<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:psc="http://podlove.org/simple-chapters" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><title><![CDATA[Chat with a White Hat]]></title><description><![CDATA[<h2><b>Real stories from the people breaking and defending the internet</b></h2><p>Every week, Michel Chamberland sits down with a cybersecurity professional to dig into the moments that shaped their career, from their first encounter with a computer to the coolest hack they ever pulled off.</p><p></p><p>Every guest answers the same core questions, giving you a unique window into how different people approach the same craft. Whether you're a seasoned red teamer, a bug bounty hunter, a vulnerability analyst, or just getting started, there's something here for you.</p>]]></description><link>https://integsec.com/chatwhitehat</link><generator>Riverside.fm (https://riverside.com)</generator><lastBuildDate>Thu, 16 Apr 2026 04:45:34 GMT</lastBuildDate><atom:link href="https://api.riverside.com/hosting/zUwV6AhO.rss" rel="self" type="application/rss+xml"/><author><![CDATA[Michel Chamberland]]></author><pubDate>Fri, 13 Feb 2026 01:25:54 GMT</pubDate><copyright><![CDATA[2026 Michel Chamberland]]></copyright><language><![CDATA[en]]></language><ttl>60</ttl><category><![CDATA[Careers]]></category><category><![CDATA[Technology]]></category><itunes:author>Michel Chamberland</itunes:author><itunes:summary>&lt;h2&gt;&lt;b&gt;Real stories from the people breaking and defending the internet&lt;/b&gt;&lt;/h2&gt;&lt;p&gt;Every week, Michel Chamberland sits down with a cybersecurity professional to dig into the moments that shaped their career, from their first encounter with a computer to the coolest hack they ever pulled off.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Every guest answers the same core questions, giving you a unique window into how different people approach the same craft. Whether you&apos;re a seasoned red teamer, a bug bounty hunter, a vulnerability analyst, or just getting started, there&apos;s something here for you.&lt;/p&gt;</itunes:summary><itunes:type>episodic</itunes:type><itunes:owner><itunes:name>Michel Chamberland</itunes:name><itunes:email>mike.chamberland@integsec.com</itunes:email></itunes:owner><itunes:explicit>no</itunes:explicit><itunes:category text="Business"><itunes:category text="Careers"/></itunes:category><itunes:category text="Technology"/><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><item><title><![CDATA[Bureaucracy in Security Testing]]></title><description><![CDATA[<p>The conversation delves into the art of bureaucracy and its impact on security testing, emphasizing the need to remove bureaucracy and reduce friction in user interfaces for effective testing.</p><p></p><p>Takeaways</p><ul><li>Bureaucracy as an art</li><li>Reducing friction in user interfaces</li></ul><p></p><p>Chapters</p><ul><li>00:00 The Art of Bureaucracy</li></ul>]]></description><guid isPermaLink="false">4ced0d83-4448-4a6c-ba65-1a8c7fa811dd</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Wed, 15 Apr 2026 16:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/aef49ff01eb8a21d23fe04d758188f2e541c58c0c88fbadae5018c9fe1d8332e/eyJlcGlzb2RlSWQiOiI0Y2VkMGQ4My00NDQ4LTRhNmMtYmE2NS0xYThjN2ZhODExZGQiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjliNDMyOTUzZGIxMDk1MzI1YjIyZGZiL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMTNfXzE2LTUxLTQ5Lm1wMyJ9.mp3" length="1101052" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/4ced0d83-4448-4a6c-ba65-1a8c7fa811dd/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation delves into the art of bureaucracy and its impact on security testing, emphasizing the need to remove bureaucracy and reduce friction in user interfaces for effective testing.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Bureaucracy as an art&lt;/li&gt;&lt;li&gt;Reducing friction in user interfaces&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 The Art of Bureaucracy&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:46</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Bureaucracy in Security Testing</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Slow Down: Key to Effective Security Testing]]></title><description><![CDATA[<p>The conversation emphasizes the importance of slowing down and conducting thorough reconnaissance in cybersecurity testing. It highlights the need to pay attention to details and avoid making assumptions based on incomplete information.</p><p></p><p>Takeaways</p><ul><li>Slow down</li><li>Thorough reconnaissance</li></ul><p></p><p>Chapters</p><ul><li>00:00 Importance of Slowing Down and Thorough Reconnaissance</li></ul>]]></description><guid isPermaLink="false">e70e70a6-5b93-473e-8b29-c219a71c99c3</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Wed, 15 Apr 2026 13:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/2681543773ecddb58a94b32d460cea0c4e2a159d6e55f25441380683c00fff89/eyJlcGlzb2RlSWQiOiJlNzBlNzBhNi01YjkzLTQ3M2UtOGIyOS1jMjE5YTcxYzk5YzMiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhMmY0Y2M0YTk3MzhhNzJkZjkyL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItNi5tcDMifQ==.mp3" length="6505264" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/e70e70a6-5b93-473e-8b29-c219a71c99c3/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation emphasizes the importance of slowing down and conducting thorough reconnaissance in cybersecurity testing. It highlights the need to pay attention to details and avoid making assumptions based on incomplete information.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Slow down&lt;/li&gt;&lt;li&gt;Thorough reconnaissance&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Importance of Slowing Down and Thorough Reconnaissance&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:04:31</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Slow Down: Key to Effective Security Testing</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Web App Pentesting: Eye-Opening Factor]]></title><description><![CDATA[<p>Nick Aures discusses his fascination with web application pen testing, highlighting the enjoyment, eye-opening factor, and impact of reporting on vulnerabilities. He emphasizes the prevalence of web applications in modern life.</p><p></p><p>Takeaways</p><ul><li>Fascination with web app pen testing</li><li>Prevalence of web applications in modern life</li></ul><p></p><p>Chapters</p><ul><li>00:00 The Fascination with Web Application Pen Testing</li></ul>]]></description><guid isPermaLink="false">2cbb12bf-4426-49a0-b23c-3dc510f38c28</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Tue, 14 Apr 2026 16:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/1965aa8c0fe38b1fddd12fbc40d81d19506cc19830caf197918dfea3caf23b68/eyJlcGlzb2RlSWQiOiIyY2JiMTJiZi00NDI2LTQ5YTAtYjIzYy0zZGM1MTBmMzhjMjgiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlkMDBiM2Y2MDZjZDkzZWNlMDIxMzk1L21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTQtM19fMjAtNDctMjcubXAzIn0=.mp3" length="1334900" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/2cbb12bf-4426-49a0-b23c-3dc510f38c28/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;Nick Aures discusses his fascination with web application pen testing, highlighting the enjoyment, eye-opening factor, and impact of reporting on vulnerabilities. He emphasizes the prevalence of web applications in modern life.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Fascination with web app pen testing&lt;/li&gt;&lt;li&gt;Prevalence of web applications in modern life&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 The Fascination with Web Application Pen Testing&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:56</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Web App Pentesting: Eye-Opening Factor</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Pentesting: More Than Just Hacking]]></title><description><![CDATA[<p>The conversation delves into the multifaceted role of a cybersecurity consultant, highlighting the responsibilities, client interactions, and report generation. It also explores the balance between pen testing and consultancy, emphasizing the importance of being a consultant as well as a pen tester. The discussion concludes with a reflection on the dual role of a cybersecurity professional.</p><p></p><p>Takeaways</p><ul><li>Cybersecurity consulting involves client interaction and report generation.</li><li>A cybersecurity professional must balance pen testing skills with consultancy responsibilities.</li></ul><p></p><p>Chapters</p><ul><li>00:00 The Role of a Consultant</li></ul>]]></description><guid isPermaLink="false">7caeea44-2858-4c9e-a1f4-1946ee5d59e3</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Tue, 14 Apr 2026 13:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/a9c104b330f9fa1f688f9119ac5070daef18c8479fea6375eaae12e3f0bd93fb/eyJlcGlzb2RlSWQiOiI3Y2FlZWE0NC0yODU4LTRjOWUtYTFmNC0xOTQ2ZWU1ZDU5ZTMiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhNDc0Y2M0YTk3MzhhNzMwY2E3L21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItMzAubXAzIn0=.mp3" length="1349947" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/7caeea44-2858-4c9e-a1f4-1946ee5d59e3/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation delves into the multifaceted role of a cybersecurity consultant, highlighting the responsibilities, client interactions, and report generation. It also explores the balance between pen testing and consultancy, emphasizing the importance of being a consultant as well as a pen tester. The discussion concludes with a reflection on the dual role of a cybersecurity professional.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Cybersecurity consulting involves client interaction and report generation.&lt;/li&gt;&lt;li&gt;A cybersecurity professional must balance pen testing skills with consultancy responsibilities.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 The Role of a Consultant&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:56</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Pentesting: More Than Just Hacking</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Market Economy Hides Cyber Exploits]]></title><description><![CDATA[<p>The conversation delves into the impact of market economy on the visibility of remote system exploits, highlighting the concealment of such exploits due to economic factors. It also explores the influence of the highest bidder in the cybersecurity industry, leading to the secrecy and privatization of valuable exploits.</p><p></p><p>Takeaways</p><ul><li>Market economy conceals remote exploits</li><li>Tyranny of the highest bidder in cybersecurity industry</li></ul><p></p><p>Chapters</p><ul><li>00:00 Market Economy and Remote Exploits</li></ul>]]></description><guid isPermaLink="false">eb7edb1b-8bf6-4319-86f1-495f0d7e44bd</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Mon, 13 Apr 2026 16:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/16a729050d883b0e5d3a1a339430853cbad4abfeeff7f800ec0d2f7c86b62231/eyJlcGlzb2RlSWQiOiJlYjdlZGIxYi04YmY2LTQzMTktODZmMS00OTVmMGQ3ZTQ0YmQiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjliNDMyOTUzZGIxMDk1MzI1YjIyZGY1L21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMTNfXzE2LTUxLTQ5Lm1wMyJ9.mp3" length="1585676" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/eb7edb1b-8bf6-4319-86f1-495f0d7e44bd/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation delves into the impact of market economy on the visibility of remote system exploits, highlighting the concealment of such exploits due to economic factors. It also explores the influence of the highest bidder in the cybersecurity industry, leading to the secrecy and privatization of valuable exploits.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Market economy conceals remote exploits&lt;/li&gt;&lt;li&gt;Tyranny of the highest bidder in cybersecurity industry&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Market Economy and Remote Exploits&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:01:06</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Market Economy Hides Cyber Exploits</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Cybersecurity Threats Are Piling Up Faster Than Ever
]]></title><description><![CDATA[<p>The conversation delves into the rising frequency of cyber vulnerabilities and its impact on defensive measures. It also explores the challenges in cybersecurity, defensive measures, and strategies, as well as the offensive side of cybersecurity with a focus on cyber attacks and offensive strategies.</p><p></p><p>Takeaways</p><ul><li>Rising frequency of cyber vulnerabilities</li><li>Challenges in cybersecurity</li></ul><p></p><p>Chapters</p><ul><li>00:00 Rising Frequency of Cyber Vulnerabilities</li></ul>]]></description><guid isPermaLink="false">92fe5212-b74b-4efc-be8c-b7edd6df7b6d</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Mon, 13 Apr 2026 13:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/5e66c7b8166309c340e0ccf79e42023c83e49a9a369631c216eef360c0fb9d55/eyJlcGlzb2RlSWQiOiI5MmZlNTIxMi1iNzRiLTRlZmMtYmU4Yy1iN2VkZDZkZjdiNmQiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlkMDBiMzJlZjg0OTczYzJhNjc5MDdiL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTQtM19fMjAtNDctMTQubXAzIn0=.mp3" length="219576" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/92fe5212-b74b-4efc-be8c-b7edd6df7b6d/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation delves into the rising frequency of cyber vulnerabilities and its impact on defensive measures. It also explores the challenges in cybersecurity, defensive measures, and strategies, as well as the offensive side of cybersecurity with a focus on cyber attacks and offensive strategies.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Rising frequency of cyber vulnerabilities&lt;/li&gt;&lt;li&gt;Challenges in cybersecurity&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Rising Frequency of Cyber Vulnerabilities&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:09</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Cybersecurity Threats Are Piling Up Faster Than Ever
</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Reverse Engineering IIS Exploit]]></title><description><![CDATA[<p>The conversation delves into the discovery of exploits and the impact of reverse engineering on program modification and distribution.</p><p></p><p>Takeaways</p><ul><li>Reverse Engineering</li><li>Impact of Exploits</li></ul><p></p><p>Chapters</p><ul><li>00:00 Uncovering Exploits and Reverse Engineering</li></ul>]]></description><guid isPermaLink="false">af60984a-5576-4267-83e6-ec6cd1fdd3a6</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Sun, 12 Apr 2026 16:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/9bc1cf42f87ad34cf555df99e3d605c84e7cdd97d0c9a6c44873e5c94d16c338/eyJlcGlzb2RlSWQiOiJhZjYwOTg0YS01NTc2LTQyNjctODNlNi1lYzZjZDFmZGQzYTYiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjliNDMyOTUzZGIxMDk1MzI1YjIyZTBjL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMTNfXzE2LTUxLTQ5Lm1wMyJ9.mp3" length="1206378" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/af60984a-5576-4267-83e6-ec6cd1fdd3a6/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation delves into the discovery of exploits and the impact of reverse engineering on program modification and distribution.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Reverse Engineering&lt;/li&gt;&lt;li&gt;Impact of Exploits&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Uncovering Exploits and Reverse Engineering&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:50</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Reverse Engineering IIS Exploit</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[AI Boosts Penetration Testing Speed]]></title><description><![CDATA[<p>The conversation delves into the impact of cloud code on penetration testing, highlighting the significant power it provides to pen testers. Additionally, the need for increased testing frequency is discussed, emphasizing the rapid changes in technology and the necessity for more frequent and efficient testing methods.</p><p></p><p>Takeaways</p><ul><li>Cloud code</li><li>Penetration testing</li><li>Testing frequency</li></ul><p></p><p>Chapters</p><ul><li>00:00 The Power of Cloud Code in Penetration Testing</li></ul>]]></description><guid isPermaLink="false">e53e1184-5ccf-4588-8f75-3cadee185015</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Sat, 11 Apr 2026 16:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/2152b9f225fa5f62cdfb56df70b9a28d2f079df19389f66bd9d318386f69dba8/eyJlcGlzb2RlSWQiOiJlNTNlMTE4NC01Y2NmLTQ1ODgtOGY3NS0zY2FkZWUxODUwMTUiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlkMDBiM2Y2MDZjZDkzZWNlMDIxMzliL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTQtM19fMjAtNDctMjcubXAzIn0=.mp3" length="1528624" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/e53e1184-5ccf-4588-8f75-3cadee185015/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation delves into the impact of cloud code on penetration testing, highlighting the significant power it provides to pen testers. Additionally, the need for increased testing frequency is discussed, emphasizing the rapid changes in technology and the necessity for more frequent and efficient testing methods.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Cloud code&lt;/li&gt;&lt;li&gt;Penetration testing&lt;/li&gt;&lt;li&gt;Testing frequency&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 The Power of Cloud Code in Penetration Testing&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:01:04</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>AI Boosts Penetration Testing Speed</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[The Hidden Threat: Market Economy & Exploits]]></title><description><![CDATA[<p>The conversation delves into the underestimation of vulnerabilities, the impact of the market economy on security, and the centralization of skills in the industry. It highlights the hidden nature of vulnerabilities, the influence of market economy on the visibility of exploits, and the decreasing number of skilled individuals in the field.</p><p></p><p>Takeaways</p><ul><li>Hidden vulnerabilities</li><li>Impact of market economy on security</li><li>Centralization of skills</li></ul><p></p><p>Chapters</p><ul><li>00:00 Underestimated Vulnerabilities</li></ul>]]></description><guid isPermaLink="false">1e61276d-902d-4cdd-9443-1c407f1e2744</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Sat, 11 Apr 2026 13:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/25d6a6b54f40a381ee7b3136374193d681ad3d8a6b557786e52534e2e000845e/eyJlcGlzb2RlSWQiOiIxZTYxMjc2ZC05MDJkLTRjZGQtOTQ0My0xYzQwN2YxZTI3NDQiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjliNDMyOWQ2MDQyNTQ5ZjViMDMyMzFlL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMTNfXzE2LTUxLTU2Lm1wMyJ9.mp3" length="6830646" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/1e61276d-902d-4cdd-9443-1c407f1e2744/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation delves into the underestimation of vulnerabilities, the impact of the market economy on security, and the centralization of skills in the industry. It highlights the hidden nature of vulnerabilities, the influence of market economy on the visibility of exploits, and the decreasing number of skilled individuals in the field.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Hidden vulnerabilities&lt;/li&gt;&lt;li&gt;Impact of market economy on security&lt;/li&gt;&lt;li&gt;Centralization of skills&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Underestimated Vulnerabilities&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:04:45</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>The Hidden Threat: Market Economy &amp; Exploits</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[AI in Security: Hype, Reality, and Future]]></title><description><![CDATA[<p>The conversation explores the impact of AI on security testing and technology, drawing parallels to the impact of cloud technology. It delves into the changes in offensive and defensive security testing due to AI and compares the initial hype and subsequent evolution of AI to that of cloud technology.</p><p></p><p>Takeaways</p><ul><li>Impact of AI on offensive and defensive security testing</li><li>Comparison of AI impact to the impact of cloud technology</li></ul><p></p><p>Chapters</p><ul><li>00:00 The Impact of AI on Security Testing and Technology</li></ul>]]></description><guid isPermaLink="false">557da51a-90d9-47c7-9dc7-2c7e6ece4401</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Fri, 10 Apr 2026 16:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/a30157e1cb446a4b82acc786434aaa456530e68fdd103c0479eef8ed6a51960d/eyJlcGlzb2RlSWQiOiI1NTdkYTUxYS05MGQ5LTQ3YzctOWRjNy0yYzdlNmVjZTQ0MDEiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhMmY0Y2M0YTk3MzhhNzJkZjhjL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItNi5tcDMifQ==.mp3" length="6718423" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/557da51a-90d9-47c7-9dc7-2c7e6ece4401/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation explores the impact of AI on security testing and technology, drawing parallels to the impact of cloud technology. It delves into the changes in offensive and defensive security testing due to AI and compares the initial hype and subsequent evolution of AI to that of cloud technology.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Impact of AI on offensive and defensive security testing&lt;/li&gt;&lt;li&gt;Comparison of AI impact to the impact of cloud technology&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 The Impact of AI on Security Testing and Technology&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:04:40</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>AI in Security: Hype, Reality, and Future</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[AI: The New Computer
]]></title><description><![CDATA[<p>The conversation explores the parallels between AI adoption and computer adoption, highlighting the potential for AI to bring efficiency and free up time for other activities. It also delves into the impact of AI on work and art, expressing hope for a future where AI enhances human creativity and productivity.</p><p></p><p>Takeaways</p><ul><li>AI adoption similar to computer adoption</li><li>AI will bring efficiency and free up time for other activities</li></ul><p></p><p>Chapters</p><ul><li>00:00 AI Adoption and Efficiency</li></ul>]]></description><guid isPermaLink="false">ddff6924-7aa8-404d-8372-a8896d6f1698</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Fri, 10 Apr 2026 13:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/f7cdd127f7d527501e2751e314d69e9b422201765375c09e188d1c752f6831d9/eyJlcGlzb2RlSWQiOiJkZGZmNjkyNC03YWE4LTQwNGQtODM3Mi1hODg5NmQ2ZjE2OTgiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlkMDBiM2Y2MDZjZDkzZWNlMDIxNDUwL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTQtM19fMjAtNDctMjcubXAzIn0=.mp3" length="1610753" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/ddff6924-7aa8-404d-8372-a8896d6f1698/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation explores the parallels between AI adoption and computer adoption, highlighting the potential for AI to bring efficiency and free up time for other activities. It also delves into the impact of AI on work and art, expressing hope for a future where AI enhances human creativity and productivity.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;AI adoption similar to computer adoption&lt;/li&gt;&lt;li&gt;AI will bring efficiency and free up time for other activities&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 AI Adoption and Efficiency&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:01:07</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>AI: The New Computer
</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Cybersecurity: Learn the Core Science]]></title><description><![CDATA[<p>The conversation covers the comparison between cybersecurity and computer science degrees, emphasizing the importance of theoretical computer science. It also delves into the concept of thinking inside the box and the limitations it imposes.</p><p></p><p>Takeaways</p><ul><li>Cybersecurity degree vs. computer science</li><li>Importance of theoretical computer science</li></ul><p></p><p>Chapters</p><ul><li>00:00 Choosing the Right Education</li></ul>]]></description><guid isPermaLink="false">b349102f-7b6b-43ce-ac82-d9aaa1122356</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Thu, 09 Apr 2026 16:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/ee9d2793ff3150ae5803be328ba13db8a05d172681eab89aa6191ab60324d51a/eyJlcGlzb2RlSWQiOiJiMzQ5MTAyZi03YjZiLTQzY2UtYWM4Mi1kOWFhYTExMjIzNTYiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjliNDMyOTUzZGIxMDk1MzI1YjIyZTJkL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMTNfXzE2LTUxLTQ5Lm1wMyJ9.mp3" length="1512324" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/b349102f-7b6b-43ce-ac82-d9aaa1122356/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation covers the comparison between cybersecurity and computer science degrees, emphasizing the importance of theoretical computer science. It also delves into the concept of thinking inside the box and the limitations it imposes.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Cybersecurity degree vs. computer science&lt;/li&gt;&lt;li&gt;Importance of theoretical computer science&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Choosing the Right Education&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:01:03</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Cybersecurity: Learn the Core Science</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[AI: Not Innovative, Just Fast
]]></title><description><![CDATA[<p>The conversation delves into the limitations of AI and its inability to be truly innovative, as well as the concept of artificial creativity. The discussion highlights the fact that AI is limited to predefined tasks and lacks the ability to generate new ideas or solutions.</p><p></p><p>Takeaways</p><ul><li>AI limitations</li><li>Artificial creativity</li></ul><p></p><p>Chapters</p><ul><li>00:00 AI Limitations and Creativity</li></ul>]]></description><guid isPermaLink="false">7372a026-9594-4f98-841f-c86144e52f33</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Thu, 09 Apr 2026 13:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/42d34c6b8bf923ee933858205515d9ce211c1d0051230ad77dc3f660c7f7d33c/eyJlcGlzb2RlSWQiOiI3MzcyYTAyNi05NTk0LTRmOTgtODQxZi1jODYxNDRlNTJmMzMiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhNDc0Y2M0YTk3MzhhNzMwY2M5L21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItMzAubXAzIn0=.mp3" length="1847109" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/7372a026-9594-4f98-841f-c86144e52f33/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation delves into the limitations of AI and its inability to be truly innovative, as well as the concept of artificial creativity. The discussion highlights the fact that AI is limited to predefined tasks and lacks the ability to generate new ideas or solutions.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;AI limitations&lt;/li&gt;&lt;li&gt;Artificial creativity&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 AI Limitations and Creativity&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:01:17</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>AI: Not Innovative, Just Fast
</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Mastering Assembler for C Fluency]]></title><description><![CDATA[<p>The conversation delves into the importance of mastering the core concepts, deep understanding of programming languages, achieving fluency, and the application of knowledge to all code. It emphasizes the significance of practice and open source code, as well as the idea that all code is open source and can be understood through reading the assembler.</p><p></p><p>Takeaways</p><ul><li>Master the core concepts</li><li>Achieve fluency in programming languages</li></ul><p></p><p>Chapters</p><ul><li>00:00 Mastering the Core</li></ul>]]></description><guid isPermaLink="false">51bb45c6-b011-4cd0-ae62-a91b4ed93ffc</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Wed, 08 Apr 2026 16:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/d6c7a65b6988c58bdef27ef0c79d92fef31271180ddcdd860824b62a9ad09706/eyJlcGlzb2RlSWQiOiI1MWJiNDVjNi1iMDExLTRjZDAtYWU2Mi1hOTFiNGVkOTNmZmMiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjliNDMyOTUzZGIxMDk1MzI1YjIyZGU5L21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMTNfXzE2LTUxLTQ4Lm1wMyJ9.mp3" length="1235217" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/51bb45c6-b011-4cd0-ae62-a91b4ed93ffc/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation delves into the importance of mastering the core concepts, deep understanding of programming languages, achieving fluency, and the application of knowledge to all code. It emphasizes the significance of practice and open source code, as well as the idea that all code is open source and can be understood through reading the assembler.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Master the core concepts&lt;/li&gt;&lt;li&gt;Achieve fluency in programming languages&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Mastering the Core&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:51</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Mastering Assembler for C Fluency</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Pentesting: More Than Just Hacking]]></title><description><![CDATA[<p>The conversation highlights the importance of consulting in the day-to-day work of a cybersecurity consultant, emphasizing the need for pen testers to also act as consultants and not just focus on hacking tricks.</p><p></p><p>Takeaways</p><ul><li>Consulting is a significant part of a cybersecurity consultant's day-to-day work.</li><li>Pen testers need to also be consultants and not just focus on showing off their hacking tricks.</li></ul><p></p><p>Chapters</p><ul><li>00:00 The Role of a Cybersecurity Consultant</li></ul>]]></description><guid isPermaLink="false">a0f099ae-9a31-4ca8-8341-ff3979baba87</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Sun, 12 Apr 2026 13:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/f53a51b0da257eb79ce8d5a104e7f63e6f0626424ce8ebd7a29da2389e2048b4/eyJlcGlzb2RlSWQiOiJhMGYwOTlhZS05YTMxLTRjYTgtODM0MS1mZjM5NzliYWJhODciLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlkMDJmZDk3OWQwNWRlYmU5MGE3OGIzL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTQtM19fMjMtMjMtMzcubXAzIn0=.mp3" length="1349320" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/a0f099ae-9a31-4ca8-8341-ff3979baba87/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation highlights the importance of consulting in the day-to-day work of a cybersecurity consultant, emphasizing the need for pen testers to also act as consultants and not just focus on hacking tricks.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Consulting is a significant part of a cybersecurity consultant&apos;s day-to-day work.&lt;/li&gt;&lt;li&gt;Pen testers need to also be consultants and not just focus on showing off their hacking tricks.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 The Role of a Cybersecurity Consultant&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:56</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Pentesting: More Than Just Hacking</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Security Testing: More Than Just Scanning]]></title><description><![CDATA[<p>The conversation delves into the misconceptions surrounding security testing and highlights the manual probing and hard thinking involved in the process.</p><p></p><p>Takeaways</p><ul><li>Misconceptions about security testing</li><li>Manual probing and hard thinking involved in security testing</li></ul><p></p><p>Chapters</p><ul><li>Misconceptions About Security Testing</li></ul>]]></description><guid isPermaLink="false">7c7fd265-3bcb-4aa9-b2cd-4b803fa49668</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Tue, 07 Apr 2026 19:45:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/21a0afe0e7a3a92f3d74e5768c54a44b8bbb4e540d1e831245b3efe6da042534/eyJlcGlzb2RlSWQiOiI3YzdmZDI2NS0zYmNiLTRhYTktYjJjZC00YjgwM2ZhNDk2NjgiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlkMDBiM2Y2MDZjZDkzZWNlMDIxNDkyL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTQtM19fMjAtNDctMjcubXAzIn0=.mp3" length="1498531" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/7c7fd265-3bcb-4aa9-b2cd-4b803fa49668/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation delves into the misconceptions surrounding security testing and highlights the manual probing and hard thinking involved in the process.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Misconceptions about security testing&lt;/li&gt;&lt;li&gt;Manual probing and hard thinking involved in security testing&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Misconceptions About Security Testing&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:01:02</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Security Testing: More Than Just Scanning</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Hacking Mac OS X]]></title><description><![CDATA[<p>The conversation covers the topic of key logging on Mac OS X without informing the user, and the process of reverse engineering Apple's implementation to achieve this. The discovery of the backdoor in Mac OS X is also discussed.</p><p></p><p>Takeaways</p><ul><li>Key logging on Mac OS X without user notification</li><li>Discovery of backdoor in Mac OS X</li></ul>]]></description><guid isPermaLink="false">97aaf43a-dea4-4cdf-b175-241a2cf32795</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Sat, 04 Apr 2026 16:15:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/4231756b76d28fea63093d9daa2bd31505518858359677cd68c26759cd25d87a/eyJlcGlzb2RlSWQiOiI5N2FhZjQzYS1kZWE0LTRjZGYtYjE3NS0yNDFhMmNmMzI3OTUiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjliNDMyYzFhNDUyMzhhY2I4ZjZlYTMzL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMTNfXzE2LTUyLTMzLm1wMyJ9.mp3" length="701692" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/97aaf43a-dea4-4cdf-b175-241a2cf32795/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation covers the topic of key logging on Mac OS X without informing the user, and the process of reverse engineering Apple&apos;s implementation to achieve this. The discovery of the backdoor in Mac OS X is also discussed.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Key logging on Mac OS X without user notification&lt;/li&gt;&lt;li&gt;Discovery of backdoor in Mac OS X&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:29</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Hacking Mac OS X</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Nick Aures Talks Zero Days and Exploit Techniques]]></title><description><![CDATA[<p>The conversation covers zero-day discoveries and cloud code exploits. Nick discusses his recent findings of zero-day vulnerabilities and his improved understanding of obscure exploit techniques. Additionally, the use of cloud code to write exploits is explored, highlighting its potential for executing commands and writing code.</p><p></p><p>Takeaways</p><ul><li>Zero-day discoveries</li><li>Cloud code exploits</li></ul>]]></description><guid isPermaLink="false">4d00dce3-cf17-463c-8493-89529e85fbfc</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Sun, 05 Apr 2026 16:15:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/9b467a1b86c535beb59cb62f705e10856a62e31f8e4d3460f56a1ce70c9a6117/eyJlcGlzb2RlSWQiOiI0ZDAwZGNlMy1jZjE3LTQ2M2MtODQ5My04OTUyOWU4NWZiZmMiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlkMDBiMzJlZjg0OTczYzJhNjc5MDgyL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTQtM19fMjAtNDctMTQubXAzIn0=.mp3" length="442139" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/4d00dce3-cf17-463c-8493-89529e85fbfc/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation covers zero-day discoveries and cloud code exploits. Nick discusses his recent findings of zero-day vulnerabilities and his improved understanding of obscure exploit techniques. Additionally, the use of cloud code to write exploits is explored, highlighting its potential for executing commands and writing code.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Zero-day discoveries&lt;/li&gt;&lt;li&gt;Cloud code exploits&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:18</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Nick Aures Talks Zero Days and Exploit Techniques</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[AI in Cybersecurity: 2026 Advice]]></title><description><![CDATA[<p>Advice for breaking into cybersecurity and pen testing in 2026, including the importance of showcasing seriousness and considering automation with AI.</p><p></p><p>Takeaways</p><ul><li>Show seriousness and dedication</li><li>Consider automation with AI</li></ul>]]></description><guid isPermaLink="false">d05106f2-17d3-4ccd-a092-047294b8817c</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Mon, 06 Apr 2026 16:15:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/df4eb0b2b92da955a1c2d95c3013d4b4207b9f7cef1c02c6d1d49ee61b596b4c/eyJlcGlzb2RlSWQiOiJkMDUxMDZmMi0xN2QzLTRjY2QtYTA5Mi0wNDcyOTRiODgxN2MiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlkMDBiM2Y2MDZjZDkzZWNlMDIxNDhjL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTQtM19fMjAtNDctMjcubXAzIn0=.mp3" length="1324869" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/d05106f2-17d3-4ccd-a092-047294b8817c/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;Advice for breaking into cybersecurity and pen testing in 2026, including the importance of showcasing seriousness and considering automation with AI.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Show seriousness and dedication&lt;/li&gt;&lt;li&gt;Consider automation with AI&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:55</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>AI in Cybersecurity: 2026 Advice</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Pentesting: A Fool's Errand]]></title><description><![CDATA[<p>The conversation covers Neil Kettle's favorite type of testing and the challenges of pen testing, highlighting the dilemma and pressure associated with it.</p><p></p><p>Takeaways</p><ul><li>Favorite testing type</li><li>Challenges of pen testing</li></ul>]]></description><guid isPermaLink="false">e34a2b3e-8fde-496e-88f8-75bd2c8671f8</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Mon, 06 Apr 2026 16:15:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/91dd5cb9b90c085542ca56118faea60d0c1638a730e4ac555d1b9ad17922509a/eyJlcGlzb2RlSWQiOiJlMzRhMmIzZS04ZmRlLTQ5NmUtODhmOC03NWJkMmM4NjcxZjgiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjliNDMyOTUzZGIxMDk1MzI1YjIyZGVmL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMTNfXzE2LTUxLTQ4Lm1wMyJ9.mp3" length="1104187" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/e34a2b3e-8fde-496e-88f8-75bd2c8671f8/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation covers Neil Kettle&apos;s favorite type of testing and the challenges of pen testing, highlighting the dilemma and pressure associated with it.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Favorite testing type&lt;/li&gt;&lt;li&gt;Challenges of pen testing&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:46</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Pentesting: A Fool&apos;s Errand</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Nick Aures (Senior Pentester)]]></title><description><![CDATA[<p>Nick Aures, a senior pen tester, shares his journey into cybersecurity, the evolution of his interest in computers, and the impact of AI on pen testing. He also discusses the underestimated attack vector of 'execution after redirect' and offers advice for aspiring cybersecurity professionals.</p><p></p><p>Takeaways</p><ul><li>Continuous pen testing models are essential for staying on top of new vulnerabilities and threats.</li><li>AI is revolutionizing cybersecurity, offering new capabilities and challenges for both offensive and defensive strategies.</li></ul><p></p><p>Chapters</p><ul><li>00:00 Introduction and Career Journey</li><li>05:06 The Coolest Hack and Continuous Pen Testing</li><li>10:12 Favorite Type of Security Testing and AI in Cybersecurity</li><li>14:58 Impact of AI on Pen Testing and Cybersecurity</li><li>19:56 Misconceptions and Underestimated Attack Vectors</li><li>25:11 Advice for Aspiring Cybersecurity Professionals and Conclusion</li></ul>]]></description><guid isPermaLink="false">1d523b56-c1d8-44ac-8a03-a1e11327cb97</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Sat, 04 Apr 2026 16:15:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/65f9a730f22d3c613287e7c22fac571b0d6e51b2def49473d81252861d5fb079/eyJlcGlzb2RlSWQiOiIxZDUyM2I1Ni1jMWQ4LTQ0YWMtOGEwMy1hMWUxMTMyN2NiOTciLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlkMDBiNmMwZWU2MjFjYmJjNjYyYjAwL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTQtM19fMjAtNDgtMTEubXAzIn0=.mp3" length="45350391" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/1d523b56-c1d8-44ac-8a03-a1e11327cb97/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;Nick Aures, a senior pen tester, shares his journey into cybersecurity, the evolution of his interest in computers, and the impact of AI on pen testing. He also discusses the underestimated attack vector of &apos;execution after redirect&apos; and offers advice for aspiring cybersecurity professionals.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Continuous pen testing models are essential for staying on top of new vulnerabilities and threats.&lt;/li&gt;&lt;li&gt;AI is revolutionizing cybersecurity, offering new capabilities and challenges for both offensive and defensive strategies.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Introduction and Career Journey&lt;/li&gt;&lt;li&gt;05:06 The Coolest Hack and Continuous Pen Testing&lt;/li&gt;&lt;li&gt;10:12 Favorite Type of Security Testing and AI in Cybersecurity&lt;/li&gt;&lt;li&gt;14:58 Impact of AI on Pen Testing and Cybersecurity&lt;/li&gt;&lt;li&gt;19:56 Misconceptions and Underestimated Attack Vectors&lt;/li&gt;&lt;li&gt;25:11 Advice for Aspiring Cybersecurity Professionals and Conclusion&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:31:30</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><itunes:title>Nick Aures (Senior Pentester)</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Just Start: Hands-On Cybersecurity]]></title><description><![CDATA[<p>The conversation emphasizes the importance of hands-on experience in cybersecurity, highlighting the transition from network play to CTFs and the value of practical keyboard experience in learning.</p><p></p><p>Takeaways</p><ul><li>Hands-on experience is crucial</li><li>CTFs are a valuable learning tool</li></ul><p></p><p>Chapters</p><ul><li>00:00 The Value of Hands-On Keyboard Experience</li></ul>]]></description><guid isPermaLink="false">0640e6ef-e180-4835-b9fb-afd512ead022</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Sun, 05 Apr 2026 16:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/978e7fdcf579e04a795f845e2a6e0f1d2e83db0183045f71dada59b6aa2caa94/eyJlcGlzb2RlSWQiOiIwNjQwZTZlZi1lMTgwLTQ4MzUtYjlmYi1hZmQ1MTJlYWQwMjIiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhNDc0Y2M0YTk3MzhhNzMwY2QwL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItMzEubXAzIn0=.mp3" length="1455272" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/0640e6ef-e180-4835-b9fb-afd512ead022/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation emphasizes the importance of hands-on experience in cybersecurity, highlighting the transition from network play to CTFs and the value of practical keyboard experience in learning.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Hands-on experience is crucial&lt;/li&gt;&lt;li&gt;CTFs are a valuable learning tool&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 The Value of Hands-On Keyboard Experience&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:01:01</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Just Start: Hands-On Cybersecurity</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Slow Down: CTF & Pen Testing Mistakes]]></title><description><![CDATA[<p>In this conversation, the speaker discusses the importance of slowing down in pen testing and CTFs to avoid missing critical vulnerabilities and attack chains. They emphasize the need to focus on the details and not rush to the end goal.</p><p></p><p>Takeaways</p><ul><li>Slowing down is crucial in pen testing and CTFs</li><li>Low severity vulnerabilities can pose high risk when combined</li></ul><p></p><p>Chapters</p><ul><li>00:00 The Need to Slow Down</li></ul>]]></description><guid isPermaLink="false">29ba6a33-11bd-40c4-bfff-88804d4f6156</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Sun, 05 Apr 2026 13:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/dd2b3e42a6b807df2fe17d611eddfad4298e965652da80da59710e0eda521fa7/eyJlcGlzb2RlSWQiOiIyOWJhNmEzMy0xMWJkLTQwYzQtYmZmZi04ODgwNGQ0ZjYxNTYiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhNDc0Y2M0YTk3MzhhNzMwZDBiL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItMzEubXAzIn0=.mp3" length="977545" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/29ba6a33-11bd-40c4-bfff-88804d4f6156/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this conversation, the speaker discusses the importance of slowing down in pen testing and CTFs to avoid missing critical vulnerabilities and attack chains. They emphasize the need to focus on the details and not rush to the end goal.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Slowing down is crucial in pen testing and CTFs&lt;/li&gt;&lt;li&gt;Low severity vulnerabilities can pose high risk when combined&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 The Need to Slow Down&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:41</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Slow Down: CTF &amp; Pen Testing Mistakes</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Exploiting EDR Console for Mass Deployment]]></title><description><![CDATA[<p>A security breach led to unauthorized access to the EDR console, allowing for the deployment of payloads and extensive access to the organization's systems.</p><p></p><p>Takeaways</p><ul><li>Unauthorized access to EDR consoles can lead to the deployment of payloads and extensive system access.</li><li>EDR consoles are often overlooked as a potential point of compromise in a security breach.</li></ul><p></p><p>Chapters</p><ul><li>00:00 Unauthorized Access to EDR Console</li></ul>]]></description><guid isPermaLink="false">f3320754-203a-48c9-8722-025f346f5fd5</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Sat, 04 Apr 2026 16:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/325540c56a5a9af8c1b64b51b9df79adc4f3d72dbd76f2b0453eb9ee97ea68ca/eyJlcGlzb2RlSWQiOiJmMzMyMDc1NC0yMDNhLTQ4YzktODcyMi0wMjVmMzQ2ZjVmZDUiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhNDc0Y2M0YTk3MzhhNzMwZDExL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItMzEubXAzIn0=.mp3" length="1181300" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/f3320754-203a-48c9-8722-025f346f5fd5/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;A security breach led to unauthorized access to the EDR console, allowing for the deployment of payloads and extensive access to the organization&apos;s systems.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Unauthorized access to EDR consoles can lead to the deployment of payloads and extensive system access.&lt;/li&gt;&lt;li&gt;EDR consoles are often overlooked as a potential point of compromise in a security breach.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Unauthorized Access to EDR Console&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:49</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Exploiting EDR Console for Mass Deployment</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[AI Boosting Red Teaming Efficiency]]></title><description><![CDATA[<p>The conversation explores the impact of AI on red teaming and the considerations of efficiency and cost for companies.</p><p></p><p>Takeaways</p><ul><li>AI can enhance red teaming</li><li>Efficiency and cost are key considerations for companies</li></ul><p></p><p>Chapters</p><ul><li>00:00 The Impact of AI on Red Teaming</li></ul>]]></description><guid isPermaLink="false">5e7fed4f-e76b-442f-aeb1-af1133ecd32b</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Sat, 04 Apr 2026 13:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/918fdaa8daf9257790518b2485827103e506a57be77565f5021b562da014e4b6/eyJlcGlzb2RlSWQiOiI1ZTdmZWQ0Zi1lNzZiLTQ0MmYtYWViMS1hZjExMzNlY2QzMmIiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhNDc0Y2M0YTk3MzhhNzMwZDM5L21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItMzEubXAzIn0=.mp3" length="1307315" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/5e7fed4f-e76b-442f-aeb1-af1133ecd32b/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation explores the impact of AI on red teaming and the considerations of efficiency and cost for companies.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;AI can enhance red teaming&lt;/li&gt;&lt;li&gt;Efficiency and cost are key considerations for companies&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 The Impact of AI on Red Teaming&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:54</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>AI Boosting Red Teaming Efficiency</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[AI in Pen Testing: Client Concerns]]></title><description><![CDATA[<p>The conversation explores the apprehension around using AI in penetration testing and draws parallels with the skepticism around self-driving cars. It delves into the fear of unmanaged AI and the need to consider the bigger picture.</p><p></p><p>Takeaways</p><ul><li>AI skepticism in penetration testing</li><li>Parallels with self-driving cars</li></ul><p></p><p>Chapters</p><ul><li>00:00 AI in Penetration Testing</li></ul>]]></description><guid isPermaLink="false">ff60be0b-cbc6-4fd1-80c9-186573bb3676</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Fri, 03 Apr 2026 16:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/ade48ffa9406eeeb8f3473afd5aab37d55b83b0fa1b293c2d8b325af1856a0b4/eyJlcGlzb2RlSWQiOiJmZjYwYmUwYi1jYmM2LTRmZDEtODBjOS0xODY1NzNiYjM2NzYiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhNDc0Y2M0YTk3MzhhNzMwZDNmL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItMzEubXAzIn0=.mp3" length="1538655" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/ff60be0b-cbc6-4fd1-80c9-186573bb3676/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation explores the apprehension around using AI in penetration testing and draws parallels with the skepticism around self-driving cars. It delves into the fear of unmanaged AI and the need to consider the bigger picture.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;AI skepticism in penetration testing&lt;/li&gt;&lt;li&gt;Parallels with self-driving cars&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 AI in Penetration Testing&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:01:04</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>AI in Pen Testing: Client Concerns</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[AI: Not Replacing Human Expertise]]></title><description><![CDATA[<p>The conversation explores the role of AI in client communication and the importance of pairing AI with skill for optimal results.</p><p></p><p>Takeaways</p><ul><li>AI should be paired with skill for optimal results</li><li>Client communication with AI requires a skilled person to guide the process.</li></ul><p></p><p>Chapters</p><ul><li>00:00 The Role of AI in Client Communication</li></ul>]]></description><guid isPermaLink="false">be2f2d4b-acb4-4544-8e49-679dbc03040d</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Fri, 03 Apr 2026 13:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/6736cce9bf6dcd2ab0af0ea03034d9f8de967bbaab7468bb26b547750bc109de/eyJlcGlzb2RlSWQiOiJiZTJmMmQ0Yi1hY2I0LTQ1NDQtOGU0OS02NzlkYmMwMzA0MGQiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhNDc0Y2M0YTk3MzhhNzMwZDQ2L21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItMzEubXAzIn0=.mp3" length="1052151" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/be2f2d4b-acb4-4544-8e49-679dbc03040d/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation explores the role of AI in client communication and the importance of pairing AI with skill for optimal results.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;AI should be paired with skill for optimal results&lt;/li&gt;&lt;li&gt;Client communication with AI requires a skilled person to guide the process.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 The Role of AI in Client Communication&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:44</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>AI: Not Replacing Human Expertise</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Red Teaming vs Pen Testing: A Hacker's Perspective]]></title><description><![CDATA[<p>The conversation covers the topics of Red Teaming and Internal Pen Testing, highlighting the differences between the two and the challenges associated with Red Teaming engagements.</p><p></p><p>Takeaways</p><ul><li>Red Teaming</li><li>Internal Pen Test</li></ul><p></p><p>Chapters</p><ul><li>00:00 Red Teaming vs. Pen Testing</li></ul>]]></description><guid isPermaLink="false">80b60aff-971c-4cd1-9e95-862f0261c4b0</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Thu, 02 Apr 2026 17:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/7d4175fe39f801202ba7c0f7bc671e9580a62379bba2a2ca930109eaa747ced8/eyJlcGlzb2RlSWQiOiI4MGI2MGFmZi05NzFjLTRjZDEtOWU5NS04NjJmMDI2MWM0YjAiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhNDc0Y2M0YTk3MzhhNzMwZGIyL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItMzEubXAzIn0=.mp3" length="1574391" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/80b60aff-971c-4cd1-9e95-862f0261c4b0/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation covers the topics of Red Teaming and Internal Pen Testing, highlighting the differences between the two and the challenges associated with Red Teaming engagements.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Red Teaming&lt;/li&gt;&lt;li&gt;Internal Pen Test&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Red Teaming vs. Pen Testing&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:01:06</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Red Teaming vs Pen Testing: A Hacker&apos;s Perspective</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[AI in Cybersecurity: Offense & Defense]]></title><description><![CDATA[<p>The conversation explores the impact of AI on offensive and defensive operations, highlighting the advantages and capabilities it offers in both areas.</p><p></p><p>Takeaways</p><ul><li>AI enables faster and more efficient operations in offensive tasks.</li><li>AI enhances the capabilities of defense operations, enabling the identification of advanced threat chains.</li></ul><p></p><p>Chapters</p><ul><li>00:00 Advantages of AI in Offensive Operations</li></ul>]]></description><guid isPermaLink="false">efc2455a-a858-416f-bbdf-8263ced1965e</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Thu, 02 Apr 2026 13:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/e8a6d49159257c84ef936d040cd2ede2ca8c5c2c02f496746df5563662d23196/eyJlcGlzb2RlSWQiOiJlZmMyNDU1YS1hODU4LTQxNmYtYmJkZi04MjYzY2VkMTk2NWUiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhNDc0Y2M0YTk3MzhhNzMwZGQ3L21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItMzEubXAzIn0=.mp3" length="1137414" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/efc2455a-a858-416f-bbdf-8263ced1965e/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation explores the impact of AI on offensive and defensive operations, highlighting the advantages and capabilities it offers in both areas.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;AI enables faster and more efficient operations in offensive tasks.&lt;/li&gt;&lt;li&gt;AI enhances the capabilities of defense operations, enabling the identification of advanced threat chains.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Advantages of AI in Offensive Operations&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:47</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>AI in Cybersecurity: Offense &amp; Defense</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[EDR Deployment: When One Payload Triggers Hundreds of Beacons]]></title><description><![CDATA[<p>The conversation covers the use of EDR for payload deployment and the overwhelming number of callbacks and beacons that followed.</p><p></p><p>Takeaways</p><ul><li>EDR for fast payload deployment</li><li>Managing overwhelming callbacks and beacons</li></ul><p></p><p>Chapters</p><ul><li>00:00 EDR Payload Deployment</li></ul>]]></description><guid isPermaLink="false">a9f29ae4-3272-49dd-9fac-35f21ab7157d</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Thu, 02 Apr 2026 04:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/b9ee44d5442c1c334461393a466e1bb080d6304e7d85bf080bd032e92832f9e8/eyJlcGlzb2RlSWQiOiJhOWYyOWFlNC0zMjcyLTQ5ZGQtOWZhYy0zNWYyMWFiNzE1N2QiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhZmFkNjJmOTlmMjg1M2ExZGQxL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTUtMzAubXAzIn0=.mp3" length="618936" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/a9f29ae4-3272-49dd-9fac-35f21ab7157d/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;The conversation covers the use of EDR for payload deployment and the overwhelming number of callbacks and beacons that followed.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;EDR for fast payload deployment&lt;/li&gt;&lt;li&gt;Managing overwhelming callbacks and beacons&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 EDR Payload Deployment&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:26</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>EDR Deployment: When One Payload Triggers Hundreds of Beacons</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[Compromising the Target using their EDR]]></title><description><![CDATA[<p>A discussion about compromising the mail server and accessing the EDR admin console, followed by an exploration of security vulnerabilities post-COVID.</p><p></p><p>Takeaways</p><ul><li>Compromising the mail server</li><li>Security vulnerabilities post-COVID</li></ul><p></p><p>Chapters</p><ul><li>00:00 Compromising the Mail Server</li></ul>]]></description><guid isPermaLink="false">cb0c487d-daf3-4162-b17f-17ab816554bf</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Wed, 01 Apr 2026 13:00:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/baf2adc78fd82b80b96956657811175bb8480af48605b9b4cc7746119ff71135/eyJlcGlzb2RlSWQiOiJjYjBjNDg3ZC1kYWYzLTQxNjItYjE3Zi0xN2FiODE2NTU0YmYiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhZmFkNjJmOTlmMjg1M2ExZGQ3L21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTUtMzAubXAzIn0=.mp3" length="1308569" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/cb0c487d-daf3-4162-b17f-17ab816554bf/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;A discussion about compromising the mail server and accessing the EDR admin console, followed by an exploration of security vulnerabilities post-COVID.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Compromising the mail server&lt;/li&gt;&lt;li&gt;Security vulnerabilities post-COVID&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Compromising the Mail Server&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:00:54</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:title>Compromising the Target using their EDR</itunes:title><itunes:episodeType>trailer</itunes:episodeType></item><item><title><![CDATA[HaxrByte (Penetration Tester/Ethical Hacker; Red Teamer/Red Team Operator)]]></title><description><![CDATA[<p>HaxrByte is a cybersecurity-focused YouTube channel built for professionals, students, and cyber-curious minds who want to dive deep into the art of offensive security. From stealthy Red Team operations to cutting-edge adversary emulation, we break down complex concepts with real-world walkthroughs, technical demos, and tactical breakdowns. <br /><br /><a rel="noopener noreferrer nofollow" href="https://www.youtube.com/@haxrbyte" target="_blank">https://www.youtube.com/@haxrbyte</a> <a rel="noopener noreferrer nofollow" href="https://haxrbyte.com" target="_blank">https://haxrbyte.com</a><br /><br />LinkedIn URL: <a rel="noopener noreferrer nofollow" href="https://www.linkedin.com/company/haxrbyte/" target="_blank">https://www.linkedin.com/company/haxrbyte/</a><br /><br />Twitter username: haxrbyte<br /></p><p>LiveStream every Thursday 8 PM ET (7 PM CT): </p><p>"Using CTFs to Train YOUR Hacker Brain — Pentester Tradecraft."</p>]]></description><guid isPermaLink="false">1f1751b1-f40e-4733-a411-f7fef238389b</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Tue, 31 Mar 2026 19:27:50 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/3312bff047ad93a497d8de8d10a92e4ae1b3edafcaa152bbc2434779578dae45/eyJlcGlzb2RlSWQiOiIxZjE3NTFiMS1mNDBlLTQ3MzMtYTQxMS1mN2ZlZjIzODM4OWIiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljYzFhNTI0YTlkNGUyYWZkMWYxNzEzL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMzFfXzIxLTItNDIubXAzIn0=.mp3" length="64151031" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/1f1751b1-f40e-4733-a411-f7fef238389b/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;HaxrByte is a cybersecurity-focused YouTube channel built for professionals, students, and cyber-curious minds who want to dive deep into the art of offensive security. From stealthy Red Team operations to cutting-edge adversary emulation, we break down complex concepts with real-world walkthroughs, technical demos, and tactical breakdowns. &lt;br /&gt;&lt;br /&gt;&lt;a rel=&quot;noopener noreferrer nofollow&quot; href=&quot;https://www.youtube.com/@haxrbyte&quot; target=&quot;_blank&quot;&gt;https://www.youtube.com/@haxrbyte&lt;/a&gt; &lt;a rel=&quot;noopener noreferrer nofollow&quot; href=&quot;https://haxrbyte.com&quot; target=&quot;_blank&quot;&gt;https://haxrbyte.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;LinkedIn URL: &lt;a rel=&quot;noopener noreferrer nofollow&quot; href=&quot;https://www.linkedin.com/company/haxrbyte/&quot; target=&quot;_blank&quot;&gt;https://www.linkedin.com/company/haxrbyte/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Twitter username: haxrbyte&lt;br /&gt;&lt;/p&gt;&lt;p&gt;LiveStream every Thursday 8 PM ET (7 PM CT): &lt;/p&gt;&lt;p&gt;&quot;Using CTFs to Train YOUR Hacker Brain — Pentester Tradecraft.&quot;&lt;/p&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:44:33</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:season>1</itunes:season><itunes:episode>2</itunes:episode><itunes:title>HaxrByte (Penetration Tester/Ethical Hacker; Red Teamer/Red Team Operator)</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Neil Kettle - Vulnerability Researcher]]></title><description><![CDATA[<p>Neil Kettle, a vulnerability researcher and bug hunter, shares his journey from early interest in computers to becoming a cybersecurity expert. He discusses his coolest hacks and exploits, favorite type of testing, and offers insights on improving security testing. The conversation covers challenges of screen sharing, bureaucratic impositions, educating the industry for efficiency, misconceptions about security testing, underestimated vulnerabilities, market economy and security exploits, old class of vulnerabilities in new technologies, advice for breaking into cybersecurity, and where to find more about Neil Kettle.</p><p></p><p>Takeaways</p><ul><li>Early exposure to computers can shape a career in cybersecurity.</li><li>Reverse engineering and crypto-related testing are preferred due to their depth and lack of bureaucratic obstacles. Security testing is not 100% technical, it's 20% technical and 80% bureaucratic.</li><li>Learning the premise is more important than memorizing the antecedent in cybersecurity education.</li></ul><p></p><p>Chapters</p><ul><li>00:00 Introduction and Background</li><li>06:01 Entry into Cybersecurity</li><li>16:34 Favorite Type of Testing</li><li>22:20 Misconceptions About Security Testing</li><li>27:36 Old Class of Vulnerabilities in New Technologies</li><li>36:10 Where to Find More About Neil Kettle</li></ul>]]></description><guid isPermaLink="false">65711397-b285-4ccc-8bce-46e939ed345f</guid><dc:creator><![CDATA[Michel Chamberland]]></dc:creator><pubDate>Tue, 31 Mar 2026 19:30:00 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/cfff521ae8f416ea6a996c3f3f8f134d2d88fa1babdc5e56971487fd0393e0d9/eyJlcGlzb2RlSWQiOiI2NTcxMTM5Ny1iMjg1LTRjY2MtOGJjZS00NmU5MzllZDM0NWYiLCJwb2RjYXN0SWQiOiI2ZWRiMzlmZS1hNGY3LTRhM2UtOThkMC1kZDg4NDAxNzQ5NTUiLCJhY2NvdW50SWQiOiI2OTNmMDdjNTEzZjczYTBhOTIyMzQ1Y2UiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjliNDMyM2Y2OTkxYjM2MTFiZTNmNWUyL21pa2VzLXN0dWRpby1EaUxGUi1jb21wb3Nlci0yMDI2LTMtMTNfXzE2LTUwLTIzLm1wMyJ9.mp3" length="55873558" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/episodes/65711397-b285-4ccc-8bce-46e939ed345f/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;Neil Kettle, a vulnerability researcher and bug hunter, shares his journey from early interest in computers to becoming a cybersecurity expert. He discusses his coolest hacks and exploits, favorite type of testing, and offers insights on improving security testing. The conversation covers challenges of screen sharing, bureaucratic impositions, educating the industry for efficiency, misconceptions about security testing, underestimated vulnerabilities, market economy and security exploits, old class of vulnerabilities in new technologies, advice for breaking into cybersecurity, and where to find more about Neil Kettle.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Takeaways&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Early exposure to computers can shape a career in cybersecurity.&lt;/li&gt;&lt;li&gt;Reverse engineering and crypto-related testing are preferred due to their depth and lack of bureaucratic obstacles. Security testing is not 100% technical, it&apos;s 20% technical and 80% bureaucratic.&lt;/li&gt;&lt;li&gt;Learning the premise is more important than memorizing the antecedent in cybersecurity education.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Chapters&lt;/p&gt;&lt;ul&gt;&lt;li&gt;00:00 Introduction and Background&lt;/li&gt;&lt;li&gt;06:01 Entry into Cybersecurity&lt;/li&gt;&lt;li&gt;16:34 Favorite Type of Testing&lt;/li&gt;&lt;li&gt;22:20 Misconceptions About Security Testing&lt;/li&gt;&lt;li&gt;27:36 Old Class of Vulnerabilities in New Technologies&lt;/li&gt;&lt;li&gt;36:10 Where to Find More About Neil Kettle&lt;/li&gt;&lt;/ul&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:38:48</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/6edb39fe-a4f7-4a3e-98d0-dd8840174955/logos/60ceac06-6372-449b-b430-0cd67fafa72a.jpeg"/><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><itunes:title>Neil Kettle - Vulnerability Researcher</itunes:title><itunes:episodeType>full</itunes:episodeType></item></channel></rss>