<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>SECURITY.COM The Podcast</title><atom:link rel="self" type="application/rss+xml" href="https://sed-cms.broadcom.com/api/v1/rss/podcasts/cb6b65df-b8aa-4318-a110-b255791ca2b8"/><link>https://symantec-enterprise-podcasts.security.com/podcasts/securitycom-podcast</link><language>en-us</language><copyright>2026 © Broadcom</copyright><itunes:author>Dan Mellinger</itunes:author><itunes:summary>In-depth intel. Real talk. Human factor.&#13;
&#13;
Join Dan Mellinger, your go-to cybersecurity communicator, and Paul Miller, seasoned threat intelligence and operations leader, on SECURITY.COM The Podcast, a show that bridges the gap between cutting-edge security tech and the humans who make it work. Delivering enterprise-grade security insights for all.&#13;
&#13;
Every first and third week each month, they unpack hard-nosed technical deep dives—from threat hunting and breaking analysis to the not-so-secrets of Data Security and SSE others won’t tell you—all rooted in the same high‑quality content and bold thought leadership you’ve come to expect on SECURITY.COM.</itunes:summary><description>In-depth intel. Real talk. Human factor.&#13;
&#13;
Join Dan Mellinger, your go-to cybersecurity communicator, and Paul Miller, seasoned threat intelligence and operations leader, on SECURITY.COM The Podcast, a show that bridges the gap between cutting-edge security tech and the humans who make it work. Delivering enterprise-grade security insights for all.&#13;
&#13;
Every first and third week each month, they unpack hard-nosed technical deep dives—from threat hunting and breaking analysis to the not-so-secrets of Data Security and SSE others won’t tell you—all rooted in the same high‑quality content and bold thought leadership you’ve come to expect on SECURITY.COM.</description><itunes:type>episodic</itunes:type><itunes:owner><itunes:name>Dan Mellinger</itunes:name><itunes:email>danmellinger@gmail.com</itunes:email></itunes:owner><itunes:image href="https://symantec-enterprise-podcasts.security.com/podcasts/sites/default/files/styles/podcast_homepage_square_3x/public/podcast-channel-art/Security%20Podcast%20Square%20Logo.png"/><itunes:category text="News"><itunes:category text="Tech News"/></itunes:category><itunes:explicit>false</itunes:explicit><item><itunes:episodeType>full</itunes:episodeType><itunes:title>AI-Hacking: Red Team vs. Blue Team</itunes:title><title>AI-Hacking: Red Team vs. Blue Team</title><itunes:summary><![CDATA[As AI shifts from passive large language models (LLMs) to active "Agents" capable of executing tasks, the cybersecurity landscape is hitting a fever pitch. In this episode, recorded ahead of their Black Hat Europe presentation, your go-to cybersecurity communicator Dan Mellinger sits down with Paul Miller (Threat Intelligence & Ops Leader) and Dick O’Brien (Principal Research Editor, Symantec & Carbon Black) to dissect the escalating AI arms race.

From the rise of "SpamGPT" to the shift toward "Predictive Security," we explore why defenders might actually have the winning hand in an AI-driven world.
]]></itunes:summary><description><![CDATA[As AI shifts from passive large language models (LLMs) to active "Agents" capable of executing tasks, the cybersecurity landscape is hitting a fever pitch. In this episode, recorded ahead of their Black Hat Europe presentation, your go-to cybersecurity communicator Dan Mellinger sits down with Paul Miller (Threat Intelligence & Ops Leader) and Dick O’Brien (Principal Research Editor, Symantec & Carbon Black) to dissect the escalating AI arms race.

From the rise of "SpamGPT" to the shift toward "Predictive Security," we explore why defenders might actually have the winning hand in an AI-driven world.
]]></description><content:encoded><![CDATA[As AI shifts from passive large language models (LLMs) to active "Agents" capable of executing tasks, the cybersecurity landscape is hitting a fever pitch. In this episode, recorded ahead of their Black Hat Europe presentation, your go-to cybersecurity communicator Dan Mellinger sits down with Paul Miller (Threat Intelligence & Ops Leader) and Dick O’Brien (Principal Research Editor, Symantec & Carbon Black) to dissect the escalating AI arms race.

From the rise of "SpamGPT" to the shift toward "Predictive Security," we explore why defenders might actually have the winning hand in an AI-driven world.
]]></content:encoded><enclosure length="54801408" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02+-+EP05+-+AI+Red+vs+Blue+-+Final+Audio.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02+-+EP05+-+AI+Red+vs+Blue+-+Final+Audio.mp3</guid><pubDate>Wed, 04 Mar 2026 12:26:14 +0000</pubDate><itunes:duration>00:42:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>5</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Personal Privacy w/ Electronic Frontier Foundations (EFF)</itunes:title><title>Personal Privacy w/ Electronic Frontier Foundations (EFF)</title><itunes:summary>In this episode, Dan Mellinger and Paul Miller host Cooper Quintin from the Electronic Frontier Foundation (EFF) to discuss the evolving landscape of cybersecurity, privacy threats, and the importance of human rights in the digital age. &#13;
&#13;
They explore the impact of smartphones on privacy, the role of tools like Privacy Badger, and the need for comprehensive privacy legislation. The conversation also highlights the significance of activism and community involvement in advocating for digital rights and privacy protections.</itunes:summary><description>In this episode, Dan Mellinger and Paul Miller host Cooper Quintin from the Electronic Frontier Foundation (EFF) to discuss the evolving landscape of cybersecurity, privacy threats, and the importance of human rights in the digital age. &#13;
&#13;
They explore the impact of smartphones on privacy, the role of tools like Privacy Badger, and the need for comprehensive privacy legislation. The conversation also highlights the significance of activism and community involvement in advocating for digital rights and privacy protections.</description><content:encoded>In this episode, Dan Mellinger and Paul Miller host Cooper Quintin from the Electronic Frontier Foundation (EFF) to discuss the evolving landscape of cybersecurity, privacy threats, and the importance of human rights in the digital age. &#13;
&#13;
They explore the impact of smartphones on privacy, the role of tools like Privacy Badger, and the need for comprehensive privacy legislation. The conversation also highlights the significance of activism and community involvement in advocating for digital rights and privacy protections.</content:encoded><enclosure length="68261424" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02+-+EP04+-+Personal+Privacy+-+Final+Audio.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02+-+EP04+-+Personal+Privacy+-+Final+Audio.mp3</guid><pubDate>Wed, 18 Feb 2026 13:09:33 +0000</pubDate><itunes:duration>00:56:54</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>4</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>2026 Threat Predictions</itunes:title><title>2026 Threat Predictions</title><itunes:summary>Dick O'Brien details the Symantec Threat Hunters cybersecurity predictions for 2026. One of which we've already seen come to pass in January.&#13;
&#13;
Five Cyber Predictions for 2026: &#13;
https://www.security.com/feature-stories/five-cyber-predictions-2026</itunes:summary><description>Dick O'Brien details the Symantec Threat Hunters cybersecurity predictions for 2026. One of which we've already seen come to pass in January.&#13;
&#13;
Five Cyber Predictions for 2026: &#13;
https://www.security.com/feature-stories/five-cyber-predictions-2026</description><content:encoded>Dick O'Brien details the Symantec Threat Hunters cybersecurity predictions for 2026. One of which we've already seen come to pass in January.&#13;
&#13;
Five Cyber Predictions for 2026: &#13;
https://www.security.com/feature-stories/five-cyber-predictions-2026</content:encoded><enclosure length="19776480" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/SE02+-+EP03+-+2026+Threat+Predictions+audio.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/SE02+-+EP03+-+2026+Threat+Predictions+audio.mp3</guid><pubDate>Wed, 04 Feb 2026 18:17:26 +0000</pubDate><itunes:duration>00:16:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>3</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Ransomware in 2025</itunes:title><title>Ransomware in 2025</title><itunes:summary><![CDATA[The cyber-extortion epidemic reached new heights in 2025, with a record number of attacks recorded. This increase is being powered by a new breed of attackers who eschew encryption and rely solely on data theft as leverage for extortion.

Recorded live at Black Hat Europe in London, Symantec & Carbon Black Threat Hunter, Dick O'Brien shares how Ransomware strategies shifted in 2025 and what's coming in 2026. 

Read the blog or download the white paper: https://www.security.com/threat-intelligence/ransomware-extortion-epidemic]]></itunes:summary><description><![CDATA[The cyber-extortion epidemic reached new heights in 2025, with a record number of attacks recorded. This increase is being powered by a new breed of attackers who eschew encryption and rely solely on data theft as leverage for extortion.

Recorded live at Black Hat Europe in London, Symantec & Carbon Black Threat Hunter, Dick O'Brien shares how Ransomware strategies shifted in 2025 and what's coming in 2026. 

Read the blog or download the white paper: https://www.security.com/threat-intelligence/ransomware-extortion-epidemic]]></description><content:encoded><![CDATA[The cyber-extortion epidemic reached new heights in 2025, with a record number of attacks recorded. This increase is being powered by a new breed of attackers who eschew encryption and rely solely on data theft as leverage for extortion.

Recorded live at Black Hat Europe in London, Symantec & Carbon Black Threat Hunter, Dick O'Brien shares how Ransomware strategies shifted in 2025 and what's coming in 2026. 

Read the blog or download the white paper: https://www.security.com/threat-intelligence/ransomware-extortion-epidemic]]></content:encoded><enclosure length="31051824" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02+-+E01+-+Ransomware+in+2025_Audio.mp4_.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02+-+E01+-+Ransomware+in+2025_Audio.mp4_.mp3</guid><pubDate>Wed, 14 Jan 2026 18:46:44 +0000</pubDate><itunes:duration>00:22:37</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>2</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>AI Code Insecurity w/ Veracode</itunes:title><title>AI Code Insecurity w/ Veracode</title><itunes:summary>Dan Mellinger and Paul Miller chat with the legendary Chris Wysopal. They discuss the evolution of cybersecurity, the impact of AI on code security, and the responsibilities of developers in the age of automated coding tools. They explore the legacy of The L0pht, the challenges of integrating AI into security practices, and the importance of maintaining vigilance in code security despite advancements in technology.</itunes:summary><description>Dan Mellinger and Paul Miller chat with the legendary Chris Wysopal. They discuss the evolution of cybersecurity, the impact of AI on code security, and the responsibilities of developers in the age of automated coding tools. They explore the legacy of The L0pht, the challenges of integrating AI into security practices, and the importance of maintaining vigilance in code security despite advancements in technology.</description><content:encoded>Dan Mellinger and Paul Miller chat with the legendary Chris Wysopal. They discuss the evolution of cybersecurity, the impact of AI on code security, and the responsibilities of developers in the age of automated coding tools. They explore the legacy of The L0pht, the challenges of integrating AI into security practices, and the importance of maintaining vigilance in code security despite advancements in technology.</content:encoded><enclosure length="67053576" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02+-+EP02+-+AI+Code+-+Final_audio.mp4_.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S02+-+EP02+-+AI+Code+-+Final_audio.mp4_.mp3</guid><pubDate>Wed, 28 Jan 2026 14:00:00 +0000</pubDate><itunes:duration>55:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>2</itunes:episode><itunes:season>2</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Chasing Vulns w/ Jerry Gamblin</itunes:title><title>Chasing Vulns w/ Jerry Gamblin</title><itunes:summary>Dan Mellinger interviews the legendary cybersecurity vulnerability researcher and open-source tool developer, Jerry Gamblin. &#13;
&#13;
They explore the importance of understanding CVEs, the role of MITRE, and the significance of the CNA Scorecard in improving data quality. &#13;
&#13;
Jerry shares insights on the challenges of managing vulnerabilities, the impact of decentralization, and the need for collaboration among software vendors. &#13;
&#13;
The conversation also touches on best practices for vulnerability management, addressing vulnerability fatigue, and the potential of AI in enhancing data processes. &#13;
&#13;
Jerry concludes with a glimpse into upcoming projects and innovations at RogoLabs.&#13;
&#13;
You can check out all of Jerry's open source tools here: https://rogolabs.net</itunes:summary><description>Dan Mellinger interviews the legendary cybersecurity vulnerability researcher and open-source tool developer, Jerry Gamblin. &#13;
&#13;
They explore the importance of understanding CVEs, the role of MITRE, and the significance of the CNA Scorecard in improving data quality. &#13;
&#13;
Jerry shares insights on the challenges of managing vulnerabilities, the impact of decentralization, and the need for collaboration among software vendors. &#13;
&#13;
The conversation also touches on best practices for vulnerability management, addressing vulnerability fatigue, and the potential of AI in enhancing data processes. &#13;
&#13;
Jerry concludes with a glimpse into upcoming projects and innovations at RogoLabs.&#13;
&#13;
You can check out all of Jerry's open source tools here: https://rogolabs.net</description><content:encoded>Dan Mellinger interviews the legendary cybersecurity vulnerability researcher and open-source tool developer, Jerry Gamblin. &#13;
&#13;
They explore the importance of understanding CVEs, the role of MITRE, and the significance of the CNA Scorecard in improving data quality. &#13;
&#13;
Jerry shares insights on the challenges of managing vulnerabilities, the impact of decentralization, and the need for collaboration among software vendors. &#13;
&#13;
The conversation also touches on best practices for vulnerability management, addressing vulnerability fatigue, and the potential of AI in enhancing data processes. &#13;
&#13;
Jerry concludes with a glimpse into upcoming projects and innovations at RogoLabs.&#13;
&#13;
You can check out all of Jerry's open source tools here: https://rogolabs.net</content:encoded><enclosure length="55557888" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01+-+E09+Chasing+Vulns+-+Final+Cut+audio.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01+-+E09+Chasing+Vulns+-+Final+Cut+audio.mp3</guid><pubDate>Wed, 19 Nov 2025 08:00:00 +0000</pubDate><itunes:duration>00:43:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>9</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Managing Security Analyst Burnout</itunes:title><title>Managing Security Analyst Burnout</title><itunes:summary>Paul Miller talks about a topic close to his heart: managing Security Operations team workload. He discusses the causes of analyst burnout, along with signs and ways to help mitigate the impacts, both human and operational.</itunes:summary><description>Paul Miller talks about a topic close to his heart: managing Security Operations team workload. He discusses the causes of analyst burnout, along with signs and ways to help mitigate the impacts, both human and operational.</description><content:encoded>Paul Miller talks about a topic close to his heart: managing Security Operations team workload. He discusses the causes of analyst burnout, along with signs and ways to help mitigate the impacts, both human and operational.</content:encoded><enclosure length="64837344" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01+-+E08+-+Managing+Analyst+Burnout.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01+-+E08+-+Managing+Analyst+Burnout.mp3</guid><pubDate>Wed, 05 Nov 2025 13:00:00 +0000</pubDate><itunes:duration>00:51:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>8</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Authentically Marketing Cybersecurity</itunes:title><title>Authentically Marketing Cybersecurity</title><itunes:summary>Dan sits down with Monica White the CMO of the Enterprise Security Group at Broadcom (and his boss) to talk about the often winding career paths in marketing, early best practices, and understand how authenticity is the key to build durable brands.</itunes:summary><description>Dan sits down with Monica White the CMO of the Enterprise Security Group at Broadcom (and his boss) to talk about the often winding career paths in marketing, early best practices, and understand how authenticity is the key to build durable brands.</description><content:encoded>Dan sits down with Monica White the CMO of the Enterprise Security Group at Broadcom (and his boss) to talk about the often winding career paths in marketing, early best practices, and understand how authenticity is the key to build durable brands.</content:encoded><enclosure length="59839488" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01+-+EP07+_+Marketing+In+Cybersecurity+-+Final+Audio.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01+-+EP07+_+Marketing+In+Cybersecurity+-+Final+Audio.mp3</guid><pubDate>Wed, 15 Oct 2025 11:23:17 +0000</pubDate><itunes:duration>00:47:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>7</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>From Cybersecurity Products to Platforms</itunes:title><title>From Cybersecurity Products to Platforms</title><itunes:summary>Dan sits down with his colleague Nate Fitzgerald (head of product management for ESG) to discuss how and why  the cybersecurity market has been transitioning from individual Products to (sometimes) integrated Platforms.</itunes:summary><description>Dan sits down with his colleague Nate Fitzgerald (head of product management for ESG) to discuss how and why  the cybersecurity market has been transitioning from individual Products to (sometimes) integrated Platforms.</description><content:encoded>Dan sits down with his colleague Nate Fitzgerald (head of product management for ESG) to discuss how and why  the cybersecurity market has been transitioning from individual Products to (sometimes) integrated Platforms.</content:encoded><enclosure length="44262576" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01+-+E06+-+From+Product+to+Platform+-+Final+Cut+01.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01+-+E06+-+From+Product+to+Platform+-+Final+Cut+01.mp3</guid><pubDate>Wed, 01 Oct 2025 11:10:58 +0000</pubDate><itunes:duration>00:32:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>6</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Cybersecurity Testing: Tuned for the Test or Tuned for the Real World?</itunes:title><title>Cybersecurity Testing: Tuned for the Test or Tuned for the Real World?</title><itunes:summary>Simon Edwards, Founder and CEO of SE Labs, and Adam Bromwich, CTO of the Enterprise Security Group at Broadcom join Dan in Las Vegas to dive into the details on cybersecurity testing which has been one of the more consistently dramatic topics in the industry.&#13;
&#13;
Definitely check out SE Labs to learn more from the best real world performance testing in the industry: https://selabs.uk</itunes:summary><description>Simon Edwards, Founder and CEO of SE Labs, and Adam Bromwich, CTO of the Enterprise Security Group at Broadcom join Dan in Las Vegas to dive into the details on cybersecurity testing which has been one of the more consistently dramatic topics in the industry.&#13;
&#13;
Definitely check out SE Labs to learn more from the best real world performance testing in the industry: https://selabs.uk</description><content:encoded>Simon Edwards, Founder and CEO of SE Labs, and Adam Bromwich, CTO of the Enterprise Security Group at Broadcom join Dan in Las Vegas to dive into the details on cybersecurity testing which has been one of the more consistently dramatic topics in the industry.&#13;
&#13;
Definitely check out SE Labs to learn more from the best real world performance testing in the industry: https://selabs.uk</content:encoded><enclosure length="46960848" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01+-+E05+-+Tuned+for+the+TestUntitled.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01+-+E05+-+Tuned+for+the+TestUntitled.mp3</guid><pubDate>Wed, 17 Sep 2025 12:00:00 +0000</pubDate><itunes:duration>00:35:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>5</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Diving Deep Into Vulnerability Risk Modeling w/ Empirical Security</itunes:title><title>Diving Deep Into Vulnerability Risk Modeling w/ Empirical Security</title><itunes:summary>Recorded from Hacker Summer Camp in Las Vegas, Dan dives deep into the history and current state of measuring cybersecurity vulnerability risk at scale with the team from Empirical Security. &#13;
&#13;
Ed, Michael, and Wade discuss some of the history of vulnerability measurement through the last decade and how they thin the time is now for organizations to start applying highly-specific local vulnerability modeling to their security strategies.&#13;
&#13;
There is a ton of amazing information you won't find anywhere else on the Empirical Security Blog: https://www.empiricalsecurity.com</itunes:summary><description>Recorded from Hacker Summer Camp in Las Vegas, Dan dives deep into the history and current state of measuring cybersecurity vulnerability risk at scale with the team from Empirical Security. &#13;
&#13;
Ed, Michael, and Wade discuss some of the history of vulnerability measurement through the last decade and how they thin the time is now for organizations to start applying highly-specific local vulnerability modeling to their security strategies.&#13;
&#13;
There is a ton of amazing information you won't find anywhere else on the Empirical Security Blog: https://www.empiricalsecurity.com</description><content:encoded>Recorded from Hacker Summer Camp in Las Vegas, Dan dives deep into the history and current state of measuring cybersecurity vulnerability risk at scale with the team from Empirical Security. &#13;
&#13;
Ed, Michael, and Wade discuss some of the history of vulnerability measurement through the last decade and how they thin the time is now for organizations to start applying highly-specific local vulnerability modeling to their security strategies.&#13;
&#13;
There is a ton of amazing information you won't find anywhere else on the Empirical Security Blog: https://www.empiricalsecurity.com</content:encoded><enclosure length="75513360" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/SE01-EP04_Empirical+Security_variable_0.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/SE01-EP04_Empirical+Security_variable_0.mp3</guid><pubDate>Wed, 03 Sep 2025 16:05:11 +0000</pubDate><itunes:duration>00:58:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>4</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Cybersecurity Tips For Seniors and Parents w/ Alex East</itunes:title><title>Cybersecurity Tips For Seniors and Parents w/ Alex East</title><itunes:summary>Dan sits down with author Alex East to discuss cybersecurity tips for Seniors and Parents. &#13;
&#13;
You can find Alex's books on Amazon: https://www.amazon.com/stores/Alex-East/author/B0D9VCFVPX&#13;
&#13;
Sorry about the video quality, the main SSDs on the external recorder was a potato.</itunes:summary><description>Dan sits down with author Alex East to discuss cybersecurity tips for Seniors and Parents. &#13;
&#13;
You can find Alex's books on Amazon: https://www.amazon.com/stores/Alex-East/author/B0D9VCFVPX&#13;
&#13;
Sorry about the video quality, the main SSDs on the external recorder was a potato.</description><content:encoded>Dan sits down with author Alex East to discuss cybersecurity tips for Seniors and Parents. &#13;
&#13;
You can find Alex's books on Amazon: https://www.amazon.com/stores/Alex-East/author/B0D9VCFVPX&#13;
&#13;
Sorry about the video quality, the main SSDs on the external recorder was a potato.</content:encoded><enclosure length="63067200" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Cyber+Tips+For+The+Most+At-Risk.mp4_.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Cyber+Tips+For+The+Most+At-Risk.mp4_.mp3</guid><pubDate>Mon, 25 Aug 2025 19:09:08 +0000</pubDate><itunes:duration>00:26:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>3</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Preventing a Nuclear Apocalypse with Threat Intel</itunes:title><title>Preventing a Nuclear Apocalypse with Threat Intel</title><itunes:summary>Paul Miller recounts a critical incident involving threat intelligence that potentially prevented a nuclear disaster. They explore the geopolitical context surrounding the incident, the challenges of incident response, and the complexities of attributing cyber attacks to specific threat actors. The conversation highlights the importance of threat intelligence in understanding and mitigating risks, as well as best practices for incident response in the face of evolving cyber threats.&#13;
&#13;
Takeaways&#13;
&#13;
- Threat intelligence is crucial for understanding cyber threats.&#13;
- Geopolitical events can significantly impact cybersecurity.&#13;
- Incident response requires quick decision-making and analysis.&#13;
- Attribution of cyber attacks is complex and fraught with challenges.&#13;
- Cybersecurity incidents can have far-reaching consequences.&#13;
- Effective communication with government agencies is essential.&#13;
- Historical data analysis is key to threat hunting.&#13;
- Most cybersecurity work involves routine tasks, with occasional high-stakes incidents.&#13;
- The evolution of cyber threats necessitates constant vigilance and adaptation.&#13;
- Collaboration within the cybersecurity community enhances overall defense strategies.</itunes:summary><description>Paul Miller recounts a critical incident involving threat intelligence that potentially prevented a nuclear disaster. They explore the geopolitical context surrounding the incident, the challenges of incident response, and the complexities of attributing cyber attacks to specific threat actors. The conversation highlights the importance of threat intelligence in understanding and mitigating risks, as well as best practices for incident response in the face of evolving cyber threats.&#13;
&#13;
Takeaways&#13;
&#13;
- Threat intelligence is crucial for understanding cyber threats.&#13;
- Geopolitical events can significantly impact cybersecurity.&#13;
- Incident response requires quick decision-making and analysis.&#13;
- Attribution of cyber attacks is complex and fraught with challenges.&#13;
- Cybersecurity incidents can have far-reaching consequences.&#13;
- Effective communication with government agencies is essential.&#13;
- Historical data analysis is key to threat hunting.&#13;
- Most cybersecurity work involves routine tasks, with occasional high-stakes incidents.&#13;
- The evolution of cyber threats necessitates constant vigilance and adaptation.&#13;
- Collaboration within the cybersecurity community enhances overall defense strategies.</description><content:encoded>Paul Miller recounts a critical incident involving threat intelligence that potentially prevented a nuclear disaster. They explore the geopolitical context surrounding the incident, the challenges of incident response, and the complexities of attributing cyber attacks to specific threat actors. The conversation highlights the importance of threat intelligence in understanding and mitigating risks, as well as best practices for incident response in the face of evolving cyber threats.&#13;
&#13;
Takeaways&#13;
&#13;
- Threat intelligence is crucial for understanding cyber threats.&#13;
- Geopolitical events can significantly impact cybersecurity.&#13;
- Incident response requires quick decision-making and analysis.&#13;
- Attribution of cyber attacks is complex and fraught with challenges.&#13;
- Cybersecurity incidents can have far-reaching consequences.&#13;
- Effective communication with government agencies is essential.&#13;
- Historical data analysis is key to threat hunting.&#13;
- Most cybersecurity work involves routine tasks, with occasional high-stakes incidents.&#13;
- The evolution of cyber threats necessitates constant vigilance and adaptation.&#13;
- Collaboration within the cybersecurity community enhances overall defense strategies.</content:encoded><enclosure length="77477760" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01+-+E02+-+Stopping+a+Nuclear+Apocalypse+with+Threat+Intel_Audio.mp4_.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/S01+-+E02+-+Stopping+a+Nuclear+Apocalypse+with+Threat+Intel_Audio.mp4_.mp3</guid><pubDate>Thu, 31 Jul 2025 17:42:59 +0000</pubDate><itunes:duration>00:32:16</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>2</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Navigating Hacker Summer Camp</itunes:title><title>Navigating Hacker Summer Camp</title><itunes:summary>In the very first episode of SECURITY.COM The Podcast, hosts Dan Mellinger and Paul Miller discuss the upcoming Hacker Summer Camp, which includes major cybersecurity conferences like DEF CON, Black Hat, and B-Sides. &#13;
&#13;
They provide an overview of each event, highlighting their unique focuses and the importance of networking and learning. The conversation also covers essential safety tips for attendees, emphasizing the need for encryption and caution in sharing personal information. The episode concludes with a preview of future topics and a reminder to stay curious and human in the cybersecurity field.</itunes:summary><description>In the very first episode of SECURITY.COM The Podcast, hosts Dan Mellinger and Paul Miller discuss the upcoming Hacker Summer Camp, which includes major cybersecurity conferences like DEF CON, Black Hat, and B-Sides. &#13;
&#13;
They provide an overview of each event, highlighting their unique focuses and the importance of networking and learning. The conversation also covers essential safety tips for attendees, emphasizing the need for encryption and caution in sharing personal information. The episode concludes with a preview of future topics and a reminder to stay curious and human in the cybersecurity field.</description><content:encoded>In the very first episode of SECURITY.COM The Podcast, hosts Dan Mellinger and Paul Miller discuss the upcoming Hacker Summer Camp, which includes major cybersecurity conferences like DEF CON, Black Hat, and B-Sides. &#13;
&#13;
They provide an overview of each event, highlighting their unique focuses and the importance of networking and learning. The conversation also covers essential safety tips for attendees, emphasizing the need for encryption and caution in sharing personal information. The episode concludes with a preview of future topics and a reminder to stay curious and human in the cybersecurity field.</content:encoded><enclosure length="93508800" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/SE01-EP01_Hacker+Summer+Camp+Audio.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/SE01-EP01_Hacker+Summer+Camp+Audio.mp3</guid><pubDate>Tue, 29 Jul 2025 16:02:13 +0000</pubDate><itunes:duration>00:38:58</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>1</itunes:episode><itunes:season>1</itunes:season></item><item><itunes:episodeType>full</itunes:episodeType><itunes:title>Welcome to SECURITY.COM The Podcast</itunes:title><title>Welcome to SECURITY.COM The Podcast</title><itunes:summary>Join Dan Mellinger, your go-to cybersecurity communicator, and Paul Miller, seasoned threat intelligence and operations leader, on SECURITY.COM The Podcast, a show that bridges the gap between cutting-edge security tech and the humans who make it work. Delivering enterprise-grade security insights for all.&#13;
&#13;
Every first and third week each month, they unpack hard-nosed technical deep dives—from threat hunting and breaking analysis to the not-so-secrets of Data Security and SSE others won’t tell you—all rooted in the same high‑quality content and bold thought leadership you’ve come to expect on SECURITY.COM.</itunes:summary><description>Join Dan Mellinger, your go-to cybersecurity communicator, and Paul Miller, seasoned threat intelligence and operations leader, on SECURITY.COM The Podcast, a show that bridges the gap between cutting-edge security tech and the humans who make it work. Delivering enterprise-grade security insights for all.&#13;
&#13;
Every first and third week each month, they unpack hard-nosed technical deep dives—from threat hunting and breaking analysis to the not-so-secrets of Data Security and SSE others won’t tell you—all rooted in the same high‑quality content and bold thought leadership you’ve come to expect on SECURITY.COM.</description><content:encoded>Join Dan Mellinger, your go-to cybersecurity communicator, and Paul Miller, seasoned threat intelligence and operations leader, on SECURITY.COM The Podcast, a show that bridges the gap between cutting-edge security tech and the humans who make it work. Delivering enterprise-grade security insights for all.&#13;
&#13;
Every first and third week each month, they unpack hard-nosed technical deep dives—from threat hunting and breaking analysis to the not-so-secrets of Data Security and SSE others won’t tell you—all rooted in the same high‑quality content and bold thought leadership you’ve come to expect on SECURITY.COM.</content:encoded><enclosure length="2920320" url="https://dts.podtrac.com/redirect.mp3/symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Welcome+to+the+podcast+Audio.mp3" type="audio/mpeg"/><guid>https://symantec-enterprise-podcasts.security.com/podcasts/assets/audio/Welcome+to+the+podcast+Audio.mp3</guid><pubDate>Mon, 28 Jul 2025 17:28:45 +0000</pubDate><itunes:duration>00:01:13</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episode>0</itunes:episode><itunes:season>1</itunes:season></item></channel></rss>
