<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
    <channel>
        <generator>RedCircle VERIFY_TOKEN_cc92cba0-8e0b-460c-a5a6-994e3cf9c486  -- Rendered At Tue, 19 May 2026 18:03:56 &#43;0000</generator>
        <title>Security Bytes</title>
        <link>https://redcircle.com/shows/security-bytes</link>
        <language>en-US</language>
        <copyright>All rights reserved.</copyright>
        <itunes:subtitle>Stories about Technology &amp; Security - Why Not?</itunes:subtitle>
        <itunes:author>Durgesh Kalya</itunes:author>
        <itunes:summary>This is part of the Simplified Security Podcast. Episodes are full of stories and interesting facts about Technology and Security. This is a complementary podcast to my other podcast Security Bits.</itunes:summary>
        <podcast:guid>cc92cba0-8e0b-460c-a5a6-994e3cf9c486</podcast:guid>
        
        <description><![CDATA[<p>This is a part of Simplified Security Podcast where you get to hear interesting stories about technology &amp; security. I will showcase special guests and experts. These episodes are usually longer than 8 minutes and can run up to 32 minutes.</p><p><br></p><p>Here are some of the segments that these episodes will feature:</p><p><br></p><p>History in Security - Where we take a step back and explore the history and significance of various things technology and security.</p><p><br></p><p>Expert in Security - You will get to hear from the experts. Check out my LinkedIn and Facebook page if you want to participate. Ask questions and also find out about my next guest.</p>]]></description>
        
        <itunes:type>episodic</itunes:type>
        <podcast:locked>no</podcast:locked>
        <itunes:owner>
            <itunes:name>Durgesh Kalya</itunes:name>
            <itunes:email>durgesh@codepear.com</itunes:email>
        </itunes:owner>
        
        <itunes:image href="https://media.redcircle.com/images/2022/5/16/13/8a04d018-f198-4cf5-9c52-5d130ac34417_3140_b8caf036-e33f-4726-a487-e30c3320ed5d_blob.jpg"/>
        
        
        
            
            <itunes:category text="Technology" />

            

        
        
            
            <itunes:category text="News">

            
                <itunes:category text="Tech News"/>
            

        </itunes:category>
        

        
        <itunes:explicit>no</itunes:explicit>
        
        
        
        
        
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>The components</itunes:title>
                <title>The components</title>

                
                
                <itunes:author>Durgesh Kalya</itunes:author>
                
                <description><![CDATA[<p>In this episode I am going to get a bit more serious, Information Security also loosely referred to as cybersecurity. Is it a field of study or a discipline or just another blanket term for anything that means protection of the computer systems? Lets find out!</p>]]></description>
                <content:encoded>&lt;p&gt;In this episode I am going to get a bit more serious, Information Security also loosely referred to as cybersecurity. Is it a field of study or a discipline or just another blanket term for anything that means protection of the computer systems? Lets find out!&lt;/p&gt;</content:encoded>
                
                <enclosure length="12886099" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/d5066786-0d2e-48cd-a2fa-4272a22e87a0/stream.mp3"/>
                
                <guid isPermaLink="false">43164429-f960-4651-b1d0-15a6418c78bb</guid>
                <link>https://icsbits.com/simplified/</link>
                <pubDate>Mon, 16 May 2022 11:56:02 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/5/16/13/ecf79987-5916-4c20-b80a-e9dd9c287100_aa54790b-2f19-411e-b538-027b003586ff_9.jpg"/>
                <itunes:duration>805</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>full</itunes:episodeType>
                <itunes:title>Yours Truly Cybersecurity</itunes:title>
                <title>Yours Truly Cybersecurity</title>

                <itunes:episode>1</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Durgesh Kalya</itunes:author>
                <itunes:subtitle>A letter from Cybersecurity</itunes:subtitle>
                <itunes:summary>This is the first episode of my new podcast Security Bytes, I am hoping to provide my listeners with some really thought provoking and mind bending experience. Todays focus is on Cybersecurity and why now is the time to be part of it.</itunes:summary>
                <description><![CDATA[<p>This is the first episode of my new podcast Security Bytes, I am hoping to provide my listeners with some really thought provoking and mind bending experience. Todays focus is on Cybersecurity and why now is the time to be part of it.</p><p><br></p><p><strong>Show Notes:</strong></p><p><br></p><p>My other Podcast: <a href="https://redcircle.com/shows/security-bits" rel="nofollow">Security Bits</a></p><p>Cybernetics Book by Norbert Weiner: <a href="https://www.amazon.com/Cybernetics-Second-Control-Communication-Machine/dp/026273009X" rel="nofollow">Amazon</a></p><p><br></p><p><strong>Connect with me:</strong></p><p>Simply follow me on <a href="https://www.linkedin.com/in/durgeshkalya/" rel="nofollow">LinkedIn</a> or <a href="https://twitter.com/durgeshkalya" rel="nofollow">Twitter</a><strong>.</strong></p><p><br></p><p><strong>Subscribe to my Podcast Simplified Security:</strong></p><p>Google Podcast</p><p><a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zb3VuZGVyLmZtLzk3NTgvcnNzLnhtbA" rel="nofollow">https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zb3VuZGVyLmZtLzk3NTgvcnNzLnhtbA</a> </p><p><br></p><p>Apple Podcast</p><p><a href="https://podcasts.apple.com/us/podcast/security-bits/id1542309317" rel="nofollow">https://podcasts.apple.com/us/podcast/security-bits/id1542309317</a> </p><p><br></p><p>For all other platforms such as Spotify, TuneIn, Amazon,</p><p>Go to <a href="https://icsbits.com/simplified/" rel="nofollow">https://icsbits.com/simplified/</a> </p><p><br></p><p>Do not forget to Subscribe to my YouTube Channel and Enable Notifications:</p><p><a href="https://www.youtube.com/channel/UC9gRPRXg3s3ZPZZafouzOWA?sub_confirmation=1" rel="nofollow">https://www.youtube.com/channel/UC9gRPRXg3s3ZPZZafouzOWA?sub_confirmation=1</a> </p>]]></description>
                <content:encoded>&lt;p&gt;This is the first episode of my new podcast Security Bytes, I am hoping to provide my listeners with some really thought provoking and mind bending experience. Todays focus is on Cybersecurity and why now is the time to be part of it.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Show Notes:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;My other Podcast: &lt;a href=&#34;https://redcircle.com/shows/security-bits&#34; rel=&#34;nofollow&#34;&gt;Security Bits&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Cybernetics Book by Norbert Weiner: &lt;a href=&#34;https://www.amazon.com/Cybernetics-Second-Control-Communication-Machine/dp/026273009X&#34; rel=&#34;nofollow&#34;&gt;Amazon&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Connect with me:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Simply follow me on &lt;a href=&#34;https://www.linkedin.com/in/durgeshkalya/&#34; rel=&#34;nofollow&#34;&gt;LinkedIn&lt;/a&gt; or &lt;a href=&#34;https://twitter.com/durgeshkalya&#34; rel=&#34;nofollow&#34;&gt;Twitter&lt;/a&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Subscribe to my Podcast Simplified Security:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Google Podcast&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zb3VuZGVyLmZtLzk3NTgvcnNzLnhtbA&#34; rel=&#34;nofollow&#34;&gt;https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zb3VuZGVyLmZtLzk3NTgvcnNzLnhtbA&lt;/a&gt; &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Apple Podcast&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://podcasts.apple.com/us/podcast/security-bits/id1542309317&#34; rel=&#34;nofollow&#34;&gt;https://podcasts.apple.com/us/podcast/security-bits/id1542309317&lt;/a&gt; &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;For all other platforms such as Spotify, TuneIn, Amazon,&lt;/p&gt;&lt;p&gt;Go to &lt;a href=&#34;https://icsbits.com/simplified/&#34; rel=&#34;nofollow&#34;&gt;https://icsbits.com/simplified/&lt;/a&gt; &lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;Do not forget to Subscribe to my YouTube Channel and Enable Notifications:&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://www.youtube.com/channel/UC9gRPRXg3s3ZPZZafouzOWA?sub_confirmation=1&#34; rel=&#34;nofollow&#34;&gt;https://www.youtube.com/channel/UC9gRPRXg3s3ZPZZafouzOWA?sub_confirmation=1&lt;/a&gt; &lt;/p&gt;</content:encoded>
                
                <enclosure length="10292662" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/f5200090-a7bc-46f4-b266-4df71945cd59/stream.mp3"/>
                
                <guid isPermaLink="false">beb02d4a-bebc-45c9-be40-550960dfd127</guid>
                <link>http://icsbits.com/simplified</link>
                <pubDate>Fri, 15 Jan 2021 08:15:58 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/5/16/13/f3717979-3b05-402f-a6b7-73639865c93b_f7-04d03720f1d1_custom_dimensions_3000x3000_px.jpg"/>
                <itunes:duration>643</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
            <item>
                <itunes:episodeType>trailer</itunes:episodeType>
                <itunes:title>Trailer - Introducing Security Bytes</itunes:title>
                <title>Trailer - Introducing Security Bytes</title>

                <itunes:episode>1</itunes:episode>
                <itunes:season>1</itunes:season>
                <itunes:author>Durgesh Kalya</itunes:author>
                <itunes:summary>I have created another podcast which is called Security Bytes. What is the difference? Security Bits is my short format which is under 8 minutes. 
Just enough to get your head around important Security Topics and News. 
On the other Podcast - Security Bytes, we will dive deep into discussions with Security Experts, Discuss history and hear stories about Cybersecurity and get inspired and motivated. 
The first episode is coming out soon in January, make sure you subscribe to Security Bytes. I hope that clarifies the Bits Vs Bytes. Thank you for your attention.</itunes:summary>
                <description><![CDATA[<p>Welcome to the Simplified Security Bytes - Yes, I know, it can get a little confusing. I already have a show by the name Security Bits. Then what is Security Bytes?</p><p><br></p><p>In the Security Bytes Podcast, we will dive deep into discussions with Security Experts, Discuss history behind technology and security. And also hear stories about Cybersecurity and get motivated &amp; Inspired.</p><p><br></p><p>The first episode is coming out soon in January, make sure you subscribe to Security Bytes podcast. If you are looking for my Short Format version which covers News, CVEs and Cybersecurity Events, then check out Security Bits.</p><p>Go to icsbits.com/simplified for more details. I am your host Durgesh Kalya. Catch me on my next Security Bytes Episode until then be safe and think before you click.</p>]]></description>
                <content:encoded>&lt;p&gt;Welcome to the Simplified Security Bytes - Yes, I know, it can get a little confusing. I already have a show by the name Security Bits. Then what is Security Bytes?&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;In the Security Bytes Podcast, we will dive deep into discussions with Security Experts, Discuss history behind technology and security. And also hear stories about Cybersecurity and get motivated &amp;amp; Inspired.&lt;/p&gt;&lt;p&gt;&lt;br&gt;&lt;/p&gt;&lt;p&gt;The first episode is coming out soon in January, make sure you subscribe to Security Bytes podcast. If you are looking for my Short Format version which covers News, CVEs and Cybersecurity Events, then check out Security Bits.&lt;/p&gt;&lt;p&gt;Go to icsbits.com/simplified for more details. I am your host Durgesh Kalya. Catch me on my next Security Bytes Episode until then be safe and think before you click.&lt;/p&gt;</content:encoded>
                
                <enclosure length="1145626" type="audio/mpeg" url="https://audio4.redcircle.com/episodes/1a1af0e4-879e-427f-89f7-c10d1532b444/stream.mp3"/>
                
                <guid isPermaLink="false">ae7b63b9-97d8-468d-8044-d9ae483ba61a</guid>
                <link>https://icsbits.com/simplified/</link>
                <pubDate>Thu, 07 Jan 2021 08:24:21 &#43;0000</pubDate>
                <itunes:image href="https://media.redcircle.com/images/2022/5/16/11/cd6bbdab-db2f-4283-bb20-a752edbbff7b_af-ff3b3878dbae_custom_dimensions_3000x3000_px.jpg"/>
                <itunes:duration>71</itunes:duration>
                
                
                <itunes:explicit>no</itunes:explicit>
                
            </item>
        
    </channel>
</rss>
