
Three Buddy Problem
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks.
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
Connect with Ryan on Twitter (Open DMs).
Latest episodes

6 snips
Oct 17, 2022 • 53min
JAG-S on big-game malware hunting and a very mysterious APT
Episode sponsors: Binarly and FwHunt - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.
SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.Links:Report: The Mystery of MetadorJ. A. Guerrero-Saade on TwitterLABScon - Security Research in Real TimeResearchers Crowdsourcing Effort to Identify Mysterious Metador APT

Oct 13, 2022 • 47min
Chainguard's Dan Lorenc gets real on software supply chain problems
Episode sponsors: Binarly and FwHunt - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.
Dan Lorenc and a team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government's efforts will speed up technology innovation. Links:Dan Lorenc on LinkedInChainguard EnforceSounil Yu on SBOMs, software supply chain securityExtending SBOMs to the firmware layerCybersecurity Leaders Scramble to Decipher SBOM Mandate

Aug 7, 2022 • 1h 8min
Vinnie Liu discusses a life in the offensive security trenches
A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a 'growth mode' investment, cybersecurity's people problem, and much more...Links:Vinnie Liu on LinkedInVinnie Liu at MS BlueHat v8Anti-Drone Tools Tested: From Shotguns To Superdrones

Jul 25, 2022 • 1h 8min
Down memory lane with Snort and Sourcefire creator Marty Roesch
Network security pioneer Marty Roesch takes listeners on a trip down memory lane, sharing stories from the creation of Snort back in the 1990s, the startup journey of building Sourcefire into an IDS/IPS powerhouse and selling the company for $2 billion, the U.S. government killing a Check Point acquisition, and his newest adventure as chief executive at Netography.Links:Martin Roesch on LinkedInMartin Roesch - WikipediaMartin Roesch on TwitterThe early days of SnortCisco Banks On Sourcefire And Snort For Its Security FutureCheck Point Aborts Sourcefire AcquisitionMartin Roesch joins Netography as CEO

Jun 1, 2022 • 34min
Subbu Rama, co-founder and CEO, BalkanID
Serial entrepreneur Subbu Rama joins the show to talk about building a cybersecurity business, addressing the problem of entitlement sprawl and raising seed funding for intelligent access governance technology.Links:BalkanID Platform ArchitectureSubbu Rama on LinkedInSubbu Rama on Twitter

May 10, 2022 • 42min
Project Zero's Maddie Stone on the surge in zero-day discoveries
Maddie Stone is a security researcher in Google's Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild. On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.Links:A Year in Review of 0-days Used In-the-Wild in 2021Maddie Stone on LinkedIn0day "In the Wild" SpreadsheetMaddie Stone on Twitter

May 6, 2022 • 46min
Prof. Mohit Tiwari on the future of securing data at scale
Symmetry Systems co-founder Mohit Tiwari has been studying data security and control flow access for more than a decade. On this episode of the podcast, he discusses his transition from academia to data security entrepreneurship, first principles around the data security and privacy, the exploding DSPM (data security posture management) space, and the mission to solve one of cybersecurity's biggest problems.Links:Mohit Tiwari | University of Texas at AustinMohit Tiwari on LinkedInFollow Mohit on TwitterSymmetry Systems DataGuardWhy is DSOS an unsolved problem?

Apr 4, 2022 • 41min
Google's Shane Huntley on zero-days and the nation-state threat landscape
Director at Google's Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...Links:Shane Huntley on LinkedInTwitter: @ShaneHuntleyProject Zero: FORCEDENTRY Sandbox EscapeGoogle and Operation Aurora A walk through Google Project Zero metricsProject Zero: 0day "In the Wild" Database

Mar 21, 2022 • 26min
Lamont Orange, CISO, Netskope
Netskope security chief Lamont Orange joins the show to chat about the changing role of the Chief Information Security Officer (CISO), managing security as a business enabler, the cybersecurity skills shortage, and his own unique approach to security leadership.Links:Lamont Orange: A CISO's Point of View on Log4jFive minutes with Lamont OrangeLamont Orange columns on DarkReading

Mar 19, 2022 • 1h 15min
Haroon Meer on the business of cybersecurity
Thinkst founder and CEO Haroon Meer joins Ryan Naraine on the show to talk about building a successful cybersecurity company without venture capital investment, fast-moving attack surfaces and the never-ending battle to mitigate memory corruption issues.Links:Haroon Meer on TwitterThinkst: We bootstrapped to $11 million in ARRMemory Corruption and Hacker FolkloreThinkst CanaryPodcast: Haroon Meer, Thinkst Applied Research