<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://phoenix.security/wp-content/plugins/seriously-simple-podcasting/templates/feed-stylesheet.xsl"?><rss version="2.0"
	 xmlns:content="http://purl.org/rss/1.0/modules/content/"
	 xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	 xmlns:dc="http://purl.org/dc/elements/1.1/"
	 xmlns:atom="http://www.w3.org/2005/Atom"
	 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	 xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	 xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
	 xmlns:podcast="https://podcastindex.org/namespace/1.0"
	 xmlns:media="http://search.yahoo.com/mrss/" >
		<channel>
		<title>Phoenix Security</title>
		<atom:link href="https://phoenix.security/feed/podcast/phoenix-security/" rel="self" type="application/rss+xml"/>
		<link>https://phoenix.security/series/phoenix-security/</link>
		<description></description>
		<lastBuildDate>Fri, 03 Apr 2026 18:31:21 +0000</lastBuildDate>
		<language>en-GB</language>
		<copyright>&#xA9; 2026 Phoenix Security</copyright>
		<itunes:subtitle>Contextualize Prioritize and ACT ON RISK</itunes:subtitle>
		<itunes:author>Phoenix Security</itunes:author>
		<itunes:summary></itunes:summary>
		<itunes:owner>
			<itunes:name>Phoenix Security</itunes:name>
		</itunes:owner>
		<itunes:explicit>false</itunes:explicit>
		<googleplay:author><![CDATA[Phoenix Security]]></googleplay:author>
						<googleplay:description></googleplay:description>
			<googleplay:explicit>No</googleplay:explicit>
			<podcast:locked>yes</podcast:locked>
		<podcast:guid>08d75233-231d-5924-bbdc-c0a41917c3d9</podcast:guid>
		
		<!-- podcast_generator="SSP by Castos/3.14.4" Seriously Simple Podcasting plugin for WordPress (https://wordpress.org/plugins/seriously-simple-podcasting/) -->
		<generator>https://wordpress.org/?v=6.7.2</generator>

<item>
	<title>CSCP S4EP19 &#8211; James Berthoty &#8211; What The heck is ASPM and the evolution of Product Security</title>
	<link>https://phoenix.security/podcast/cscp-s4ep19-james-berthoty-what-the-heck-is-aspm-and-the-evolution-of-product-security/</link>
	<pubDate>Sun, 28 Jul 2024 20:23:14 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://phoenix.security/podcast/cscp-s4ep18-james-berthoty-what-the-heck-is-aspm-and-the-evolution-of-product-security/</guid>
	<description><![CDATA[Join us as we dive into the future of Application Security (AppSec) and Vulnerability Management with James Berthoty. Discover insights on the evolution of AppSec, challenges in managing software vulnerabilities, and the role of Application Security Posture Management (ASPM) in today’s API-driven cloud environment. Listen now for expert analysis and practical solutions in cybersecurity.]]></description>
	<itunes:subtitle><![CDATA[Join us as we dive into the future of Application Security (AppSec) and Vulnerability Management with James Berthoty. Discover insights on the evolution of AppSec, challenges in managing software vulnerabilities, and the role of Application Security Post]]></itunes:subtitle>
	<content:encoded><![CDATA[Join us as we dive into the future of Application Security (AppSec) and Vulnerability Management with James Berthoty. Discover insights on the evolution of AppSec, challenges in managing software vulnerabilities, and the role of Application Security Posture Management (ASPM) in today’s API-driven cloud environment. Listen now for expert analysis and practical solutions in cybersecurity.]]></content:encoded>
	<enclosure url="https://chrt.fm/track/F9977D/mcdn.podbean.com/mf/web/s3hp8sb2fyqxf2q9/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security8d63t.mp3" length="91326923" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Join us as we dive into the future of Application Security (AppSec) and Vulnerability Management with James Berthoty. Discover insights on the evolution of AppSec, challenges in managing software vulnerabilities, and the role of Application Security Posture Management (ASPM) in today’s API-driven cloud environment. Listen now for expert analysis and practical solutions in cybersecurity.]]></itunes:summary>
	<itunes:image href="https://phoenix.security/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-JIdjHV.jpeg"></itunes:image>
	<image>
		<url>https://phoenix.security/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-JIdjHV.jpeg</url>
		<title>CSCP S4EP19 &#8211; James Berthoty &#8211; What The heck is ASPM and the evolution of Product Security</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[Join us as we dive into the future of Application Security (AppSec) and Vulnerability Management with James Berthoty. Discover insights on the evolution of AppSec, challenges in managing software vulnerabilities, and the role of Application Security Posture Management (ASPM) in today’s API-driven cloud environment. Listen now for expert analysis and practical solutions in cybersecurity.]]></googleplay:description>
	<googleplay:image href="https://phoenix.security/media/CSCP_S4EP18_-_James_Berthoty_-_What_The_heck_is_ASPM_and_the_evolution_of_Product_security_sq_ctwcxe-JIdjHV.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP18 &#8211; Marius Poskus &#8211;  Who mention about non-technical CISO &#8211; ASPM and Running application security programs from a CISO perspective</title>
	<link>https://phoenix.security/podcast/cscp-s4ep18-marius-poskus-who-mention-about-non-technical-ciso-aspm-and-running-application-security-programs-from-ciso-perspective/</link>
	<pubDate>Sun, 07 Jul 2024 20:57:15 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://phoenix.security/podcast/cscp-s4ep18-marius-poskus-who-mention-about-non-technical-ciso-aspm-and-running-application-security-programs-from-ciso-perspective-sq/</guid>
	<description><![CDATA[Explore the evolving landscape of application security and ASPM with Marius Poskus, VP at Glow Financial Services. Discover insights on the adoption of open-source code and AI, cultural shifts for DevSecOps, and challenges in maintaining consistent security programs. Sponsored by Phoenix Security, leaders in vulnerability management. Listen now for strategic approaches to managing application security and prioritizing critical issues to align with business goals. #Cybersecurity #AppSec #ProductSecurity #ASPM]]></description>
	<itunes:subtitle><![CDATA[Explore the evolving landscape of application security and ASPM with Marius Poskus, VP at Glow Financial Services. Discover insights on the adoption of open-source code and AI, cultural shifts for DevSecOps, and challenges in maintaining consistent secur]]></itunes:subtitle>
	<content:encoded><![CDATA[Explore the evolving landscape of application security and ASPM with Marius Poskus, VP at Glow Financial Services. Discover insights on the adoption of open-source code and AI, cultural shifts for DevSecOps, and challenges in maintaining consistent security programs. Sponsored by Phoenix Security, leaders in vulnerability management. Listen now for strategic approaches to managing application security and prioritizing critical issues to align with business goals. #Cybersecurity #AppSec #ProductSecurity #ASPM]]></content:encoded>
	<enclosure url="https://chrt.fm/track/F9977D/mcdn.podbean.com/mf/web/3f73d6rp6tw32q5e/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq8v4t2.m4a" length="33353484" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Explore the evolving landscape of application security and ASPM with Marius Poskus, VP at Glow Financial Services. Discover insights on the adoption of open-source code and AI, cultural shifts for DevSecOps, and challenges in maintaining consistent security programs. Sponsored by Phoenix Security, leaders in vulnerability management. Listen now for strategic approaches to managing application security and prioritizing critical issues to align with business goals. #Cybersecurity #AppSec #ProductSecurity #ASPM]]></itunes:summary>
	<itunes:image href="https://phoenix.security/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-KLr7e5.jpeg"></itunes:image>
	<image>
		<url>https://phoenix.security/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-KLr7e5.jpeg</url>
		<title>CSCP S4EP18 &#8211; Marius Poskus &#8211;  Who mention about non-technical CISO &#8211; ASPM and Running application security programs from a CISO perspective</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[Explore the evolving landscape of application security and ASPM with Marius Poskus, VP at Glow Financial Services. Discover insights on the adoption of open-source code and AI, cultural shifts for DevSecOps, and challenges in maintaining consistent security programs. Sponsored by Phoenix Security, leaders in vulnerability management. Listen now for strategic approaches to managing application security and prioritizing critical issues to align with business goals. #Cybersecurity #AppSec #ProductSecurity #ASPM]]></googleplay:description>
	<googleplay:image href="https://phoenix.security/media/CSCP_S4EP18_-_Marius_Poskus_-_Who_mention_about_non_technical_ciso_-_Running_application_security_programs_from_CISO_perspective_sq2_hsxi9d-KLr7e5.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP17 &#8211; Adam Shostack  &#8211; Threat modelling in past and future with   Adam Shostack from vulnerability to ASPM and modern application security</title>
	<link>https://phoenix.security/podcast/cscp-s4ep17-adam-shostack-threat-modelling-in-past-and-future-with-adam-shostack-from-vulnerability-to-aspm-and-modern-application-security/</link>
	<pubDate>Sun, 16 Jun 2024 22:44:56 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://phoenix.security/podcast/cscp-s4ep17-adam-shostack-threat-modelling-in-past-and-future-with-adam-shostack-from-vulnerability-to-aspm-and-modern-application-security/</guid>
	<description><![CDATA[Join cybersecurity expert Adam Shostack on the Cybersecurity and Cloud Podcast as he discusses Application Security Posture Management (ASPM), threat modeling, and proactive strategies for enhancing software security. Learn about the impact of government regulations, CISA’s approaches to vulnerability management, and balancing security with profit. Don't miss these insights to stay ahead in the cybersecurity landscape.]]></description>
	<itunes:subtitle><![CDATA[Join cybersecurity expert Adam Shostack on the Cybersecurity and Cloud Podcast as he discusses Application Security Posture Management (ASPM), threat modeling, and proactive strategies for enhancing software security. Learn about the impact of government]]></itunes:subtitle>
	<content:encoded><![CDATA[Join cybersecurity expert Adam Shostack on the Cybersecurity and Cloud Podcast as he discusses Application Security Posture Management (ASPM), threat modeling, and proactive strategies for enhancing software security. Learn about the impact of government regulations, CISA’s approaches to vulnerability management, and balancing security with profit. Don't miss these insights to stay ahead in the cybersecurity landscape.]]></content:encoded>
	<enclosure url="https://chrt.fm/track/F9977D/mcdn.podbean.com/mf/web/ir2w6j3vjmpfbkj7/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security7mxl5.mp3" length="70331164" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Join cybersecurity expert Adam Shostack on the Cybersecurity and Cloud Podcast as he discusses Application Security Posture Management (ASPM), threat modeling, and proactive strategies for enhancing software security. Learn about the impact of government regulations, CISA’s approaches to vulnerability management, and balancing security with profit. Don't miss these insights to stay ahead in the cybersecurity landscape.]]></itunes:summary>
	<itunes:image href="https://phoenix.security/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-wfw0Vf.jpeg"></itunes:image>
	<image>
		<url>https://phoenix.security/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-wfw0Vf.jpeg</url>
		<title>CSCP S4EP17 &#8211; Adam Shostack  &#8211; Threat modelling in past and future with   Adam Shostack from vulnerability to ASPM and modern application security</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[Join cybersecurity expert Adam Shostack on the Cybersecurity and Cloud Podcast as he discusses Application Security Posture Management (ASPM), threat modeling, and proactive strategies for enhancing software security. Learn about the impact of government regulations, CISA’s approaches to vulnerability management, and balancing security with profit. Don't miss these insights to stay ahead in the cybersecurity landscape.]]></googleplay:description>
	<googleplay:image href="https://phoenix.security/media/CSCP_S4EP17_-_Adam_Shostack_-_Threat_modelling_in_past_and_future_with_Adam_Shostack_from_vulnerability_to_ASPM_and_modern_application_security_sq_8xc6cb-wfw0Vf.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP16 &#8211; Irene Michlin &#8211; Threat Modelling in the Age of AI</title>
	<link>https://phoenix.security/podcast/cscp-s4ep16-irene-michlin-threat-modelling-in-the-age-of-ai/</link>
	<pubDate>Sun, 26 May 2024 20:40:24 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://phoenix.security/podcast/cscp-s4ep16-irene-michlin-threat-modelling-in-the-age-of-ai/</guid>
	<description><![CDATA["Discover the crucial role of threat modeling in application security with insights from Irene Michlin, application security lead at Neo4j. Learn how integrating developer perspectives and leveraging AI can enhance your security practices. Join the conversation on the Cybersecurity and Cloud Podcast and explore actionable strategies for robust application security. #Cybersecurity #ThreatModeling #ApplicationSecurity #AI #DevSecOps"]]></description>
	<itunes:subtitle><![CDATA[Discover the crucial role of threat modeling in application security with insights from Irene Michlin, application security lead at Neo4j. Learn how integrating developer perspectives and leveraging AI can enhance your security practices. Join the conver]]></itunes:subtitle>
	<content:encoded><![CDATA["Discover the crucial role of threat modeling in application security with insights from Irene Michlin, application security lead at Neo4j. Learn how integrating developer perspectives and leveraging AI can enhance your security practices. Join the conversation on the Cybersecurity and Cloud Podcast and explore actionable strategies for robust application security. #Cybersecurity #ThreatModeling #ApplicationSecurity #AI #DevSecOps"]]></content:encoded>
	<enclosure url="https://chrt.fm/track/F9977D/mcdn.podbean.com/mf/web/hfi8k6an7pr6kn89/CSCP_S4EP16_-_irene_michlin_-_Threat_Modelling_in_the_age_of_AI9jpea.m4a" length="48674394" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA["Discover the crucial role of threat modeling in application security with insights from Irene Michlin, application security lead at Neo4j. Learn how integrating developer perspectives and leveraging AI can enhance your security practices. Join the conversation on the Cybersecurity and Cloud Podcast and explore actionable strategies for robust application security. #Cybersecurity #ThreatModeling #ApplicationSecurity #AI #DevSecOps"]]></itunes:summary>
	<itunes:image href="https://phoenix.security/media/CSCP-S4EP16-irene-michlin-Threat-Modelling-in-the-age-of-AI_sq.jpg"></itunes:image>
	<image>
		<url>https://phoenix.security/media/CSCP-S4EP16-irene-michlin-Threat-Modelling-in-the-age-of-AI_sq.jpg</url>
		<title>CSCP S4EP16 &#8211; Irene Michlin &#8211; Threat Modelling in the Age of AI</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA["Discover the crucial role of threat modeling in application security with insights from Irene Michlin, application security lead at Neo4j. Learn how integrating developer perspectives and leveraging AI can enhance your security practices. Join the conversation on the Cybersecurity and Cloud Podcast and explore actionable strategies for robust application security. #Cybersecurity #ThreatModeling #ApplicationSecurity #AI #DevSecOps"]]></googleplay:description>
	<googleplay:image href="https://phoenix.security/media/CSCP-S4EP16-irene-michlin-Threat-Modelling-in-the-age-of-AI_sq.jpg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP15 &#8211; Akira Brand &#8211; Singing the Tune of Application Security with Akira Brand</title>
	<link>https://phoenix.security/podcast/cscp-s4ep14-akira-brand-singing-the-tune-of-application-security-with-akira-brand/</link>
	<pubDate>Sun, 12 May 2024 22:37:08 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://phoenix.security/podcast/cscp-s4ep14-akira-brand-singing-the-tune-of-application-security-with-akira-brand/</guid>
	<description><![CDATA[Delve into Application Security Program Management (ASPM) with Akira Brand on the Cybersecurity and Cloud Podcast. Discover how her unique opera background enriches her approach to security, enhancing application safety in a cloud-driven world. Tune in for expert insights on evolving AppSec to product security, the critical role of threat modeling, and strategies for building a resilient security culture.]]></description>
	<itunes:subtitle><![CDATA[Delve into Application Security Program Management (ASPM) with Akira Brand on the Cybersecurity and Cloud Podcast. Discover how her unique opera background enriches her approach to security, enhancing application safety in a cloud-driven world. Tune in f]]></itunes:subtitle>
	<content:encoded><![CDATA[Delve into Application Security Program Management (ASPM) with Akira Brand on the Cybersecurity and Cloud Podcast. Discover how her unique opera background enriches her approach to security, enhancing application safety in a cloud-driven world. Tune in for expert insights on evolving AppSec to product security, the critical role of threat modeling, and strategies for building a resilient security culture.]]></content:encoded>
	<enclosure url="https://chrt.fm/track/F9977D/mcdn.podbean.com/mf/web/zw4p2y73hj3j78dx/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_ber35.m4a" length="41043685" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Delve into Application Security Program Management (ASPM) with Akira Brand on the Cybersecurity and Cloud Podcast. Discover how her unique opera background enriches her approach to security, enhancing application safety in a cloud-driven world. Tune in for expert insights on evolving AppSec to product security, the critical role of threat modeling, and strategies for building a resilient security culture.]]></itunes:summary>
	<itunes:image href="https://phoenix.security/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-e4lO1a.jpeg"></itunes:image>
	<image>
		<url>https://phoenix.security/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-e4lO1a.jpeg</url>
		<title>CSCP S4EP15 &#8211; Akira Brand &#8211; Singing the Tune of Application Security with Akira Brand</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[Delve into Application Security Program Management (ASPM) with Akira Brand on the Cybersecurity and Cloud Podcast. Discover how her unique opera background enriches her approach to security, enhancing application safety in a cloud-driven world. Tune in for expert insights on evolving AppSec to product security, the critical role of threat modeling, and strategies for building a resilient security culture.]]></googleplay:description>
	<googleplay:image href="https://phoenix.security/media/CSCP_S4EP14_-_Akira_Brand_-_Singing_the_Tune_of_Application_Security_with_Akira_Brand_sq_pkqqts-e4lO1a.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP14 &#8211; Izar Tarandach &#8211; The Future of Threat Modeling and Product Security, with Izar Tarandach</title>
	<link>https://phoenix.security/podcast/cscp-s4ep14-izar-tarandach-the-future-of-threat-modeling-and-product-security-with-izar-tarandach/</link>
	<pubDate>Sun, 21 Apr 2024 19:57:09 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://phoenix.security/podcast/cscp-s4ep14-izar-tarandach-the-future-of-threat-modeling-and-product-security-with-izar-tarandach/</guid>
	<description><![CDATA[  This episode features guest Izar Tarandach, a seasoned security architect with extensive experience in application security, cloud security, and the development of comprehensive security frameworks. Our discussion navigates through the latest trends in application security, the pivotal role of DevSecOps, and the strategic integration of security practices within modern business environments. Sponsored by Phoenix [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[  This episode features guest Izar Tarandach, a seasoned security architect with extensive experience in application security, cloud security, and the development of comprehensive security frameworks. Our discussion navigates through the latest trends in]]></itunes:subtitle>
	<content:encoded><![CDATA[  This episode features guest Izar Tarandach, a seasoned security architect with extensive experience in application security, cloud security, and the development of comprehensive security frameworks. Our discussion navigates through the latest trends in application security, the pivotal role of DevSecOps, and the strategic integration of security practices within modern business environments. Sponsored by Phoenix [&#8230;]]]></content:encoded>
	<enclosure url="https://chrt.fm/track/F9977D/mcdn.podbean.com/mf/web/4dm729w7sa24sj5w/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach9nze2.m4a" length="52446756" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[  This episode features guest Izar Tarandach, a seasoned security architect with extensive experience in application security, cloud security, and the development of comprehensive security frameworks. Our discussion navigates through the latest trends in application security, the pivotal role of DevSecOps, and the strategic integration of security practices within modern business environments. Sponsored by Phoenix [&#8230;]]]></itunes:summary>
	<itunes:image href="https://phoenix.security/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-SuQo3j.jpeg"></itunes:image>
	<image>
		<url>https://phoenix.security/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-SuQo3j.jpeg</url>
		<title>CSCP S4EP14 &#8211; Izar Tarandach &#8211; The Future of Threat Modeling and Product Security, with Izar Tarandach</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[  This episode features guest Izar Tarandach, a seasoned security architect with extensive experience in application security, cloud security, and the development of comprehensive security frameworks. Our discussion navigates through the latest trends in application security, the pivotal role of DevSecOps, and the strategic integration of security practices within modern business environments. Sponsored by Phoenix [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://phoenix.security/media/CSCP_S4EP14_-_Izar_Tarandach_-_The_Future_of_Threat_Modeling_and_Product_Security_with_Izar_Tarandach_sq_cwz6py-SuQo3j.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP13 &#8211; Josh Goldberg &#8211; Crafting Appsec and Secure Applications in the Age of AI with Josh Goldberg</title>
	<link>https://phoenix.security/podcast/cscp-s4ep13-josh-goldberg-crafting-secure-applications-in-the-age-of-ai-with-josh-goldberg/</link>
	<pubDate>Sun, 07 Apr 2024 20:11:54 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://phoenix.security/podcast/cscp-s4ep13-josh-goldberg-crafting-secure-applications-in-the-age-of-ai-with-josh-goldberg/</guid>
	<description><![CDATA[Explore the intersection of cybersecurity, DevSecOps, and application security with Josh Goldberg in our podcast. Dive into AI's role, secure coding practices, and the debate on developer dynamics for a safer digital future. Listen now to revolutionize your approach to application security.]]></description>
	<itunes:subtitle><![CDATA[Explore the intersection of cybersecurity, DevSecOps, and application security with Josh Goldberg in our podcast. Dive into AIs role, secure coding practices, and the debate on developer dynamics for a safer digital future. Listen now to revolutionize yo]]></itunes:subtitle>
	<content:encoded><![CDATA[Explore the intersection of cybersecurity, DevSecOps, and application security with Josh Goldberg in our podcast. Dive into AI's role, secure coding practices, and the debate on developer dynamics for a safer digital future. Listen now to revolutionize your approach to application security.]]></content:encoded>
	<enclosure url="https://chrt.fm/track/F9977D/mcdn.podbean.com/mf/web/2bpztn/CSCP_S4EP12_-_Josh_Goldberg_-_Linting_your_way_into_security8ioyx.m4a" length="45575647" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Explore the intersection of cybersecurity, DevSecOps, and application security with Josh Goldberg in our podcast. Dive into AI's role, secure coding practices, and the debate on developer dynamics for a safer digital future. Listen now to revolutionize your approach to application security.]]></itunes:summary>
	<itunes:image href="https://phoenix.security/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-Q4dBEF.jpeg"></itunes:image>
	<image>
		<url>https://phoenix.security/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-Q4dBEF.jpeg</url>
		<title>CSCP S4EP13 &#8211; Josh Goldberg &#8211; Crafting Appsec and Secure Applications in the Age of AI with Josh Goldberg</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[Explore the intersection of cybersecurity, DevSecOps, and application security with Josh Goldberg in our podcast. Dive into AI's role, secure coding practices, and the debate on developer dynamics for a safer digital future. Listen now to revolutionize your approach to application security.]]></googleplay:description>
	<googleplay:image href="https://phoenix.security/media/CSCP_S4EP13_-_Josh_Goldberg_-_Crafting_Secure_Applications_in_the_Age_of_AI_with_Josh_Goldberg_sq_cx7ypz-Q4dBEF.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP12 &#8211; Raj Umadas &#8211; Diving Deep into Cybersecurity and Application Security Journey exploring Frontiers with Maestro Raj Umadas</title>
	<link>https://phoenix.security/podcast/cscp-s4ep12-raj-umadas-diving-deep-into-cybersecurity-and-application-security-journey-exploring-frontiers-with-maestro-raj-umadas/</link>
	<pubDate>Sun, 24 Mar 2024 22:45:06 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://phoenix.security/podcast/cscp-s4ep12-raj-umadas-diving-deep-into-cybersecurity-and-application-security-journey-exploring-frontiers-with-maestro-raj-umadas/</guid>
	<description><![CDATA[Dive into the latest Cybersecurity and Cloud Podcast episode featuring Rajendra Umadas on Application Security Program Management (ASPM). Gain expert insights into ASPM's role in cybersecurity, strategies for building resilient app security teams, and the future of digital defense. Essential listening for professionals in cybersecurity, DevSecOps, and tech. #Cybersecurity #CloudComputing #ASPM #DevSecOps #TechInsights]]></description>
	<itunes:subtitle><![CDATA[Dive into the latest Cybersecurity and Cloud Podcast episode featuring Rajendra Umadas on Application Security Program Management (ASPM). Gain expert insights into ASPMs role in cybersecurity, strategies for building resilient app security teams, and the]]></itunes:subtitle>
	<content:encoded><![CDATA[Dive into the latest Cybersecurity and Cloud Podcast episode featuring Rajendra Umadas on Application Security Program Management (ASPM). Gain expert insights into ASPM's role in cybersecurity, strategies for building resilient app security teams, and the future of digital defense. Essential listening for professionals in cybersecurity, DevSecOps, and tech. #Cybersecurity #CloudComputing #ASPM #DevSecOps #TechInsights]]></content:encoded>
	<enclosure url="https://chrt.fm/track/F9977D/mcdn.podbean.com/mf/web/mavrw3/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadasayts4.m4a" length="49199709" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Dive into the latest Cybersecurity and Cloud Podcast episode featuring Rajendra Umadas on Application Security Program Management (ASPM). Gain expert insights into ASPM's role in cybersecurity, strategies for building resilient app security teams, and the future of digital defense. Essential listening for professionals in cybersecurity, DevSecOps, and tech. #Cybersecurity #CloudComputing #ASPM #DevSecOps #TechInsights]]></itunes:summary>
	<itunes:image href="https://phoenix.security/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-tY3a0Z.jpeg"></itunes:image>
	<image>
		<url>https://phoenix.security/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-tY3a0Z.jpeg</url>
		<title>CSCP S4EP12 &#8211; Raj Umadas &#8211; Diving Deep into Cybersecurity and Application Security Journey exploring Frontiers with Maestro Raj Umadas</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[Dive into the latest Cybersecurity and Cloud Podcast episode featuring Rajendra Umadas on Application Security Program Management (ASPM). Gain expert insights into ASPM's role in cybersecurity, strategies for building resilient app security teams, and the future of digital defense. Essential listening for professionals in cybersecurity, DevSecOps, and tech. #Cybersecurity #CloudComputing #ASPM #DevSecOps #TechInsights]]></googleplay:description>
	<googleplay:image href="https://phoenix.security/media/CSCP_S4EP12_-_Raj_Umadas_-_Diving_Deep_into_Cybersecurity_and_Application_Security_Journey_exploring_Frontiers_with_Maestro_Raj_Umadas_sq_umetwu-tY3a0Z.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP11 &#8211; Derek Fisher &#8211; Strengthening Digital Defenses Inside Application Security and the Role of AI in Cybersecurity</title>
	<link>https://phoenix.security/podcast/cscp-s4ep11-derek-fisher-strengthening-digital-defenses-inside-application-security-and-the-role-of-ai-in-cybersecurity/</link>
	<pubDate>Sun, 03 Mar 2024 23:49:12 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://phoenix.security/podcast/cscp-s4ep11-derek-fisher-strengthening-digital-defenses-inside-application-security-and-the-role-of-ai-in-cybersecurity/</guid>
	<description><![CDATA[In today&#8217;s digital age, the realms of Application Security and Cybersecurity are rapidly evolving, driven by the relentless pace of technological innovation. Derek Fisher, a renowned figure in the application security sphere and an accomplished author, joins us to shed light on these pivotal areas. His insights provide a roadmap for navigating the complexities of [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[In today&#8217;s digital age, the realms of Application Security and Cybersecurity are rapidly evolving, driven by the relentless pace of technological innovation. Derek Fisher, a renowned figure in the application security sphere and an accomplished aut]]></itunes:subtitle>
	<content:encoded><![CDATA[In today&#8217;s digital age, the realms of Application Security and Cybersecurity are rapidly evolving, driven by the relentless pace of technological innovation. Derek Fisher, a renowned figure in the application security sphere and an accomplished author, joins us to shed light on these pivotal areas. His insights provide a roadmap for navigating the complexities of [&#8230;]]]></content:encoded>
	<enclosure url="https://chrt.fm/track/F9977D/mcdn.podbean.com/mf/web/pdkib7/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity8zzrh.m4a" length="44781594" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[In today&#8217;s digital age, the realms of Application Security and Cybersecurity are rapidly evolving, driven by the relentless pace of technological innovation. Derek Fisher, a renowned figure in the application security sphere and an accomplished author, joins us to shed light on these pivotal areas. His insights provide a roadmap for navigating the complexities of [&#8230;]]]></itunes:summary>
	<itunes:image href="https://phoenix.security/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa.jpeg"></itunes:image>
	<image>
		<url>https://phoenix.security/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa.jpeg</url>
		<title>CSCP S4EP11 &#8211; Derek Fisher &#8211; Strengthening Digital Defenses Inside Application Security and the Role of AI in Cybersecurity</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[In today&#8217;s digital age, the realms of Application Security and Cybersecurity are rapidly evolving, driven by the relentless pace of technological innovation. Derek Fisher, a renowned figure in the application security sphere and an accomplished author, joins us to shed light on these pivotal areas. His insights provide a roadmap for navigating the complexities of [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://phoenix.security/media/CSCP_S4EP11_-_Derek_Fisher_-_Strengthening_Digital_Defenses_Inside_Application_Security_and_the_Role_of_AI_in_Cybersecurity_sq_c4as3m-UqMXCa.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP10 &#8211; David Matousek &#8211; Will Ai replace Product Security? automation vs experteese</title>
	<link>https://phoenix.security/podcast/cscp-s4ep10-david-matousek-will-ai-replace-product-security-automation-vs-experteese/</link>
	<pubDate>Sun, 18 Feb 2024 19:35:08 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://phoenix.security/podcast/cscp-s4ep10-david-matousek-will-ai-replace-product-security-automation-vs-experteese/</guid>
	<description><![CDATA[Will AI replace the role of product security? Join us in an enlightening conversation with David Matousek, where we dive deep into the synergy between automation and product security in the realm of application security. Explore the fascinating world of product security with David Matousek on the Cybersecurity and Cloud Podcast. Discover how transitioning from [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[Will AI replace the role of product security? Join us in an enlightening conversation with David Matousek, where we dive deep into the synergy between automation and product security in the realm of application security. Explore the fascinating world of ]]></itunes:subtitle>
	<content:encoded><![CDATA[Will AI replace the role of product security? Join us in an enlightening conversation with David Matousek, where we dive deep into the synergy between automation and product security in the realm of application security. Explore the fascinating world of product security with David Matousek on the Cybersecurity and Cloud Podcast. Discover how transitioning from [&#8230;]]]></content:encoded>
	<enclosure url="https://chrt.fm/track/F9977D/mcdn.podbean.com/mf/web/vhz5yp/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese6laty.m4a" length="42842747" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Will AI replace the role of product security? Join us in an enlightening conversation with David Matousek, where we dive deep into the synergy between automation and product security in the realm of application security. Explore the fascinating world of product security with David Matousek on the Cybersecurity and Cloud Podcast. Discover how transitioning from [&#8230;]]]></itunes:summary>
	<itunes:image href="https://phoenix.security/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o.jpeg"></itunes:image>
	<image>
		<url>https://phoenix.security/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o.jpeg</url>
		<title>CSCP S4EP10 &#8211; David Matousek &#8211; Will Ai replace Product Security? automation vs experteese</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[Will AI replace the role of product security? Join us in an enlightening conversation with David Matousek, where we dive deep into the synergy between automation and product security in the realm of application security. Explore the fascinating world of product security with David Matousek on the Cybersecurity and Cloud Podcast. Discover how transitioning from [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://phoenix.security/media/CSCP_S4EP10_-_David_Matousek_-_Product_Security_automation_vs_experteese_sq_phu592-So9S6o.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP09 &#8211; Micheal Smith &#8211;  Code to Network Reachability how to use WAF to prioritize vulnerabilities</title>
	<link>https://phoenix.security/podcast/cscp-s4ep09-micheal-smith-code-to-network-reachability-how-to-use-waf-to-prioritize-vulnerabilities/</link>
	<pubDate>Sun, 04 Feb 2024 21:41:50 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://phoenix.security/podcast/cscp-s4ep09-micheal-smith-code-to-network-reachability-how-to-use-waf-to-prioritize-vulnerabilities/</guid>
	<description><![CDATA[  This is an enlightening conversation with Michael Smith on CSCP exploring the intersection between vulnerabilities, DDoS and WAF technologies.  Join us as we reconvene with cybersecurity virtuoso Michael Smith, Field CTO at Verkara, for a rerecording further to explore the fascinating intersection of cybersecurity and cloud technology. Listen in as Michael brings his wealth [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[  This is an enlightening conversation with Michael Smith on CSCP exploring the intersection between vulnerabilities, DDoS and WAF technologies.  Join us as we reconvene with cybersecurity virtuoso Michael Smith, Field CTO at Verkara, for a rerecording f]]></itunes:subtitle>
	<content:encoded><![CDATA[  This is an enlightening conversation with Michael Smith on CSCP exploring the intersection between vulnerabilities, DDoS and WAF technologies.  Join us as we reconvene with cybersecurity virtuoso Michael Smith, Field CTO at Verkara, for a rerecording further to explore the fascinating intersection of cybersecurity and cloud technology. Listen in as Michael brings his wealth [&#8230;]]]></content:encoded>
	<enclosure url="https://chrt.fm/track/F9977D/mcdn.podbean.com/mf/web/22abp5/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilitiesagu8p.mp3" length="38902611" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[  This is an enlightening conversation with Michael Smith on CSCP exploring the intersection between vulnerabilities, DDoS and WAF technologies.  Join us as we reconvene with cybersecurity virtuoso Michael Smith, Field CTO at Verkara, for a rerecording further to explore the fascinating intersection of cybersecurity and cloud technology. Listen in as Michael brings his wealth [&#8230;]]]></itunes:summary>
	<itunes:image href="https://phoenix.security/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3.jpeg"></itunes:image>
	<image>
		<url>https://phoenix.security/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3.jpeg</url>
		<title>CSCP S4EP09 &#8211; Micheal Smith &#8211;  Code to Network Reachability how to use WAF to prioritize vulnerabilities</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[  This is an enlightening conversation with Michael Smith on CSCP exploring the intersection between vulnerabilities, DDoS and WAF technologies.  Join us as we reconvene with cybersecurity virtuoso Michael Smith, Field CTO at Verkara, for a rerecording further to explore the fascinating intersection of cybersecurity and cloud technology. Listen in as Michael brings his wealth [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://phoenix.security/media/CSCP_S4EP09_-_Micheal_Smith_-_Code_to_Network_Reachability_how_to_use_WAF_to_prioritize_vulnerabilities-sq_jfwi3m-PCMHY3.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>CSCP S4EP08 &#8211; Jay Jacobs &#8211; A Conversation with Jay Jacobs: Exploring the Future of Vulnerability Management and Data Science</title>
	<link>https://phoenix.security/podcast/cscp-s4ep08-jay-jacobs-a-conversation-with-jay-jacobs-exploring-the-future-of-vulnerability-management-and-data-science/</link>
	<pubDate>Sun, 21 Jan 2024 22:17:00 +0000</pubDate>
	<dc:creator><![CDATA[Phoenix Security]]></dc:creator>
	<guid isPermaLink="false">https://phoenix.security/podcast/cscp-s4ep08-jay-jacobs-a-conversation-with-jay-jacobs-exploring-the-future-of-vulnerability-management-and-data-science/</guid>
	<description><![CDATA[  This is an enlighting conversation with Jay Jacobs  &#8211; Exploring the Future of Vulnerability Management and Data Science Unlock the secrets of cybersecurity&#8217;s intricate dance with data science as I, Francesco Cipollone, sit down with tech wizard J Jacobs, co-founder of Cyanthia. Prepare to be captivated by J&#8217;s inspiring tech odyssey, from his youthful [&#8230;]]]></description>
	<itunes:subtitle><![CDATA[  This is an enlighting conversation with Jay Jacobs  &#8211; Exploring the Future of Vulnerability Management and Data Science Unlock the secrets of cybersecurity&#8217;s intricate dance with data science as I, Francesco Cipollone, sit down with tech wi]]></itunes:subtitle>
	<content:encoded><![CDATA[  This is an enlighting conversation with Jay Jacobs  &#8211; Exploring the Future of Vulnerability Management and Data Science Unlock the secrets of cybersecurity&#8217;s intricate dance with data science as I, Francesco Cipollone, sit down with tech wizard J Jacobs, co-founder of Cyanthia. Prepare to be captivated by J&#8217;s inspiring tech odyssey, from his youthful [&#8230;]]]></content:encoded>
	<enclosure url="https://chrt.fm/track/F9977D/mcdn.podbean.com/mf/web/vz47fm/CSCP_S4EP08_-_jay_jacobs_-_EPSS_widebn5hz.mp3" length="63086120" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[  This is an enlighting conversation with Jay Jacobs  &#8211; Exploring the Future of Vulnerability Management and Data Science Unlock the secrets of cybersecurity&#8217;s intricate dance with data science as I, Francesco Cipollone, sit down with tech wizard J Jacobs, co-founder of Cyanthia. Prepare to be captivated by J&#8217;s inspiring tech odyssey, from his youthful [&#8230;]]]></itunes:summary>
	<itunes:image href="https://phoenix.security/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz.jpeg"></itunes:image>
	<image>
		<url>https://phoenix.security/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz.jpeg</url>
		<title>CSCP S4EP08 &#8211; Jay Jacobs &#8211; A Conversation with Jay Jacobs: Exploring the Future of Vulnerability Management and Data Science</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>0:00</itunes:duration>
	<itunes:author><![CDATA[Phoenix Security]]></itunes:author>	<googleplay:description><![CDATA[  This is an enlighting conversation with Jay Jacobs  &#8211; Exploring the Future of Vulnerability Management and Data Science Unlock the secrets of cybersecurity&#8217;s intricate dance with data science as I, Francesco Cipollone, sit down with tech wizard J Jacobs, co-founder of Cyanthia. Prepare to be captivated by J&#8217;s inspiring tech odyssey, from his youthful [&#8230;]]]></googleplay:description>
	<googleplay:image href="https://phoenix.security/media/CSCP_S4EP08_-_jay_jacobs_-_EPSS_sq_t4z67w-YztoXz.jpeg"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>
	</channel>
</rss>
