Chapters 
 Transcript 
 Episode notes 
 1  2  3  4  5  6  7  8  9  10  11  12  13 
 Introduction 
 00:00 • 5min 
 The Challenge Put Into Soft Ware Development 
 04:36 • 5min 
 Is This a Sore Use Case? 
 09:40 • 2min 
 Is Your Network Security Not Blocking That Type of Activity? 
 11:14 • 3min 
 Is Sore a Methodology or a Tool? 
 14:15 • 3min 
 What Makes This Different Than What We Were Selling as What Sim Was Going to Do for Us? 
 17:17 • 5min 
 Using a Playbook to Run a Query? 
 22:28 • 6min 
 Socks Weapon Systems 
 28:16 • 4min 
 Changing the Name, Change the Perceived Value 
 31:50 • 2min 
 The Barrier to Entry Now Is Level Three, Right? 
 33:30 • 2min 
 How to Make Security Tools Work Together? 
 35:39 • 5min 
 The Webenar Was Not a Dig on Them 
 41:03 • 4min 
 Down the Security Rabbit Hole Podcast 
 44:57 • 2min 


