Artwork

Innhold levert av Data Driven. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Data Driven eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Player FM - Podcast-app
Gå frakoblet med Player FM -appen!

Kevin Latchford on the Security Risks of Large Language Models

38:34
 
Del
 

Manage episode 430590897 series 3320043
Innhold levert av Data Driven. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Data Driven eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

In this episode, we explore real-world cases that showcase the susceptibility of AI chatbots to manipulation, as illustrated by a shocking incident where an AI was manipulated to sell a Chevy truck for just $1. Kevin Latchford sheds light on the dual-use knowledge risks and the potential for unauthorized leaks and malicious backdoors within AI plugins.

Frank and Kevin dive into the implications of quick technological adoption, drawing parallels to the early web era. We discuss the impact of network setups, access controls, data supply chain integrity, and the ongoing investigations into the security implications of these burgeoning technologies. This episode is packed with expert insights and practical advice on navigating the complex world of AI security.

Show Notes

05:04 Public space tech meant to have safeguards.

09:39 Security issue in enterprise AI adoption concern.

12:53 Understanding security implications is crucial for mitigation.

16:40 Chatbot manipulated to sell Chevy truck for $1.

17:57 Found something during cybersecurity exercise, not sharing.

21:11 Uncertainty about security in remote interfacing.

24:00 Utilize specialized LLM to analyze prompts precisely.

29:15 Understanding cybersecurity first is key to AI.

32:32 Implement outbound stateful connection to prevent automatic calls.

34:31 IT field is interesting with its vulnerabilities.

37:15 Data-driven podcast highlights AI security vulnerabilities. Stay vigilant.

About the Speaker

Kevin Latchford is an esteemed expert in the cybersecurity realm, renowned for his comprehensive understanding and proficiency in both offensive and defensive strategies. Drawing from concepts rooted in military practice, Kevin adeptly navigates the intricate dynamics of red teaming and blue teaming. As an advocate for offensive cybersecurity, red teaming, also known as opposing force operations, he challenges the vulnerabilities within systems to enhance their integrity. Conversely, his expertise in blue teaming, the defensive counterpart, focuses on shielding and fortifying friendlies. Through his dedicated efforts, Kevin ensures the confidentiality, integrity, and accessibility of computer networks and systems, whether they are natively hosted or web-based, culminating in fortified cyber defenses and resilient information security.

Mentioned in this episode:

WITI BOGO Deal!

Special Offer: WITI is offering an incredible Buy One, Get One sale on memberships until Labor Day in the US. This is a perfect chance to access valuable networking opportunities, cutting-edge resources, and career advancement perks. Exclusive Discount Code: Use the coupon code DATADRIVEN at checkout to take advantage of this special offer. Whether you’re aiming to elevate your career or support a fellow tech enthusiast, now is the perfect time to join WITI. Visit WITI.com to grab your BOGO membership before it’s too late!

  continue reading

300 episoder

Artwork
iconDel
 
Manage episode 430590897 series 3320043
Innhold levert av Data Driven. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av Data Driven eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

In this episode, we explore real-world cases that showcase the susceptibility of AI chatbots to manipulation, as illustrated by a shocking incident where an AI was manipulated to sell a Chevy truck for just $1. Kevin Latchford sheds light on the dual-use knowledge risks and the potential for unauthorized leaks and malicious backdoors within AI plugins.

Frank and Kevin dive into the implications of quick technological adoption, drawing parallels to the early web era. We discuss the impact of network setups, access controls, data supply chain integrity, and the ongoing investigations into the security implications of these burgeoning technologies. This episode is packed with expert insights and practical advice on navigating the complex world of AI security.

Show Notes

05:04 Public space tech meant to have safeguards.

09:39 Security issue in enterprise AI adoption concern.

12:53 Understanding security implications is crucial for mitigation.

16:40 Chatbot manipulated to sell Chevy truck for $1.

17:57 Found something during cybersecurity exercise, not sharing.

21:11 Uncertainty about security in remote interfacing.

24:00 Utilize specialized LLM to analyze prompts precisely.

29:15 Understanding cybersecurity first is key to AI.

32:32 Implement outbound stateful connection to prevent automatic calls.

34:31 IT field is interesting with its vulnerabilities.

37:15 Data-driven podcast highlights AI security vulnerabilities. Stay vigilant.

About the Speaker

Kevin Latchford is an esteemed expert in the cybersecurity realm, renowned for his comprehensive understanding and proficiency in both offensive and defensive strategies. Drawing from concepts rooted in military practice, Kevin adeptly navigates the intricate dynamics of red teaming and blue teaming. As an advocate for offensive cybersecurity, red teaming, also known as opposing force operations, he challenges the vulnerabilities within systems to enhance their integrity. Conversely, his expertise in blue teaming, the defensive counterpart, focuses on shielding and fortifying friendlies. Through his dedicated efforts, Kevin ensures the confidentiality, integrity, and accessibility of computer networks and systems, whether they are natively hosted or web-based, culminating in fortified cyber defenses and resilient information security.

Mentioned in this episode:

WITI BOGO Deal!

Special Offer: WITI is offering an incredible Buy One, Get One sale on memberships until Labor Day in the US. This is a perfect chance to access valuable networking opportunities, cutting-edge resources, and career advancement perks. Exclusive Discount Code: Use the coupon code DATADRIVEN at checkout to take advantage of this special offer. Whether you’re aiming to elevate your career or support a fellow tech enthusiast, now is the perfect time to join WITI. Visit WITI.com to grab your BOGO membership before it’s too late!

  continue reading

300 episoder

Alle episoder

×
 
Loading …

Velkommen til Player FM!

Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.

 

Hurtigreferanseguide

Copyright 2024 | Sitemap | Personvern | Vilkår for bruk | | opphavsrett