<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://media.rss.com/style.xsl"?>
<rss xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom" xml:lang="en" version="2.0">
  <channel>
    <title><![CDATA[Human Cyber]]></title>
    <link>https://rss.com/podcasts/human-cyber</link>
    <atom:link href="https://media.rss.com/human-cyber/feed.xml" rel="self" type="application/rss+xml"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <description><![CDATA[<p>Podcast about the Human side of Cyber security with the goal of educating and enlightening.</p>]]></description>
    <generator>RSS.com 2026.428.112250</generator>
    <lastBuildDate>Mon, 11 May 2026 02:36:11 GMT</lastBuildDate>
    <language>en</language>
    <copyright><![CDATA[Max Margolis 2026]]></copyright>
    <itunes:image href="https://media.rss.com/human-cyber/20260211_070241_181ed3301e8fccd32c8dfe8591031422.png"/>
    <podcast:guid>12731115-4145-522b-9bce-3248aab89f93</podcast:guid>
    <image>
      <url>https://media.rss.com/human-cyber/20260211_070241_181ed3301e8fccd32c8dfe8591031422.png</url>
      <title>Human Cyber</title>
      <link>https://rss.com/podcasts/human-cyber</link>
    </image>
    <podcast:locked>yes</podcast:locked>
    <podcast:license>Max Margolis 2026</podcast:license>
    <itunes:author>Max Margolis</itunes:author>
    <itunes:owner>
      <itunes:name>Max Margolis</itunes:name>
    </itunes:owner>
    <itunes:explicit>false</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:category text="Technology"/>
    <podcast:txt purpose="applepodcastsverify">ad712e10-088e-11f1-9969-e523afcfdb67</podcast:txt>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="f0c85bf3-7ee8-5715-b3ce-20b78b663997"/>
    </podcast:podroll>
    <podcast:medium>podcast</podcast:medium>
    <podcast:txt purpose="ai-content">false</podcast:txt>
    <item>
      <title><![CDATA[The Invisible Beast]]></title>
      <itunes:title><![CDATA[The Invisible Beast]]></itunes:title>
      <description><![CDATA[<p>In Episode 3 of Human Cyber, host Max Margolis is joined by Jai Minton (Cyber SME at Huntress) to unpack one of the most dangerous and misunderstood threats in security today: software supply chain attacks. Using the metaphor of a poisoned water supply, Max and Jai break down how attackers don’t come at you directly — they taint something you already trust, and the contamination flows downstream to you, your team, and your customers.</p>]]></description>
      <link>https://rss.com/podcasts/human-cyber/2555686</link>
      <enclosure url="https://content.rss.com/episodes/372405/2555686/human-cyber/2026_05_07_07_02_53_00428883-4351-4f8b-9f41-5a650200018f.mp3" length="59123734" type="audio/mpeg"/>
      <guid isPermaLink="false">0dba8c9b-4bac-4c72-b453-cc6b3071b033</guid>
      <itunes:duration>3695</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 06 May 2026 02:45:01 GMT</pubDate>
      <podcast:txt purpose="ai-content">false</podcast:txt>
      <itunes:image href="https://media.rss.com/human-cyber/ep_cover_20260506_020552_b9b3ef2364a19427934a38c87c387fa6.png"/>
    </item>
    <item>
      <title><![CDATA[The Human Firewall]]></title>
      <itunes:title><![CDATA[The Human Firewall]]></itunes:title>
      <description><![CDATA[<p>Episode Description: "In this episode, Max Margolis tackles 'The Human Firewall' - why people are called the weakest link in security and what we can actually do about it. He breaks down why traditional security awareness training fails (boring compliance theater with no reinforcement), explores the psychology of why smart people click phishing links (spoiler: curiosity is a powerful weapon), discusses insider threats both accidental and malicious, and provides practical guidance on building security culture that actually works. If you've ever wondered why security training feels useless or how to get your team to actually care about security, this episode is for you."</p><p></p><p>Intro, Outro, and background music is hand picked from Pixabay and Epidemic Sound (all royalty-free licensing)</p>]]></description>
      <link>https://rss.com/podcasts/human-cyber/2555683</link>
      <enclosure url="https://content.rss.com/episodes/372405/2555683/human-cyber/2026_03_30_04_59_43_62c5155a-f75c-4b26-807d-20b5666219dd.mp3" length="41652359" type="audio/mpeg"/>
      <guid isPermaLink="false">df2dd7b8-4b59-402e-a654-db22e1f8df9e</guid>
      <itunes:duration>2603</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 29 Mar 2026 08:23:57 GMT</pubDate>
      <itunes:image href="https://media.rss.com/human-cyber/ep_cover_20260328_090316_c1d2d0526f874e70261e271fcc0c6548.jpg"/>
    </item>
    <item>
      <title><![CDATA[This Artificial Life]]></title>
      <itunes:title><![CDATA[This Artificial Life]]></itunes:title>
      <description><![CDATA[<p>Welcome to Human Cyber! In this inaugural episode, host Max Margolis cuts through the AI hype to reveal what generative AI actually means for cyber security. Using the metaphor of a compass, Max explains why AI is a tool that guides direction but doesn’t make decisions - and why treating it as a magic solution leads to failure. He tackles the AI buzzword problem plaguing security products, explores how both attackers and defenders are really using these tools, and provides practical guidance for professionals, organizations, and everyday users.”</p><p>Music provided by Pixabay</p>]]></description>
      <link>https://rss.com/podcasts/human-cyber/2545521</link>
      <enclosure url="https://content.rss.com/episodes/372405/2545521/human-cyber/2026_02_13_02_20_22_a39604ac-6edf-43ea-ba45-e32eca0c171b.mp3" length="55964778" type="audio/mpeg"/>
      <guid isPermaLink="false">84f03fab-f650-4488-bb57-2aa77b37d4b3</guid>
      <itunes:duration>3497</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 13 Feb 2026 03:19:58 GMT</pubDate>
      <itunes:image href="https://media.rss.com/human-cyber/ep_cover_20260213_020247_b849e1dedcd8c6c294e7af91d9205663.png"/>
      <podcast:transcript url="https://transcripts.rss.com/372405/2545521/transcript" type="text/vtt"/>
      <podcast:chapters url="https://apollo.rss.com/chapters/2545521" type="application/json+chapters"/>
      <psc:chapters>
        <psc:chapter start="3:28" title="The Compass Metaphor"/>
        <psc:chapter start="5:02" title="What Generative AI Actually Is"/>
        <psc:chapter start="8:04" title="The Buzzword Problem "/>
        <psc:chapter start="12:40" title="How Adversaries use GenAI"/>
        <psc:chapter start="19:31" title="How Defenders Use GenAI"/>
        <psc:chapter start="26:17" title="The AI Arms Race"/>
        <psc:chapter start="29:05" title="Guidance on GenAI and Security Awareness"/>
        <psc:chapter start="53:41" title="Summary &amp; Conclusion"/>
      </psc:chapters>
    </item>
  </channel>
</rss>