Advanced Persistent Security Podcast

Advanced Persistent Security

A Technology and Tech News podcast
Good podcast? Give it some love!
A periodic audio podcast discussing current events and trends in Cyber Security.

Creators & Guests

View All
Add Creators
Guest
1 episode

Recent Episodes

View All
Reviews

This podcast hasn't been reviewed yet. You can add a review to show others what you thought.

Mentioned In These Lists

There are no lists that include "Advanced Persistent Security". You can add this podcast to a new or existing list.

Similar Podcasts

    Rate Podcast
    Recommend This Podcast
    Recommendation sent

    Join Podchaser to...

    • Rate podcasts and episodes
    • Follow podcasts and creators
    • Create podcast and episode lists
    • & much more
    Podcast Details
    Started
    Sep 8th, 2015
    Latest Episode
    Apr 26th, 2018
    Release Period
    Weekly
    No. of Episodes
    50
    Avg. Episode Length
    About 1 hour
    Explicit
    No

    Podcast Tags

    Do you host or manage this podcast?
    Claim and edit this page to your liking.
    Are we missing an episode or update?
    Use this to check the RSS feed immediately.
    \\n\\n\\n// \\n\\n \\n\",\"rating\":null,\"user_data\":{}},\"10180791\":{\"air_date\":\"2015-09-24 14:00:53\",\"podcast\":85099,\"audio_url\":\"http://feedproxy.google.com/~r/AdvancedPersistentSecurity/~5/VsD3Rg__0vI/sans-top-20-critical-security-controls-1-4.mp3\",\"length\":1559,\"review_count\":0,\"guid\":\"https://advancedpersistentsecurity.net/?post_type=podcast&p=545\",\"image_url\":null,\"slug\":\"sans-top-20-critical-security-controls-1-4\",\"rating_count\":0,\"list_count\":0,\"creator_summary\":[],\"highlight\":[],\"weighted_rating_alltime\":3,\"podcast_id\":85099,\"title\":\"SANS Top 20 Critical Security Controls 1-4\",\"id\":10180791,\"creator_count\":0,\"description\":\"\\n\\n\\nSANS Top 20 Critical Security Controls 1-4\\n\\nThe SANS SANS Top 20 Critical Security Controls are an industry and (for the most part) vendor neutral set of controls that organizations are encouraged to implement to ensure they are cognizant of security issues and can respond accordingly. This episode deals exclusively with the first 4 controls in-depth, so to not overwhelm listeners with what is shaping up to be a nearly 3 hour podcast.\\nIf you want to discuss how Advanced Persistent Security can help you implement the SANS Top 20 Critical Security Controls, please contact Advanced Persistent Security Sales.\\nContent\\nThis week, we begin to discuss the SANS Top 20 Critical Security Controls, this week we cover the following 4 Controls:\\nSANS Top 20 Critical Security Controls, #1: Inventory of Authorized and Unauthorized Devices\\nSANS Top 20 Critical Security Controls, #2: Inventory of Authorized and Unauthorized Software\\nSANS Top 20 Critical Security Controls, #3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers\\nSANS Top 20 Critical Security Controls, #4: Continuous Vulnerability Assessment and Remediation\\nThe Center for Internet Security Benchmarks Program\\nThe NIST National Checklist Program\\nDISCLAIMER: Aside from receiving training from SANS and holding a certification from their partner organization, GIAC, neither Advanced Persistent Security nor myself, Joe Gray are affiliated with SANS. This podcast is authorized via SANS open use clause and is not officially authorized by SANS. There is no compensation to Advanced Persistent Security nor myself, Joe Gray for doing this podcast. The purpose is to increase awareness using open frameworks.\\nIf you have any questions or concerns about the podcast or something you want featured on the podcast, please email us at podcast@advancedpersistentsecurity.net\\nThanks for stopping by and listening to our podcast. We would appreciate if you could subscribe (assuming you like what you hear; we think you will). This is meant to be informative and to provide value to anyone who listens to this – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.\\nBe sure to subscribe to this podcast and to our Blog.\\n\\n\\nReferences\\nNIST SP 800-53 Revision 4\\nSANS Top 20 Critical Security Controls\\n\\n\\n\\n\\n\\nEnter your email address:\\n\\n\\nDelivered by FeedBurner\\n\\n\\n\\n\\n\\nSubscribe to our mailing list\\n* indicates required\\nEmail Address *\\n\\n\\nFirst Name \\n\\nLast Name \\n\\n\\n\\n\\n\\n\\n\\n\\n// \\n\\n\\n// \\n\\n \\n\",\"rating\":null,\"user_data\":{}},\"15811251\":{\"air_date\":\"2016-10-03 10:00:54\",\"podcast\":85099,\"audio_url\":\"http://feedproxy.google.com/~r/AdvancedPersistentSecurity/~5/LkxL_hmAwRo/women-minorities-in-technology-with-shana-bumpas.mp3\",\"length\":3869,\"review_count\":0,\"guid\":\"https://advancedpersistentsecurity.net/?post_type=podcast&p=2171\",\"image_url\":\"https://i0.wp.com/advancedpersistentsecurity.net/wp-content/uploads/2015/09/jocephus865.jpg?fit=1400%2C1400&ssl=1\",\"slug\":\"women-minorities-in-technology-with-shana-bumpas\",\"rating_count\":0,\"list_count\":0,\"creator_summary\":[],\"highlight\":[],\"weighted_rating_alltime\":3,\"podcast_id\":85099,\"title\":\"Women & Minorities in Technology (with Shana Bumpas)\",\"id\":15811251,\"creator_count\":0,\"description\":\"Women & Minorities in Technology (WITH SHANA BUMPAS)\\nADVANCED PERSISTENT SECURITY PODCAST\\nEPISODE 21\\nGUEST: Shana Bumpas\\nOctober 3, 2016\\nIf you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on iTunes; Like us on Google Play, Stitcher, Sound Cloud, Spreaker, and YouTube.\\nNOTE: The opinions expressed in this podcast are ours alone and do not reflect those of our employers\\nWomen & Minorities in Technology (with Shana Bumpas) SHOW NOTES\\nPART 1\\nJoe introduces Shana Bumpas, an Information Security professional with both state and federal experience. She gets us up to speed on what she’s been up to and then we transition into the news. Shana and Joe provide their outside analysis of the Yahoo data breach and the impact it will have on Yahoo’s sale to Verizon. Joe voices his belly aches with everyone claiming “Nation State” attacks.\\nPART 2\\nShana talks about the gap in technology of minorities and females. She talks about the decline in completion of STEAM (Science, Technology, Engineering, Art, and Math) degrees and entering the workforce. Shana equates this to a lack of mentors. Joe talks about putting effort in and reaping the rewards as well as crushing the security and technology elitism. We discuss using shows like Mr. Robot as a tool for awareness and getting the security conversation started. Joe calls out his mentors in his early days: Luke Winkelmann and Jim Roller. Shana and Joe discuss newer perspectives and challenges in promoting diversity.\\nPART 3\\nJoe mentions Girls Who Code, Women Cyberjutsu, Women In Technology, and Women In Cybersecurity. Shana talks about these organizations spreading the word and gaining the male advocacy. Shana provides more groups, which are in the resources section with the groups Joe mentioned. Shana calls higher learning institutions to do more to mentor students via clubs, job shadowing, and helping them gain internships.\\nABOUT Shana\\nShana Bumpas\\nShana Bumpas has been working in the IT profession for over 20 years in both the public and private sectors. Prior to that, she served as an Aviation Electronics Technician in the US Navy.  She graduated from Virginia Commonwealth University in Richmond, VA with a Bachelors of Science in Business Administration majoring in Management of Information Systems.  She has earned a Master of Science in Information Assurance from Norwich University in Northfield, VT.   She is currently working a Doctorate of Education at Liberty University. Prior to her current role as the IT Risk Manager with a state agency, she was a Senior Information Security Analyst, security administrator, systems administrator, to name a few of the multiple areas of IT in which she has worked.\\nShana is a member of the International Information Systems Security Certification Consortium and is a Certified Information Systems Security Professional.  She is also a member of Information Systems Auditing Control Association’s international and Virginia chapters and holds a both Certified Information Systems Auditor and Certified in Risk and Information Systems Control certifications.  She is also CompTIA Security+ certified and a Microsoft Certified Professional.\\nResources and sites mentioned:\\nhaveibeenpwned.com\\nTime Based Security (Book)\\nGirls Who Code: website / @GirlsWhoCode (Twitter) / Facebook\\nWomen’s Society of Cyberjutsu: website / @WomenCyberjutsu (Twitter) / Facebook\\nWomen in Cybersecurity (WiCyS) Conference: website\\nNation Center for Women & information Technology: website / @NCWIT (Twitter) / Facebook\\nWomen in Technology: website / @WITWomen (Twitter)\\nBlack Girls Code: website / @BlackGirlsCode (Twitter) / Facebook\\nNational Black Data Processing Association: website / @BDPA (Twitter) / Facebook\\nPASSWORD BLOG LINKS:\\nAlienVault\\nHosted Locally on Advanced Persistent Security\\nWI-FI BLOG LINK:\\nAlienVault\\nHosted Locally on Advanced Persistent Security\\nPOWERSHELL LINK:\\nAlienVault\\nHosted Locally on Advanced Persistent Security\\n\\nThanks for stopping by and checking out our podcast. We would appreciate if you could subscribe (assuming you like what you hear; we think you will). This is meant to be informative and to provide value to anyone who listens – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.\\nIf you have ANY Cybersecurity needs, please contact us and a member of our staff with promptly reply to your question or concern.\\nEnter your email address:\\n\\n\\nDelivered by FeedBurner\\n\\n\\n\\nSUBSCRIBE TO OUR MAILING LIST\\n* indicates required\\nEmail Address *\\n\\n\\nFirst Name \\n\\nLast Name \\n\\n\\n\\n\\n\\n\\n\\n\\n \\n\",\"rating\":null,\"user_data\":{}},\"27364857\":{\"air_date\":\"2018-04-12 10:00:29\",\"podcast\":85099,\"audio_url\":\"http://feedproxy.google.com/~r/AdvancedPersistentSecurity/~5/cE9aQ1usYXY/infosec-thoughts-with-jayson-e-street-tracy-maleeff.mp3\",\"length\":3324,\"review_count\":0,\"guid\":\"https://advancedpersistentsecurity.net/?post_type=podcast&p=2950\",\"image_url\":\"https://i0.wp.com/advancedpersistentsecurity.net/wp-content/uploads/2015/09/jocephus865.jpg?fit=1400%2C1400&ssl=1\",\"slug\":\"infosec-thoughts-with-jayson-e-street-tracy-maleeff\",\"rating_count\":0,\"list_count\":0,\"creator_summary\":[],\"highlight\":[],\"weighted_rating_alltime\":3,\"podcast_id\":85099,\"title\":\"Infosec Thoughts (with Jayson E. Street & Tracy Maleeff)\",\"id\":27364857,\"creator_count\":0,\"description\":\"Infosec Thoughts (with Jayson E. Street & Tracy Maleeff)\\nAdvanced Persistent Security Podcast\\nEpisode 42\\nGuests: Jayson E. Street and Tracy “Infosec Sherpa” Maleeff\\nApril 12, 2018\\nIf you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on iTunes; Like us on Google Play, Stitcher, Sound Cloud, Spreaker, and YouTube.\\nNOTE: The opinions expressed in this podcast are ours alone and do not reflect those of our employers\\nInfosec Thoughts (with Jayson E. Street & Tracy Maleeff)\\nShow Notes\\nSegment 1\\nIn this episode, Tracy and Joe introduce Jayson E. Street. Tracy mentions Jayson’s talk about failing from Tactical Edge conference. Joe and Tracy agree that people in infosec do not talk enough about their failures. Jayson talks about how to break into infosec. He shares how he would survey his defenses as a security guard (30 years ago) from the lens of someone who would be breaking in.\\nBad Guys will break in just like a red teamer, but they won’t give you a report to mitigate it.\\nBrian Krebs should not be your IDS.\\nJoe hits Jayson with a trick question about which language one should learn to break into infosec. Jayson passes the test with the answer of “English.” We continue down the rabbit hole of effective communications with regards to buzzwords and speaking the language of the audience. We talk about the use of the word “cyber” in the sense of cybersecurity in lieu of information security when speaking to the businesses.\\nSegment 2\\nTracy asks Jayson how to approach talking to non-technical, non-security people about the umbrella of information security relative to explaining the various types of security disciplines and the differences in each. Jayson levels with us with regards to the culture of information security based on his travels across the world. Jayson tells us how he would collect information about a company using OSINT to phish the company or gain unauthorized access. He encourages listeners to go out and speak to non-security groups to raise awareness across other verticals.\\nkittenwar.com\\nAbout Jayson\\nJayson E. Street\\nJayson E. Street is an Author of Dissecting the Hack: The F0rb1dd3n Network from Syngress. Also Creator of http://dissectingthehack.com He has also spoken at DEFCON, DerbyCon, UCON and at several other ’CONs and colleges on a variety of information security subjects. His life story can be found on Google under “Jayson E. Street” *He is a highly carbonated speaker who has partaken of pizza from Beijing to Brazil. He does not expect anybody to still be reading this far, but if they are please note he was chosen as one of Time’s persons of the year for 2006.\\nContacting Jayson:\\nTwitter: @jaysonstreet\\nAwkward Hugs\\niRonin\\nJaysonEStreet.com\\nThe Forb1dd3n Network\\nBooks\\nDissecting the Hack: The F0rb1dd3n Network Revised\\nDissecting the Hack: The V3rb0t3n Network\\nAbout Tracy:\\nTracy Maleef\\nTracy Z. Maleeff is a Cyber Analyst in the Security Operations Center for global pharmaceutical company GSK. She holds a Master of Library and Information Science degree from the University of Pittsburgh. She has 15+ years’ experience as a law firm librarian and also worked as an independent consultant who specialized in social media, research, and Information Security awareness training. Tracy received the Wolters Kluwer Law & Business Innovations in Law Librarianship Award in 2016 and the Information Systems Security Association Women in Security Leadership Award in 2017. Tracy has presented at a variety of conferences including the Special Libraries Association, Security BSides, O’Reilly Security, and DEF CON’s Recon Village.\\nContacting Tracy:\\nTwitter: @infosecsherpa\\nNewsletter\\nWebsite: Sherpa Intel\\nThanks for stopping by and checking out our podcast. We would appreciate if you could subscribe (assuming you like what you hear; we think you will). This is meant to be informative and to provide value to anyone who listens – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.\\nEnter your email address:\\n\\n\\nDelivered by FeedBurner\\n\\n\\n\\nSUBSCRIBE TO OUR MAILING LIST\\n* indicates required\\nEmail Address *\\n\\n\\nFirst Name \\n\\nLast Name \\n\\n\\n\\n\\n\\n\\n\\n \\n\",\"rating\":null,\"user_data\":{}},\"27541642\":{\"air_date\":\"2018-04-19 10:00:51\",\"podcast\":85099,\"audio_url\":\"http://feedproxy.google.com/~r/AdvancedPersistentSecurity/~5/3DvDrqckVBE/ransomware-with-allan-liska-tim-gallo.mp3\",\"length\":5439,\"review_count\":0,\"guid\":\"https://advancedpersistentsecurity.net/?post_type=podcast&p=2952\",\"image_url\":\"https://i0.wp.com/advancedpersistentsecurity.net/wp-content/uploads/2015/09/jocephus865.jpg?fit=1400%2C1400&ssl=1\",\"slug\":\"ransomware-with-allan-liska-tim-gallo\",\"rating_count\":0,\"list_count\":0,\"creator_summary\":[22885],\"highlight\":[],\"weighted_rating_alltime\":3,\"podcast_id\":85099,\"title\":\"Ransomware (with Allan Liska & Tim Gallo)\",\"id\":27541642,\"creator_count\":0,\"description\":\"Ransomware (with Allan Liska & Tim Gallo)\\nAdvanced Persistent Security Podcast\\nEpisode 43\\nGuests: Allan Liska and Tim Gallo\\nApril 19, 2018\\nIf you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on iTunes; Like us on Google Play, Stitcher, Sound Cloud, Spreaker, and YouTube.\\nNOTE: The opinions expressed in this podcast are ours alone and do not reflect those of our employers\\nRansomware (with Allan Liska & Tim Gallo)\\nShow Notes\\nSegment 1\\nIn this episode, Joe is joined by Allan Liska and Tim Gallo, co-authors of O’Reilly’s Ransomware book. The show kicks off with origin stories. We talk about the passion of security professionals and the career versus hobby camps. We discuss mentoring in terms of selecting mentees and mentors. Allan and Tim provide insight on the process of writing a book. We talk about persistence.\\nSegment 2\\nJoe kicks it off with a question to Allan and Tim about their observations of ransomware. A discussion as to whether to pay the ransom or not ensues and considerations for each argument are given. Tim talks about the relationship between IT Operations and IT Security. He relates stories from his past to convey why many security professionals make assumptions as to why/how things are done. Joe talks about “Schrodinger’s Backup” and its relation to proper incident response plans.  We talk about the malware SDLC.\\nThe conversation shifts to our research on exploit kits and ransomware as well as trends for each. We discuss the argument of paying or not paying [the ransomware.] This segment is concluded with a talk about ransomware in cars.\\nphishing@advancedpersistentsecurity.net\\nBook Link:\\nRansomware: Defending Against Digital Extortion\\nAbout Allan:\\nAllan Liska\\nAllan Liska is a solutions architect at Recorded Future. He has more than 15 years’ experience in the world of information security and has worked as both a security practitioner and an ethical hacker. Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the co-author of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.\\nContacting Allan:\\nTwitter: @uuallan\\nAbout Tim:\\nTim Gallo\\nI’ve been working in security for 20 years, everything from firewall management to security officer and consultant. I spent 8 years as a product manager for an intelligence vendor and recently coauthored an O’Reilly book on Ransomware, I was also a technical editor on books about DNS Security and Building Threat Intelligence Programs. I have strong opinions on the importance of building intelligence programs and how they can help your organization save money when done correctly, and can cost you a lot of money if done poorly. In the end, I’d like to try and share with others what I’ve seen go well and go wrong. I’m not a rockstar, nor am I some sort of guru. You won’t find shrines to me in the halls of Twitter, nor the fields of LinkedIn, but you will find me there, sipping on information and bourbon.\\nContacting Tim:\\nTwitter: @TimJGallo\\nThanks for stopping by and checking out our podcast. We would appreciate if you could subscribe (assuming you like what you hear; we think you will). This is meant to be informative and to provide value to anyone who listens – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.\\nEnter your email address:\\n\\n\\nDelivered by FeedBurner\\n\\n\\n\\nSUBSCRIBE TO OUR MAILING LIST\\n* indicates required\\nEmail Address *\\n\\n\\nFirst Name \\n\\nLast Name \\n\\n\\n\\n\\n\\n\\n\\n \\n\",\"rating\":null,\"user_data\":{}},\"27727067\":{\"air_date\":\"2018-04-26 10:00:57\",\"podcast\":85099,\"audio_url\":\"http://feedproxy.google.com/~r/AdvancedPersistentSecurity/~5/qOGPMrmnfO0/killing-the-pen-test-bsides-knoxville-with-adrian-sanabria.mp3\",\"length\":3541,\"review_count\":0,\"guid\":\"https://advancedpersistentsecurity.net/?post_type=podcast&p=3043\",\"image_url\":\"https://i0.wp.com/advancedpersistentsecurity.net/wp-content/uploads/2015/09/jocephus865.jpg?fit=1400%2C1400&ssl=1\",\"slug\":\"killing-the-pen-test-bsides-knoxville-with-adrian-sanabria\",\"rating_count\":0,\"list_count\":0,\"creator_summary\":[],\"highlight\":[],\"weighted_rating_alltime\":3,\"podcast_id\":85099,\"title\":\"Killing the Pen Test & BSides Knoxville (with Adrian Sanabria)\",\"id\":27727067,\"creator_count\":0,\"description\":\"Killing the Pen Test & BSides Knoxville (with Adrian Sanabria)\\nAdvanced Persistent Security Podcast\\nEpisode 44\\nGuests: Adrian Sanabria\\nApril 26, 2018\\nIf you enjoy this podcast, be sure to give us a 5 Star Review and “Love Us” on iTunes; Like us on Google Play, Stitcher, Sound Cloud, Spreaker, and YouTube.\\nNOTE: The opinions expressed in this podcast are ours alone and do not reflect those of our employers\\nKilling the Pen Test & BSides Knoxville (with Adrian Sanabria)\\nShow Notes\\nIn this episode, Joe is joined by Adrian Sanabria. Adrian is a co-organizer of BSides Knoxville and one of the founders of dc865. We discuss Adrian’s background in technology and how he came into security in the days before PCI. Adrian talks about his transition into working at 451 Research in terms of terminology and industry analysis.\\nJoe and Adrian talk about Savage Security and RSA Conference. Adrian tells us about his (then forthcoming) presentation at RSA Conference. Adrian’s presentation is called It is Time to Kill the Pen Test and why it is important. He cites Haroon Meer’s Keynote at 44con in 2011 as a thought provoking idea that spawned this.\\nPen testing as a skill is not the problem, it is the service offering that is. Adrian cites inefficiencies like vulnerability scanning and reporting at the same rate as the test. We talk about the advanced attacks versus sticking to the basics. Adrian talks about prioritizing breach simulations and ransomware simulations over a pen test.\\nWe talk about the scoping documents of pen tests and how they are relative to actual attacks and their objectives. The fact that not all adversaries attempt to get domain admin, while others try to perform defacement or exfiltration. Adrian mentions Haroon’s quote:\\nPen testers are not emulating attackers. They are emulating other pen testers.\\nAdrian talks about the lack of responsiveness of blue teams during pen tests. We talk about the mentality of many attackers of wanting to “pwn the world” vice enhance the security of an organization. Adrian calls for more “white box testing.” Joe mentions the lack of analysis of OSINT as another inefficiency in pen testing. We also discuss the fact that dwell time is so high that expecting a black box test is almost unrealistic.\\nAdrian talks about some metrics associated with MSSPs detecting him when doing breach simulations. We talk about C2 and other indicators such as the use of TOR. We talk about how to make the industry better.\\nAbout Adrian:\\nAdrian Sanabria is Co-Founder and Director of Research at Savage Security. Sanabria’s past experience includes 13 years as a Defender and Consultant building security programs, defending large financial organizations and performing penetration tests. He has spent far more time dealing with PCI than is healthy for an adult male of his age. Sanabria learned the business side of the industry as a research analyst for 451 Research, working closely with vendors and investors. He is an outspoken researcher and doesn’t shy away from the truth or being proven wrong. Sanabria loves to write about the industry, tell stories and still sees the glass as half full.\\nContacting Adrian:\\nTwitter: @sawaba\\nBlog\\nBSides Knoxville:\\nWebsite\\nRegistration\\nDate: May 18, 2018\\nLocations: Scruffy City Hall, Preservation Pub, Knoxville Entrepreneurial Center\\n8:00 AM – 6:00 PM\\n \\nThanks for stopping by and checking out our podcast. We would appreciate if you could subscribe (assuming you like what you hear; we think you will). This is meant to be informative and to provide value to anyone who listens – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.\\nEnter your email address:\\n\\n\\nDelivered by FeedBurner\\n\\n\\n\\nSUBSCRIBE TO OUR MAILING LIST\\n* indicates required\\nEmail Address *\\n\\n\\nFirst Name \\n\\nLast Name \\n\\n\\n\\n\\n\\n\\n\\n \\n\",\"rating\":null,\"user_data\":{}}},\"failed\":{},\"by_podcast\":{\"85099\":[10180785,10180791,15811251,27364857,27541642,27727067]}},\"favourites\":[]},\"category\":{\"categories\":{\"loading\":{},\"entities\":{\"technology\":{\"id\":9,\"text\":\"Technology\",\"slug\":\"technology\",\"relevance\":500},\"tech-news\":{\"id\":45,\"text\":\"Tech News\",\"slug\":\"tech-news\",\"relevance\":400}}}},\"rating\":{\"ratings\":{\"loading\":{},\"entities\":{}}},\"tag\":{\"tags\":{\"entities\":{},\"loading\":{},\"autocomplete\":{},\"failed\":{}}},\"creator\":{\"creators\":{\"entities\":{\"22885\":{\"subtitle_long\":\"Guest on Armstrong & Getty Extra Larg… and Advanced Persistent Security\",\"role_summary_unconfirmed\":[{\"entity_type\":\"podcast\",\"roles\":[{\"code\":\"guest\",\"role_rank\":5,\"description\":\"Somebody who is joining the host(s) for a single episode or several episodes\",\"title\":\"Guest\"}],\"entity_id\":782964,\"entity\":{\"image_url\":\"https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/67ff594c9058294500fc4bd565db5b08.jpg\",\"id\":782964,\"title\":\"Armstrong & Getty Extra Large Interviews\",\"slug\":\"armstrong-getty-extra-large-interviews\"}},{\"entity_type\":\"podcast\",\"roles\":[{\"code\":\"guest\",\"role_rank\":5,\"description\":\"Somebody who is joining the host(s) for a single episode or several episodes\",\"title\":\"Guest\"}],\"entity_id\":85099,\"entity\":{\"image_url\":\"https://advancedpersistentsecurity.net/wp-content/uploads/2015/09/jocephus865.jpg\",\"id\":85099,\"title\":\"Advanced Persistent Security\",\"slug\":\"advanced-persistent-security\"}}],\"podcast_credit_count\":2,\"follower_user_ids\":[],\"suggested_credit_count\":4,\"related_credits\":{\"podcast:85099\":{\"id\":94892,\"entity_id\":85099,\"role\":\"guest\",\"role_rank\":5,\"confirmed\":true,\"episode_count\":1}},\"bio\":\"Allan Liska is a writer, threat intel analyst at Recorded Future, and author of the book, Ransomware.\",\"created_at\":\"2019-12-25 06:38:42\",\"name\":\"Allan Liska\",\"follower_selection\":[],\"episode_credit_count\":2,\"related_credit\":{\"entity_type\":\"podcast\",\"entity_id\":85099,\"role\":\"guest\",\"role_rank\":5,\"episode_count\":1},\"follower_count\":0,\"pcid\":\"701117\",\"changes_requested\":0,\"most_recent_episode\":{\"air_date\":\"2019-08-23 17:24:35\",\"podcast\":{\"itunes_id\":1449216231,\"image_url\":\"https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/67ff594c9058294500fc4bd565db5b08.jpg\",\"slug\":\"armstrong-getty-extra-large-interviews\",\"feed_url\":\"https://www.spreaker.com/show/3292080/episodes/feed\",\"title\":\"Armstrong & Getty Extra Large Interviews\",\"initial_rating\":\"3.00\",\"podcast_initial_rating_rank\":null,\"id\":782964,\"categories\":[{\"id\":61,\"text\":\"News\",\"slug\":\"news\",\"relevance\":500}]},\"id\":43836197,\"title\":\"The Scourge of Ransomware Attacks. Allan Liska talks to Armstrong & Getty\",\"slug\":\"the-scourge-of-ransomware-attacks-allan-liska-talks-to-armstrong-getty\"},\"highlight\":[],\"confidence_votes\":\"10000001\",\"twitter_handle\":\"uuallan\",\"profile_image_url\":\"https://creator-images.podchaser.com/f0f321cc1759168bc357042f6d52b6c9.jpeg\",\"subtitle_short\":\"Guest on Armstrong & Getty Extra Larg… and Advanced Persistent Security\",\"unconfirmed_count\":0,\"informal_name\":\"Allan\",\"id\":22885,\"submitted_by\":19858,\"categories\":[{\"id\":61,\"text\":\"News\",\"slug\":\"news\",\"relevance\":500},{\"id\":9,\"text\":\"Technology\",\"slug\":\"technology\",\"relevance\":500},{\"id\":45,\"text\":\"Tech News\",\"slug\":\"tech-news\",\"relevance\":400}],\"role_summary\":[{\"entity_type\":\"podcast\",\"roles\":[{\"code\":\"guest\",\"role_rank\":5,\"description\":\"Somebody who is joining the host(s) for a single episode or several episodes\",\"title\":\"Guest\"}],\"entity_id\":782964,\"entity\":{\"image_url\":\"https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/67ff594c9058294500fc4bd565db5b08.jpg\",\"id\":782964,\"title\":\"Armstrong & Getty Extra Large Interviews\",\"slug\":\"armstrong-getty-extra-large-interviews\"}},{\"entity_type\":\"podcast\",\"roles\":[{\"code\":\"guest\",\"role_rank\":5,\"description\":\"Somebody who is joining the host(s) for a single episode or several episodes\",\"title\":\"Guest\"}],\"entity_id\":85099,\"entity\":{\"image_url\":\"https://advancedpersistentsecurity.net/wp-content/uploads/2015/09/jocephus865.jpg\",\"id\":85099,\"title\":\"Advanced Persistent Security\",\"slug\":\"advanced-persistent-security\"}}],\"creator_user\":{\"verified\":false},\"confirmed\":true}},\"failed\":{},\"by_pcid\":{\"701117\":\"22885\"}},\"credits\":{\"entities\":{}},\"suggested_credits\":{\"entities\":{}},\"roles\":{\"entities\":{\"guest\":{\"code\":\"guest\",\"title\":\"Guest\",\"description\":\"Somebody who is joining the host(s) for a single episode or several episodes\",\"role_rank\":5}}},\"loading\":{},\"editing\":null},\"merch\":{\"merch_products\":{\"loading\":{},\"entities\":{},\"failed\":{}}},\"claiming\":{\"feed_details\":null,\"claim_status\":{\"claimed\":false,\"validate_error\":null},\"podcasts\":{},\"user_data\":{\"claimed\":[],\"pending\":[],\"loading\":false,\"loaded\":false}}}";