المحتوى المقدم من Secure Talk and Justin Beals. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Secure Talk and Justin Beals أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
Artificial intelligence is evolving at an unprecedented pace—what does that mean for the future of technology, venture capital, business, and even our understanding of ourselves? Award-winning journalist and writer Anil Ananthaswamy joins us for our latest episode to discuss his latest book Why Machines Learn: The Elegant Math Behind Modern AI . Anil helps us explore the journey and many breakthroughs that have propelled machine learning from simple perceptrons to the sophisticated algorithms shaping today’s AI revolution, powering GPT and other models. The discussion aims to demystify some of the underlying mathematical concepts that power modern machine learning, to help everyone grasp this technology impacting our lives–even if your last math class was in high school. Anil walks us through the power of scaling laws, the shift from training to inference optimization, and the debate among AI’s pioneers about the road to AGI—should we be concerned, or are we still missing key pieces of the puzzle? The conversation also delves into AI’s philosophical implications—could understanding how machines learn help us better understand ourselves? And what challenges remain before AI systems can truly operate with agency? If you enjoy this episode, please subscribe and leave us a review on your favorite podcast platform. Sign up for our newsletter at techsurgepodcast.com for exclusive insights and updates on upcoming TechSurge Live Summits. Links: Read Why Machines Learn, Anil’s latest book on the math behind AI https://www.amazon.com/Why-Machines-Learn-Elegant-Behind/dp/0593185749 Learn more about Anil Ananthaswamy’s work and writing https://anilananthaswamy.com/ Watch Anil Ananthaswamy’s TED Talk on AI and intelligence https://www.ted.com/speakers/anil_ananthaswamy Discover the MIT Knight Science Journalism Fellowship that shaped Anil’s AI research https://ksj.mit.edu/ Understand the Perceptron, the foundation of neural networks https://en.wikipedia.org/wiki/Perceptron Read about the Perceptron Convergence Theorem and its significance https://www.nature.com/articles/323533a0…
المحتوى المقدم من Secure Talk and Justin Beals. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Secure Talk and Justin Beals أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Cory O'Daniel is the CEO and Co-Founder of Massdriver a company that provides self-service capabilities for deploying cloud infrastructure in an optimal manner for both cost and governance. Cory talks a bit about Massdriver's service and explains the challenges of traditional dev ops, and how dev ops is evolving. He also talks about what founders should look for when selecting a funding partner. Massdriver https://www.massdriver.cloud/ The Secure Talk Podcast https://securetalkpodcast.com/
المحتوى المقدم من Secure Talk and Justin Beals. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Secure Talk and Justin Beals أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Cory O'Daniel is the CEO and Co-Founder of Massdriver a company that provides self-service capabilities for deploying cloud infrastructure in an optimal manner for both cost and governance. Cory talks a bit about Massdriver's service and explains the challenges of traditional dev ops, and how dev ops is evolving. He also talks about what founders should look for when selecting a funding partner. Massdriver https://www.massdriver.cloud/ The Secure Talk Podcast https://securetalkpodcast.com/
If you've ever found yourself frustrated watching deadlines slip by as your development team waits on yet another security review, you're not alone. In today's competitive landscape, companies are caught in a difficult balancing act: move quickly to deliver the features customers want or slow down to ensure those features don't introduce vulnerabilities that could lead to the next headline-making breach. Security reviews have become the speed bump on the road to innovation that everyone acknowledges is necessary, but few have figured out how to navigate efficiently. Development teams push for velocity while security teams pull the emergency brake, creating tension that reverberates throughout organizations. Today, we're joined by Dimitri Shvartsman, co-founder of Prime Security and prior Head of Cybersecurity at PayPal, to discuss how enterprise organizations are innovating security solutions to reduce the time to feature delivery. We'll explore how AI tools can actually enable rather than impede innovation and examine practical approaches to integrating AI security tools earlier in the development lifecycle. Whether you're a CISO trying to balance security with business needs, a developer tired of security roadblocks, or a product leader navigating these competing priorities, this conversation will give you actionable insights to transform security from a bottleneck into a business enabler.…
In this episode of SecureTalk, Justin Beals welcomes Daniel Oberhaus, the author of Silicon Shrink, to discuss the revolutionary and controversial integration of artificial intelligence (AI) in mental health care. Daniel demystifies the central theme of his book, explaining the concept of Silicon Shrink and exploring how AI tools are increasingly being used to diagnose and treat mental health conditions. He highlights the alarming implications of leveraging AI in psychiatry, the historical intersection of these two fields, and the potential pitfalls and ethical challenges this marriage presents. He also delves into the technical, policy, and philosophical dimensions of using AI in psychiatry, bringing attention to various case studies and real-world applications such as emotion-recognition technology and AI-driven triage systems like those used by the Crisis Text Line. Daniel's insights present a compelling narrative, urging a cautious yet hopeful approach to adopting AI technologies in areas as sensitive as mental health, underscoring the need for transparency, privacy, and ethical considerations. Book: Oberhaus, Daniel. The Silicon Shrink: How Artificial Intelligence Made the World an Asylum. MIT Press, 2025. (Link)…
Terence Bennet watched from the deck of the USS Paul Hamilton as the Arab Spring unfolded. As a naval officer, he realized that his battlefield awareness was limited by good intelligence. Intelligence drove good decision-making. And in an area of conflict, good decision-making is the difference between mission success and failure. In this episode of Secure Talk, host Justin Beals talks with Terence Bennett, a former Naval Intelligence Officer and now the CEO of DreamFactory. They discuss Terence's intriguing path from an early interest in the military to a successful career in cybersecurity. He recounts his origin story, which is grounded in a lifelong dedication to service, racing sailboats at the naval academy, his experiences aboard the USS Paul Hamilton, and pivotal roles in intelligence during major geopolitical events such as the Arab Spring and the Bin Laden raid. The conversation covers topics including red teaming, the impact of digital transformation on intelligence, and the necessity of security by design in today’s fast-changing digital environment. Especially of interest is Terence’s new work on cybersecurity by marrying AI developed API’s with effective network segmentation. This episode serves as a valuable resource for cybersecurity professionals, providing a distinct viewpoint on the blend of military experience and cyber defense strategies.…
In our latest SecureTalk episode, Justin Beals gathers Micah Spieler, Chief Product Officer, and Josh Bullers, Head of AI, to explore the multifaceted world of AI and cybersecurity. With the recent release of DeepSeek-r1, the AI marketplace has been thrown into turmoil. It has rocked the hubris of Silicon Valley and questioned the validity and valuations of organizations like OpenAI. What does DeepSeek mean to the AI landscape, and how does it fit into the fundamentals of machine learning and the future of information systems? Our discussion delves deeply into the synergy of AI advancements and the pressing need for robust security measures. Micah and Josh share their journey in striking the delicate balance between innovation and safety, offering invaluable insights for anyone in the tech and cybersecurity field. As AI continues to revolutionise industries, cybersecurity experts must adapt and evolve. Tune in as we examine the potential and challenges presented by cutting-edge AI models. This episode is essential listening for those striving to stay ahead in the ever-evolving landscape of AI-driven cybersecurity. Join us and be part of the conversation shaping the future of technology!…
In this episode of Secure Talk, host Justin Beals welcomes Kate O'Neill, a passionate tech humanist dedicated to crafting technology solutions that genuinely prioritize people. Together, they explore the key themes of Kate's books, “Tech Humanist” and 'What Matters Next: A Leader's Guide to Making Human-Friendly Tech Decisions in a World That's Moving Too Fast.' Their engaging discussion shines a light on the power of systems thinking, the significance of thoughtful decision-making in the tech industry, and the vital balance between achieving business objectives and enhancing the human experience. This episode is a delightful must-listen for cybersecurity professionals who are excited to navigate the important intersection of technology, ethics, and human dignity in our ever-evolving digital world. Books: O'Neill, Kate. What Matters Next: A Leader's Guide to Making Human-Friendly Decisions In a World That's Moving Too Fast (2025) Tech Humanist: How You Can Make Technology Better for Business and Better for Humans (2018)…
In this episode of SecureTalk, host Justin Beals warmly welcomes Panos Louridas for an insightful discussion on the history, evolution, and future of cryptography. Panos has deep expertise and authored a book called " Cryptography" that helps explain the history of keeping secrets, important innovations in the field and the mathematical functions of effective encryption. They delve into Panos's early interest in computing, starting with a ZX Spectrum and his recent book on cryptography, which aims to make complex algorithms accessible to those with a high school level of mathematics. The conversation traverses the critical role of cryptography in our digital lives, the potential impacts of quantum computing, and the practical aspects of key management in modern web applications. Panos also shares captivating stories from the history of the Enigma machine and discusses the ongoing arms race in cryptography. Perfect for cybersecurity experts, this episode offers a rich blend of historical anecdotes, technical insights, and future-looking perspectives. Book: Louridas, Panos. (2024) Cryptography. MIT Press. 00:00 Welcome to SecureTalk 00:28 The Importance of Cryptography 02:21 Introducing Panos Louridas 03:41 Panos Louridas' Journey into Computing 06:11 The Evolution of Cryptography 12:13 The Enigma Machine and Its Legacy 19:03 Security by Obscurity: A Fallacy 22:32 Speculations on NSA Backdoors 23:21 Government Contributions to Cryptography 24:51 Evolution and Security of AES 27:10 Challenges in Generating Randomness 28:15 Quantum Computing and Cryptography 33:45 Key Management in Modern Web Applications 36:53 TLS and AES: Understanding Their Relationship 39:01 The Human Factor in Cryptography 40:38 Making Cryptography Accessible 42:58 Conclusion and Final Thoughts…
In 2000 the internet was expanding at an astronomical rate. Consumers were logging in via dial-up modems by the hundreds of millions and businesses were racing to maximize their footprint in the digital world. A hacker named Onel de Guzman living in the Philippines had been playing with a script called “I Love You”. Distributed via email, it could assume secret control of an individual's computer from a centralized control. The “I Love You” virus spread to over 50 million computers, creating the world's largest botnet. Michael Tiffany and his co-founders were aware of these types of cyber attacks and wanted to ensure the Internet worked for businesses wanting to connect with consumers. They founded Human Security, one of the first companies to combat botnet activity for major brands and today a very powerful cybersecurity company for major corporations. In this episode of Secure Talk, host Justin Beals interviews Michael Tiffany, co-founder of Human Security and the current leader of Fulcra Dynamics. Michael shares his early experiences with computers and his journey into cybersecurity, discussing topics the founding of Human Security as a solution for botnets, ad fraud, and early “Know Your Customer” challenges. He explains his current company, Fulcra's mission to empower individuals by unifying their personal data and promoting privacy and control in the age of AI. Listen as Michael reflects on the ethical responsibilities in technology and shares his vision for a future where individuals have sovereignty over their data. 00:00 Introduction to SecureTalk 00:32 Host's Journey into Computer Science 01:39 Introducing Michael Tiffany 03:12 Michael Tiffany's Early Experiences 15:26 The Birth of Human Security 20:56 Challenges and Innovations in Cybersecurity 27:11 Fulcra Dynamics: Empowering Personal Data 37:22 Vision for the Future of AI and Data Sovereignty 43:59 Conclusion and Final Thoughts…
Without the ability to keep secrets, our internet would fail. Without effective cryptography the internet would never have graduated from the hobbyist interest. And we have great examples of networks without effective encryption like the worldwide HAM radio operators. I’ve been utilizing cryptography in the development of web applications since my first professional web application development work. Although I’ve rarely understood the underlying technology and mathematics of cryptography. In this episode of SecureTalk, our guest is Dr. Bill Anderson, an expert in cryptography. Bill shares his journey into the field, starting as a student in electrical and computer engineering. He inadvertently ventured into cryptography during his postgraduate studies. He discusses the evolution of cryptography, its historical context, and the impact of quantum computing on current cryptographic methods. We explore various topics, including public key cryptography, digital signatures, and the ongoing need for crypto agility. Bill also provides insights into his current role as Principal Product Lead at Mattermost, a secure collaboration platform focused on data sovereignty and security. This episode offers a comprehensive look at modern cryptographic techniques and the challenges posed by future advancements in computing, making it a must-listen for anyone interested in cybersecurity and cryptography. 00:00 Welcome to SecureTalk: Introduction and Host Introduction 00:33 The Role of Security in Business Growth 01:55 Introducing Dr. Bill Anderson: A Security Expert 03:57 Dr. Anderson's Journey into Cryptography 05:35 The Evolution of Security and Cryptography 08:11 Understanding Business and Technology Landscapes 13:56 Mattermost: A Secure Collaboration Platform 22:01 The History and Methods of Cryptography 25:01 Understanding Public and Private Keys 25:58 Digital Signatures and Authentication 27:12 The Open Research Model in Cryptography 28:31 Challenges in Cryptographic Security 31:02 Quantum Computing and Cryptography 35:38 The Future of Cryptographic Systems 42:04 NIST's Role in Quantum-Safe Cryptography 49:41 Conclusion and Final Thoughts…
Eldon Spickerhoff founded eSentire in 2001. He had been a Senior Information Security Engineer for ING Prime after completing his academic work at Waterloo University. At the time the cybersecurity solutions marketplace was primarily a services offering, focusing on vulnerability scanning. The team at eSentire realized that the tools deployed in vulnerability scanning to internal systems could be left running post a services engagement. And in the process they invented an ‘always on’ threat intelligence solution. In 2022 eSentire added storied private equity firm Warburg-Pincus to their cap table and achieved unicorn status with a valuation of one billion dollars. In this engaging episode of SecureTalk, host Justin Beals invites Eldon Sprickerhoff, a seasoned cybersecurity expert and founder of eSentire, to share his journey. Eldon graduated with a computer science degree from Waterloo University in 1991 and went on to establish a leading managed security services provider. During the conversation, Eldon reflects on his early career concerns and the macroeconomic challenges he faced during a recession. He also shares insights from his book, *Committed*, which explores the realities of startup life. The discussion highlights essential strategies for navigating the cybersecurity marketplace, the importance of founder-led sales, and the significant challenges and opportunities within the cybersecurity field. Tune in to gain valuable perspectives on entrepreneurship, real-time vulnerability scans, and the impact of AI and quantum computing on cybersecurity. Link to the Book: Commited: Startup Survival Tips and Uncommon Sense for First-Time Tech Founders https://sutherlandhousebooks.com/product/committed/…
In this episode of Secure Talk, Justin welcomes Stephen Ferrell, a cybersecurity expert and Chief Strategy Officer of Strike Graph, to discuss the significant changes in the compliance landscape brought about by the Cybersecurity Maturity Model Certification (CMMC). They explore the recent finalization of the CMMC rule, its implications for the defense industrial base, and the phased compliance requirements for various certification levels. The conversation emphasizes the necessity of CMMC for federal contractors, including those in non-traditional sectors like medical equipment manufacturing, along with the associated costs and procedures. Stephen also shares insights from his experience conducting a self-assessment for CMMC compliance, offering practical advice for organizations aiming to achieve certification. This episode is essential for cybersecurity professionals who want to understand the latest federal compliance standards and prepare their organizations accordingly.…
Privacy laws in our modern computing era have been around for well over twenty years. The conversation around appropriate privacy measures and effective governance of data has matured quite nicely since the early days of the Internet. While breaches do continue to happen, laws like GDPR, HIPAA and CCPA have helped set expectations for ethical and effective privacy practices. But we are in the midst of a massive proliferation of generative AI models. Since the technology is so nascent our expectations of privacy are being reshaped. An AI model is fundamentally a mathematical representation of a large data set. Its probabilistic function will create information depending on the prompts it can be given. Deep in the model the data used to ‘train’ it still leaves a fingerprint of the source information. What are the expectations for privacy, copyright and safety to those of us that have shared information on the internet? In this episode of Secure Talk, host Justin Beals engages in a comprehensive discussion with Dan Clarke, about the significant impact of AI. The conversation begins with Dan’s early days in computing and follows his journey into developing AI governance. They explore the transformative effects of AI in comparison to historical technological innovations, as well as the risks and biases that are inherent in AI systems. Additionally, they discuss current and future legal compliance issues. Dan shares personal anecdotes related to privacy challenges and the applicability of AI, emphasizing the importance of transparency, thorough risk assessment, and bias testing in AI implementations. This episode provides valuable insights for anyone interested in the ethical and responsible use of AI technology in today's applications. 00:00 Welcome to SecureTalk: Exploring Information Security 00:32 The Evolving Landscape of Privacy and AI 01:47 Introducing Dan Clark: AI Privacy Leader 03:10 Dan Clark's Journey: From Intel to Privacy Advocacy 04:14 The Impact of AI: Paradigm Shifts and Privacy Concerns 06:08 Personal Data and Privacy: A Real-Life Story 08:45 The Importance of Data Control and Fairness 13:10 AI Governance and Legal Responsibilities 21:02 Current Laws Impacting AI and Privacy 26:47 Legal Basis for Data Usage 27:01 Introduction to Truio and InnerEdge 27:29 The Birth of Truio: Addressing GDPR 28:39 AI Governance and Federal Privacy Law 30:48 Transparent AI Practices 31:58 Understanding AI Risks and Transparency 36:52 AI Use Cases and Risk Assessment 44:57 Bias Testing and AI Governance 50:39 Concluding Thoughts on AI and Governance Link: https://get.truyo.com/ai-governance-training…
In this episode of Secure Talk, host Justin Beals, CEO and founder of Strike Graph, discusses cybersecurity awareness training with Craig Taylor, CEO and co-founder of CyberHoot. They explore the evolution and significance of security training, particularly in light of the rising number of phishing attacks. Taylor shares insights from his extensive background, including being a senior risk analyst for Computer Sciences Corporation in the development of one of the first cloud hosting platforms. He also shares his experience as a virtual Chief Information Security Officer (vCISO) and the growth and success of CyberHoot. The conversation highlights CyberHoot's innovative use of positive reinforcement methods in their approach to automated training and examines the role of artificial intelligence (AI) in both creating and combating cybersecurity threats. They also discuss the future of AI in security training and provide practical steps that companies can take to enhance their cyber resilience. 00:00 Introduction to SecureTalk 00:34 The Importance of Security Awareness Training 03:18 Craig Taylor's Journey into Cybersecurity 05:25 The Evolution of Technology and AI 15:30 The Role of Virtual CISOs 21:48 Building CyberHoot: From Services to Product 25:17 The Ineffectiveness of Shock Collars and Negative Reinforcement 26:21 The Power of Positive Reinforcement in Training 27:21 Challenges with Fake Email Phishing 27:51 Cyberhoots' Approach to Phishing Simulations 28:50 Gamification and Positive Outcomes 30:26 The Anxiety Around Cybersecurity Training 31:39 The Problem with Traditional Phishing Tests 33:13 Emerging Best Practices in Cybersecurity 38:53 The Role of AI in Phishing and Cybersecurity 45:16 Future Perspectives and Rapid Content Creation 48:46 Conclusion and Final Thoughts…
In this episode of Secure Talk we discuss the evolution of identity management with Eric Olden, co-founder and CEO of Strata Identity. Identity Management is at the heart of secure computing practices. And the requirements placed on it are ever-growing. Get it wrong, and you will expose the ‘crown jewels’ of your business. Today, many solutions rely on cloud-based Identity Management solutions for further security. How was Identity Management born, and where is it heading? We discuss the early days of networked computing. How Eric recognized in 1995, while at Berkley, the opportunity of the Internet to break out of academic communities and become a space for business. In a moment of inspiration, he realized that the missing feature was security. To be successful a ‘web powered’ business needed to manage its users and their identities. Eric founded Securant Technologies in 1995 and developed some of the first Web Access Management products. Securant Technologies was acquired by RSA in 2001. Eric continued to stay at the forefront of Identity Management by working on SAML, the gold standard of shared authentication. Today, Eric is developing Strata and exploring how enterprise organizations are harmonizing multiple Identity Providers from Okta to Microsoft. Tune in to learn about the critical advancements shaping the trusted identity landscape from a leading expert and present innovator. 00:00 Introduction to SecureTalk 01:51 Challenges in Identity Management 03:16 Introduction to Eric Olden 04:33 Eric Olden's Early Experiences with Computing 08:39 The Birth of Identity Management Solutions 17:11 The Origin of SAML 23:13 Reflections on SAML Evolution 23:56 Introduction to OAuth and Identity Standards 26:22 The Vision Behind Strata 30:15 Challenges in Identity Management 33:12 Exploring Self-Hosted Identity Solutions 40:07 The Importance of Authentication and Authorization 46:39 Concluding Thoughts on Identity Standards…
Cybersecurity is complicated; weird acronyms, massive risks and arcane skills. How do we teach or learn about cybersecurity in human ways? In this episode of SecureTalk, host Justin Beals is joined by cybersecurity researcher Luca Viganò to discuss his innovative approach to demystifying cybersecurity concepts using fairy tales. Luca shares his passion for making cybersecurity accessible to both experts and the general public by employing storytelling techniques. Key topics include multifactor authentication, explained through 'Cinderella' and password security inspired by 'Alibaba and the 40 Thieves.' Luca's insights are based on his acclaimed article 'Cyber Security of Fairy Tales.' This episode provides a fresh perspective on engaging non-expert stakeholders and underlines the importance of a social-technical approach to cybersecurity. 00:00 Introduction to SecureTalk 00:34 Host's Background and Passion for Storytelling 03:07 Introducing Luca Vigano 04:49 Luca's Journey in Cybersecurity 06:47 The Power of Storytelling in Teaching Security 08:10 Fairy Tales and Cybersecurity 18:43 Cinderella and Multi-Factor Authentication 34:06 Alibaba and the 40 Thieves: Lessons in Security 40:30 Show vs. Tell in Security Education 44:39 Future Work and Conclusion Article: Luca Viganò, The cybersecurity of fairy tales, Journal of Cybersecurity , Volume 10, Issue 1, 2024, tyae005, https://doi.org/10.1093/cybsec/tyae005…
In this episode of SecureTalk, host Justin Beals speaks with Idan Plotnik, co-founder and CEO of Apiiro, about the complexities of application security and innovation. They discuss Idan's career, which began with his early interest in secure computing as an engineer for the Israeli Defence Force. Later, while at Microsoft, Idan was frustrated by the inefficiencies in current application security reviews that slowed down software delivery. Idan explains opportunities to improve the application security posture throughout the software development lifecycle, emphasizing their methods for deep code analysis and extended Software Bill of Materials (SBOMs). The conversation also covers the role of AI in security, the significance of automation, and the integration of graph data models for effectively visualizing and managing security threats. 00:00 Welcome to SecureTalk 00:32 Introduction to Application Security 01:44 Meet Idan Plotnik 02:52 Idan’s Journey in Cybersecurity 04:31 Early Encounters with Computers and Security 08:44 Military Service and Professional Growth 12:19 Founding Apiiro and Innovations in Security 14:06 Challenges in Modern Software Development 15:33 Comprehensive Security Measures 19:47 Understanding the Risk Landscape 24:35 Understanding Risk in Software Architecture 25:30 The Role of AI in Software Security 26:29 Translating Code into Components 27:50 The Importance of Software Inventory 31:47 The Limitations of SBOMs 40:02 Automation in Security Design 46:00 The Power of Graph Data Models 48:35 Conclusion and Final Thoughts…
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.