#
Title
1

Show 137: Wafaa Mamilli Discusses Cultural Differences in Technology Management

2

Show 136: Pavi Ramamurthy discusses the relationship between development and software security

3

Show 135: Ksenia Dmitrieva-Peguero discusses software security and AngularJS

4

Show 134: Kelly Jackson Higgins Discusses Cyber Security Journalism

5

Show 133: Cheryl Biswas Discusses the Politicization of Cyber Security

6

Show 132: Chenxi Wang Discusses DevOps and Diversity in Tech

7

Show 131: Kate Pearce Discusses the Relationship Between Biology and Security

8

Show 130: Jessy Irwin Discusses How to Make Security and Privacy Accessible

9

Show 129: Kelly Lum Discusses Bug Hunting and a Unique Analytical Outlook on Security

10

Show 128: Lesley Carhart Discusses Incident Response and Digital Forensics

11

Show 127: Dr. Marie Moe Discusses Medical Device Security

12

Show 126: Mike Pittenger Discusses Open Source Software Security

13

Show 125: Jim Manico Discusses Static Analysis, Open Source, and Developer Training

14

Show 124: Lance Cottrell Discusses Anonymity and Privacy

15

Show 123: Yanek Korff Discusses How to Build a Successful Technical Team

16

Show 122: David Nathans Discusses Security Operations Centers and Medical Device Security

17

Show 121: Marty Hellman Discusses Cryptography and Nuclear Non-Proliferation

18

Show 120: Silver Bullet Celebrates 10 Years! Marcus Ranum Interviews Gary McGraw

19

Show 119: Jacob West Discusses the IEEE CSD, Bugs, Flaws, And Wearable Devices

20

Show 118: Jack Daniel Discusses Security BSides, Communities, and the Big Picture of Security

21

Show 117: Jamie Butler Discusses Security Research, Thinking Like a Hacker, And Rootkit Development

22

Show 116: Doug Maughan Discusses the Current State Of Cyber Security In the U.S. Department Of Homeland Security

23

Show 115: Peiter “mudge” Zatko Discusses the L0pht and Government Influence

24

Show 114: Peter Clay Discusses the Evolution of the CISO Role

25

Show 113: Chandu Ketkar Discusses Software Security Best Practices

26

Show 112: “Crypto Wars II” with Steve Bellovin and Matt Green

27

Show 111 – An Interview with Marcus Ranum

28

Show 110 – An Interview with Paul Dorey

29

Show 109 – An Interview with Bart Preneel

30

Show 108 – An Interview with Katie Moussouris

31

Show 107 – An Interview with Jean Camp

32

Show 106 – An Interview with Steve Katz

33

The History of Public Key Cryptography with Whitfield Diffie

34

Show 104 – An Interview with Rick Gordon

35

Show 103 – An Interview with Brian Krebs

36

Show 102 – An Interview with Richard Danzig

37

Software Security with the Founders of the Center for Secure Design

38

The State of Software Security with Cigital’s Principals

39

the PLDI and Software Security with Michael Hicks

40

The Hype behind Heartbleed with Bart Miller

41

The Development Side of Software Security with Aaron Bedra

42

Show 096 – An Interview with Nate Fick

43

Show 095 – An Interview with Charlie Miller

44

Show 094 – An Interview with Ming Chow

45

Show 093 – An Interview with Yoshi Kohno

46

The Early Days of Computing with Jon Callas

47

A Breakdown of the BSIMM-V with Caroline Wong

48

Cryptography compared with Matthew Green

49

Academic vs. Corporate research with Michael Reiter

50

Teaching Security Globally with Christian Collberg

51

Progression of Software Security with James Walden

52

Technical Culture across the Pacific with Wenyuan Xu

53

Show 085 – A Discussion with Jim Routh and Scott Matsumoto

54

Learning Science in the Country with Hord Tipton

55

Show 083 – An Interview with Mark Graff

56

Show 082 – An Interview with Kevin Fu

57

Show 081 – An Interview with Steve Bellovin

58

Show 080 – An Interview with Thomas Rid

59

Show 079 – Software Security Initiative at Sony with Per-Olof Persson

60

Show 078 – An Interview with Jacob West

61

Show 077 – An Interview with Gary Warzala

62

Show 076 – An Interview with David Evans

63

Show 075 – An Interview with Howard Schmidt

64

Show 074 – An Interview with Bruce Schneier

65

Show 073 – An Interview with Robert Vamosi

66

Show 072 – An Interview with Randy Sabett

67

Show 071 – An Interview with Bill Arbaugh

68

Show 070 – An Interview with Ross Anderson

69

Show 069 – An Interview with Steve Myers

70

Show 068 – An Interview with John Steven

71

Show 067 – An Interview with Bill Pugh

72

Show 066 – An Interview with Shari Lawrence Pfleeger

73

Show 065 – An Interview with Giovanni Vigna

74

Show 064 – An Interview with Markus Schumacher

75

Show 063 – An Interview with Craig Miller

76

Show 062 – An Interview with Halvar Flake

77

Show 061 – An Interview with Carl Landwehr

78

Show 060 – An Interview with Neil Daswani

79

Show 059 – An Interview with Ralph Langner

80

Show 058 – An Interview with John Savage

81

Show 057 – An Interview with Elinor Mills

82

Show 056 – An Interview with Sammy Migues

83

Show 055 – An Interview with Deborah Frincke

84

The Decades Science Fiction with Marc Donner

85

Network Security Best Practices with Richard Bejtlich

86

A Breakdown of Security Analysis with Paul Kocher

87

Startup versus Government Research with Anup Ghosh

88

Lacking Defense in Cyber War with Richard Clarke

89

Imitating the Attackers Prespective with Ivan Arce

90

Changes in Security Compliance with Andrew Jaquith

91

Security’s need for Languages with Greg Morrisett

92

A Look Inside Infowar with David Rice

93

The Common Disregard for Privacy with Lorrie Cranor

94

The History of Network Security with Steve Kent

95

The Hype behind Cloud Security with Chris Hoff

96

Informatics and Health Security with Gilian Hayes

97

Security vs. Reliability with Fred Schneider

98

Comparing Security Models with Bob Blakley

99

“Cyber Coordinator” defined with Matt Blaze

100

The Importance of In-Situ Usability with Kay Connelly

101

Changes and Immortality of Security with Virgil Gilgor

102

The Birth of the BSIMM with Gary McGraw

103

Computer Security within Daemon with Daniel Suarez

104

Show 034 – An Interview with Bill Brenner

105

Show 033 – An Interview with Laurie Williams

106

Show 032 – An Interview with Jeremiah Grossman

107

Show 031 – An Interview with Matt Bishop

108

Show 030 – An Interview with Ken van Wyk

109

Show 029 – An Interview with Dennis Fisher

110

Show 028 – An Interview with Bill Cheswick

111

Show 027 – An Interview with Gunnar Peterson

112

Show 026 – An Interview with Adam Shostack

113

Show 025 – An Interview with Jon Swartz

114

Background Behind a CSO with Mary Ann Davidson

115

The Growth of Software Security with Chris Wysopal

116

Software Security Behind AT&T with Ed Amoroso

117

Show 021 – A Panel Discussion with Cigital’s Principals

118

Show 020 – An Interview with Markus Jakobsson

119

The Legitimacy of Mobile Viruses with Mikko Hyppönen

120

The Importance of Software Testing with Eugene Spafford

121

The ROI of Computer Security with Eric Cole

122

Understanding Exploits with Greg Hoglund

123

Data Privacy Defined with Annie Antón

124

Computer Security since the 1960’s with Peter Neumann

125

Security Engineering Described with Ross Anderson

126

From Ruralism to Computer Security with Becky Bace

127

Teaching Computer Security with Dorothy Denning

128

A Discussion on Software Security & Static Analysis Tools

129

Phyisical And Computer Security Compared with Bruce Schneier

130

Show 008 – An Interview with Brian Chess

131

Day in The Life of a CSO with John Stewart

132

Security’s impact on Microsoft with Michael Howard

133

2006 Technology Predications with Ed Felton

134

A Software Security Industry 360 with Dana Epp

135

The Computer Security Plateau with Marcus Ranum

136

The Necessities of a Security Practitioner with Dan Geer

137

Show 001 – An Interview with Avi Rubin