Episode, You Will Learn:</strong>   </p><ul><li>What the Pluton Security Processor is and how it was created </li><li>The architecture of the Pluton Security Processor </li><li>What challenges were faced while bringing the Pluton Security Processor to life </li><li>The Root of Trust today vs. The Future with Pluton </li><li>The naming systems for threat actors, from periodic elements to volcanoes </li></ul><p> </p><p><strong>Some Questions We Ask:</strong> </p><ul><li>What differentiates the Pluton Security Processor from previous methodologies? </li><li>Why is the Pluton Processor better than what we have used in the past?   </li><li>What challenges lie ahead with the next steps around Pluton? </li><li>What has changed since Pluton was in Xbox to where it is now? </li><li>What tools and platforms does a Threat Intel Librarian utilize? </li></ul><p> </p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/security/blog/2020/11/17/meet-the-microsoft-pluton-processor-the-security-chip-designed-for-the-future-of-windows-pcs/%20">Microsoft Pluton Announcement</a></p><p><a href="https://www.linkedin.com/in/peter-waxman-ba5555/%20%20">Peter’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/madeline-carmichael-081540b2/">Madeline’s LinkedIn</a> </p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>BEC: Homoglyphs, Drop Accounts, and CEO Fraud</title>
			<itunes:title>BEC: Homoglyphs, Drop Accounts, and CEO Fraud</itunes:title>
			<pubDate>Wed, 03 Feb 2021 08:30:00 GMT</pubDate>
			<itunes:duration>45:41</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/6019fa58749bb81e8f38f441/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">6019fa58749bb81e8f38f441</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/13/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b9e</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA793ga9oPrSIw/a6F6G+uLMCK]]></acast:settings>
			<itunes:subtitle>Peter Anaman and Scott Christiansen</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>CCI: Cyber Crime Investigation. Another day, another email attack - something smells “phishy” in the network. *Slowly puts on sunglasses and flips up trench coat collar* Time to go to work. </p><p>Just how easy is it for someone to steal your credentials? Because once they’re stolen, and sold for pocket change, it’s open season. Homoglyphs, drop accounts, email forwarding… is it any wonder billions of dollars have been lost to BEC (business email compromise)?</p><p>Join hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> for a fascinating conversation with <a href="https://www.linkedin.com/in/anamanp/">Peter Anaman</a>, Director and Principal Investigator of the CELA Digital Crimes Unit, as they unpack the cybercrime section of the Microsoft Digital Defense Report to see what these phishers are up to. <a href="https://www.linkedin.com/in/scottchristiansen/">Scott Christiansen</a> joins us later in the show to recount his journey to security and his role as an Adjunct Professor for Bellevue University's Master of Science in Cybersecurity, along with some great advice for choosing security as a profession.     </p><p>  </p><p><strong>In This Episode, You Will Learn: </strong>  </p><ul><li>The difference between consumer and enterprise phishing </li><li>The types of people and professions that are usually targeted in cyber attacks  </li><li>How putting policies on backups and policies to protect the organization in place will help prevent digital crimes </li><li>The four categories of the internet: the dark web, the surface web, the deep web, and the vetted web </li></ul><p>  </p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>What would an example of credential phishing look like? </li><li>What is the end goal for phishers? </li><li>How are phishing and business email compromise techniques leveraged during the pandemic? </li><li>What patterns are being seen when it comes to credential phishing? </li><li>How do you use ML to classify whether a bug is security-related or not? </li></ul><p><br></p><p><strong>Resources:</strong>  </p><p><a href="https://www.microsoft.com/en-us/security/business/security-intelligence-report%20%20">Microsoft Digital Defense Report</a></p><p><a href="https://www.linkedin.com/in/anamanp/%20">Peter’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/scottchristiansen/%20">Scott’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>CCI: Cyber Crime Investigation. Another day, another email attack - something smells “phishy” in the network. *Slowly puts on sunglasses and flips up trench coat collar* Time to go to work. </p><p>Just how easy is it for someone to steal your credentials? Because once they’re stolen, and sold for pocket change, it’s open season. Homoglyphs, drop accounts, email forwarding… is it any wonder billions of dollars have been lost to BEC (business email compromise)?</p><p>Join hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> for a fascinating conversation with <a href="https://www.linkedin.com/in/anamanp/">Peter Anaman</a>, Director and Principal Investigator of the CELA Digital Crimes Unit, as they unpack the cybercrime section of the Microsoft Digital Defense Report to see what these phishers are up to. <a href="https://www.linkedin.com/in/scottchristiansen/">Scott Christiansen</a> joins us later in the show to recount his journey to security and his role as an Adjunct Professor for Bellevue University's Master of Science in Cybersecurity, along with some great advice for choosing security as a profession.     </p><p>  </p><p><strong>In This Episode, You Will Learn: </strong>  </p><ul><li>The difference between consumer and enterprise phishing </li><li>The types of people and professions that are usually targeted in cyber attacks  </li><li>How putting policies on backups and policies to protect the organization in place will help prevent digital crimes </li><li>The four categories of the internet: the dark web, the surface web, the deep web, and the vetted web </li></ul><p>  </p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>What would an example of credential phishing look like? </li><li>What is the end goal for phishers? </li><li>How are phishing and business email compromise techniques leveraged during the pandemic? </li><li>What patterns are being seen when it comes to credential phishing? </li><li>How do you use ML to classify whether a bug is security-related or not? </li></ul><p><br></p><p><strong>Resources:</strong>  </p><p><a href="https://www.microsoft.com/en-us/security/business/security-intelligence-report%20%20">Microsoft Digital Defense Report</a></p><p><a href="https://www.linkedin.com/in/anamanp/%20">Peter’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/scottchristiansen/%20">Scott’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>All Your Pa$$w0rd Are Belong to Us</title>
			<itunes:title>All Your Pa$$w0rd Are Belong to Us</itunes:title>
			<pubDate>Wed, 27 Jan 2021 08:05:00 GMT</pubDate>
			<itunes:duration>43:55</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/6009ca99f6decb7cc4e37084/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">6009ca99f6decb7cc4e37084</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/12/notes</link>
			<acast:episodeId>64ac54f84d889200102d1b9f</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA790hiX40l98zzdNr6Rw6Jhi4]]></acast:settings>
			<itunes:subtitle>Alex Weinert</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Special Edition! </p><p>We’ve been told for years how important passwords are, taught how to make them stronger and longer and better, and we frantically tear up our home or office when we can’t find that sticky note where we wrote them down. Life feels like it comes to a screeching halt when we’ve lost our passwords, but… what would life be like if we didn’t need them? Can your passwords truly become a thing of the past? Sounds a bit unnerving, but we can promise you, it’s always security first here at Microsoft.  </p><p>On this special edition episode of the Security Unlocked podcast, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> explore the journey of becoming <a href="https://www.microsoft.com/en-us/security/business/identity/passwordless">passwordless</a> with <a href="https://www.linkedin.com/in/alexweinert/">Alex Weinert</a>, Director of Identity Security at Microsoft, as he explains why your passwords don’t matter and how going passwordless can protect you from attackers.</p><br><p><strong>In This Episode, You Will Learn: </strong>  </p><ul><li>The risks that are being mitigated through passwordless authentication </li><li>Where the challenges lie within using passwordless authentication </li><li>The functions of Windows Hello, Microsoft Authenticator and FIDO tokens </li><li>How ML is used in these technologies </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>What does passwordless mean? </li><li>What are some common misconceptions or risks? </li><li>Where are customers on their journey to going passwordless? </li><li>hat is the end goal for passwordless authentication? </li></ul><p><br></p><p><strong>Resources:</strong></p><p><a href="https://techcommunity.microsoft.com/t5/azure-active-directory-identity/your-pa-word-doesn-t-matter/ba-p/731984%20">Alex’s Blog Post</a></p><p><a href="https://www.linkedin.com/in/alexweinert/%20">Alex’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Special Edition! </p><p>We’ve been told for years how important passwords are, taught how to make them stronger and longer and better, and we frantically tear up our home or office when we can’t find that sticky note where we wrote them down. Life feels like it comes to a screeching halt when we’ve lost our passwords, but… what would life be like if we didn’t need them? Can your passwords truly become a thing of the past? Sounds a bit unnerving, but we can promise you, it’s always security first here at Microsoft.  </p><p>On this special edition episode of the Security Unlocked podcast, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> explore the journey of becoming <a href="https://www.microsoft.com/en-us/security/business/identity/passwordless">passwordless</a> with <a href="https://www.linkedin.com/in/alexweinert/">Alex Weinert</a>, Director of Identity Security at Microsoft, as he explains why your passwords don’t matter and how going passwordless can protect you from attackers.</p><br><p><strong>In This Episode, You Will Learn: </strong>  </p><ul><li>The risks that are being mitigated through passwordless authentication </li><li>Where the challenges lie within using passwordless authentication </li><li>The functions of Windows Hello, Microsoft Authenticator and FIDO tokens </li><li>How ML is used in these technologies </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong>  </p><ul><li>What does passwordless mean? </li><li>What are some common misconceptions or risks? </li><li>Where are customers on their journey to going passwordless? </li><li>hat is the end goal for passwordless authentication? </li></ul><p><br></p><p><strong>Resources:</strong></p><p><a href="https://techcommunity.microsoft.com/t5/azure-active-directory-identity/your-pa-word-doesn-t-matter/ba-p/731984%20">Alex’s Blog Post</a></p><p><a href="https://www.linkedin.com/in/alexweinert/%20">Alex’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Under the Hood: Ensuring Firmware Integrity</title>
			<itunes:title>Under the Hood: Ensuring Firmware Integrity</itunes:title>
			<pubDate>Wed, 20 Jan 2021 08:05:00 GMT</pubDate>
			<itunes:duration>47:25</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/6007aba0201b617d336a7450/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">6007aba0201b617d336a7450</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/11/notes</link>
			<acast:episodeId>64ac54f84d889200102d1ba0</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA792HQ43nNIIOOcTZTwYX6tkh]]></acast:settings>
			<itunes:subtitle>Nazmus Sakib and Bhavna Soman</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>How do we ensure firmware integrity and <a href="https://www.microsoft.com/en-us/security/business">security</a>? Join hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and guest <a href="https://www.linkedin.com/in/nazmus-sakib-5aa8a6123/">Nazmus Sakib</a>, a Principal Lead Program Manager at Microsoft, to dive deeper and assess the complexities and challenges that come along with securing firmware - bootstraps and all!  </p><p>Megamind <a href="https://www.linkedin.com/in/bhavna-soman-3004b613/">Bhavna Soman</a>, a Senior Security Research Lead, joins us later in the show and we learn about her journey in optimizing AI and ML to improve efficiency in security and give the humans a break.  </p><br><p><strong>In This Episode, You Will Learn: </strong></p><ul><li>How Microsoft ensures <a href="https://docs.microsoft.com/en-us/azure/security/fundamentals/project-cerberus">firmware integrity</a> and security </li><li>How firmware is making it harder for attackers</li><li>Where AI and ML will take threat intelligence in the near future </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong></p><ul><li>What is firmware? </li><li>Do we know where firmware attacks begin? </li><li>What does the threat landscape look like for firmware? </li><li>What part of ML should be automated better so that humans can shift to other tasks? </li></ul><p> </p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/en-us/security/business/security-intelligence-report%20">Microsoft Digital Defense Report</a></p><p><a href="https://www.linkedin.com/in/nazmus-sakib-5aa8a6123/%20%20">Nazmus’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/bhavna-soman-3004b613/%20">Bhavna’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>How do we ensure firmware integrity and <a href="https://www.microsoft.com/en-us/security/business">security</a>? Join hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> and guest <a href="https://www.linkedin.com/in/nazmus-sakib-5aa8a6123/">Nazmus Sakib</a>, a Principal Lead Program Manager at Microsoft, to dive deeper and assess the complexities and challenges that come along with securing firmware - bootstraps and all!  </p><p>Megamind <a href="https://www.linkedin.com/in/bhavna-soman-3004b613/">Bhavna Soman</a>, a Senior Security Research Lead, joins us later in the show and we learn about her journey in optimizing AI and ML to improve efficiency in security and give the humans a break.  </p><br><p><strong>In This Episode, You Will Learn: </strong></p><ul><li>How Microsoft ensures <a href="https://docs.microsoft.com/en-us/azure/security/fundamentals/project-cerberus">firmware integrity</a> and security </li><li>How firmware is making it harder for attackers</li><li>Where AI and ML will take threat intelligence in the near future </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong></p><ul><li>What is firmware? </li><li>Do we know where firmware attacks begin? </li><li>What does the threat landscape look like for firmware? </li><li>What part of ML should be automated better so that humans can shift to other tasks? </li></ul><p> </p><p><strong>Resources:</strong> </p><p><a href="https://www.microsoft.com/en-us/security/business/security-intelligence-report%20">Microsoft Digital Defense Report</a></p><p><a href="https://www.linkedin.com/in/nazmus-sakib-5aa8a6123/%20%20">Nazmus’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/bhavna-soman-3004b613/%20">Bhavna’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Tracking Nation State Actors</title>
			<itunes:title>Tracking Nation State Actors</itunes:title>
			<pubDate>Wed, 13 Jan 2021 08:30:00 GMT</pubDate>
			<itunes:duration>57:29</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/5ffe28e38454cb1bdf38ee29/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">5ffe28e38454cb1bdf38ee29</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/10/notes</link>
			<acast:episodeId>64ac54f84d889200102d1ba1</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA793lrx4LOPQa3gqFwxV1cGnH]]></acast:settings>
			<itunes:subtitle>Randy Treit and Jeremy Dallman</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Watchdogs in tow, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> are joined by guest <a href="https://www.linkedin.com/in/rtreit/">Randy Treit</a>, Principal Security Leader at Microsoft, to examine the process of identifying the source of a threat and stopping the spread by protecting “patient zero.” Randy has a few key tricks up his sleeve as a defender, but you can decide if they’re more impressive than the antics he and his identical twin have pulled while working at Microsoft.</p><p>In the second segment, <a href="https://www.linkedin.com/in/jeremydallman/">Jeremy Dallman</a>, Principal Program Manager at Microsoft, discusses why some bad actors are known in the security world under some of the most seemingly harmless codenames, such as “Fancy Bear” and “Charming Kitten”, and highlights the techniques his team is using to protect Microsoft’s customers from Nation-State actors. </p><p> </p><p><strong>In This Episode, You Will Learn: </strong></p><ul><li>How Microsoft is defending and protecting patient zero</li><li>The history of Defender and <a href="https://www.microsoft.com/en-us/microsoft-365/security/endpoint-defender">antimalware</a></li><li>The process of finding gaps in protections</li><li>The importance of protecting customers from Nation-State actors</li><li>How and why security vendors use codenames to refer to threat activity groups </li></ul><p> </p><p><strong>Some Questions We Ask:</strong></p><ul><li>What is different about focusing on patient zero than other aspects of <a href="https://www.microsoft.com/en-us/security/business">security</a>?</li><li>How does Microsoft measure the false positive rate in protecting patient zero?</li><li>What tools are being used on a day-to-day basis in defender security?</li><li>Why does Microsoft partner with the industry to identify Nation-State actors?</li><li>How many groups are utilizing AI and ML to enhance their ability to become a threat? </li></ul><p> </p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/en-us/security/business/security-intelligence-report%20">Microsoft Digital Defense Report</a></p><p><a href="https://www.linkedin.com/in/rtreit/%20">Randy’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/jeremydallman/%20">Jeremy’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Watchdogs in tow, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> are joined by guest <a href="https://www.linkedin.com/in/rtreit/">Randy Treit</a>, Principal Security Leader at Microsoft, to examine the process of identifying the source of a threat and stopping the spread by protecting “patient zero.” Randy has a few key tricks up his sleeve as a defender, but you can decide if they’re more impressive than the antics he and his identical twin have pulled while working at Microsoft.</p><p>In the second segment, <a href="https://www.linkedin.com/in/jeremydallman/">Jeremy Dallman</a>, Principal Program Manager at Microsoft, discusses why some bad actors are known in the security world under some of the most seemingly harmless codenames, such as “Fancy Bear” and “Charming Kitten”, and highlights the techniques his team is using to protect Microsoft’s customers from Nation-State actors. </p><p> </p><p><strong>In This Episode, You Will Learn: </strong></p><ul><li>How Microsoft is defending and protecting patient zero</li><li>The history of Defender and <a href="https://www.microsoft.com/en-us/microsoft-365/security/endpoint-defender">antimalware</a></li><li>The process of finding gaps in protections</li><li>The importance of protecting customers from Nation-State actors</li><li>How and why security vendors use codenames to refer to threat activity groups </li></ul><p> </p><p><strong>Some Questions We Ask:</strong></p><ul><li>What is different about focusing on patient zero than other aspects of <a href="https://www.microsoft.com/en-us/security/business">security</a>?</li><li>How does Microsoft measure the false positive rate in protecting patient zero?</li><li>What tools are being used on a day-to-day basis in defender security?</li><li>Why does Microsoft partner with the industry to identify Nation-State actors?</li><li>How many groups are utilizing AI and ML to enhance their ability to become a threat? </li></ul><p> </p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/en-us/security/business/security-intelligence-report%20">Microsoft Digital Defense Report</a></p><p><a href="https://www.linkedin.com/in/rtreit/%20">Randy’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/jeremydallman/%20">Jeremy’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Unpacking the New ML Threat Matrix</title>
			<itunes:title>Unpacking the New ML Threat Matrix</itunes:title>
			<pubDate>Wed, 06 Jan 2021 08:00:00 GMT</pubDate>
			<itunes:duration>57:08</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/5ff51f567ae05d0cd32a055e/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">5ff51f567ae05d0cd32a055e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/9/notes</link>
			<acast:episodeId>64ac54f84d889200102d1ba2</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA791DVmJQKXVBdgn8xZOJvkj2]]></acast:settings>
			<itunes:subtitle>Ram Shankar Siva Kumar and Justin Carroll</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Yeehaw! “Data Cowboy” is in the building. Join us as <a href="https://www.linkedin.com/in/nicfill/%20">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> sit down with <a href="https://www.linkedin.com/in/ram-shankar-siva-kumar-7b04a73a/">Ram Shankar Siva Kumar</a>, aka “Data Cowboy” at Microsoft, for an exciting conversation about the release of a new <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F10%2F22%2Fcyberattacks-against-machine-learning-systems-are-more-common-than-you-think%2F&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436193462%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=NnbmkQ8zQr3KH7De0UHpYUeV%2BjNp8sdtKiWtSLIhYFE%3D&amp;reserved=0">adversarial ML threat matrix</a> created for security analysts. Have no fear, we made sure to find out how Ram acquired the name, “Data Cowboy”, so saddle up and get ready for the ride!</p><p>Stick around to hear Nic and Natalia explore the urgency of surfacing threats at a faster rate with <a href="https://www.linkedin.com/in/justin-carroll-20616574/%20">Justin Carroll</a>, a Threat Analyst at Microsoft, and why it is more important now than ever before.</p><br><p><strong>In This Episode, You Will Learn: </strong></p><ul><li>How Microsoft is using the new ML threat matrix against cyber attacks </li><li>The approach and philosophy for putting the threat matrix on GitHub  </li><li>ML applications in regard to healthcare and why it is worrisome </li><li>What needs to happen in order to be successful in combating certain threats </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong></p><ul><li>What is an adversarial ML threat matrix? </li><li>How will the community on GitHub contribute to the evolution of the ML threat matrix? </li><li>What resources are available to learn about all things VM? </li><li>What techniques are being used to find threats at a faster speed? </li><li>How do AI and ML factor into the role of managing data and collaborating with other teams? </li></ul><p><br></p><p><strong>Resources</strong></p><p><a href="https://www.microsoft.com/security/blog/2020/10/22/cyberattacks-against-machine-learning-systems-are-more-common-than-you-think/%20">Ram’s Blog</a></p><p><a href="https://www.linkedin.com/in/ram-shankar-siva-kumar-7b04a73a/%20">Ram’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/justin-carroll-20616574/%20%20">Justin’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/%20">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/%20">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/%20%20">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Yeehaw! “Data Cowboy” is in the building. Join us as <a href="https://www.linkedin.com/in/nicfill/%20">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> sit down with <a href="https://www.linkedin.com/in/ram-shankar-siva-kumar-7b04a73a/">Ram Shankar Siva Kumar</a>, aka “Data Cowboy” at Microsoft, for an exciting conversation about the release of a new <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F10%2F22%2Fcyberattacks-against-machine-learning-systems-are-more-common-than-you-think%2F&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436193462%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=NnbmkQ8zQr3KH7De0UHpYUeV%2BjNp8sdtKiWtSLIhYFE%3D&amp;reserved=0">adversarial ML threat matrix</a> created for security analysts. Have no fear, we made sure to find out how Ram acquired the name, “Data Cowboy”, so saddle up and get ready for the ride!</p><p>Stick around to hear Nic and Natalia explore the urgency of surfacing threats at a faster rate with <a href="https://www.linkedin.com/in/justin-carroll-20616574/%20">Justin Carroll</a>, a Threat Analyst at Microsoft, and why it is more important now than ever before.</p><br><p><strong>In This Episode, You Will Learn: </strong></p><ul><li>How Microsoft is using the new ML threat matrix against cyber attacks </li><li>The approach and philosophy for putting the threat matrix on GitHub  </li><li>ML applications in regard to healthcare and why it is worrisome </li><li>What needs to happen in order to be successful in combating certain threats </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong></p><ul><li>What is an adversarial ML threat matrix? </li><li>How will the community on GitHub contribute to the evolution of the ML threat matrix? </li><li>What resources are available to learn about all things VM? </li><li>What techniques are being used to find threats at a faster speed? </li><li>How do AI and ML factor into the role of managing data and collaborating with other teams? </li></ul><p><br></p><p><strong>Resources</strong></p><p><a href="https://www.microsoft.com/security/blog/2020/10/22/cyberattacks-against-machine-learning-systems-are-more-common-than-you-think/%20">Ram’s Blog</a></p><p><a href="https://www.linkedin.com/in/ram-shankar-siva-kumar-7b04a73a/%20">Ram’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/justin-carroll-20616574/%20%20">Justin’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/%20">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/nicfill/%20">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/%20%20">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Tackling Identity Threats With AI</title>
			<itunes:title>Tackling Identity Threats With AI</itunes:title>
			<pubDate>Wed, 23 Dec 2020 08:05:00 GMT</pubDate>
			<itunes:duration>56:47</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/5fe27b49e7d26c417e896b70/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">5fe27b49e7d26c417e896b70</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/8/notes</link>
			<acast:episodeId>64ac54f84d889200102d1ba3</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA7912IIgFUgQPS40QLTWKcrFP]]></acast:settings>
			<itunes:subtitle>Maria Puertas Calvo and Geoff McDonald</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>The last thing we all need this year is an identity crisis. Fear not, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> are here with <a href="https://www.linkedin.com/in/mariapuertas/">Maria Puertas Calvo</a>, Data Science Lead of Microsoft’s <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen%2Fsecurity%2Fbusiness%2Fidentity&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436203419%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=XV%2FnPD5Ni5iDdNCbRNZc9H1eLYlzV66wSd6AKEAXrzI%3D&amp;reserved=0">Identity Security</a> and Protection Team, to learn how AI is being used to protect our personal identities. Maria also reveals previously undisclosed information – her favorite food and her famous top-secret recipe, so get ready to take notes! </p><p>Later, the hosts bring back a previous guest, <a href="https://www.linkedin.com/in/geoff-mcdonald-76655029/?originalSubdomain=ca">Geoff McDonald</a>, ML Research Lead at Microsoft to unpack his career in cybersecurity and how game hacking led him to where he is now. </p><br><p><strong>In This Episode, You Will Learn: </strong></p><ul><li>How offline detections are used for account compromise prevention </li><li>The importance of multi-factor authentication </li><li>How Microsoft is taking a new approach with AI to identify threats with real-time prevention  </li><li>The problem with adversaries and malware attackers </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul><li>How is Microsoft applying AI to solve problems for account compromise prevention? </li><li>How do humans play a role in labeling data sets? </li><li>How is Microsoft measuring success of their new enhanced AI? </li><li>What is the future for neural networks? </li></ul><p><br></p><p><strong>Resources</strong></p><p><a href="https://techcommunity.microsoft.com/t5/azure-active-directory-identity/enhanced-ai-for-account-compromise-prevention/ba-p/1994653%20">Maria’s Blog</a></p><p><a href="https://www.microsoft.com/security/blog/%20">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/mariapuertas/">Maria’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/geoff-mcdonald-76655029/">Geoff’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nicfill/%20">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/%20">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>The last thing we all need this year is an identity crisis. Fear not, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> are here with <a href="https://www.linkedin.com/in/mariapuertas/">Maria Puertas Calvo</a>, Data Science Lead of Microsoft’s <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen%2Fsecurity%2Fbusiness%2Fidentity&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436203419%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=XV%2FnPD5Ni5iDdNCbRNZc9H1eLYlzV66wSd6AKEAXrzI%3D&amp;reserved=0">Identity Security</a> and Protection Team, to learn how AI is being used to protect our personal identities. Maria also reveals previously undisclosed information – her favorite food and her famous top-secret recipe, so get ready to take notes! </p><p>Later, the hosts bring back a previous guest, <a href="https://www.linkedin.com/in/geoff-mcdonald-76655029/?originalSubdomain=ca">Geoff McDonald</a>, ML Research Lead at Microsoft to unpack his career in cybersecurity and how game hacking led him to where he is now. </p><br><p><strong>In This Episode, You Will Learn: </strong></p><ul><li>How offline detections are used for account compromise prevention </li><li>The importance of multi-factor authentication </li><li>How Microsoft is taking a new approach with AI to identify threats with real-time prevention  </li><li>The problem with adversaries and malware attackers </li></ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul><li>How is Microsoft applying AI to solve problems for account compromise prevention? </li><li>How do humans play a role in labeling data sets? </li><li>How is Microsoft measuring success of their new enhanced AI? </li><li>What is the future for neural networks? </li></ul><p><br></p><p><strong>Resources</strong></p><p><a href="https://techcommunity.microsoft.com/t5/azure-active-directory-identity/enhanced-ai-for-account-compromise-prevention/ba-p/1994653%20">Maria’s Blog</a></p><p><a href="https://www.microsoft.com/security/blog/%20">Microsoft Security Blog</a></p><p><a href="https://www.linkedin.com/in/mariapuertas/">Maria’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/geoff-mcdonald-76655029/">Geoff’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nicfill/%20">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/%20">Natalia’s LinkedIn</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Threat Modeling for Adversarial ML</title>
			<itunes:title>Threat Modeling for Adversarial ML</itunes:title>
			<pubDate>Wed, 09 Dec 2020 08:00:00 GMT</pubDate>
			<itunes:duration>47:28</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/5fd00b5b6737ff1d84756bb7/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">5fd00b5b6737ff1d84756bb7</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/7/notes</link>
			<acast:episodeId>64ac54f84d889200102d1ba4</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA791PipdR8qXh2Tsg5o96YeCX]]></acast:settings>
			<itunes:subtitle>Andrew Marshall and Sam Schwartz</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>How ready is your corporate security team to handle AI and ML threats? Many simply don’t have the bandwidth or don’t see it as a priority. That’s where security engineers like Microsoft’s <a href="https://www.linkedin.com/in/andrew-marshall-47334969/">Andrew Marshall</a> step in. In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with Andrew about just what his team is doing to teach security professionals and policy makers about the dangers of AI and ML attacks, and walks through some of the documentation, available for free <a href="https://docs.microsoft.com/en-us/security/engineering/threat-modeling-aiml">online</a>, that can help guide the response. Plus, why he really, really doesn’t want to talk about Windows Vista. </p><p>Nic and Natalia then explore what it’s like to hunt down threats with <a href="https://www.linkedin.com/in/scschwa/">Sam Schwartz</a>, a program manager with Microsoft Threat Experts. She came to Microsoft right out of college and didn’t even know what malware was. Now, she’s helping coordinate a team of <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F03%2F10%2Fthreat-hunting-part-1-why-your-soc-needs-a-proactive-hunting-team%2F&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436223324%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=7tXumsx14eRqBH%2Bf%2BWTEk0tN0MQPCTv0WLi1TjKqGPs%3D&amp;reserved=0">threat hunters</a> on the cutting edge of attack prevention. </p><p>  </p><p><strong>In This Episode, You Will Learn: </strong>  </p><ul><li>Why data science and security engineering skills don’t necessarily overlap </li><li>How attackers are using ML to change decision making </li><li>What security teams are doing to protect AI and ML systems </li><li>How threat hunters are tracking down the newest security risks </li><li>Why Microsoft Threat Experts are focused on human adversaries, not malware </li></ul><p>  </p><p><strong>Some Questions We Ask: </strong>  </p><ul><li>What does the ML landscape look like at Microsoft? </li><li>How are ML attacks evolving? </li><li>What is ‘data poisoning’? </li><li>Why do threat hunters need to limit the scope of their work? </li><li>What skills do you need to be a security program manager? </li></ul><p><br></p><p><strong>Resources </strong></p><p><a href="https://docs.microsoft.com/en-us/security/engineering/threat-modeling-aiml">Threat Modeling AI Systems and Dependencies</a> </p><p><a href="https://www.linkedin.com/in/andrew-marshall-47334969/">Andrew’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/scschwa/">Sam’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn </a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>How ready is your corporate security team to handle AI and ML threats? Many simply don’t have the bandwidth or don’t see it as a priority. That’s where security engineers like Microsoft’s <a href="https://www.linkedin.com/in/andrew-marshall-47334969/">Andrew Marshall</a> step in. In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with Andrew about just what his team is doing to teach security professionals and policy makers about the dangers of AI and ML attacks, and walks through some of the documentation, available for free <a href="https://docs.microsoft.com/en-us/security/engineering/threat-modeling-aiml">online</a>, that can help guide the response. Plus, why he really, really doesn’t want to talk about Windows Vista. </p><p>Nic and Natalia then explore what it’s like to hunt down threats with <a href="https://www.linkedin.com/in/scschwa/">Sam Schwartz</a>, a program manager with Microsoft Threat Experts. She came to Microsoft right out of college and didn’t even know what malware was. Now, she’s helping coordinate a team of <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F03%2F10%2Fthreat-hunting-part-1-why-your-soc-needs-a-proactive-hunting-team%2F&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436223324%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=7tXumsx14eRqBH%2Bf%2BWTEk0tN0MQPCTv0WLi1TjKqGPs%3D&amp;reserved=0">threat hunters</a> on the cutting edge of attack prevention. </p><p>  </p><p><strong>In This Episode, You Will Learn: </strong>  </p><ul><li>Why data science and security engineering skills don’t necessarily overlap </li><li>How attackers are using ML to change decision making </li><li>What security teams are doing to protect AI and ML systems </li><li>How threat hunters are tracking down the newest security risks </li><li>Why Microsoft Threat Experts are focused on human adversaries, not malware </li></ul><p>  </p><p><strong>Some Questions We Ask: </strong>  </p><ul><li>What does the ML landscape look like at Microsoft? </li><li>How are ML attacks evolving? </li><li>What is ‘data poisoning’? </li><li>Why do threat hunters need to limit the scope of their work? </li><li>What skills do you need to be a security program manager? </li></ul><p><br></p><p><strong>Resources </strong></p><p><a href="https://docs.microsoft.com/en-us/security/engineering/threat-modeling-aiml">Threat Modeling AI Systems and Dependencies</a> </p><p><a href="https://www.linkedin.com/in/andrew-marshall-47334969/">Andrew’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/scschwa/">Sam’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn </a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Mechanics of Digital Crime</title>
			<itunes:title>The Mechanics of Digital Crime</itunes:title>
			<pubDate>Wed, 25 Nov 2020 08:05:00 GMT</pubDate>
			<itunes:duration>53:32</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/5fbc78974740105e34c4884f/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">5fbc78974740105e34c4884f</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/6/notes</link>
			<acast:episodeId>64ac54f84d889200102d1ba5</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA793xuxIp0HG/1RIDM9Fo8paC]]></acast:settings>
			<itunes:subtitle>Donal Keating and Michelle Lam</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Ever wonder why it's so difficult to really secure a network, systems or data? Cyber criminals are stepping up their game, even as security gets stronger and stronger, and they’re using all sorts of new techniques to break through enterprise walls. In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/donal-keating/">Donal Keating</a>, Director of Innovation and Research for the <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fgovernment%23office-ContentAreaHeadingTemplate-x0hsfbl&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436233276%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=wNpiu2czZum%2F%2FHqTUJQ%2BSkxZ1qQc0IrL1PF90gSQvfg%3D&amp;reserved=0">Microsoft Digital Crimes Unit</a>, about one of the key findings in the latest <a href="https://www.microsoft.com/en-us/download/details.aspx?id=101738">Microsoft Digital Defense Report:</a> how attackers are adapting and becoming more sophisticated. Plus how social engineering is revealing the true weakest link in any security plan -- and it’s something you might not expect. </p><p>Then they dive into what it’s like to hunt threats with <a href="https://www.linkedin.com/in/michellelamcalpoly/">Michelle Lam</a>, who brings fresh eyes to every security problem she faces at Microsoft. She explains why not spending time in a <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F06%2F22%2Fmodernizing-security-operations-center-secure-remote-workforce%2F&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436243243%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=XclezjZ5dCFqbAr8f1qhpAmQ6luHllQ1%2BZ7RbXapTbQ%3D&amp;reserved=0">SOC</a> early in her career helps her spot potential attacks others might miss, and why she’s so passionate about helping serve under-represented communities and inspiring the next generation of security professionals. </p><p>  </p><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>How cyber attackers are using the cloud </li><li>Why humans are the weakest link in every security system </li><li>The new steps cyber criminals are taking to get people to trust them </li><li>How threat hunters look for malicious activity </li><li>How networking helps young security professionals </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong>  </p><ul><li>What new threat trends are emerging? </li><li>How should security professionals prepare for new threats? </li><li>What is a homoglyph? </li><li>Why is threat hunting a uniquely human-based activity? </li></ul><p><br></p><p><strong>Resources </strong></p><p><a href="https://www.microsoft.com/en-us/download/details.aspx?id=101738">Microsoft Digital Defense Report, September 2020</a> </p><p><a href="https://www.linkedin.com/in/donal-keating/">Donal’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/michellelamcalpoly/">Michelle’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nicfill/%20">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Ever wonder why it's so difficult to really secure a network, systems or data? Cyber criminals are stepping up their game, even as security gets stronger and stronger, and they’re using all sorts of new techniques to break through enterprise walls. In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/donal-keating/">Donal Keating</a>, Director of Innovation and Research for the <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fgovernment%23office-ContentAreaHeadingTemplate-x0hsfbl&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436233276%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=wNpiu2czZum%2F%2FHqTUJQ%2BSkxZ1qQc0IrL1PF90gSQvfg%3D&amp;reserved=0">Microsoft Digital Crimes Unit</a>, about one of the key findings in the latest <a href="https://www.microsoft.com/en-us/download/details.aspx?id=101738">Microsoft Digital Defense Report:</a> how attackers are adapting and becoming more sophisticated. Plus how social engineering is revealing the true weakest link in any security plan -- and it’s something you might not expect. </p><p>Then they dive into what it’s like to hunt threats with <a href="https://www.linkedin.com/in/michellelamcalpoly/">Michelle Lam</a>, who brings fresh eyes to every security problem she faces at Microsoft. She explains why not spending time in a <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F06%2F22%2Fmodernizing-security-operations-center-secure-remote-workforce%2F&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436243243%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=XclezjZ5dCFqbAr8f1qhpAmQ6luHllQ1%2BZ7RbXapTbQ%3D&amp;reserved=0">SOC</a> early in her career helps her spot potential attacks others might miss, and why she’s so passionate about helping serve under-represented communities and inspiring the next generation of security professionals. </p><p>  </p><p><strong>In This Episode, You Will Learn:</strong></p><ul><li>How cyber attackers are using the cloud </li><li>Why humans are the weakest link in every security system </li><li>The new steps cyber criminals are taking to get people to trust them </li><li>How threat hunters look for malicious activity </li><li>How networking helps young security professionals </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong>  </p><ul><li>What new threat trends are emerging? </li><li>How should security professionals prepare for new threats? </li><li>What is a homoglyph? </li><li>Why is threat hunting a uniquely human-based activity? </li></ul><p><br></p><p><strong>Resources </strong></p><p><a href="https://www.microsoft.com/en-us/download/details.aspx?id=101738">Microsoft Digital Defense Report, September 2020</a> </p><p><a href="https://www.linkedin.com/in/donal-keating/">Donal’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/michellelamcalpoly/">Michelle’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nicfill/%20">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Protecting Machine Learning Systems</title>
			<itunes:title>Protecting Machine Learning Systems</itunes:title>
			<pubDate>Wed, 11 Nov 2020 08:01:00 GMT</pubDate>
			<itunes:duration>51:14</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/5fab4a8c32c2e42581ea91c4/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">5fab4a8c32c2e42581ea91c4</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/5/notes</link>
			<acast:episodeId>64ac54f84d889200102d1ba6</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA7917lm7BEaiW5ZlyqvNrcVgu]]></acast:settings>
			<itunes:subtitle>Sharon Xia and Emily Hacker</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/sharon-xia-713a365/">Sharon Xia</a>, a principal program manager for cloud and AI at Microsoft, about the role machine learning plays in security. They discuss four major themes, outlined in the <a href="https://www.microsoft.com/en-us/download/details.aspx?id=101738">Microsoft Digital Defense Report</a>, including how to prepare your industry for attacks on machine learning systems, preventing attack fatigue, democratizing machine learning and leveraging anomaly detection for <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen%2Fmicrosoft-365%2Fsecurity%2Fendpoint-defender&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436263150%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=hKvH9MaHdM41OZ7e0ZRpz1ki4xWNKA5CjZL0eX1o3s8%3D&amp;reserved=0">post-breach detection</a>. </p><p>Then they speak to <a href="https://www.linkedin.com/in/emilydhacker/">Emily Hacker</a>, a threat intelligence analyst at Microsoft, about her path from professional writing to helping find and stop attacks.</p><br><p><strong>In This Episode, You Will Learn: </strong></p><ul><li>How to prepare for attacks on machine learning systems </li><li>The dangers of a model poisoning attack </li><li>Why it’s important to democratize machine learning </li><li>How a humanities background helps when tracking threats </li><li>The latest methods attackers are using for social engineering </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong></p><ul><li>Why are most organizations not prepared for ML attacks? </li><li>How do you assess the trustworthiness of an ML system? </li><li>How can machine learning reduce alert fatigue? </li><li>What kind of patterns are analysts seeing in email threats? </li><li>Why is business email compromise treated differently than other threats?  </li></ul><p><br></p><p><strong>Resources</strong> </p><p><a href="https://www.microsoft.com/en-us/download/details.aspx?id=101738">Microsoft Digital Defense Report, September 2020</a></p><p><a href="https://www.linkedin.com/in/sharon-xia-713a365/">Sharon’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/emilydhacker/">Emily’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/sharon-xia-713a365/">Sharon Xia</a>, a principal program manager for cloud and AI at Microsoft, about the role machine learning plays in security. They discuss four major themes, outlined in the <a href="https://www.microsoft.com/en-us/download/details.aspx?id=101738">Microsoft Digital Defense Report</a>, including how to prepare your industry for attacks on machine learning systems, preventing attack fatigue, democratizing machine learning and leveraging anomaly detection for <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen%2Fmicrosoft-365%2Fsecurity%2Fendpoint-defender&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436263150%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=hKvH9MaHdM41OZ7e0ZRpz1ki4xWNKA5CjZL0eX1o3s8%3D&amp;reserved=0">post-breach detection</a>. </p><p>Then they speak to <a href="https://www.linkedin.com/in/emilydhacker/">Emily Hacker</a>, a threat intelligence analyst at Microsoft, about her path from professional writing to helping find and stop attacks.</p><br><p><strong>In This Episode, You Will Learn: </strong></p><ul><li>How to prepare for attacks on machine learning systems </li><li>The dangers of a model poisoning attack </li><li>Why it’s important to democratize machine learning </li><li>How a humanities background helps when tracking threats </li><li>The latest methods attackers are using for social engineering </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong></p><ul><li>Why are most organizations not prepared for ML attacks? </li><li>How do you assess the trustworthiness of an ML system? </li><li>How can machine learning reduce alert fatigue? </li><li>What kind of patterns are analysts seeing in email threats? </li><li>Why is business email compromise treated differently than other threats?  </li></ul><p><br></p><p><strong>Resources</strong> </p><p><a href="https://www.microsoft.com/en-us/download/details.aspx?id=101738">Microsoft Digital Defense Report, September 2020</a></p><p><a href="https://www.linkedin.com/in/sharon-xia-713a365/">Sharon’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/emilydhacker/">Emily’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nicfill/">Nic’s LinkedIn</a></p><p><a href="https://www.linkedin.com/in/nataliagodyla/">Natalia’s LinkedIn</a></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>How to Catch a Villian With Math</title>
			<itunes:title>How to Catch a Villian With Math</itunes:title>
			<pubDate>Wed, 28 Oct 2020 07:01:00 GMT</pubDate>
			<itunes:duration>42:49</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/5f98a3c4fe9163150eea8117/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">5f98a3c4fe9163150eea8117</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/4/notes</link>
			<acast:episodeId>64ac54f84d889200102d1ba7</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA792DYmgVaKUP2RdqA4Qj4kBw]]></acast:settings>
			<itunes:subtitle><![CDATA[Mike Flowers, Cole Sodja & Justin Carroll, and Dr. Anna Bertiger]]></itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/mikesflowers/">Mike Flowers</a> and <a href="https://www.linkedin.com/in/cole-sodja-a255361b/">Cole Sodja</a> of the Microsoft Protection Team, and Justin Carroll of the Microsoft Threat Intelligence Global Engagement and Response team, about how they’re using machine learning to identify and model <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F06%2F10%2Fthe-science-behind-microsoft-threat-protection-attack-modeling-for-finding-and-stopping-evasive-ransomware%2F&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436273103%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=sA5fwAULj%2FpyL%2BNvxr6zEooJpFHU%2Boc0HdFYgLb9X1g%3D&amp;reserved=0">lateral movement</a> attacks.</p><p>Then they speak to Dr. Anna Bertiger, Senior Applied Scientist at Microsoft, on how she’s using math to catch villains and make computer networks safer.</p><p> </p><p><strong>In This Episode, You Will Learn: </strong></p><ul><li>What are lateral movement attacks</li><li>How machine learning helps address security challenges</li><li>Why grouping attack data can help better prevent threats</li><li>How math is used to help analyze attack trends</li><li>How AI and ML help identify patterns that can stop attacks</li></ul><p> </p><p><strong>Some Questions We Ask: </strong></p><ul><li>What are the most challenging parts of identifying lateral movement attacks?</li><li>How does machine learning help understand how attacks would happen in the future?</li><li>How do attackers change techniques as security techniques change?</li><li>How do you use math to determine if an action is dangerous or benign?</li><li>What is so beautiful about math?</li></ul><p> </p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.microsoft.com/security/blog/2020/06/10/the-science-behind-microsoft-threat-protection-attack-modeling-for-finding-and-stopping-evasive-ransomware/">Mike, Cole &amp; Justin’s Blog Post</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/mikesflowers/">Mike Flowers</a> and <a href="https://www.linkedin.com/in/cole-sodja-a255361b/">Cole Sodja</a> of the Microsoft Protection Team, and Justin Carroll of the Microsoft Threat Intelligence Global Engagement and Response team, about how they’re using machine learning to identify and model <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F06%2F10%2Fthe-science-behind-microsoft-threat-protection-attack-modeling-for-finding-and-stopping-evasive-ransomware%2F&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436273103%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=sA5fwAULj%2FpyL%2BNvxr6zEooJpFHU%2Boc0HdFYgLb9X1g%3D&amp;reserved=0">lateral movement</a> attacks.</p><p>Then they speak to Dr. Anna Bertiger, Senior Applied Scientist at Microsoft, on how she’s using math to catch villains and make computer networks safer.</p><p> </p><p><strong>In This Episode, You Will Learn: </strong></p><ul><li>What are lateral movement attacks</li><li>How machine learning helps address security challenges</li><li>Why grouping attack data can help better prevent threats</li><li>How math is used to help analyze attack trends</li><li>How AI and ML help identify patterns that can stop attacks</li></ul><p> </p><p><strong>Some Questions We Ask: </strong></p><ul><li>What are the most challenging parts of identifying lateral movement attacks?</li><li>How does machine learning help understand how attacks would happen in the future?</li><li>How do attackers change techniques as security techniques change?</li><li>How do you use math to determine if an action is dangerous or benign?</li><li>What is so beautiful about math?</li></ul><p> </p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog</a></p><p><a href="https://www.microsoft.com/security/blog/2020/06/10/the-science-behind-microsoft-threat-protection-attack-modeling-for-finding-and-stopping-evasive-ransomware/">Mike, Cole &amp; Justin’s Blog Post</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Protecting the Under-Secured With Bad Behavior</title>
			<itunes:title>Protecting the Under-Secured With Bad Behavior</itunes:title>
			<pubDate>Wed, 14 Oct 2020 07:05:00 GMT</pubDate>
			<itunes:duration>38:38</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/5f84d0ac38ce194e7cb59363/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">5f84d0ac38ce194e7cb59363</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/3/notes</link>
			<acast:episodeId>64ac54f84d889200102d1ba8</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA7929tdt7nw7f8rRfEo0aSRMQ]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with Hardik Suri of the Microsoft Defender ATP Research Team about using <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F03%2F09%2Fbehavioral-blocking-and-containment-transforming-optics-into-protection%2F&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436283059%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=3z1rZspblASU5jCXOmmwKMAXI%2FSxFtlMwVKCN4c2ICo%3D&amp;reserved=0">behavior-based detection</a> and machine learning to block attacks against Exchange servers, and why it’s so critical to patch and enable security capabilities.  </p><p>Then they speak to <a href="https://www.linkedin.com/in/karen-lavi/">Dr. Karen Lavi</a>, a Senior Data Science Lead in the Microsoft Defender Research Team, on the neuroscience of threat detection, and how her team is using AI and machine learning to predict and prevent <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fwdsi%2Fthreats&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436302973%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=BYk9skk%2FO3gFbcUOJb5iXz6EmzlZP6FEDLqR4VkYkzg%3D&amp;reserved=0">malware attacks</a>. </p><br><p><strong>In This Episode, You Will Learn: </strong> </p><ul><li>Why Exchange servers are so vulnerable </li><li>The best way to defend against web shells </li><li>The simple things security professionals can do to protect under-protected servers </li><li>How neuroscience factors into threat detection </li><li>How to catch ‘patient zero’ in an attack </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong> </p><ul><li>How are techniques for detecting and blocking attacks evolving?  </li><li>What’s next for behavior-based blocking?  </li><li>How does machine learning benefit security?  </li><li>How do you build a diverse team to catch threats?  </li><li>What’s the next innovation in security research?  </li></ul><p><br></p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/security/blog">Microsoft Security Blog</a> </p><p><a href="https://www.microsoft.com/security/blog/2020/06/24/defending-exchange-servers-under-attack/">Hardik’s blog post</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with Hardik Suri of the Microsoft Defender ATP Research Team about using <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2020%2F03%2F09%2Fbehavioral-blocking-and-containment-transforming-optics-into-protection%2F&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436283059%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=3z1rZspblASU5jCXOmmwKMAXI%2FSxFtlMwVKCN4c2ICo%3D&amp;reserved=0">behavior-based detection</a> and machine learning to block attacks against Exchange servers, and why it’s so critical to patch and enable security capabilities.  </p><p>Then they speak to <a href="https://www.linkedin.com/in/karen-lavi/">Dr. Karen Lavi</a>, a Senior Data Science Lead in the Microsoft Defender Research Team, on the neuroscience of threat detection, and how her team is using AI and machine learning to predict and prevent <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fwdsi%2Fthreats&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436302973%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=BYk9skk%2FO3gFbcUOJb5iXz6EmzlZP6FEDLqR4VkYkzg%3D&amp;reserved=0">malware attacks</a>. </p><br><p><strong>In This Episode, You Will Learn: </strong> </p><ul><li>Why Exchange servers are so vulnerable </li><li>The best way to defend against web shells </li><li>The simple things security professionals can do to protect under-protected servers </li><li>How neuroscience factors into threat detection </li><li>How to catch ‘patient zero’ in an attack </li></ul><p><br></p><p><strong>Some Questions We Ask: </strong> </p><ul><li>How are techniques for detecting and blocking attacks evolving?  </li><li>What’s next for behavior-based blocking?  </li><li>How does machine learning benefit security?  </li><li>How do you build a diverse team to catch threats?  </li><li>What’s the next innovation in security research?  </li></ul><p><br></p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/security/blog">Microsoft Security Blog</a> </p><p><a href="https://www.microsoft.com/security/blog/2020/06/24/defending-exchange-servers-under-attack/">Hardik’s blog post</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Unmasking Malicious Scripts With Machine Learning</title>
			<itunes:title>Unmasking Malicious Scripts With Machine Learning</itunes:title>
			<pubDate>Wed, 14 Oct 2020 07:03:00 GMT</pubDate>
			<itunes:duration>37:43</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/5f84d075e75b502ea7aaf185/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">5f84d075e75b502ea7aaf185</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/2/notes</link>
			<acast:episodeId>64ac54f84d889200102d1ba9</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA792Nb+EJT0XaL/sRyetGIrAa]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>There are all kinds of powerful features baked into the Windows operating system. One of them is the Antimalware Scan Interface or AMSI. In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/ankitrgarg/">Ankit Garg</a> and <a href="https://www.linkedin.com/in/geoff-mcdonald-76655029/">Geoff McDonald</a> of the Microsoft Defender ATP Research Team to learn how AMSI operates, and how they’re utilizing ML to stop attacks. </p><p>Then they speak with <a href="https://www.linkedin.com/in/josh-neil/">Dr. Josh Neil</a>, a Principal Data Science Manager at Microsoft, about his unique path from music to data security, and why his team is sniffing through weak signals to detect attack patterns. </p><br><p><strong>In This Episode, You Will Learn: </strong> </p><ul><li>How AMSI protects against threats </li><li>How machine learning makes it easier to catch attacks </li><li>The way security experts think about attack methodology </li><li>How computers can think unlike human brains to solve problems </li><li>The innovations coming to the world of data science </li></ul><p> </p><p><strong>Some Questions We Ask: </strong> </p><ul><li>What is AMSI?  </li><li>How do you differentiate between the benign and malicious?  </li><li>What’s next for cloud machine learning?  </li><li>How do define AI  </li><li>How does music theory impact your work?  </li></ul><p> </p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog </a></p><p><a href="https://www.microsoft.com/security/blog/2020/08/27/stopping-active-directory-attacks-and-other-post-exploitation-behavior-with-amsi-and-machine-learning/">Ankit &amp; Geoff’s blog post</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>There are all kinds of powerful features baked into the Windows operating system. One of them is the Antimalware Scan Interface or AMSI. In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/ankitrgarg/">Ankit Garg</a> and <a href="https://www.linkedin.com/in/geoff-mcdonald-76655029/">Geoff McDonald</a> of the Microsoft Defender ATP Research Team to learn how AMSI operates, and how they’re utilizing ML to stop attacks. </p><p>Then they speak with <a href="https://www.linkedin.com/in/josh-neil/">Dr. Josh Neil</a>, a Principal Data Science Manager at Microsoft, about his unique path from music to data security, and why his team is sniffing through weak signals to detect attack patterns. </p><br><p><strong>In This Episode, You Will Learn: </strong> </p><ul><li>How AMSI protects against threats </li><li>How machine learning makes it easier to catch attacks </li><li>The way security experts think about attack methodology </li><li>How computers can think unlike human brains to solve problems </li><li>The innovations coming to the world of data science </li></ul><p> </p><p><strong>Some Questions We Ask: </strong> </p><ul><li>What is AMSI?  </li><li>How do you differentiate between the benign and malicious?  </li><li>What’s next for cloud machine learning?  </li><li>How do define AI  </li><li>How does music theory impact your work?  </li></ul><p> </p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog </a></p><p><a href="https://www.microsoft.com/security/blog/2020/08/27/stopping-active-directory-attacks-and-other-post-exploitation-behavior-with-amsi-and-machine-learning/">Ankit &amp; Geoff’s blog post</a></p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Going Deep to Find the Unknown Unknowns</title>
			<itunes:title>Going Deep to Find the Unknown Unknowns</itunes:title>
			<pubDate>Wed, 14 Oct 2020 07:01:00 GMT</pubDate>
			<itunes:duration>36:55</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/5f84d050e75b502ea7aaf182/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">5f84d050e75b502ea7aaf182</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/1/notes</link>
			<acast:episodeId>64ac54f84d889200102d1baa</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA791r+E/vT5/zDk7ZmTjzrr7a]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/arieagranonik/">Arie Agranonik</a>, a Senior Data Scientist in the Microsoft Defender ATP Research team, about building models using deep learning to protect against malicious attacks. It’s complicated work, requiring huge computing power and even larger amounts of data, and it could be the future of <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fthreat-protection&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436312931%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=vvnNDYgkUvU6w04v2oC%2FgeeJBOKBIMJ6%2FPGkWKv09nU%3D&amp;reserved=0">threat protection</a>. </p><p>They also speak with <a href="https://www.linkedin.com/in/hollyjstewart/">Holly Stewart</a>, a Principal Research Lead at Microsoft, on how building a security team with different perspectives helps to better understand and stop threats. Plus, her journey from the Peace Corps to Microsoft, and how that informs her decision-making. </p><p> </p><p><strong>In This Episode, You Will Learn: </strong> </p><ul><li>The difference between deep learning, machine learning and AI </li><li>Why it’s so difficult to program a computer to think like a human </li><li>How adversarial models learn from each other to prevent attacks </li><li>Why the best security teams are made up of those with different perspectives </li><li>How data science can train machines to find things humans were not thinking about </li></ul><p> </p><p><strong>Some Questions We Ask: </strong> </p><ul><li>What is deep learning?</li><li>Does a neural network mimic the way the human brain functions?</li><li>How are behavioral observations evolving to combat sophisticated attacks? </li><li>How do AI and ML factor into solving complicated security problems?</li><li>What’s next on the horizon for data science? </li></ul><p> </p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog </a></p><p><a href="https://www.microsoft.com/security/blog/2020/07/23/seeing-the-big-picture-deep-learning-based-fusion-of-behavior-signals-for-threat-detection/">Arie’s blog post</a></p><p>View <a href="https://www.linkedin.com/in/arieagranonik/">Arie Agranonik on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, hosts <a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia Godyla</a> speak with <a href="https://www.linkedin.com/in/arieagranonik/">Arie Agranonik</a>, a Senior Data Scientist in the Microsoft Defender ATP Research team, about building models using deep learning to protect against malicious attacks. It’s complicated work, requiring huge computing power and even larger amounts of data, and it could be the future of <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fthreat-protection&amp;data=04%7C01%7Cbbrack%40microsoft.com%7C37b038f01dd543f84eea08d8b411776f%7C72f988bf86f141af91ab2d7cd011db47%7C0%7C0%7C637457334436312931%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=vvnNDYgkUvU6w04v2oC%2FgeeJBOKBIMJ6%2FPGkWKv09nU%3D&amp;reserved=0">threat protection</a>. </p><p>They also speak with <a href="https://www.linkedin.com/in/hollyjstewart/">Holly Stewart</a>, a Principal Research Lead at Microsoft, on how building a security team with different perspectives helps to better understand and stop threats. Plus, her journey from the Peace Corps to Microsoft, and how that informs her decision-making. </p><p> </p><p><strong>In This Episode, You Will Learn: </strong> </p><ul><li>The difference between deep learning, machine learning and AI </li><li>Why it’s so difficult to program a computer to think like a human </li><li>How adversarial models learn from each other to prevent attacks </li><li>Why the best security teams are made up of those with different perspectives </li><li>How data science can train machines to find things humans were not thinking about </li></ul><p> </p><p><strong>Some Questions We Ask: </strong> </p><ul><li>What is deep learning?</li><li>Does a neural network mimic the way the human brain functions?</li><li>How are behavioral observations evolving to combat sophisticated attacks? </li><li>How do AI and ML factor into solving complicated security problems?</li><li>What’s next on the horizon for data science? </li></ul><p> </p><p><strong>Resources:</strong></p><p><a href="https://www.microsoft.com/security/blog/">Microsoft Security Blog </a></p><p><a href="https://www.microsoft.com/security/blog/2020/07/23/seeing-the-big-picture-deep-learning-based-fusion-of-behavior-signals-for-threat-detection/">Arie’s blog post</a></p><p>View <a href="https://www.linkedin.com/in/arieagranonik/">Arie Agranonik on LinkedIn</a></p><p>View <a href="https://www.linkedin.com/in/nicfill/">Nic on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/nataliagodyla/">Natalia on LinkedIn</a> </p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Security Unlocked - Trailer</title>
			<itunes:title>Security Unlocked - Trailer</itunes:title>
			<pubDate>Wed, 30 Sep 2020 16:00:00 GMT</pubDate>
			<itunes:duration>2:48</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/64ac54ede55ebb0011cb41b1/e/5f7402213029a77f5359228a/media.mp3" length="0" type="audio/mpeg"/>
			<guid isPermaLink="false">5f7402213029a77f5359228a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://thecyberwire.com/podcasts/security-unlocked/0/notes</link>
			<acast:episodeId>64ac54f84d889200102d1bab</acast:episodeId>
			<acast:showId>64ac54ede55ebb0011cb41b1</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrkthxIKZq1nUnfA4lPqHPuwMlJbGD4+N2Pi5M5GlAhSPwIyCXKrSob8UJv/EiAA792Bp0q3YdI8rjI9g9S0Xko5]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/64ac54ede55ebb0011cb41b1/show-cover.jpg"/>
			<description><![CDATA[<p>Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and subscribe!</p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and subscribe!</p><br><p><strong>Related:</strong></p><p>Listen to: <a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a> </p><p>Discover and follow other Microsoft podcasts at <a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a></p><br><p><em>Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.</em> </p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
    	<itunes:category text="Technology"/>
    	<itunes:category text="Science"/>
		<itunes:category text="News">
			<itunes:category text="Tech News"/>
		</itunes:category>
    </channel>
</rss>
