<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/global-ciso-for-defenders-by-defenders" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>The Global CISO with Chuck Herrin</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/global-ciso-for-defenders-by-defenders</itunes:new-feed-url>
    <description>For defenders by defenders. Examining the reality and challenges every CISO faces in this modern global security landscape. </description>
    <copyright>© 2025 Chuck Herrin</copyright>
    <podcast:guid>69861676-a2da-5e07-866b-0e0314dda02f</podcast:guid>
    <podcast:locked owner="s.bleakley@f5.com">no</podcast:locked>
    <language>en</language>
    <pubDate>Thu, 25 Sep 2025 04:00:10 -0700</pubDate>
    <lastBuildDate>Tue, 02 Dec 2025 23:30:18 -0800</lastBuildDate>
    <link>https://GlobalCISO.gm</link>
    <image>
      <url>https://img.transistor.fm/cxk0hyUZfWiyUSepbLNc_vvnXbQ4ddbwnFgc2RvZrsI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYzZj/YmUyYjBiYjllNTQ3/ODZiZThhYTk2NzRk/NTYwMC5wbmc.jpg</url>
      <title>The Global CISO with Chuck Herrin</title>
      <link>https://GlobalCISO.gm</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Chuck Herrin</itunes:author>
    <itunes:image href="https://img.transistor.fm/cxk0hyUZfWiyUSepbLNc_vvnXbQ4ddbwnFgc2RvZrsI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYzZj/YmUyYjBiYjllNTQ3/ODZiZThhYTk2NzRk/NTYwMC5wbmc.jpg"/>
    <itunes:summary>For defenders by defenders. Examining the reality and challenges every CISO faces in this modern global security landscape. </itunes:summary>
    <itunes:subtitle>For defenders by defenders.</itunes:subtitle>
    <itunes:keywords>F5, CISO, Technology,</itunes:keywords>
    <itunes:owner>
      <itunes:name>Swante Bleakley</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Simplify and secure: top cybersecurity strategies for CXOs</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Simplify and secure: top cybersecurity strategies for CXOs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">def3aec6-64e8-4052-ae1c-2fbad7e5665c</guid>
      <link>https://theglobalciso.transistor.fm/4</link>
      <description>
        <![CDATA[<p>Chuck Herrin, Field CISO at F5, and Howard Holton, CEO of GigaOm, discuss the future of cybersecurity, including AI-driven threats, supply chain risks, and the impact of quantum computing. Learn how simplifying your tech stack can reduce vulnerabilities and improve defenses. Perfect for CIOs, CTOs, and CISOs looking to stay ahead.</p><p><br></p><p><br><a href="https://www.youtube.com/playlist?list=PLSKNMFxFwt4T_ox94kIfAxa3mzZ1Kl3NU"><strong>Watch the podcast on F5 YouTube: </strong></a><br><a href="https://www.f5.com?utm_medium=podcast&amp;utm_source=transistorfm&amp;utm_campaign=ww_ww-adc_adc_adc"><strong>Learn more about F5:</strong> </a></p><p><a href="https://www.f5.com/company/blog?utm_medium=podcast&amp;utm_source=transistorfm&amp;utm_campaign=ww_ww-adc_adc_adc"><strong>Read our blog: </strong></a><br><a href="https://www.linkedin.com/company/f5/"><strong>Visit us on LinkedIn: </strong> </a><br> </p><p><strong>RESOURCES:</strong> <br><a href="https://www.hackerone.com/blog/hackerone-leaderboard-update-ai-vs-human">HackerOne</a>  <br><a href="https://www.f5.com/resources/reference-architectures/ai-overview?utm_medium=podcast&amp;utm_source=transistorfm&amp;utm_campaign=ww_ww-adc_adc_adc">AI Reference Architecture</a> </p><p><a href="https://arxiv.org/html/2503.17332v1">CVEBench</a> - automated vulnerability reverse engineering <br><a href="https://abnormal.ai/blog/vibe-hacking-ai-enabled-threats-anthropic-report">Vibe hacking in the wild</a> </p><p> </p><p> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chuck Herrin, Field CISO at F5, and Howard Holton, CEO of GigaOm, discuss the future of cybersecurity, including AI-driven threats, supply chain risks, and the impact of quantum computing. Learn how simplifying your tech stack can reduce vulnerabilities and improve defenses. Perfect for CIOs, CTOs, and CISOs looking to stay ahead.</p><p><br></p><p><br><a href="https://www.youtube.com/playlist?list=PLSKNMFxFwt4T_ox94kIfAxa3mzZ1Kl3NU"><strong>Watch the podcast on F5 YouTube: </strong></a><br><a href="https://www.f5.com?utm_medium=podcast&amp;utm_source=transistorfm&amp;utm_campaign=ww_ww-adc_adc_adc"><strong>Learn more about F5:</strong> </a></p><p><a href="https://www.f5.com/company/blog?utm_medium=podcast&amp;utm_source=transistorfm&amp;utm_campaign=ww_ww-adc_adc_adc"><strong>Read our blog: </strong></a><br><a href="https://www.linkedin.com/company/f5/"><strong>Visit us on LinkedIn: </strong> </a><br> </p><p><strong>RESOURCES:</strong> <br><a href="https://www.hackerone.com/blog/hackerone-leaderboard-update-ai-vs-human">HackerOne</a>  <br><a href="https://www.f5.com/resources/reference-architectures/ai-overview?utm_medium=podcast&amp;utm_source=transistorfm&amp;utm_campaign=ww_ww-adc_adc_adc">AI Reference Architecture</a> </p><p><a href="https://arxiv.org/html/2503.17332v1">CVEBench</a> - automated vulnerability reverse engineering <br><a href="https://abnormal.ai/blog/vibe-hacking-ai-enabled-threats-anthropic-report">Vibe hacking in the wild</a> </p><p> </p><p> </p>]]>
      </content:encoded>
      <pubDate>Thu, 25 Sep 2025 04:00:00 -0700</pubDate>
      <author>Chuck Herrin</author>
      <enclosure url="https://media.transistor.fm/aba861e5/0ef4ce1d.mp3" length="10552558" type="audio/mpeg"/>
      <itunes:author>Chuck Herrin</itunes:author>
      <itunes:image href="https://img.transistor.fm/qovOIgeZ6q6BLUKXLAnKIXBKwsI3yDQl5wmEkTi71oc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MWY3/NmE5NzFlZmMwNDdj/N2M0ZDM3Y2U5YjU4/ODUwMS5wbmc.jpg"/>
      <itunes:duration>656</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chuck Herrin, Field CISO at F5, and Howard Holton, CEO of GigaOm, discuss the future of cybersecurity, including AI-driven threats, supply chain risks, and the impact of quantum computing. Learn how simplifying your tech stack can reduce vulnerabilities and improve defenses. Perfect for CIOs, CTOs, and CISOs looking to stay ahead.</p><p><br></p><p><br><a href="https://www.youtube.com/playlist?list=PLSKNMFxFwt4T_ox94kIfAxa3mzZ1Kl3NU"><strong>Watch the podcast on F5 YouTube: </strong></a><br><a href="https://www.f5.com?utm_medium=podcast&amp;utm_source=transistorfm&amp;utm_campaign=ww_ww-adc_adc_adc"><strong>Learn more about F5:</strong> </a></p><p><a href="https://www.f5.com/company/blog?utm_medium=podcast&amp;utm_source=transistorfm&amp;utm_campaign=ww_ww-adc_adc_adc"><strong>Read our blog: </strong></a><br><a href="https://www.linkedin.com/company/f5/"><strong>Visit us on LinkedIn: </strong> </a><br> </p><p><strong>RESOURCES:</strong> <br><a href="https://www.hackerone.com/blog/hackerone-leaderboard-update-ai-vs-human">HackerOne</a>  <br><a href="https://www.f5.com/resources/reference-architectures/ai-overview?utm_medium=podcast&amp;utm_source=transistorfm&amp;utm_campaign=ww_ww-adc_adc_adc">AI Reference Architecture</a> </p><p><a href="https://arxiv.org/html/2503.17332v1">CVEBench</a> - automated vulnerability reverse engineering <br><a href="https://abnormal.ai/blog/vibe-hacking-ai-enabled-threats-anthropic-report">Vibe hacking in the wild</a> </p><p> </p><p> </p>]]>
      </itunes:summary>
      <itunes:keywords>F5, CISO, Technology,</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://theglobalciso.transistor.fm/people/chuck-herrin" img="https://img.transistor.fm/vhyYCCsN5ADsc6dIfCakUwaoCeQRv4OCwAmxO8dswww/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZDVj/N2MxZDE1MjVmNTdi/M2NiNmNjNGNiN2My/OTM1OC5wbmc.jpg">Chuck Herrin</podcast:person>
      <podcast:person role="Guest" href="https://theglobalciso.transistor.fm/people/howard-holton" img="https://img.transistor.fm/sa2gs4U8PopxgA0DgzD19aLUDaeNjRWTj9eMiwz1zyI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YzQ2/YWIwMmE2MDY3ZGU1/OWFjYWZhMmQyOTgy/YzUwNy53ZWJw.jpg">Howard Holton</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/aba861e5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>   API security in the AI era: insights from hacking expert Corey Ball </title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>   API security in the AI era: insights from hacking expert Corey Ball </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">545624ef-886a-4f81-a27a-2730a18fc1dd</guid>
      <link>https://theglobalciso.transistor.fm/3</link>
      <description>
        <![CDATA[<p>In episode 3 of <em>The Global CISO Podcast</em>, Chuck Herrin chats with Corey Ball, CEO of hAPI Labs and author of <em>Hacking APIs</em>, about securing APIs in the AI era. </p><p> </p><p>Listen in to learn how generative AI expands the attack surface and discover real world strategies CISOs can use to defend against modern threats. Perfect for cybersecurity leaders navigating today’s evolving digital threats. </p><p><strong>Watch the podcast on F5 YouTube: </strong><a href="https://youtu.be/fEBTBbnNkvg">https://youtu.be/fEBTBbnNkvg</a><strong> <br>Learn more about F5: </strong><a href="http://www.f5.com/"><strong>www.f5.com</strong></a><strong><br>Read our blog: </strong><a href="https://www.f5.com/company/blog"><strong>https://www.f5.com/company/blog</strong></a><strong> </strong> <br><strong>Visit us on LinkedIn: </strong><a href="https://www.linkedin.com/company/f5/"><strong>https://www.linkedin.com/company/f5/</strong></a><strong> </strong> </p><p> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode 3 of <em>The Global CISO Podcast</em>, Chuck Herrin chats with Corey Ball, CEO of hAPI Labs and author of <em>Hacking APIs</em>, about securing APIs in the AI era. </p><p> </p><p>Listen in to learn how generative AI expands the attack surface and discover real world strategies CISOs can use to defend against modern threats. Perfect for cybersecurity leaders navigating today’s evolving digital threats. </p><p><strong>Watch the podcast on F5 YouTube: </strong><a href="https://youtu.be/fEBTBbnNkvg">https://youtu.be/fEBTBbnNkvg</a><strong> <br>Learn more about F5: </strong><a href="http://www.f5.com/"><strong>www.f5.com</strong></a><strong><br>Read our blog: </strong><a href="https://www.f5.com/company/blog"><strong>https://www.f5.com/company/blog</strong></a><strong> </strong> <br><strong>Visit us on LinkedIn: </strong><a href="https://www.linkedin.com/company/f5/"><strong>https://www.linkedin.com/company/f5/</strong></a><strong> </strong> </p><p> </p>]]>
      </content:encoded>
      <pubDate>Thu, 11 Sep 2025 06:00:00 -0700</pubDate>
      <author>Chuck Herrin</author>
      <enclosure url="https://media.transistor.fm/90bc97e4/4fbb496d.mp3" length="15753039" type="audio/mpeg"/>
      <itunes:author>Chuck Herrin</itunes:author>
      <itunes:image href="https://img.transistor.fm/mJ8R4tjRXqDaiqwrJkNQumy_ktE4EBdbrfwLtsvzww0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Njkx/OGMxOTM2ZWU1YjNm/YWMwNzUxZmYxM2E4/OTczNS5wbmc.jpg"/>
      <itunes:duration>651</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In episode 3 of <em>The Global CISO Podcast</em>, Chuck Herrin chats with Corey Ball, CEO of hAPI Labs and author of <em>Hacking APIs</em>, about securing APIs in the AI era. </p><p> </p><p>Listen in to learn how generative AI expands the attack surface and discover real world strategies CISOs can use to defend against modern threats. Perfect for cybersecurity leaders navigating today’s evolving digital threats. </p><p><strong>Watch the podcast on F5 YouTube: </strong><a href="https://youtu.be/fEBTBbnNkvg">https://youtu.be/fEBTBbnNkvg</a><strong> <br>Learn more about F5: </strong><a href="http://www.f5.com/"><strong>www.f5.com</strong></a><strong><br>Read our blog: </strong><a href="https://www.f5.com/company/blog"><strong>https://www.f5.com/company/blog</strong></a><strong> </strong> <br><strong>Visit us on LinkedIn: </strong><a href="https://www.linkedin.com/company/f5/"><strong>https://www.linkedin.com/company/f5/</strong></a><strong> </strong> </p><p> </p>]]>
      </itunes:summary>
      <itunes:keywords>F5, CISO, Technology,</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://theglobalciso.transistor.fm/people/chuck-herrin" img="https://img.transistor.fm/vhyYCCsN5ADsc6dIfCakUwaoCeQRv4OCwAmxO8dswww/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZDVj/N2MxZDE1MjVmNTdi/M2NiNmNjNGNiN2My/OTM1OC5wbmc.jpg">Chuck Herrin</podcast:person>
      <podcast:person role="Guest" href="https://theglobalciso.transistor.fm/people/corey-ball" img="https://img.transistor.fm/MP9rqVGi4AFhJXjaFwX0FeJ4WQzuZdP2RjiA_08LAtc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YTgw/MjlkMDExMTgzZjQ0/MTFlNTAzYWY1YTE0/MGRkYi5qcGVn.jpg">Corey Ball</podcast:person>
    </item>
    <item>
      <title>Automate first: the CTO playbook for APIs, observability, and vendor accountability</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Automate first: the CTO playbook for APIs, observability, and vendor accountability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1c75f809-cf3c-48bf-839f-e1a369b66c07</guid>
      <link>https://theglobalciso.transistor.fm/2</link>
      <description>
        <![CDATA[<p><br>In Episode 2 of <em>The Global CISO Podcast</em>, host Chuck Herrin welcomes Hitesh Patel, F5 Field CTO and fellow million-miler, to decode the mindset shift behind effective automation.  </p><p>They explore why automation starts with intent – not tools – and how a “bias toward automating first” can transform daily operations. </p><p>They get specific: using declarative APIs to reduce complexity, evaluating vendors based on API quality and observability, tips for managing technical debt, and strategies for building an automated security workflow that survives production. </p><p>Whether you're a new CTO or a seasoned security leader, tune in for insights on leading with automation, demanding more from your vendors, and creating headroom for innovation. </p><p><strong>Watch the podcast on F5 YouTube: </strong><a href="https://youtu.be/lAaBs7RH4PQ"><strong>https://youtu.be/lAaBs7RH4PQ</strong></a><strong><br>Learn more about F5: </strong><a href="http://www.f5.com/"><strong>www.f5.com</strong></a><strong><br>Read our blog: </strong><a href="https://www.f5.com/company/blog"><strong>https://www.f5.com/company/blog</strong></a><strong> </strong> <br><strong>Visit us on LinkedIn: </strong><a href="https://www.linkedin.com/company/f5/"><strong>https://www.linkedin.com/company/f5/</strong></a><strong> </strong> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>In Episode 2 of <em>The Global CISO Podcast</em>, host Chuck Herrin welcomes Hitesh Patel, F5 Field CTO and fellow million-miler, to decode the mindset shift behind effective automation.  </p><p>They explore why automation starts with intent – not tools – and how a “bias toward automating first” can transform daily operations. </p><p>They get specific: using declarative APIs to reduce complexity, evaluating vendors based on API quality and observability, tips for managing technical debt, and strategies for building an automated security workflow that survives production. </p><p>Whether you're a new CTO or a seasoned security leader, tune in for insights on leading with automation, demanding more from your vendors, and creating headroom for innovation. </p><p><strong>Watch the podcast on F5 YouTube: </strong><a href="https://youtu.be/lAaBs7RH4PQ"><strong>https://youtu.be/lAaBs7RH4PQ</strong></a><strong><br>Learn more about F5: </strong><a href="http://www.f5.com/"><strong>www.f5.com</strong></a><strong><br>Read our blog: </strong><a href="https://www.f5.com/company/blog"><strong>https://www.f5.com/company/blog</strong></a><strong> </strong> <br><strong>Visit us on LinkedIn: </strong><a href="https://www.linkedin.com/company/f5/"><strong>https://www.linkedin.com/company/f5/</strong></a><strong> </strong> </p>]]>
      </content:encoded>
      <pubDate>Thu, 28 Aug 2025 04:00:00 -0700</pubDate>
      <author>Chuck Herrin</author>
      <enclosure url="https://media.transistor.fm/02c53665/31c1297e.mp3" length="6616312" type="audio/mpeg"/>
      <itunes:author>Chuck Herrin</itunes:author>
      <itunes:image href="https://img.transistor.fm/WC1pUTh4Fh0GNZo5n4eJvRMllnhcL36zRQ4YurZal3I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MWQ5/ZDNhZTg2NTExZjU5/ZDAzNjE3MDExZDZm/MzUwYS5wbmc.jpg"/>
      <itunes:duration>410</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>In Episode 2 of <em>The Global CISO Podcast</em>, host Chuck Herrin welcomes Hitesh Patel, F5 Field CTO and fellow million-miler, to decode the mindset shift behind effective automation.  </p><p>They explore why automation starts with intent – not tools – and how a “bias toward automating first” can transform daily operations. </p><p>They get specific: using declarative APIs to reduce complexity, evaluating vendors based on API quality and observability, tips for managing technical debt, and strategies for building an automated security workflow that survives production. </p><p>Whether you're a new CTO or a seasoned security leader, tune in for insights on leading with automation, demanding more from your vendors, and creating headroom for innovation. </p><p><strong>Watch the podcast on F5 YouTube: </strong><a href="https://youtu.be/lAaBs7RH4PQ"><strong>https://youtu.be/lAaBs7RH4PQ</strong></a><strong><br>Learn more about F5: </strong><a href="http://www.f5.com/"><strong>www.f5.com</strong></a><strong><br>Read our blog: </strong><a href="https://www.f5.com/company/blog"><strong>https://www.f5.com/company/blog</strong></a><strong> </strong> <br><strong>Visit us on LinkedIn: </strong><a href="https://www.linkedin.com/company/f5/"><strong>https://www.linkedin.com/company/f5/</strong></a><strong> </strong> </p>]]>
      </itunes:summary>
      <itunes:keywords>F5, CISO, Technology,</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://theglobalciso.transistor.fm/people/chuck-herrin" img="https://img.transistor.fm/vhyYCCsN5ADsc6dIfCakUwaoCeQRv4OCwAmxO8dswww/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZDVj/N2MxZDE1MjVmNTdi/M2NiNmNjNGNiN2My/OTM1OC5wbmc.jpg">Chuck Herrin</podcast:person>
      <podcast:person role="Guest" href="https://theglobalciso.transistor.fm/people/hitesh-patel" img="https://img.transistor.fm/SkW0CnbHMWqIkCaQr6tRDPPE90_iMJDead2PXA3d_1A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xOTdh/OTA0MDBmZGMzYmI1/YjFlOTVhYThiZGQw/NjQ3OS5qcGVn.jpg">Hitesh Patel</podcast:person>
    </item>
    <item>
      <title>Taming APIs, AI security vulnerabilities, and PQC</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Taming APIs, AI security vulnerabilities, and PQC</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">98c63029-25a4-4510-9191-40a99fcd395f</guid>
      <link>https://theglobalciso.transistor.fm/1</link>
      <description>
        <![CDATA[<p>In this premiere episode of <em>The Global CISO Podcast: For defenders by defenders</em>, host Chuck Herrin shares what traveling a half a million kilometers on the road taught him about what’s breaking in cybersecurity and how to fix it.  </p><p>He unpacks the four forces reshaping the attack surface—API vulnerabilities and exposures, AI-accelerated cyber threats, geopolitical shifts disrupting supply chain security, and post quantum computing.  </p><p>In this series, Chuck explores what defenders must do to stay agile in an era of exponential change. You’ll learn how to regain control of API inventories, mitigate emerging AI-driven attack vectors, plan realistic PQC migrations, and build resilience into multicloud architectures. </p><p>Tune in for a no-hype, real-world look at what works, what doesn’t, and how CISOs can lead with resilience. </p><p><strong>Watch the podcast on F5 YouTube: </strong><a href="https://youtu.be/VzbkkvT1e2g"><strong>https://youtu.be/VzbkkvT1e2g</strong></a><strong><br>Learn more about F5: </strong><a href="http://www.f5.com/"><strong>www.f5.com</strong></a><strong> </strong> <br><strong>Read our blog: </strong><a href="https://www.f5.com/company/blog"><strong>https://www.f5.com/company/blog</strong></a><strong> </strong> <br><strong>Visit us on LinkedIn: </strong><a href="https://www.linkedin.com/company/f5/"><strong>https://www.linkedin.com/company/f5/</strong></a><strong> </strong> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this premiere episode of <em>The Global CISO Podcast: For defenders by defenders</em>, host Chuck Herrin shares what traveling a half a million kilometers on the road taught him about what’s breaking in cybersecurity and how to fix it.  </p><p>He unpacks the four forces reshaping the attack surface—API vulnerabilities and exposures, AI-accelerated cyber threats, geopolitical shifts disrupting supply chain security, and post quantum computing.  </p><p>In this series, Chuck explores what defenders must do to stay agile in an era of exponential change. You’ll learn how to regain control of API inventories, mitigate emerging AI-driven attack vectors, plan realistic PQC migrations, and build resilience into multicloud architectures. </p><p>Tune in for a no-hype, real-world look at what works, what doesn’t, and how CISOs can lead with resilience. </p><p><strong>Watch the podcast on F5 YouTube: </strong><a href="https://youtu.be/VzbkkvT1e2g"><strong>https://youtu.be/VzbkkvT1e2g</strong></a><strong><br>Learn more about F5: </strong><a href="http://www.f5.com/"><strong>www.f5.com</strong></a><strong> </strong> <br><strong>Read our blog: </strong><a href="https://www.f5.com/company/blog"><strong>https://www.f5.com/company/blog</strong></a><strong> </strong> <br><strong>Visit us on LinkedIn: </strong><a href="https://www.linkedin.com/company/f5/"><strong>https://www.linkedin.com/company/f5/</strong></a><strong> </strong> </p>]]>
      </content:encoded>
      <pubDate>Tue, 26 Aug 2025 16:34:58 -0700</pubDate>
      <author>Chuck Herrin</author>
      <enclosure url="https://media.transistor.fm/623c2cbc/1cfdcc66.mp3" length="3627025" type="audio/mpeg"/>
      <itunes:author>Chuck Herrin</itunes:author>
      <itunes:image href="https://img.transistor.fm/ng0xSMrBePFgb2S_CchDAvW9YteRenWQdD-sXoRNXaU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNzc4/YjdhYjViNWViZTA4/Nzc5ZDE5Nzg1M2Fl/OTU2NC5wbmc.jpg"/>
      <itunes:duration>223</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this premiere episode of <em>The Global CISO Podcast: For defenders by defenders</em>, host Chuck Herrin shares what traveling a half a million kilometers on the road taught him about what’s breaking in cybersecurity and how to fix it.  </p><p>He unpacks the four forces reshaping the attack surface—API vulnerabilities and exposures, AI-accelerated cyber threats, geopolitical shifts disrupting supply chain security, and post quantum computing.  </p><p>In this series, Chuck explores what defenders must do to stay agile in an era of exponential change. You’ll learn how to regain control of API inventories, mitigate emerging AI-driven attack vectors, plan realistic PQC migrations, and build resilience into multicloud architectures. </p><p>Tune in for a no-hype, real-world look at what works, what doesn’t, and how CISOs can lead with resilience. </p><p><strong>Watch the podcast on F5 YouTube: </strong><a href="https://youtu.be/VzbkkvT1e2g"><strong>https://youtu.be/VzbkkvT1e2g</strong></a><strong><br>Learn more about F5: </strong><a href="http://www.f5.com/"><strong>www.f5.com</strong></a><strong> </strong> <br><strong>Read our blog: </strong><a href="https://www.f5.com/company/blog"><strong>https://www.f5.com/company/blog</strong></a><strong> </strong> <br><strong>Visit us on LinkedIn: </strong><a href="https://www.linkedin.com/company/f5/"><strong>https://www.linkedin.com/company/f5/</strong></a><strong> </strong> </p>]]>
      </itunes:summary>
      <itunes:keywords>F5, CISO, Technology,</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://theglobalciso.transistor.fm/people/chuck-herrin" img="https://img.transistor.fm/vhyYCCsN5ADsc6dIfCakUwaoCeQRv4OCwAmxO8dswww/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZDVj/N2MxZDE1MjVmNTdi/M2NiNmNjNGNiN2My/OTM1OC5wbmc.jpg">Chuck Herrin</podcast:person>
    </item>
  </channel>
</rss>
