NEW: Microsoft Vulnerabilities Report 2022 - Read the Findings of Our Annual Report Read Now

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Videos
    • Glossary
    • Infographics
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

Introducing Adventures of Alice & Bob: Not Your Average New Kids on the Block

June 22, 2022

  • Blog
  • Archive
  1. Home
  2. Blog
  3. Introducing Adventures of Alice & Bob: Not Your Average New Kids on the Block

I am thrilled to announce the launch of BeyondTrust’s new cybersecurity podcast, Adventures of Alice & Bob. Episodes are now available to stream on your favorite podcast players! With rotating hosts Marc Maiffret, James Maude, and Karl Lankford, you’re guaranteed a few good laughs, legit hacker story-swapping, and off-the-cuff banter fitting for any cybersecurity aficionado.

With 5 episodes ready for immediate streaming, you have plenty of cybersecurity entertainment to handle on your next commute, workout, or chill hour. Tune in as our hosts talk shop with hackers, thought leaders, and the unsung heroes of the cybersecurity world.

Here’s a brief synopsis for each released episode:

Ep. 01 - Uncovering the Code Red Worm // Marc Maiffret

In our very first episode, our two hosts James and Karl are joined by our very own Marc Maiffret to talk about Marc's experience being raided by the FBI as a teenager, the infamous Code Red worm he co-discovered, and how cybersecurity will be different in the future. A great episode to kick-off the series with!

Ep. 02 - Basic Adorable Destruction // Jayson E Street

Once described as a "paunchy hacker" by Rolling Stone Magazine, Jayson E Street, joins Marc and Karl in our second episode to talk about his unique take on pen testing, how his biggest success story is about him failing, and how everyone is born a hacker. This 62 minute episode flies by as Jayson takes listeners through a very entertaining and sometimes terrifying world of hacking.

Ep. 03 - Fighting the Vastaamo Ransomware Attack // Sami Laiho

One of the leading Windows OS professionals in the world, Sami Laiho, joins James and Karl in this episode to talk about how choosing your words wisely can convince people to take security seriously and how he dealt with the Vastaamo ransomware attack, the largest crime ever committed in Finland.

Ep. 04 - She Hacks Purple // Tanya Janca

Best-selling author of Alice and Bob Learn Application Security (yes, we swoon at the name too), Tanya Janca, joins Marc and Karl to talk about what it’s like being a woman in cybersecurity, the origin story of We Hack Purple, and how important it is to be integrated in the cybersecurity community. Tanya had a lot to share in this 60 minute episode and left us eager to book another installment with her!

Ep. 05 - After Hours with Alice & Bob // Live Episode!

In this 30-minute episode we are introducing After Hours with Alice & Bob, a special live episode recorded at BeyondTrust’s GoBeyond event in Miami Florida. Our hosts James and Marc have a ton of fun talking to guests at the conference about embarrassing cybersecurity mistakes, AI, superheroes, organized cyber crime, and more. A sure way to entertain your next 30 minutes!

Subscribe to Adventures of Alice & Bob on Apple Podcasts, Spotify, or wherever you listen to podcasts. And, if you love it, please consider rating Adventures of Alice & Bob 5 stars!

Interested in Being a Guest?

If you are a cybersecurity hero (well, of course you are) and have a personal anecdote from the front lines of a cyberattack that you’d like to share on the podcast, please contact the BeyondTrust podcast production team at podcast@beyondtrust.com.


Photograph of Sarah Lieber

Sarah Lieber, Sr. Manager, Marketing Programs

Sarah is a highly dedicated and creative marketing professional with over a decade of experience in proven B2B demand-gen and campaign success in the cybersecurity space. Sarah strategically built and grew from the ground-up BeyondTrust's highly effective and successful world-wide webinar and podcast program. Yearly, the BeyondTrust webinar program involves over 100 cybersecurity experts and generates tens of thousands of attendees across the globe. See what's new with BeyondTrust webinars here: https://www.beyondtrust.com/resources/webcasts

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Up next

From June 21, 2022:
Go Beyond 2022: A Reimagined Conference for Customers and Partners
From June 27, 2022:
The Dark Side of Microsoft Windows – Administrative Privilege and Access Security Weaknesses

You May Also Be Interested In:

Whitepapers

IDSA Report: 2022 Trends in Securing Digital Identities

Whitepapers

Microsoft Vulnerabilities Report 2022

Whitepapers

Cybersecurity Insurance Checklist

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Infographics
  • Podcast
  • Videos
  • Webinars
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.