Player FM 앱으로 오프라인으로 전환하세요!
들어볼 가치가 있는 팟캐스트
스폰서 후원


1 Advancing Cardiology and Heart Surgery Through a History of Collaboration 20:13
AI Red Teaming Comes to Bug Bounties - Francis Dinha, Michiel Prins - ESW #391
Manage episode 463477643 series 1161048
HackerOne's co-founder, Michiel Prins walks us through the latest new offensive security service: AI red teaming.
At the same time enterprises are globally trying to figure out how to QA and red team generative AI models like LLMs, early adopters are challenged to scale these tests. Crowdsourced bug bounty platforms are a natural place to turn for assistance with scaling this work, though, as we'll discuss on this episode, it is unlike anything bug hunters have ever tackled before.
Segment Resources:
- https://www.hackerone.com/ai/snap-ai-red-teaming
- https://www.hackerone.com/thought-leadership/ai-safety-red-teaming
This interview is a bit different from our norm. We talk to the founder and CEO of OpenVPN about what it is like to operate a business based on open source, particularly through trying times like the recent pandemic. How do you compete when your competitors are free to build products using your software and IP? It seems like an oxymoron, but an open source-based business actually has some significant advantages over the closed source commercial approach.
In this week's enterprise security news,
- the first cybersecurity IPO in 3.5 years!
- new companies
- new tools
- the fate of CISA and the cyber safety review board
- things we learned about AI in 2024
- is the humanless SOC possible?
- NGFWs have some surprising vulnerabilities
- what did generative music sound like in 1996?
All that and more, on this episode of Enterprise Security Weekly.
Visit https://www.securityweekly.com/esw for all the latest episodes!
Show Notes: https://securityweekly.com/esw-391
412 에피소드
Manage episode 463477643 series 1161048
HackerOne's co-founder, Michiel Prins walks us through the latest new offensive security service: AI red teaming.
At the same time enterprises are globally trying to figure out how to QA and red team generative AI models like LLMs, early adopters are challenged to scale these tests. Crowdsourced bug bounty platforms are a natural place to turn for assistance with scaling this work, though, as we'll discuss on this episode, it is unlike anything bug hunters have ever tackled before.
Segment Resources:
- https://www.hackerone.com/ai/snap-ai-red-teaming
- https://www.hackerone.com/thought-leadership/ai-safety-red-teaming
This interview is a bit different from our norm. We talk to the founder and CEO of OpenVPN about what it is like to operate a business based on open source, particularly through trying times like the recent pandemic. How do you compete when your competitors are free to build products using your software and IP? It seems like an oxymoron, but an open source-based business actually has some significant advantages over the closed source commercial approach.
In this week's enterprise security news,
- the first cybersecurity IPO in 3.5 years!
- new companies
- new tools
- the fate of CISA and the cyber safety review board
- things we learned about AI in 2024
- is the humanless SOC possible?
- NGFWs have some surprising vulnerabilities
- what did generative music sound like in 1996?
All that and more, on this episode of Enterprise Security Weekly.
Visit https://www.securityweekly.com/esw for all the latest episodes!
Show Notes: https://securityweekly.com/esw-391
412 에피소드
모든 에피소드
×

1 Evolving the SOC: Automating Manual Work while Maintaining Quality at Scale - Allie Mellen, Tim MalcomVetter - ESW #394 1:55:17


1 The groundbreaking technology addressing employment scams and deepfakes - John Dwyer, Aaron Painter - ESW #393 1:49:44


1 The Growth of Women in Cybersecurity Has Slowed - Why, and What Can We Do About It? - Lynn Dohm - ESW #392 2:11:49


1 AI Red Teaming Comes to Bug Bounties - Francis Dinha, Michiel Prins - ESW #391 2:07:23


1 The Next Era of Data Security: AI, Cloud, & Compliance - Jeff Smith, Dimitri Sirota, Kiran Chinnagangannagari - ESW #390 2:03:35


1 How threat-informed defense benefits each security team member - Frank Duff, Nathan Sportsman - ESW #389 2:00:38


1 D3FEND 1.0: A Milestone in Cyber Ontology - Peter Kaloroumakis - ESW #388 1:42:49


1 The 2024 Cybersecurity Market Review - Mike Privette, Rew Islam - ESW #387 1:47:09


1 Tackling Barriers on the Road To Cyber Resilience - Rob Allen, Theresa Lanowitz - ESW #386 1:59:27


1 2023 Funding and Acquisition Summary with Return on Security - Mike Privette - ESW Vault 43:56


1 Fixing how cybersecurity products are bought and sold - Mariana Padilla - ESW #385 1:52:17


1 AI and the Autonomous SOC - Separating Hype from Reality - Justin Beals, Itai Tevet - ESW #384 1:56:05


1 Cybersecurity Budgets: the Journey from Reactive to Proactive - Todd Thiemann, Theresa Lanowitz - ESW #383 2:01:03


1 What if securing buildings was as easy as your smartphone? - Damon McDougald, Blaine Frederick, Punit Minocha - ESW #382 2:06:19


1 Transforming the Defender's Dilemma into the Defender's Advantage - Charlotte Wylie, Bhawna Singh, Lenny Zeltser - ESW #381 1:50:15
플레이어 FM에 오신것을 환영합니다!
플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.