
Three Buddy Problem
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks.
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
Connect with Ryan on Twitter (Open DMs).
Latest episodes

Feb 22, 2022 • 20min
Tony Pepper, co-founder and CEO, Egress
Chief executive officer at Egress Tony Pepper joins the show to talk about entrepreneurship in the fast-paced age of modern computing, the state of e-mail security, and his company's bet on securing the future of messaging in the enterprise.Links:About EgressTony Pepper on LinkedInInfoSecurity Interview: Tony Pepper

Jan 8, 2022 • 27min
Microsoft's Justin Campbell on offensive security research
Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team's discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving 'shift-left' mindset and Redmond's ongoing work to reduce attack surfaces.Links:Microsoft Flags SolarWinds Serv-U 0-day exploitSolarWinds Serv-U RCE advisoryIn-the-wild zero-day counterHacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation

Dec 23, 2021 • 41min
Costin Raiu on the .gov mobile exploitation business
Global director of Kaspersky's GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem.Links:Google Says NSO Pegasus Zero-Click 'Most Technically Sophisticated Exploit Ever Seen'Project Zero: A deep dive into an NSO zero-click iMessage exploitThe Million Dollar Dissident: NSO Group's iPhone Zero-DaysPegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary VendorProliferation of Cyber Capabilities in International Arms Markets

Dec 20, 2021 • 46min
Amanda Gorton, co-founder and CEO, Corellium
Corellium co-founder and chief executive Amanda Gorton joins the show to talk about raising $25 million in Series A funding, the market fit for device modeling and software virtualization products, the trials and tribulations of startup life, and the nuances of operating in the world of offensive security research.Links:Corellium Secures $25M Series A RoundCorellium Lands $25 Million Investment for Virtualization TechCorellium for Journalists

Sep 9, 2021 • 35min
Intel's Venky Venkateswaran on hardware-enabled security
Venky Venkateswaran works on client security and roadmap planning at Intel Corp. On this episode of the podcast, Venky joins Ryan to talk about a reported surge in firmware attacks, Intel's ongoing investments in cybersecurity, the importance of transparency and open documentation, and the company's push to fight ransomware with its flagship TDT (Threat Detection Technology).Links:> Extending SBOMs to the firmware layer> Hardware Based Security for Business (Intel)> Alex Matrosov on the state of firmware security> Microsoft Launches JIT-Free 'Super Duper Secure Mode' Edge Browser Experiment

Jul 13, 2021 • 48min
Sounil Yu on SBOMs, software supply chain security
Episode sponsored by SecurityWeek.com
JupiterOne CISO Sounil Yu joins the show to sift through the noise and explain the value of SBOMs (software bill of materials), the U.S. government's response to software supply chain security gaps, and what every buyer and seller should be doing to prepare for major changes in the ecosystem.

Jul 6, 2021 • 40min
Algirde Pipikaite, Centre for Cybersecurity, World Economic Forum
Episode sponsored by MongoDB.com.
Algirde Pipikaite, the project lead of the Governance and Policy team at the Center for Cybersecurity at the World Economic Forum, joins the podcast to discuss her work to bridge the gap between cybersecurity experts and decision makers. We chat about communicating risk to different audiences, cybersecurity as a business enabler, and the need for more global private-public collaboration.Links:Algirde Pipikaite ProfileDeveloping the Future of Policy for CybersecurityCNBC: Cyberattacks on the rise amid coronavirus crisis, WEF expert says

Jun 18, 2021 • 38min
Josh Schwartz on red-teaming and proactive security engineering
Josh Schwartz, aka FuzzyNop, oversees offensive security, product engineering, and security engagement functions at Verizon Media (soon to be Yahoo). He shares insights on red-teaming, overcoming the adversarial relationship between red/blue teams. chasing the "feeling" of being secure, and why there's a need for more empathy in cybersecurity.
(Episode sponsored by Eclypsium)

Jun 10, 2021 • 31min
Michael Laventure, threat detection and response, Netflix
Netflix threat detection and response practitioner Michael Laventure joins the show to talk about a simple goal to "do security better." We discuss a transition from .gov security work to the fast pace of Silicon Valley, the culture clashes that can make life difficult, the value of threat-intelligence to a modern security program, and why we should all be optimistic about the future of cybersecurity.

May 26, 2021 • 39min
Google's Heather Adkins on defenders playing the long game
Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the "long-game," the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.
Sponsored by Eclypsium:
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices. Request a demo at Eclypsium.com.