logo
episode-header-image
Oct 2023
36m 22s

AI Threats & Opportunities in Cyber Secu...

Conviction
About this episode
Cyber Security is going to change significantly in the era of AI, according to Ryan Noon, cofounder of Material Security, a security company that makes cloud-based Google and Microsoft email a safe place for sensitive data. Elad Gil and Ryan talk about how Material Security started to use LLMs, potential security threats from AI hacks, and the role of the go ... Show More
Up next
Mar 20
Andrej Karpathy on Code Agents, AutoResearch, and the Loopy Era of AI
What happens when AI agents can design experiments, collect data, and improve — without a human in the loop? Andrej Karpathy joins Sarah Guo on the state of models, the future of engineering and education, thinking about impact on jobs, and his project AutoResearch: where agents ... Show More
1h 6m
Mar 12
From Coder to Manager: Navigating the Shift to Agentic Engineering with Notion Co-Founder Simon Last
Notion isn’t designing AI agents that just use tools. Their agents can autonomously build their own integrations, as well as write the code needed to finish a task. Sarah Guo sits down with Notion Co-Founder Simon Last to explore Notion’s rapid evolution from a simple writing ass ... Show More
29m 2s
Feb 26
How Capital is Powering the AI Infrastructure Buildout with Magnetar Capital Managing Director Neil Tiwari
By the end of 2026, AI capital expenditure is projected to hit nearly $700 billion. The question isn’t who has the best model, but who has the most creative financing to build out AI infrastructure and beyond. Sarah Guo is joined by Neil Tiwari, Managing Director at Magnetar Capi ... Show More
36m 4s
Recommended Episodes
May 2024
AI Is a Cybersecurity Tool and Threat
tail spinning
26m 19s
May 2019
Supply chain hacking campaign looks like espionage. Airstrikes versus hackers. FTC versus Facebook. Notes from the Global Cyber Innovation Summit. What’s up with MegaCortex.
Tracking a group that’s after the software supply chain. Israel adds airstrikes to the array of responses it’s prepared to make to hackers. The US Federal Trade Commission still doesn’t know how you solve a problem like Mark. Some more notes from last week’s Global Cyber Innovati ... Show More
22m 33s
Sep 2023
Malicious ads in a chatbot. A vulnerability gets some clarification. Cl0p switches from Tor to torrents. Influence operations as an adjunct to WMD. And NSA’s new AI Security Center.
Malicious ads in a chatbot. Google provides clarification on a recent vulnerability. Cl0p switches from Tor to torrents. Influence operations as an adjunct to weapons of mass destruction. Our guest Jeffrey Wells, former Maryland cyber czar and partner at Sigma7 shares his thought ... Show More
26m 46s
Sep 2023
Agent Tesla still hits unpatched systems. Hot wallet hacks. AI and DevSecOps. Notes on Fancy Bear and NoName057(16). And some curious trends in the cyber labor market.
There’s a new Agent Tesla variant. Lost credentials and crypto wallet hacks. Tension between DevSecOps and AI. Fancy Bear makes an attempt on Ukrainian energy infrastructure. A look at NoName057(16). Tim Starks from the Washington Post's Cybersecurity 202. Simone Petrella and Hel ... Show More
31m 23s
Sep 2019
Preventing Cyber Attacks with John Davis, Federal Chief Security Officer of Palo Alto Networks
From Senior Military Cyber Advisor at the Pentagon to VP and Federal Chief Security Officer at Palo Alto Networks, John Davis is an experienced cyber security professional focused on educating the public on cyber threats and preventing the next national and international cyber at ... Show More
52m 50s
Nov 2021
1798: Dr. Chase Cunningham, CSO of Ericom Software
<p>Dr. Chase Cunningham, CSO of Ericom Software released a techno-thriller book during Cyber Awareness Month titled "C:\>_gAbrIel." This book draws on Chase's real-world experience as a technologist and how cyber warfare, cybersecurity, and artificial intelligence (AI) can be lev ... Show More
16m 18s
Oct 2017
Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups.
In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observ ... Show More
16m 45s