{"version":"https://jsonfeed.org/version/1","title":"Scinary Information Nexus","home_page_url":"https://scinary-info-nexus.fireside.fm","feed_url":"https://scinary-info-nexus.fireside.fm/json","description":"Scinary Cybersecurity is here to \"Serve and defend those who serve and defend others\". To help us \"serve and defend\" we pull from many different sources - experts, colleagues, industry standards, etc... We hit every subject from all angles making it easy to understand while also letting us go in depth. Making this podcast perfect for cybersecurity beginners and experts alike. Come join us on our journey to constantly educate ourselves and explore the amazing things that are happening in our industry. ","_fireside":{"subtitle":"Cybersecurity discussions, news, and expert interviews","pubdate":"2025-08-11T00:00:00.000-05:00","explicit":false,"copyright":"2025 by Scinary Cybersecurity","owner":"Scinary Cybersecurity","image":"https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"},"items":[{"id":"b58d758d-0171-4d27-b1a6-2c014b459a41","title":"Episode 17: Revenge Hacking: Justice or Just Illegal?","url":"https://scinary-info-nexus.fireside.fm/17","content_text":"Welcome to the Scinary Information Nexus! This week, the team tackles a controversial and ethically murky corner of the cyber world: Offensive Security and the temptation to \"hack back\"\n\nWhen an attacker breaches your network, is fighting back a righteous act of justice or a dangerous form of vigilantism? Join Richard Martin, Joseph Hamilton, Brazos Wortham, and Director of Cybersecurity Operations Tye Valdis as they break down the minefield of digital retaliation.\n\nIn this episode, we expose:\n\n\nThe \"Burn the House Down\" Dilemma\nOffensive Security vs. Revenge Hacking: What's the difference?\nThe Attribution Problem: Who are you really attacking?\nCollateral Damage \u0026amp; Poking the Nation-State Bear\nWhy Hacking Back is ILLEGAL (Computer Fraud and Abuse Act)\nReal-World Examples: Stuxnet, Microsoft, and the Government\nWhy \"Cyber-Batman\" Has No Jurisdiction\n\n\nIs taking the fight to the enemy a smart strategy, or will you just end up interfering with an FBI operation and getting yourself in legal trouble? Let's discuss.\n\n\n\nConnect with Scinary Cybersecurity:\n\nhttps://www.scinary.com\nhttps://x.com/scinarycyber\n\nOffensiveSecurity #Cybersecurity #EthicalHacking #HackBack #PenetrationTesting #CyberLaw #InfoSec #DEFCON","content_html":"\u003cp\u003eWelcome to the Scinary Information Nexus! This week, the team tackles a controversial and ethically murky corner of the cyber world: Offensive Security and the temptation to \u0026quot;hack back\u0026quot;\u003c/p\u003e\n\n\u003cp\u003eWhen an attacker breaches your network, is fighting back a righteous act of justice or a dangerous form of vigilantism? Join Richard Martin, Joseph Hamilton, Brazos Wortham, and Director of Cybersecurity Operations Tye Valdis as they break down the minefield of digital retaliation.\u003c/p\u003e\n\n\u003cp\u003eIn this episode, we expose:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eThe \u0026quot;Burn the House Down\u0026quot; Dilemma\u003c/li\u003e\n\u003cli\u003eOffensive Security vs. Revenge Hacking: What\u0026#39;s the difference?\u003c/li\u003e\n\u003cli\u003eThe Attribution Problem: Who are you \u003cem\u003ereally\u003c/em\u003e attacking?\u003c/li\u003e\n\u003cli\u003eCollateral Damage \u0026amp; Poking the Nation-State Bear\u003c/li\u003e\n\u003cli\u003eWhy Hacking Back is ILLEGAL (Computer Fraud and Abuse Act)\u003c/li\u003e\n\u003cli\u003eReal-World Examples: Stuxnet, Microsoft, and the Government\u003c/li\u003e\n\u003cli\u003eWhy \u0026quot;Cyber-Batman\u0026quot; Has No Jurisdiction\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eIs taking the fight to the enemy a smart strategy, or will you just end up interfering with an FBI operation and getting yourself in legal trouble? Let\u0026#39;s discuss.\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003c/p\u003e\n\n\u003cp\u003e\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003c/p\u003e\n\n\u003ch1\u003eOffensiveSecurity #Cybersecurity #EthicalHacking #HackBack #PenetrationTesting #CyberLaw #InfoSec #DEFCON\u003c/h1\u003e","summary":"This week, the team tackles a controversial and ethically murky corner of the cyber world: Offensive Security and the temptation to \"hack back\". When an attacker breaches your network, is fighting back a righteous act of justice or a dangerous form of vigilantism?","date_published":"2025-08-11T00:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/b58d758d-0171-4d27-b1a6-2c014b459a41.mp3","mime_type":"audio/mpeg","size_in_bytes":114439048,"duration_in_seconds":3576}]},{"id":"fa4df968-97f3-4dae-94d9-0dfdbe36b9cd","title":"Episode 16: The Dark Side of Venture Capital","url":"https://scinary-info-nexus.fireside.fm/16","content_text":"Welcome to the Scinary Information Nexus! This week, fueled by our friends at Southern Roots Brewing and AdiraNow, we're on camera to pull back the curtain on one of the tech world's most powerful and misunderstood forces: Venture Capital.\n\nJoin CEO Richard Martin, SOC Managers Mario Ortiz and Joseph Hamilton, and Director of Strategic Initiatives Brazos Wortham as we dissect the high-stakes world of VC funding.\n\nWe expose:\n\n\nThe VC Gamble\nIs Your Pension at Risk?\nThe TikTok Ban Hypocrisy\nHype Over Diligence\nExit Strategy Over Everything\nThe Transparency Black Hole\n\n\nIs the tech industry built on a foundation of responsible innovation or just a high-stakes casino game played with other people's money? Join the discussion.\n\n\n\nThis episode is proudly sponsored by:\n\nSouthern Roots Brewing Company: A Waco staple! For the best craft beer and local vibes, visit our friends at Southern Roots. Tell them Scinary sent you!\n\nAdiraNow: The go-to technology partner for local government and education in Oklahoma. Thank you to Dr. Jack Green and Gaitha Milligan for their support (and the Blanton's!).\n\nConnect with Scinary Cybersecurity:\n\nhttps://www.scinary.com\nhttps://x.com/scinarycyber","content_html":"\u003cp\u003eWelcome to the Scinary Information Nexus! This week, fueled by our friends at Southern Roots Brewing and AdiraNow, we\u0026#39;re on camera to pull back the curtain on one of the tech world\u0026#39;s most powerful and misunderstood forces: Venture Capital.\u003c/p\u003e\n\n\u003cp\u003eJoin CEO Richard Martin, SOC Managers Mario Ortiz and Joseph Hamilton, and Director of Strategic Initiatives Brazos Wortham as we dissect the high-stakes world of VC funding.\u003c/p\u003e\n\n\u003cp\u003eWe expose:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eThe VC Gamble\u003c/li\u003e\n\u003cli\u003eIs Your Pension at Risk?\u003c/li\u003e\n\u003cli\u003eThe TikTok Ban Hypocrisy\u003c/li\u003e\n\u003cli\u003eHype Over Diligence\u003c/li\u003e\n\u003cli\u003eExit Strategy Over Everything\u003c/li\u003e\n\u003cli\u003eThe Transparency Black Hole\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eIs the tech industry built on a foundation of responsible innovation or just a high-stakes casino game played with other people\u0026#39;s money? Join the discussion.\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eThis episode is proudly sponsored by:\u003c/p\u003e\n\n\u003cp\u003e\u003cem\u003eSouthern Roots Brewing Company:\u003c/em\u003e A Waco staple! For the best craft beer and local vibes, visit our friends at Southern Roots. Tell them Scinary sent you!\u003c/p\u003e\n\n\u003cp\u003e\u003cem\u003eAdiraNow:\u003c/em\u003e The go-to technology partner for local government and education in Oklahoma. Thank you to Dr. Jack Green and Gaitha Milligan for their support (and the Blanton\u0026#39;s!).\u003c/p\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003c/p\u003e\n\n\u003cp\u003e\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003c/p\u003e","summary":"Join CEO Richard Martin, SOC Managers Mario Ortiz and Joseph Hamilton, and Director of Strategic Initiatives Brazos Wortham as we dissect the high-stakes world of VC funding.\r\n\r\nIs the tech industry built on a foundation of responsible innovation or just a high-stakes casino game played with other people's money? Join the discussion.","date_published":"2025-08-08T21:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/fa4df968-97f3-4dae-94d9-0dfdbe36b9cd.mp3","mime_type":"audio/mpeg","size_in_bytes":119184529,"duration_in_seconds":3724}]},{"id":"038955cd-c502-4083-8336-a40a3a2057e7","title":"Episode 15: Recall, Copilot and Your Data Security","url":"https://scinary-info-nexus.fireside.fm/15","content_text":"In this episode we discuss Microsoft's implementation of AI in the form of Copilot and Recall. We also drink beer from Southern Roots Brewing Company in Waco, Texas. https://southernrootsbrewingco.com/","content_html":"\u003cp\u003eIn this episode we discuss Microsoft\u0026#39;s implementation of AI in the form of Copilot and Recall. We also drink beer from Southern Roots Brewing Company in Waco, Texas. \u003ca href=\"https://southernrootsbrewingco.com/\" rel=\"nofollow\"\u003ehttps://southernrootsbrewingco.com/\u003c/a\u003e\u003c/p\u003e","summary":"","date_published":"2025-07-25T16:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/038955cd-c502-4083-8336-a40a3a2057e7.mp3","mime_type":"audio/mpeg","size_in_bytes":111709576,"duration_in_seconds":3490}]},{"id":"c8645d7e-3d08-4373-a5a8-035cf6eafce9","title":"Episode 14: TikTok, TikTok","url":"https://scinary-info-nexus.fireside.fm/14","content_text":"","content_html":"","summary":"In this episode we discuss the absurdity of politicians fascination with TikTok","date_published":"2025-07-18T06:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c8645d7e-3d08-4373-a5a8-035cf6eafce9.mp3","mime_type":"audio/mpeg","size_in_bytes":98798309,"duration_in_seconds":3084}]},{"id":"a43ed1ca-0fbb-4b00-9074-31847ec90f1c","title":"Episode 13: Is it a Pen Test or a Pen Test?","url":"https://scinary-info-nexus.fireside.fm/13","content_text":"","content_html":"","summary":"We discuss the varying definitions of penetration testing and what to look for in a pen test.","date_published":"2025-07-11T14:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/a43ed1ca-0fbb-4b00-9074-31847ec90f1c.mp3","mime_type":"audio/mpeg","size_in_bytes":88188512,"duration_in_seconds":3674}]},{"id":"60d1967d-df60-4e83-91df-87bc847baafd","title":"Episode 12: Your Cybersecurity Insurance is Judging You","url":"https://scinary-info-nexus.fireside.fm/12","content_text":"","content_html":"","summary":"We discuss cybersecurity insurance and our opinions on the industry","date_published":"2025-06-27T14:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/60d1967d-df60-4e83-91df-87bc847baafd.mp3","mime_type":"audio/mpeg","size_in_bytes":67120160,"duration_in_seconds":2796}]},{"id":"8efde36f-5ac8-4561-8cf5-fbdc78e4abcd","title":"Episode 11: Our Take on Cybersecurity Jobs","url":"https://scinary-info-nexus.fireside.fm/11","content_text":"In this episode, we drink beer and tell you what we really think about cybersecurity career paths.","content_html":"\u003cp\u003eIn this episode, we drink beer and tell you what we really think about cybersecurity career paths.\u003c/p\u003e","summary":"","date_published":"2025-06-06T14:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/8efde36f-5ac8-4561-8cf5-fbdc78e4abcd.mp3","mime_type":"audio/mpeg","size_in_bytes":79637942,"duration_in_seconds":4977}]},{"id":"633724c7-99ee-4c23-957c-da57587e4095","title":"Episode 10: Acronym Hell","url":"https://scinary-info-nexus.fireside.fm/10","content_text":"","content_html":"","summary":"In this episode we explore the ridiculousness that are acronyms in cybersec.","date_published":"2025-05-30T13:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/633724c7-99ee-4c23-957c-da57587e4095.mp3","mime_type":"audio/mpeg","size_in_bytes":30325446,"duration_in_seconds":1895}]},{"id":"c4edb9d0-92ac-4e03-a8db-b96b43d2bb81","title":"Episode 9: We put the government in its place...kinda.","url":"https://scinary-info-nexus.fireside.fm/9","content_text":"","content_html":"","summary":"We go into the role of government in cybersecurity, drink a new beer, and talk about recent event in the ransomware space.","date_published":"2025-05-16T14:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c4edb9d0-92ac-4e03-a8db-b96b43d2bb81.mp3","mime_type":"audio/mpeg","size_in_bytes":49335066,"duration_in_seconds":3083}]},{"id":"899d4e80-e684-48a6-a91a-8f134aab375a","title":"Episode 8: One year later","url":"https://scinary-info-nexus.fireside.fm/8","content_text":"","content_html":"","summary":"We've done some things... I promise.","date_published":"2025-05-09T14:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/899d4e80-e684-48a6-a91a-8f134aab375a.mp3","mime_type":"audio/mpeg","size_in_bytes":54775222,"duration_in_seconds":3423}]},{"id":"9fd99aec-5c6e-4f47-a541-a104d211d80d","title":"Episode 7: Vault7: Part 2","url":"https://scinary-info-nexus.fireside.fm/7","content_text":"Part 2 of our Vault 7 episode. Joined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it's a few years too late.","content_html":"\u003cp\u003ePart 2 of our Vault 7 episode. Joined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it\u0026#39;s a few years too late.\u003c/p\u003e","summary":"Continuation our talk about the Vault 7 leak and what the C.I.A. used for their clandestine information gathering. We get into the details of each part of the leak and give our ample conjecture on what that may mean for the Cybersecurity industry today.","date_published":"2023-04-10T14:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/9fd99aec-5c6e-4f47-a541-a104d211d80d.mp3","mime_type":"audio/mpeg","size_in_bytes":76878141,"duration_in_seconds":2559}]},{"id":"c4bc39ca-ed64-4ea4-a5d6-8b6f9d26614f","title":"Episode 6: Vault7: Part 1","url":"https://scinary-info-nexus.fireside.fm/6","content_text":"Joined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it's a few years too late.","content_html":"\u003cp\u003eJoined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it\u0026#39;s a few years too late.\u003c/p\u003e","summary":"Today we talk about the Vault 7 leak and what the C.I.A. used for their clandestine information gathering. We get into the details of each part of the leak and give our ample conjecture on what that may mean for the Cybersecurity industry today.","date_published":"2023-02-22T15:00:00.000-06:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c4bc39ca-ed64-4ea4-a5d6-8b6f9d26614f.mp3","mime_type":"audio/mpeg","size_in_bytes":89674893,"duration_in_seconds":2914}]},{"id":"3e6c8f66-5e6f-4c24-b3b4-1caf92b682ca","title":"Episode 5: PenTesting with Jason Phillips","url":"https://scinary-info-nexus.fireside.fm/5","content_text":"On this episode we look into the world of PenTesting and what some of the pitfalls and ethical conundrums mean for the cyber practitioner. Our experts give us first hand anecdotes of what they've experienced in the field while Mario and Joseph try no to derail the episode too much. Come explore the crazy world of red teams, penetration tests, and all things cybersecurity with your Scinary Information Nexus.\n\nMustang Cyber: https://mustangcyber.com\n\nScinary Cybersecurity: https://www.scinary.com","content_html":"\u003cp\u003eOn this episode we look into the world of PenTesting and what some of the pitfalls and ethical conundrums mean for the cyber practitioner. Our experts give us first hand anecdotes of what they\u0026#39;ve experienced in the field while Mario and Joseph try no to derail the episode too much. Come explore the crazy world of red teams, penetration tests, and all things cybersecurity with your Scinary Information Nexus.\u003c/p\u003e\n\n\u003cp\u003eMustang Cyber: \u003ca href=\"https://mustangcyber.com\" rel=\"nofollow\"\u003ehttps://mustangcyber.com\u003c/a\u003e\u003c/p\u003e\n\n\u003cp\u003eScinary Cybersecurity: \u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003c/p\u003e","summary":"A conversation with the CEO of Mustang Cyber and our very own Director of Operations Tye Valdis.","date_published":"2022-11-28T14:00:00.000-06:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/3e6c8f66-5e6f-4c24-b3b4-1caf92b682ca.mp3","mime_type":"audio/mpeg","size_in_bytes":71855301,"duration_in_seconds":2646}]},{"id":"cbd9a7ce-342e-4e08-a70f-f92e01590f69","title":"Episode 4: Ant Catalogue/Conspiracy Theories","url":"https://scinary-info-nexus.fireside.fm/4","content_text":"Fair warning, most of this episode is our personal opinions and speculation. That being said we will be going into the information leaked from the A.N.T. catalogue, conspiracies around the Stuxnet worm, and what keeps us up at night when it comes to our big government friends and their wonderful toys. It's a conspiracy nut convention and we're the squirrels. Come joing us on this fun ride into state threat actors.","content_html":"\u003cp\u003eFair warning, most of this episode is our personal opinions and speculation. That being said we will be going into the information leaked from the A.N.T. catalogue, conspiracies around the Stuxnet worm, and what keeps us up at night when it comes to our big government friends and their wonderful toys. It\u0026#39;s a conspiracy nut convention and we\u0026#39;re the squirrels. Come joing us on this fun ride into state threat actors.\u003c/p\u003e","summary":"We take a dive into the world of Advanced Persistent Threat actors as we look at Nation State actors and their capabilities. We'll look at the NSA A.N.T. catalogue and see if we can't shine a little light on the shadow organizations of the world.","date_published":"2022-09-19T17:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/cbd9a7ce-342e-4e08-a70f-f92e01590f69.mp3","mime_type":"audio/mpeg","size_in_bytes":102918669,"duration_in_seconds":3469}]},{"id":"589ad254-87db-460b-b840-e2919e0063d4","title":"Episode 3: *BACK TO SCHOOL SPECIAL*","url":"https://scinary-info-nexus.fireside.fm/3","content_text":"Introducing!!! Richard Martin!!! Our Managing Partner of Sales joins us to talk about what keeps him up at night and what our clients can do to help him (and them) sleep better. Fair warning he's a man who speaks his mind and the filter doesn't always stay on. That being said, we had a few slip ups in the obscene language department, but we're talking about things that can destroy lives and organizations. Our boss don't play around folks. So come join us on this special episode and hopefully walk away with your own plan of action.","content_html":"\u003cp\u003eIntroducing!!! Richard Martin!!! Our Managing Partner of Sales joins us to talk about what keeps him up at night and what our clients can do to help him (and them) sleep better. Fair warning he\u0026#39;s a man who speaks his mind and the filter doesn\u0026#39;t always stay on. That being said, we had a few slip ups in the obscene language department, but we\u0026#39;re talking about things that can destroy lives and organizations. Our boss don\u0026#39;t play around folks. So come join us on this special episode and hopefully walk away with your own plan of action.\u003c/p\u003e","summary":"Our managing partner of Sales and Co-founder of Scinary Cybersecurity, Richard Martin, gives an honest assessment of the things tech departments in K-12 education can do to help secure themselves in today's threat landscape.","date_published":"2022-09-07T18:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/589ad254-87db-460b-b840-e2919e0063d4.mp3","mime_type":"audio/mpeg","size_in_bytes":53219622,"duration_in_seconds":3326}]},{"id":"ef80115e-cd37-464a-8e99-e29f44f88e28","title":"Episode 2: Intern Insights","url":"https://scinary-info-nexus.fireside.fm/2","content_text":"","content_html":"","summary":"a conversation with our new batch of interns asking them what they've learned and where they might go next.","date_published":"2022-08-08T15:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/ef80115e-cd37-464a-8e99-e29f44f88e28.mp3","mime_type":"audio/mpeg","size_in_bytes":46342269,"duration_in_seconds":1892}]},{"id":"2e53fce6-3dcb-4e6d-8d68-8bed3fceaea0","title":"Episode 1: P@ssw0rd!","url":"https://scinary-info-nexus.fireside.fm/1","content_text":"","content_html":"","summary":"a brief overview of passwords, why they frustrate us, what we should do about it, and what might happen to them in the future.","date_published":"2022-08-08T15:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/2e53fce6-3dcb-4e6d-8d68-8bed3fceaea0.mp3","mime_type":"audio/mpeg","size_in_bytes":51058797,"duration_in_seconds":1780}]},{"id":"c6c29777-1172-4e4b-9f72-64ff3ba2ed4b","title":"Introduction to the Scinary Information Nexus","url":"https://scinary-info-nexus.fireside.fm/intro","content_text":"","content_html":"","summary":"An introduction to your hosts Joe and Mario. Come join us as we learn from industry experts and our peers about what it means to work in cybersecurity and what to keep an eye on in the future.","date_published":"2022-08-08T15:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c6c29777-1172-4e4b-9f72-64ff3ba2ed4b.mp3","mime_type":"audio/mpeg","size_in_bytes":11608077,"duration_in_seconds":438}]}]}