<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://stagingphoenix.kinsta.cloud/wp-content/plugins/seriously-simple-podcasting/templates/feed-stylesheet.xsl"?><rss version="2.0"
	 xmlns:content="http://purl.org/rss/1.0/modules/content/"
	 xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	 xmlns:dc="http://purl.org/dc/elements/1.1/"
	 xmlns:atom="http://www.w3.org/2005/Atom"
	 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	 xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	 xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
	 xmlns:podcast="https://podcastindex.org/namespace/1.0"
	xmlns:media="http://search.yahoo.com/mrss/" 
>
		<channel>
		<title>Phoenix Security</title>
		<atom:link href="https://stagingphoenix.kinsta.cloud/feed/podcast/phoenix-security/" rel="self" type="application/rss+xml"/>
		<link>https://stagingphoenix.kinsta.cloud/series/phoenix-security/</link>
		<description>Contextualize Prioritize and ACT ON RISK</description>
		<lastBuildDate>Sun, 28 Jul 2024 20:23:14 +0000</lastBuildDate>
		<language>en-GB</language>
		<copyright>&#xA9; 2026 Phoenix Security</copyright>
		<itunes:subtitle>Contextualize Prioritize and ACT ON RISK</itunes:subtitle>
		<itunes:author>Phoenix Security</itunes:author>
		<itunes:summary>Contextualize Prioritize and ACT ON RISK</itunes:summary>
		<itunes:owner>
			<itunes:name>Phoenix Security</itunes:name>
		</itunes:owner>
		<itunes:explicit>false</itunes:explicit>
		<googleplay:author><![CDATA[Phoenix Security]]></googleplay:author>
						<googleplay:description>Contextualize Prioritize and ACT ON RISK</googleplay:description>
			<googleplay:explicit>No</googleplay:explicit>
			<podcast:locked>yes</podcast:locked>
		<podcast:guid>08d75233-231d-5924-bbdc-c0a41917c3d9</podcast:guid>
		
		<!-- podcast_generator="SSP by Castos/3.1.1" Seriously Simple Podcasting plugin for WordPress (https://wordpress.org/plugins/seriously-simple-podcasting/) -->
		<generator>https://wordpress.org/?v=6.4.3</generator>

<item>
	<title>CSCP S4EP18 &#8211; James Berthoty &#8211; What The heck is ASPM and the evolution of Product security</title>
	<link>https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep18-james-berthoty-what-the-heck-is-aspm-and-the-evolution-of-product-security/</link>
	<pubDate>Sun, 28 Jul 2024 20:23:14 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep18-james-berthoty-what-the-heck-is-aspm-and-the-evolution-of-product-security/</guid>
	<description><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />Join us for an engaging episode as we welcome James Berthoty, a seasoned cybersecurity professional with a diverse background spanning sysadmin, DevOps, and security engineering roles. James takes us through his journey across different organizations, including his current role at PagerDuty, where he tackles the intricate challenges of FedRAMP compliance. Listen in as James shares [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[Join us for an engaging episode as we welcome James Berthoty, a seasoned cybersecurity professional with a diverse background spanning sysadmin, DevOps, and security engineering roles. James takes us through his journey across different organizations, in]]></itunes:subtitle>
	<content:encoded><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />Join us for an engaging episode as we welcome James Berthoty, a seasoned cybersecurity professional with a diverse background spanning sysadmin, DevOps, and security engineering roles. James takes us through his journey across different organizations, including his current role at PagerDuty, where he tackles the intricate challenges of FedRAMP compliance. Listen in as James shares [&#8230;]]]></content:encoded>
	<enclosure url="https://stagingphoenix.kinsta.cloud/podcast-download/30927/cscp-s4ep18-james-berthoty-what-the-heck-is-aspm-and-the-evolution-of-product-security.mp3" length="91326923" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Join us for an engaging episode as we welcome James Berthoty, a seasoned cybersecurity professional with a diverse background spanning sysadmin, DevOps, and security engineering roles. James takes us through his journey across different organizations, including his current role at PagerDuty, where he tackles the intricate challenges of FedRAMP compliance. Listen in as James shares [&#8230;]]]></itunes:summary>
	<itunes:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG.jpeg"></itunes:image>
	<image>
		<url>https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG.jpeg</url>
		<title>CSCP S4EP18 &#8211; James Berthoty &#8211; What The heck is ASPM and the evolution of Product security</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[Join us for an engaging episode as we welcome James Berthoty, a seasoned cybersecurity professional with a diverse background spanning sysadmin, DevOps, and security engineering roles. James takes us through his journey across different organizations, including his current role at PagerDuty, where he tackles the intricate challenges of FedRAMP compliance. Listen in as James shares [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-qlL2uG.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP18 &#8211; Marius Poskus &#8211;  Who mention about non technical CISO &#8211; ASPM and Running application security programs from CISO perspective</title>
	<link>https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep18-marius-poskus-who-mention-about-non-technical-ciso-aspm-and-running-application-security-programs-from-ciso-perspective/</link>
	<pubDate>Sun, 07 Jul 2024 20:57:15 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep18-marius-poskus-who-mention-about-non-technical-ciso-aspm-and-running-application-security-programs-from-ciso-perspective/</guid>
	<description><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp.jpeg 1399w" sizes="(max-width: 150px) 100vw, 150px" />Join us as we explore the evolving application security landscape with Marius Poskus, VP of Glow Financial Services and a seasoned cybersecurity professional. In this episode, we delve into the increasing adoption of open-source code and AI in startup development, examining the potential impacts on code security amid rapid innovation pressures. Marius shares his insights on [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[Join us as we explore the evolving application security landscape with Marius Poskus, VP of Glow Financial Services and a seasoned cybersecurity professional. In this episode, we delve into the increasing adoption of open-source code and AI in startup de]]></itunes:subtitle>
	<content:encoded><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp.jpeg 1399w" sizes="(max-width: 150px) 100vw, 150px" />Join us as we explore the evolving application security landscape with Marius Poskus, VP of Glow Financial Services and a seasoned cybersecurity professional. In this episode, we delve into the increasing adoption of open-source code and AI in startup development, examining the potential impacts on code security amid rapid innovation pressures. Marius shares his insights on [&#8230;]]]></content:encoded>
	<enclosure url="https://stagingphoenix.kinsta.cloud/podcast-download/30925/cscp-s4ep18-marius-poskus-who-mention-about-non-technical-ciso-aspm-and-running-application-security-programs-from-ciso-perspective.mp3" length="53968272" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Join us as we explore the evolving application security landscape with Marius Poskus, VP of Glow Financial Services and a seasoned cybersecurity professional. In this episode, we delve into the increasing adoption of open-source code and AI in startup development, examining the potential impacts on code security amid rapid innovation pressures. Marius shares his insights on [&#8230;]]]></itunes:summary>
	<itunes:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp.jpeg"></itunes:image>
	<image>
		<url>https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp.jpeg</url>
		<title>CSCP S4EP18 &#8211; Marius Poskus &#8211;  Who mention about non technical CISO &#8211; ASPM and Running application security programs from CISO perspective</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[Join us as we explore the evolving application security landscape with Marius Poskus, VP of Glow Financial Services and a seasoned cybersecurity professional. In this episode, we delve into the increasing adoption of open-source code and AI in startup development, examining the potential impacts on code security amid rapid innovation pressures. Marius shares his insights on [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-N4pobp.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP17 &#8211; Adam Shostack  &#8211; Threat modelling in past and future with   Adam Shostack from vulnerability to ASPM and modern application security</title>
	<link>https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep17-adam-shostack-threat-modelling-in-past-and-future-with-adam-shostack-from-vulnerability-to-aspm-and-modern-application-security/</link>
	<pubDate>Sun, 16 Jun 2024 22:44:56 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep17-adam-shostack-threat-modelling-in-past-and-future-with-adam-shostack-from-vulnerability-to-aspm-and-modern-application-security/</guid>
	<description><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj.jpeg 1399w" sizes="(max-width: 150px) 100vw, 150px" />  Join us in this insightful episode of the Cybersecurity and Cloud Podcast, where host Francesco Cipollone sits down with the pioneer of threat modeling, Adam Shostack. Dive into the intricacies of Application Security Posture Management (ASPM), effective threat modeling practices, and the innovative solutions offered by Phoenix Security. Gain valuable knowledge on how to [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[  Join us in this insightful episode of the Cybersecurity and Cloud Podcast, where host Francesco Cipollone sits down with the pioneer of threat modeling, Adam Shostack. Dive into the intricacies of Application Security Posture Management (ASPM), effecti]]></itunes:subtitle>
	<content:encoded><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj.jpeg 1399w" sizes="(max-width: 150px) 100vw, 150px" />  Join us in this insightful episode of the Cybersecurity and Cloud Podcast, where host Francesco Cipollone sits down with the pioneer of threat modeling, Adam Shostack. Dive into the intricacies of Application Security Posture Management (ASPM), effective threat modeling practices, and the innovative solutions offered by Phoenix Security. Gain valuable knowledge on how to [&#8230;]]]></content:encoded>
	<enclosure url="https://stagingphoenix.kinsta.cloud/podcast-download/30923/cscp-s4ep17-adam-shostack-threat-modelling-in-past-and-future-with-adam-shostack-from-vulnerability-to-aspm-and-modern-application-security.mp3" length="70331164" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[  Join us in this insightful episode of the Cybersecurity and Cloud Podcast, where host Francesco Cipollone sits down with the pioneer of threat modeling, Adam Shostack. Dive into the intricacies of Application Security Posture Management (ASPM), effective threat modeling practices, and the innovative solutions offered by Phoenix Security. Gain valuable knowledge on how to [&#8230;]]]></itunes:summary>
	<itunes:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj.jpeg"></itunes:image>
	<image>
		<url>https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj.jpeg</url>
		<title>CSCP S4EP17 &#8211; Adam Shostack  &#8211; Threat modelling in past and future with   Adam Shostack from vulnerability to ASPM and modern application security</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[  Join us in this insightful episode of the Cybersecurity and Cloud Podcast, where host Francesco Cipollone sits down with the pioneer of threat modeling, Adam Shostack. Dive into the intricacies of Application Security Posture Management (ASPM), effective threat modeling practices, and the innovative solutions offered by Phoenix Security. Gain valuable knowledge on how to [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-LBxHXj.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP16 &#8211; Irene Michlin &#8211; Threat Modelling in the age of AI</title>
	<link>https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep16-irene-michlin-threat-modelling-in-the-age-of-ai/</link>
	<pubDate>Sun, 26 May 2024 20:40:24 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep16-irene-michlin-threat-modelling-in-the-age-of-ai/</guid>
	<description><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />  Listen in as we navigate the crucial role of threat modeling in the landscape of application security with our esteemed guest, Irene Michlin, the application security lead at Neo4j. Together, we peel back the layers of integrating a developer&#8217;s insight into the security process and how it fortifies the software development lifecycle. Irene&#8217;s journey [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[  Listen in as we navigate the crucial role of threat modeling in the landscape of application security with our esteemed guest, Irene Michlin, the application security lead at Neo4j. Together, we peel back the layers of integrating a developer&#8217;s i]]></itunes:subtitle>
	<content:encoded><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />  Listen in as we navigate the crucial role of threat modeling in the landscape of application security with our esteemed guest, Irene Michlin, the application security lead at Neo4j. Together, we peel back the layers of integrating a developer&#8217;s insight into the security process and how it fortifies the software development lifecycle. Irene&#8217;s journey [&#8230;]]]></content:encoded>
	<enclosure url="https://stagingphoenix.kinsta.cloud/podcast-download/30921/cscp-s4ep16-irene-michlin-threat-modelling-in-the-age-of-ai.m4a" length="49796233" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[  Listen in as we navigate the crucial role of threat modeling in the landscape of application security with our esteemed guest, Irene Michlin, the application security lead at Neo4j. Together, we peel back the layers of integrating a developer&#8217;s insight into the security process and how it fortifies the software development lifecycle. Irene&#8217;s journey [&#8230;]]]></itunes:summary>
	<itunes:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd.jpeg"></itunes:image>
	<image>
		<url>https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd.jpeg</url>
		<title>CSCP S4EP16 &#8211; Irene Michlin &#8211; Threat Modelling in the age of AI</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[  Listen in as we navigate the crucial role of threat modeling in the landscape of application security with our esteemed guest, Irene Michlin, the application security lead at Neo4j. Together, we peel back the layers of integrating a developer&#8217;s insight into the security process and how it fortifies the software development lifecycle. Irene&#8217;s journey [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI_sq_ncjd79-IW2mWd.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP14 &#8211; Akira Brand &#8211; Singing the Tune of Application Security with Akira Brand</title>
	<link>https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep14-akira-brand-singing-the-tune-of-application-security-with-akira-brand/</link>
	<pubDate>Sun, 12 May 2024 22:37:08 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep14-akira-brand-singing-the-tune-of-application-security-with-akira-brand/</guid>
	<description><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />  Join us for an in-depth discussion on the challenges and strategies of Application Security Program Management (ASPM) in today&#8217;s fast-evolving tech landscape. Francesco Cipollone welcomes guest Akira Brand, a seasoned application security engineer and cybersecurity consultant, to explore practical insights into securing applications in the cloud and beyond. We also examine the shift in [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[  Join us for an in-depth discussion on the challenges and strategies of Application Security Program Management (ASPM) in today&#8217;s fast-evolving tech landscape. Francesco Cipollone welcomes guest Akira Brand, a seasoned application security enginee]]></itunes:subtitle>
	<content:encoded><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />  Join us for an in-depth discussion on the challenges and strategies of Application Security Program Management (ASPM) in today&#8217;s fast-evolving tech landscape. Francesco Cipollone welcomes guest Akira Brand, a seasoned application security engineer and cybersecurity consultant, to explore practical insights into securing applications in the cloud and beyond. We also examine the shift in [&#8230;]]]></content:encoded>
	<enclosure url="https://stagingphoenix.kinsta.cloud/podcast-download/30919/cscp-s4ep14-akira-brand-singing-the-tune-of-application-security-with-akira-brand.m4a" length="41043685" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[  Join us for an in-depth discussion on the challenges and strategies of Application Security Program Management (ASPM) in today&#8217;s fast-evolving tech landscape. Francesco Cipollone welcomes guest Akira Brand, a seasoned application security engineer and cybersecurity consultant, to explore practical insights into securing applications in the cloud and beyond. We also examine the shift in [&#8230;]]]></itunes:summary>
	<itunes:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV.jpeg"></itunes:image>
	<image>
		<url>https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV.jpeg</url>
		<title>CSCP S4EP14 &#8211; Akira Brand &#8211; Singing the Tune of Application Security with Akira Brand</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[  Join us for an in-depth discussion on the challenges and strategies of Application Security Program Management (ASPM) in today&#8217;s fast-evolving tech landscape. Francesco Cipollone welcomes guest Akira Brand, a seasoned application security engineer and cybersecurity consultant, to explore practical insights into securing applications in the cloud and beyond. We also examine the shift in [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-Mw6gxV.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP14 &#8211; Izar Tarandach &#8211; The Future of Threat Modeling and Product Security, with Izar Tarandach</title>
	<link>https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep14-izar-tarandach-the-future-of-threat-modeling-and-product-security-with-izar-tarandach/</link>
	<pubDate>Sun, 21 Apr 2024 19:57:09 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep14-izar-tarandach-the-future-of-threat-modeling-and-product-security-with-izar-tarandach/</guid>
	<description><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />  This episode features guest Izar Tarandach, a seasoned security architect with extensive experience in application security, cloud security, and the development of comprehensive security frameworks. Our discussion navigates through the latest trends in application security, the pivotal role of DevSecOps, and the strategic integration of security practices within modern business environments. Sponsored by Phoenix [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[  This episode features guest Izar Tarandach, a seasoned security architect with extensive experience in application security, cloud security, and the development of comprehensive security frameworks. Our discussion navigates through the latest trends in]]></itunes:subtitle>
	<content:encoded><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />  This episode features guest Izar Tarandach, a seasoned security architect with extensive experience in application security, cloud security, and the development of comprehensive security frameworks. Our discussion navigates through the latest trends in application security, the pivotal role of DevSecOps, and the strategic integration of security practices within modern business environments. Sponsored by Phoenix [&#8230;]]]></content:encoded>
	<enclosure url="https://stagingphoenix.kinsta.cloud/podcast-download/30917/cscp-s4ep14-izar-tarandach-the-future-of-threat-modeling-and-product-security-with-izar-tarandach.m4a" length="52446756" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[  This episode features guest Izar Tarandach, a seasoned security architect with extensive experience in application security, cloud security, and the development of comprehensive security frameworks. Our discussion navigates through the latest trends in application security, the pivotal role of DevSecOps, and the strategic integration of security practices within modern business environments. Sponsored by Phoenix [&#8230;]]]></itunes:summary>
	<itunes:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6.jpeg"></itunes:image>
	<image>
		<url>https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6.jpeg</url>
		<title>CSCP S4EP14 &#8211; Izar Tarandach &#8211; The Future of Threat Modeling and Product Security, with Izar Tarandach</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[  This episode features guest Izar Tarandach, a seasoned security architect with extensive experience in application security, cloud security, and the development of comprehensive security frameworks. Our discussion navigates through the latest trends in application security, the pivotal role of DevSecOps, and the strategic integration of security practices within modern business environments. Sponsored by Phoenix [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-paqyI6.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP13 &#8211; Josh Goldberg &#8211; Crafting Secure Applications in the Age of AI with Josh Goldberg</title>
	<link>https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep13-josh-goldberg-crafting-secure-applications-in-the-age-of-ai-with-josh-goldberg/</link>
	<pubDate>Sun, 07 Apr 2024 20:11:54 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep13-josh-goldberg-crafting-secure-applications-in-the-age-of-ai-with-josh-goldberg/</guid>
	<description><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />A dev perspective on application security: Dive deep into the pivotal nexus of cybersecurity, application security, and software development in our latest podcast episode featuring Josh Goldberg, a renowned figure in the TypeScript ecosystem. This episode sheds light on the evolving realm of secure coding practices, acknowledging the progress achieved while recognizing the challenges that [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[A dev perspective on application security: Dive deep into the pivotal nexus of cybersecurity, application security, and software development in our latest podcast episode featuring Josh Goldberg, a renowned figure in the TypeScript ecosystem. This episod]]></itunes:subtitle>
	<content:encoded><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />A dev perspective on application security: Dive deep into the pivotal nexus of cybersecurity, application security, and software development in our latest podcast episode featuring Josh Goldberg, a renowned figure in the TypeScript ecosystem. This episode sheds light on the evolving realm of secure coding practices, acknowledging the progress achieved while recognizing the challenges that [&#8230;]]]></content:encoded>
	<enclosure url="https://stagingphoenix.kinsta.cloud/podcast-download/30915/cscp-s4ep13-josh-goldberg-crafting-secure-applications-in-the-age-of-ai-with-josh-goldberg.m4a" length="45575647" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[A dev perspective on application security: Dive deep into the pivotal nexus of cybersecurity, application security, and software development in our latest podcast episode featuring Josh Goldberg, a renowned figure in the TypeScript ecosystem. This episode sheds light on the evolving realm of secure coding practices, acknowledging the progress achieved while recognizing the challenges that [&#8230;]]]></itunes:summary>
	<itunes:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP.jpeg"></itunes:image>
	<image>
		<url>https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP.jpeg</url>
		<title>CSCP S4EP13 &#8211; Josh Goldberg &#8211; Crafting Secure Applications in the Age of AI with Josh Goldberg</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[A dev perspective on application security: Dive deep into the pivotal nexus of cybersecurity, application security, and software development in our latest podcast episode featuring Josh Goldberg, a renowned figure in the TypeScript ecosystem. This episode sheds light on the evolving realm of secure coding practices, acknowledging the progress achieved while recognizing the challenges that [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-cUmoDP.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP12 &#8211; Raj Umadas &#8211; Diving Deep into Cybersecurity and Application Security Journey exploring Frontiers with Maestro Raj Umadas</title>
	<link>https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep12-raj-umadas-diving-deep-into-cybersecurity-and-application-security-journey-exploring-frontiers-with-maestro-raj-umadas/</link>
	<pubDate>Sun, 24 Mar 2024 22:45:06 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep12-raj-umadas-diving-deep-into-cybersecurity-and-application-security-journey-exploring-frontiers-with-maestro-raj-umadas/</guid>
	<description><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m.jpeg 1395w" sizes="(max-width: 150px) 100vw, 150px" />What does it take to get into application security from pentesting? Will AI replace the role of product security? How do you start an application security program and write a book about it?    Join us on the Cybersecurity and Cloud Podcast as we welcome the insightful Raj Umadas, head of InfoSec at Ackblue, for [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[What does it take to get into application security from pentesting? Will AI replace the role of product security? How do you start an application security program and write a book about it?    Join us on the Cybersecurity and Cloud Podcast as we welcome ]]></itunes:subtitle>
	<content:encoded><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m.jpeg 1395w" sizes="(max-width: 150px) 100vw, 150px" />What does it take to get into application security from pentesting? Will AI replace the role of product security? How do you start an application security program and write a book about it?    Join us on the Cybersecurity and Cloud Podcast as we welcome the insightful Raj Umadas, head of InfoSec at Ackblue, for [&#8230;]]]></content:encoded>
	<enclosure url="https://stagingphoenix.kinsta.cloud/podcast-download/30913/cscp-s4ep12-raj-umadas-diving-deep-into-cybersecurity-and-application-security-journey-exploring-frontiers-with-maestro-raj-umadas.m4a" length="49199709" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[What does it take to get into application security from pentesting? Will AI replace the role of product security? How do you start an application security program and write a book about it?    Join us on the Cybersecurity and Cloud Podcast as we welcome the insightful Raj Umadas, head of InfoSec at Ackblue, for [&#8230;]]]></itunes:summary>
	<itunes:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m.jpeg"></itunes:image>
	<image>
		<url>https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m.jpeg</url>
		<title>CSCP S4EP12 &#8211; Raj Umadas &#8211; Diving Deep into Cybersecurity and Application Security Journey exploring Frontiers with Maestro Raj Umadas</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[What does it take to get into application security from pentesting? Will AI replace the role of product security? How do you start an application security program and write a book about it?    Join us on the Cybersecurity and Cloud Podcast as we welcome the insightful Raj Umadas, head of InfoSec at Ackblue, for [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-lxBw1m.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP11 &#8211; Derek Fisher &#8211; Strengthening Digital Defenses Inside Application Security and the Role of AI in Cybersecurity</title>
	<link>https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep11-derek-fisher-strengthening-digital-defenses-inside-application-security-and-the-role-of-ai-in-cybersecurity/</link>
	<pubDate>Sun, 03 Mar 2024 23:49:12 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep11-derek-fisher-strengthening-digital-defenses-inside-application-security-and-the-role-of-ai-in-cybersecurity/</guid>
	<description><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />In today&#8217;s digital age, the realms of Application Security and Cybersecurity are rapidly evolving, driven by the relentless pace of technological innovation. Derek Fisher, a renowned figure in the application security sphere and an accomplished author, joins us to shed light on these pivotal areas. His insights provide a roadmap for navigating the complexities of [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[In today&#8217;s digital age, the realms of Application Security and Cybersecurity are rapidly evolving, driven by the relentless pace of technological innovation. Derek Fisher, a renowned figure in the application security sphere and an accomplished aut]]></itunes:subtitle>
	<content:encoded><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />In today&#8217;s digital age, the realms of Application Security and Cybersecurity are rapidly evolving, driven by the relentless pace of technological innovation. Derek Fisher, a renowned figure in the application security sphere and an accomplished author, joins us to shed light on these pivotal areas. His insights provide a roadmap for navigating the complexities of [&#8230;]]]></content:encoded>
	<enclosure url="https://stagingphoenix.kinsta.cloud/podcast-download/30874/cscp-s4ep11-derek-fisher-strengthening-digital-defenses-inside-application-security-and-the-role-of-ai-in-cybersecurity.m4a" length="44781594" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[In today&#8217;s digital age, the realms of Application Security and Cybersecurity are rapidly evolving, driven by the relentless pace of technological innovation. Derek Fisher, a renowned figure in the application security sphere and an accomplished author, joins us to shed light on these pivotal areas. His insights provide a roadmap for navigating the complexities of [&#8230;]]]></itunes:summary>
	<itunes:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa.jpeg"></itunes:image>
	<image>
		<url>https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa.jpeg</url>
		<title>CSCP S4EP11 &#8211; Derek Fisher &#8211; Strengthening Digital Defenses Inside Application Security and the Role of AI in Cybersecurity</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[In today&#8217;s digital age, the realms of Application Security and Cybersecurity are rapidly evolving, driven by the relentless pace of technological innovation. Derek Fisher, a renowned figure in the application security sphere and an accomplished author, joins us to shed light on these pivotal areas. His insights provide a roadmap for navigating the complexities of [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP10 &#8211; David Matousek &#8211; Will Ai replace Product Security? automation vs experteese</title>
	<link>https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep10-david-matousek-will-ai-replace-product-security-automation-vs-experteese/</link>
	<pubDate>Sun, 18 Feb 2024 19:35:08 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep10-david-matousek-will-ai-replace-product-security-automation-vs-experteese/</guid>
	<description><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="application security product security cybersecurity appsec aspm david matousek cscp cyber security cloud podcast" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o-1536x1536.jpeg 1536w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o.jpeg 1920w" sizes="(max-width: 150px) 100vw, 150px" />Will AI replace the role of product security? Join us in an enlightening conversation with David Matousek, where we dive deep into the synergy between automation and product security in the realm of application security. Explore the fascinating world of product security with David Matousek on the Cybersecurity and Cloud Podcast. Discover how transitioning from [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[Will AI replace the role of product security? Join us in an enlightening conversation with David Matousek, where we dive deep into the synergy between automation and product security in the realm of application security. Explore the fascinating world of ]]></itunes:subtitle>
	<content:encoded><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="application security product security cybersecurity appsec aspm david matousek cscp cyber security cloud podcast" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o-1536x1536.jpeg 1536w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o.jpeg 1920w" sizes="(max-width: 150px) 100vw, 150px" />Will AI replace the role of product security? Join us in an enlightening conversation with David Matousek, where we dive deep into the synergy between automation and product security in the realm of application security. Explore the fascinating world of product security with David Matousek on the Cybersecurity and Cloud Podcast. Discover how transitioning from [&#8230;]]]></content:encoded>
	<enclosure url="https://stagingphoenix.kinsta.cloud/podcast-download/30752/cscp-s4ep10-david-matousek-will-ai-replace-product-security-automation-vs-experteese.m4a" length="42842747" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Will AI replace the role of product security? Join us in an enlightening conversation with David Matousek, where we dive deep into the synergy between automation and product security in the realm of application security. Explore the fascinating world of product security with David Matousek on the Cybersecurity and Cloud Podcast. Discover how transitioning from [&#8230;]]]></itunes:summary>
	<itunes:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o.jpeg"></itunes:image>
	<image>
		<url>https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o.jpeg</url>
		<title>CSCP S4EP10 &#8211; David Matousek &#8211; Will Ai replace Product Security? automation vs experteese</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[Will AI replace the role of product security? Join us in an enlightening conversation with David Matousek, where we dive deep into the synergy between automation and product security in the realm of application security. Explore the fascinating world of product security with David Matousek on the Cybersecurity and Cloud Podcast. Discover how transitioning from [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP09 &#8211; Micheal Smith &#8211;  Code to Network Reachability how to use WAF to prioritize vulnerabilities</title>
	<link>https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep09-micheal-smith-code-to-network-reachability-how-to-use-waf-to-prioritize-vulnerabilities/</link>
	<pubDate>Sun, 04 Feb 2024 21:41:50 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep09-micheal-smith-code-to-network-reachability-how-to-use-waf-to-prioritize-vulnerabilities/</guid>
	<description><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3-1536x1536.jpeg 1536w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3.jpeg 1920w" sizes="(max-width: 150px) 100vw, 150px" />  This is an enlightening conversation with Michael Smith on CSCP exploring the intersection between vulnerabilities, DDoS and WAF technologies.  Join us as we reconvene with cybersecurity virtuoso Michael Smith, Field CTO at Verkara, for a rerecording further to explore the fascinating intersection of cybersecurity and cloud technology. Listen in as Michael brings his wealth [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[  This is an enlightening conversation with Michael Smith on CSCP exploring the intersection between vulnerabilities, DDoS and WAF technologies.  Join us as we reconvene with cybersecurity virtuoso Michael Smith, Field CTO at Verkara, for a rerecording f]]></itunes:subtitle>
	<content:encoded><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3-1536x1536.jpeg 1536w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3.jpeg 1920w" sizes="(max-width: 150px) 100vw, 150px" />  This is an enlightening conversation with Michael Smith on CSCP exploring the intersection between vulnerabilities, DDoS and WAF technologies.  Join us as we reconvene with cybersecurity virtuoso Michael Smith, Field CTO at Verkara, for a rerecording further to explore the fascinating intersection of cybersecurity and cloud technology. Listen in as Michael brings his wealth [&#8230;]]]></content:encoded>
	<enclosure url="https://stagingphoenix.kinsta.cloud/podcast-download/30406/cscp-s4ep09-micheal-smith-code-to-network-reachability-how-to-use-waf-to-prioritize-vulnerabilities.mp3" length="38902611" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[  This is an enlightening conversation with Michael Smith on CSCP exploring the intersection between vulnerabilities, DDoS and WAF technologies.  Join us as we reconvene with cybersecurity virtuoso Michael Smith, Field CTO at Verkara, for a rerecording further to explore the fascinating intersection of cybersecurity and cloud technology. Listen in as Michael brings his wealth [&#8230;]]]></itunes:summary>
	<itunes:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3.jpeg"></itunes:image>
	<image>
		<url>https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3.jpeg</url>
		<title>CSCP S4EP09 &#8211; Micheal Smith &#8211;  Code to Network Reachability how to use WAF to prioritize vulnerabilities</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[  This is an enlightening conversation with Michael Smith on CSCP exploring the intersection between vulnerabilities, DDoS and WAF technologies.  Join us as we reconvene with cybersecurity virtuoso Michael Smith, Field CTO at Verkara, for a rerecording further to explore the fascinating intersection of cybersecurity and cloud technology. Listen in as Michael brings his wealth [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP08 &#8211; Jay Jacobs &#8211; A Conversation with Jay Jacobs: Exploring the Future of Vulnerability Management and Data Science</title>
	<link>https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep08-jay-jacobs-a-conversation-with-jay-jacobs-exploring-the-future-of-vulnerability-management-and-data-science/</link>
	<pubDate>Sun, 21 Jan 2024 22:17:00 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://stagingphoenix.kinsta.cloud/podcast/cscp-s4ep08-jay-jacobs-a-conversation-with-jay-jacobs-exploring-the-future-of-vulnerability-management-and-data-science/</guid>
	<description><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />  This is an enlighting conversation with Jay Jacobs  &#8211; Exploring the Future of Vulnerability Management and Data Science Unlock the secrets of cybersecurity&#8217;s intricate dance with data science as I, Francesco Cipollone, sit down with tech wizard J Jacobs, co-founder of Cyanthia. Prepare to be captivated by J&#8217;s inspiring tech odyssey, from his youthful [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[  This is an enlighting conversation with Jay Jacobs  &#8211; Exploring the Future of Vulnerability Management and Data Science Unlock the secrets of cybersecurity&#8217;s intricate dance with data science as I, Francesco Cipollone, sit down with tech wi]]></itunes:subtitle>
	<content:encoded><![CDATA[<img width="150" height="150" src="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz-150x150.jpeg" class="attachment-thumbnail size-thumbnail wp-post-image" alt="" decoding="async" srcset="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz-150x150.jpeg 150w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz-600x600.jpeg 600w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz-1200x1200.jpeg 1200w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz-768x768.jpeg 768w, https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz.jpeg 1400w" sizes="(max-width: 150px) 100vw, 150px" />  This is an enlighting conversation with Jay Jacobs  &#8211; Exploring the Future of Vulnerability Management and Data Science Unlock the secrets of cybersecurity&#8217;s intricate dance with data science as I, Francesco Cipollone, sit down with tech wizard J Jacobs, co-founder of Cyanthia. Prepare to be captivated by J&#8217;s inspiring tech odyssey, from his youthful [&#8230;]]]></content:encoded>
	<enclosure url="https://stagingphoenix.kinsta.cloud/podcast-download/30337/cscp-s4ep08-jay-jacobs-a-conversation-with-jay-jacobs-exploring-the-future-of-vulnerability-management-and-data-science.mp3" length="63086120" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[  This is an enlighting conversation with Jay Jacobs  &#8211; Exploring the Future of Vulnerability Management and Data Science Unlock the secrets of cybersecurity&#8217;s intricate dance with data science as I, Francesco Cipollone, sit down with tech wizard J Jacobs, co-founder of Cyanthia. Prepare to be captivated by J&#8217;s inspiring tech odyssey, from his youthful [&#8230;]]]></itunes:summary>
	<itunes:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz.jpeg"></itunes:image>
	<image>
		<url>https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz.jpeg</url>
		<title>CSCP S4EP08 &#8211; Jay Jacobs &#8211; A Conversation with Jay Jacobs: Exploring the Future of Vulnerability Management and Data Science</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[  This is an enlighting conversation with Jay Jacobs  &#8211; Exploring the Future of Vulnerability Management and Data Science Unlock the secrets of cybersecurity&#8217;s intricate dance with data science as I, Francesco Cipollone, sit down with tech wizard J Jacobs, co-founder of Cyanthia. Prepare to be captivated by J&#8217;s inspiring tech odyssey, from his youthful [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://stagingphoenix.kinsta.cloud/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>
	</channel>
</rss>
