<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/cybersentries" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Cyber Sentries: AI Insight to Cloud Security</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/cybersentries</itunes:new-feed-url>
    <description>Cyber Sentries explores the critical convergence of AI, cloud, and cybersecurity, diving deep into how these three pillars are actively redefining the modern Security Operations Center (SOC). As the threat landscape grows in complexity, we showcase the accelerating role of AI in defending cloud infrastructure, applications, and data. Join us as we illuminate this high-stakes intersection—a space where cutting-edge innovation meets the necessity for continuous vigilance—to transform how organizations approach resilience in a digital-first world.</description>
    <copyright>© TruStory FM</copyright>
    <podcast:guid>ef54baa6-9e0c-5d98-a109-302d5d9bada0</podcast:guid>
    <podcast:locked>yes</podcast:locked>
    <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
    <podcast:trailer pubdate="Fri, 01 Dec 2023 02:00:00 -0800" url="https://op3.dev/e/media.transistor.fm/9939c124/eac8dd32.mp3" length="1031618" type="audio/mpeg" season="1">Welcome to Cyber Sentries</podcast:trailer>
    <language>en</language>
    <pubDate>Wed, 01 Apr 2026 03:00:05 -0700</pubDate>
    <lastBuildDate>Wed, 01 Apr 2026 03:01:47 -0700</lastBuildDate>
    <link>https://www.cyberproof.com/</link>
    <image>
      <url>https://img.transistorcdn.com/EQc4sadZy2TGSnARRhoYh-HUZXegaJErESxmoKMfikk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lZDg5/MzE1MjJkODgxYmJh/MzE2ZDA1ZjI5YmNj/YTM3OC5qcGc.jpg</url>
      <title>Cyber Sentries: AI Insight to Cloud Security</title>
      <link>https://www.cyberproof.com/</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>TruStory FM</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/EQc4sadZy2TGSnARRhoYh-HUZXegaJErESxmoKMfikk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lZDg5/MzE1MjJkODgxYmJh/MzE2ZDA1ZjI5YmNj/YTM3OC5qcGc.jpg"/>
    <itunes:summary>Cyber Sentries explores the critical convergence of AI, cloud, and cybersecurity, diving deep into how these three pillars are actively redefining the modern Security Operations Center (SOC). As the threat landscape grows in complexity, we showcase the accelerating role of AI in defending cloud infrastructure, applications, and data. Join us as we illuminate this high-stakes intersection—a space where cutting-edge innovation meets the necessity for continuous vigilance—to transform how organizations approach resilience in a digital-first world.</itunes:summary>
    <itunes:subtitle>Cyber Sentries explores the critical convergence of AI, cloud, and cybersecurity, diving deep into how these three pillars are actively redefining the modern Security Operations Center (SOC).</itunes:subtitle>
    <itunes:keywords>Cloud Security, AI</itunes:keywords>
    <itunes:owner>
      <itunes:name>TruStory FM</itunes:name>
      <itunes:email>shows@trustory.fm</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Five Seconds to Fraud: Detecting AI Deepfakes Before They Strike with Ben Colman</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Five Seconds to Fraud: Detecting AI Deepfakes Before They Strike with Ben Colman</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d5b6b23e-b309-46a0-aede-224fc1ad5512</guid>
      <link>https://share.transistor.fm/s/66970b49</link>
      <description>
        <![CDATA[<p><strong>Inside the AI Deepfake Threat</strong></p><p>What if the voice confirming your wire transfer wasn't actually your client? Ben Colman, founder and CEO of Reality Defender, joins host John Richards to unpack one of the fastest-growing attack surfaces in cybersecurity: AI-generated deepfakes. Once the exclusive domain of Hollywood studios and nation-state actors, real-time voice and video impersonation is now accessible to anyone with a laptop—and fraudsters are scaling up fast.</p><p><strong>From Specialized Hardware to Your Home Computer</strong></p><p>Ben traces the evolution from the specialized machinery required six years ago to today's world where anyone can clone a voice with less than five seconds of audio—locally, for free, using open-source models. He walks through the modern fraud landscape, from grandparent scams and bank account takeovers to an eye-opening story about fake job applicants that will make any recruiting team rethink its screening process.</p><p>Reality Defender's approach is built for how organizations actually work—plugging directly into call centers, video conferencing platforms, and identity verification tools through a simple API, rather than asking teams to adopt yet another standalone product. Their probabilistic detection models scan in real time across thousands of indicators, all without storing or comparing against any biometric data.</p><p>John and Ben also get into the emerging frontier of <em>agentic AI</em>—what happens when you need to authenticate an AI voice agent rather than a human—and how smart permission gates can define exactly what those agents are and aren't allowed to do.</p><p><strong>Questions We Answer in This Episode</strong></p><ul><li>How has the barrier to creating convincing deepfakes changed in the last six years?</li><li>What are the most common deepfake fraud vectors hitting businesses and consumers right now?</li><li>How does Reality Defender detect AI-generated media without storing any biometric data?</li><li>What does deepfake defense look like as agentic AI becomes mainstream?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>Voice cloning now requires less than five seconds of audio and runs locally on consumer hardware</li><li>Deepfake fraud spans a wide range—from grandparent scams to fake job applicants to wire transfer hijacking</li><li>Real-time detection can plug directly into tools organizations already use, with no new workflow required</li><li>Agentic AI is creating a new category of identity challenge—and the defenses are already being built</li></ul><p>The deepfake threat isn't coming—it's already here, hitting call centers, recruiting pipelines, and financial institutions every day. Whether you're a developer looking to integrate detection into your stack or a security leader trying to get ahead of the next wave, this conversation is a essential listen.</p><p><strong>Resources</strong></p><ul><li><a href="https://www.realitydefender.com/">Reality Defender</a></li><li><a href="https://www.realitydefender.com/team/ben-colman">Ben Colman</a></li><li><a href="https://www.linkedin.com/company/reality-defender/">Reality Defender on LinkedIn</a></li><li><a href="https://x.com/DetectDeepfakes">Follow Reality Defender on X</a></li><li><a href="https://www.cyberproof.com">CyberProof</a></li><li><a href="https://www.paladincloud.io">Learn more about Paladin Cloud</a></li><li><a href="https://share.hsforms.com/1HUPIst8wRIOGxAoY6OnkPQ2xcs8">Got a question? Ask us here!</a></li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:35) - Meet Ben Colman, Reality Defender</li>
<li>(01:23) - Ben’s Beginnings</li>
<li>(02:36) - Changing Landscape</li>
<li>(03:57) - What It Looks Like Today</li>
<li>(05:07) - Differences</li>
<li>(06:16) - Main Ways Fraud’s Committed</li>
<li>(09:21) - Way to Tackle It</li>
<li>(11:07) - Distinguishing the AI</li>
<li>(13:14) - Response Time</li>
<li>(14:09) - Recommended Next Steps</li>
<li>(15:55) - Where It’s Heading</li>
<li>(19:21) - How to Use as Organization</li>
<li>(20:52) - Developer Community</li>
<li>(22:23) - Audio and Video</li>
<li>(23:34) - Risk Assessment</li>
<li>(24:41) - Prevalence</li>
<li>(26:09) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Inside the AI Deepfake Threat</strong></p><p>What if the voice confirming your wire transfer wasn't actually your client? Ben Colman, founder and CEO of Reality Defender, joins host John Richards to unpack one of the fastest-growing attack surfaces in cybersecurity: AI-generated deepfakes. Once the exclusive domain of Hollywood studios and nation-state actors, real-time voice and video impersonation is now accessible to anyone with a laptop—and fraudsters are scaling up fast.</p><p><strong>From Specialized Hardware to Your Home Computer</strong></p><p>Ben traces the evolution from the specialized machinery required six years ago to today's world where anyone can clone a voice with less than five seconds of audio—locally, for free, using open-source models. He walks through the modern fraud landscape, from grandparent scams and bank account takeovers to an eye-opening story about fake job applicants that will make any recruiting team rethink its screening process.</p><p>Reality Defender's approach is built for how organizations actually work—plugging directly into call centers, video conferencing platforms, and identity verification tools through a simple API, rather than asking teams to adopt yet another standalone product. Their probabilistic detection models scan in real time across thousands of indicators, all without storing or comparing against any biometric data.</p><p>John and Ben also get into the emerging frontier of <em>agentic AI</em>—what happens when you need to authenticate an AI voice agent rather than a human—and how smart permission gates can define exactly what those agents are and aren't allowed to do.</p><p><strong>Questions We Answer in This Episode</strong></p><ul><li>How has the barrier to creating convincing deepfakes changed in the last six years?</li><li>What are the most common deepfake fraud vectors hitting businesses and consumers right now?</li><li>How does Reality Defender detect AI-generated media without storing any biometric data?</li><li>What does deepfake defense look like as agentic AI becomes mainstream?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>Voice cloning now requires less than five seconds of audio and runs locally on consumer hardware</li><li>Deepfake fraud spans a wide range—from grandparent scams to fake job applicants to wire transfer hijacking</li><li>Real-time detection can plug directly into tools organizations already use, with no new workflow required</li><li>Agentic AI is creating a new category of identity challenge—and the defenses are already being built</li></ul><p>The deepfake threat isn't coming—it's already here, hitting call centers, recruiting pipelines, and financial institutions every day. Whether you're a developer looking to integrate detection into your stack or a security leader trying to get ahead of the next wave, this conversation is a essential listen.</p><p><strong>Resources</strong></p><ul><li><a href="https://www.realitydefender.com/">Reality Defender</a></li><li><a href="https://www.realitydefender.com/team/ben-colman">Ben Colman</a></li><li><a href="https://www.linkedin.com/company/reality-defender/">Reality Defender on LinkedIn</a></li><li><a href="https://x.com/DetectDeepfakes">Follow Reality Defender on X</a></li><li><a href="https://www.cyberproof.com">CyberProof</a></li><li><a href="https://www.paladincloud.io">Learn more about Paladin Cloud</a></li><li><a href="https://share.hsforms.com/1HUPIst8wRIOGxAoY6OnkPQ2xcs8">Got a question? Ask us here!</a></li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:35) - Meet Ben Colman, Reality Defender</li>
<li>(01:23) - Ben’s Beginnings</li>
<li>(02:36) - Changing Landscape</li>
<li>(03:57) - What It Looks Like Today</li>
<li>(05:07) - Differences</li>
<li>(06:16) - Main Ways Fraud’s Committed</li>
<li>(09:21) - Way to Tackle It</li>
<li>(11:07) - Distinguishing the AI</li>
<li>(13:14) - Response Time</li>
<li>(14:09) - Recommended Next Steps</li>
<li>(15:55) - Where It’s Heading</li>
<li>(19:21) - How to Use as Organization</li>
<li>(20:52) - Developer Community</li>
<li>(22:23) - Audio and Video</li>
<li>(23:34) - Risk Assessment</li>
<li>(24:41) - Prevalence</li>
<li>(26:09) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 01 Apr 2026 03:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/66970b49/c4d9e314.mp3" length="28107587" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/iOhXUCnwzLBgPor9vHtslviIbxHHcPhzM1CtzQHLy0o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMzA0/MDgyZTQ1YWI3ZTk0/NmNkMzRmNGI0MGUw/MDllOC5qcGc.jpg"/>
      <itunes:duration>1736</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Inside the AI Deepfake Threat</strong></p><p>What if the voice confirming your wire transfer wasn't actually your client? Ben Colman, founder and CEO of Reality Defender, joins host John Richards to unpack one of the fastest-growing attack surfaces in cybersecurity: AI-generated deepfakes. Once the exclusive domain of Hollywood studios and nation-state actors, real-time voice and video impersonation is now accessible to anyone with a laptop—and fraudsters are scaling up fast.</p><p><strong>From Specialized Hardware to Your Home Computer</strong></p><p>Ben traces the evolution from the specialized machinery required six years ago to today's world where anyone can clone a voice with less than five seconds of audio—locally, for free, using open-source models. He walks through the modern fraud landscape, from grandparent scams and bank account takeovers to an eye-opening story about fake job applicants that will make any recruiting team rethink its screening process.</p><p>Reality Defender's approach is built for how organizations actually work—plugging directly into call centers, video conferencing platforms, and identity verification tools through a simple API, rather than asking teams to adopt yet another standalone product. Their probabilistic detection models scan in real time across thousands of indicators, all without storing or comparing against any biometric data.</p><p>John and Ben also get into the emerging frontier of <em>agentic AI</em>—what happens when you need to authenticate an AI voice agent rather than a human—and how smart permission gates can define exactly what those agents are and aren't allowed to do.</p><p><strong>Questions We Answer in This Episode</strong></p><ul><li>How has the barrier to creating convincing deepfakes changed in the last six years?</li><li>What are the most common deepfake fraud vectors hitting businesses and consumers right now?</li><li>How does Reality Defender detect AI-generated media without storing any biometric data?</li><li>What does deepfake defense look like as agentic AI becomes mainstream?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>Voice cloning now requires less than five seconds of audio and runs locally on consumer hardware</li><li>Deepfake fraud spans a wide range—from grandparent scams to fake job applicants to wire transfer hijacking</li><li>Real-time detection can plug directly into tools organizations already use, with no new workflow required</li><li>Agentic AI is creating a new category of identity challenge—and the defenses are already being built</li></ul><p>The deepfake threat isn't coming—it's already here, hitting call centers, recruiting pipelines, and financial institutions every day. Whether you're a developer looking to integrate detection into your stack or a security leader trying to get ahead of the next wave, this conversation is a essential listen.</p><p><strong>Resources</strong></p><ul><li><a href="https://www.realitydefender.com/">Reality Defender</a></li><li><a href="https://www.realitydefender.com/team/ben-colman">Ben Colman</a></li><li><a href="https://www.linkedin.com/company/reality-defender/">Reality Defender on LinkedIn</a></li><li><a href="https://x.com/DetectDeepfakes">Follow Reality Defender on X</a></li><li><a href="https://www.cyberproof.com">CyberProof</a></li><li><a href="https://www.paladincloud.io">Learn more about Paladin Cloud</a></li><li><a href="https://share.hsforms.com/1HUPIst8wRIOGxAoY6OnkPQ2xcs8">Got a question? Ask us here!</a></li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:35) - Meet Ben Colman, Reality Defender</li>
<li>(01:23) - Ben’s Beginnings</li>
<li>(02:36) - Changing Landscape</li>
<li>(03:57) - What It Looks Like Today</li>
<li>(05:07) - Differences</li>
<li>(06:16) - Main Ways Fraud’s Committed</li>
<li>(09:21) - Way to Tackle It</li>
<li>(11:07) - Distinguishing the AI</li>
<li>(13:14) - Response Time</li>
<li>(14:09) - Recommended Next Steps</li>
<li>(15:55) - Where It’s Heading</li>
<li>(19:21) - How to Use as Organization</li>
<li>(20:52) - Developer Community</li>
<li>(22:23) - Audio and Video</li>
<li>(23:34) - Risk Assessment</li>
<li>(24:41) - Prevalence</li>
<li>(26:09) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/66970b49/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/66970b49/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Built Fast, Broken Faster: MCP &amp; AI App Security—with GitGuardian’s Gaetan Ferry</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Built Fast, Broken Faster: MCP &amp; AI App Security—with GitGuardian’s Gaetan Ferry</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">864f6b3a-be8f-497e-8e06-782d68bff9d8</guid>
      <link>https://share.transistor.fm/s/90e71c22</link>
      <description>
        <![CDATA[<p><strong>When “Ship Fast” Meets “Secure by Design” in AI Apps</strong></p><p>AI-driven development is moving at breakneck speed—and attackers are taking advantage of the shortcuts. In this episode of Cyber Sentries: AI Insights for Cloud Security, host John Richards sits down with Gaetan Ferry, security researcher at GitGuardian, to unpack how modern AI tooling, MCP servers, and cloud platforms are reshaping the security landscape. The core problem: the same agentic workflows that boost productivity can also multiply identities, credentials, and blast radius if something goes wrong.</p><p>After John and Gaetan set the stage, Gaetan walks through a real-world-style vulnerability chain involving smithery.ai, an MCP server registry/hosting platform. It’s a practical look at how “classic” web issues can still show up in brand-new AI ecosystems—and how one small weakness can cascade into bigger supply chain risk. Along the way, they explore why secret sprawl is accelerating, what attackers are hunting for, and why observability is becoming as essential for identities and tokens as it is for infrastructure.</p><p><strong>Why MCP Servers, OAuth, and Secret Sprawl Are Colliding</strong></p><p>A big theme is the tension between usability and security: teams want agents that can “do everything,” which often means broad permissions and long-lived credentials. Gaetan explains why adopting OAuth is directionally better than static API keys, but still not a silver bullet in a world where agents need delegated access and tokens inevitably “live somewhere.” John pushes on what builders can do now—especially when new frameworks (and new hype cycles) keep resetting hard-won security practices.</p><p>The conversation lands on pragmatic guidance: reduce blast radius where you can, inventory identities and secrets, and invest in observability so you can respond fast when—not if—credentials leak. <strong>Note:</strong> This episode discusses breach scenarios and exploitation chains—be thoughtful about sharing internal security details and incident response specifics.</p><p><strong>Questions We Answer in This Episode</strong></p><ul><li>How can a simple web flaw turn into an AI supply chain attack through MCP server hosting?</li><li>Why doesn’t OAuth automatically “solve” agent security and credential risk?</li><li>What does “limiting blast radius” look like when agents need broad permissions to be useful?</li><li>How can observability help you detect and respond to secrets sprawl across AI tools?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>Treat MCP servers and agent integrations like critical supply chain dependencies—because they are.</li><li>Prefer short-lived, scoped credentials (OAuth when possible), but plan for token theft scenarios anyway.</li><li>Reduce blast radius with least privilege, separation of duties, and segmented agent access.</li><li>Build identity and secret observability so you can triage and remediate leaks quickly.</li></ul><p><strong>The Bottom Line for AI Security Teams in 2026</strong></p><p>If you’re experimenting with MCP servers or rolling out agentic workflows, this episode is a timely reminder that fundamentals still win. John and Gaetan make the case that “moving fast” doesn’t have to mean accepting unlimited credential risk—you can ship quickly while still tightening scopes, tracking identities, and watching where secrets spread. Tune in for the real-world examples and the practical mindset shift that helps teams stay productive without becoming the next supply chain headline.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.gitguardian.com/">GitGuardian</a></li><li><a href="https://www.linkedin.com/in/gaetan-f-a40497a4/">Connect with Gaetan on LinkedIn</a></li><li><a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2025">State of Secrets Sprawl Report 2025</a></li><li><a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2026">State of Secrets Sprawl Report 2026</a> (coming later in March!)</li><li><a href="https://www.cyberproof.com">CyberProof</a></li><li><a href="https://www.paladincloud.io">Learn more about Paladin Cloud</a></li><li><a href="https://share.hsforms.com/1HUPIst8wRIOGxAoY6OnkPQ2xcs8">Got a question? Ask us here!</a></li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:07) - Meet Gaetan Ferry</li>
<li>(02:19) - Attacks</li>
<li>(03:17) - Vulnerabilities</li>
<li>(07:38) - One-Off or Widespread?</li>
<li>(10:20) - Recommendations to Avoid</li>
<li>(14:19) - Exploiting</li>
<li>(16:50) - Resolving</li>
<li>(23:13) - Path Forward</li>
<li>(30:53) - Impact</li>
<li>(34:48) - Year of Supply Chain Attacks</li>
<li>(35:51) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>When “Ship Fast” Meets “Secure by Design” in AI Apps</strong></p><p>AI-driven development is moving at breakneck speed—and attackers are taking advantage of the shortcuts. In this episode of Cyber Sentries: AI Insights for Cloud Security, host John Richards sits down with Gaetan Ferry, security researcher at GitGuardian, to unpack how modern AI tooling, MCP servers, and cloud platforms are reshaping the security landscape. The core problem: the same agentic workflows that boost productivity can also multiply identities, credentials, and blast radius if something goes wrong.</p><p>After John and Gaetan set the stage, Gaetan walks through a real-world-style vulnerability chain involving smithery.ai, an MCP server registry/hosting platform. It’s a practical look at how “classic” web issues can still show up in brand-new AI ecosystems—and how one small weakness can cascade into bigger supply chain risk. Along the way, they explore why secret sprawl is accelerating, what attackers are hunting for, and why observability is becoming as essential for identities and tokens as it is for infrastructure.</p><p><strong>Why MCP Servers, OAuth, and Secret Sprawl Are Colliding</strong></p><p>A big theme is the tension between usability and security: teams want agents that can “do everything,” which often means broad permissions and long-lived credentials. Gaetan explains why adopting OAuth is directionally better than static API keys, but still not a silver bullet in a world where agents need delegated access and tokens inevitably “live somewhere.” John pushes on what builders can do now—especially when new frameworks (and new hype cycles) keep resetting hard-won security practices.</p><p>The conversation lands on pragmatic guidance: reduce blast radius where you can, inventory identities and secrets, and invest in observability so you can respond fast when—not if—credentials leak. <strong>Note:</strong> This episode discusses breach scenarios and exploitation chains—be thoughtful about sharing internal security details and incident response specifics.</p><p><strong>Questions We Answer in This Episode</strong></p><ul><li>How can a simple web flaw turn into an AI supply chain attack through MCP server hosting?</li><li>Why doesn’t OAuth automatically “solve” agent security and credential risk?</li><li>What does “limiting blast radius” look like when agents need broad permissions to be useful?</li><li>How can observability help you detect and respond to secrets sprawl across AI tools?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>Treat MCP servers and agent integrations like critical supply chain dependencies—because they are.</li><li>Prefer short-lived, scoped credentials (OAuth when possible), but plan for token theft scenarios anyway.</li><li>Reduce blast radius with least privilege, separation of duties, and segmented agent access.</li><li>Build identity and secret observability so you can triage and remediate leaks quickly.</li></ul><p><strong>The Bottom Line for AI Security Teams in 2026</strong></p><p>If you’re experimenting with MCP servers or rolling out agentic workflows, this episode is a timely reminder that fundamentals still win. John and Gaetan make the case that “moving fast” doesn’t have to mean accepting unlimited credential risk—you can ship quickly while still tightening scopes, tracking identities, and watching where secrets spread. Tune in for the real-world examples and the practical mindset shift that helps teams stay productive without becoming the next supply chain headline.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.gitguardian.com/">GitGuardian</a></li><li><a href="https://www.linkedin.com/in/gaetan-f-a40497a4/">Connect with Gaetan on LinkedIn</a></li><li><a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2025">State of Secrets Sprawl Report 2025</a></li><li><a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2026">State of Secrets Sprawl Report 2026</a> (coming later in March!)</li><li><a href="https://www.cyberproof.com">CyberProof</a></li><li><a href="https://www.paladincloud.io">Learn more about Paladin Cloud</a></li><li><a href="https://share.hsforms.com/1HUPIst8wRIOGxAoY6OnkPQ2xcs8">Got a question? Ask us here!</a></li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:07) - Meet Gaetan Ferry</li>
<li>(02:19) - Attacks</li>
<li>(03:17) - Vulnerabilities</li>
<li>(07:38) - One-Off or Widespread?</li>
<li>(10:20) - Recommendations to Avoid</li>
<li>(14:19) - Exploiting</li>
<li>(16:50) - Resolving</li>
<li>(23:13) - Path Forward</li>
<li>(30:53) - Impact</li>
<li>(34:48) - Year of Supply Chain Attacks</li>
<li>(35:51) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 04 Mar 2026 03:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/90e71c22/fea5ea68.mp3" length="37512285" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/k_u1RgGdqEpp_r1ClxigDKzyHYg5FoOHxVzeWk27di0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMmMz/NjcxZTVjNDAyOTlk/NzRhN2E4NThlMjM3/YTI4YS5qcGc.jpg"/>
      <itunes:duration>2324</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>When “Ship Fast” Meets “Secure by Design” in AI Apps</strong></p><p>AI-driven development is moving at breakneck speed—and attackers are taking advantage of the shortcuts. In this episode of Cyber Sentries: AI Insights for Cloud Security, host John Richards sits down with Gaetan Ferry, security researcher at GitGuardian, to unpack how modern AI tooling, MCP servers, and cloud platforms are reshaping the security landscape. The core problem: the same agentic workflows that boost productivity can also multiply identities, credentials, and blast radius if something goes wrong.</p><p>After John and Gaetan set the stage, Gaetan walks through a real-world-style vulnerability chain involving smithery.ai, an MCP server registry/hosting platform. It’s a practical look at how “classic” web issues can still show up in brand-new AI ecosystems—and how one small weakness can cascade into bigger supply chain risk. Along the way, they explore why secret sprawl is accelerating, what attackers are hunting for, and why observability is becoming as essential for identities and tokens as it is for infrastructure.</p><p><strong>Why MCP Servers, OAuth, and Secret Sprawl Are Colliding</strong></p><p>A big theme is the tension between usability and security: teams want agents that can “do everything,” which often means broad permissions and long-lived credentials. Gaetan explains why adopting OAuth is directionally better than static API keys, but still not a silver bullet in a world where agents need delegated access and tokens inevitably “live somewhere.” John pushes on what builders can do now—especially when new frameworks (and new hype cycles) keep resetting hard-won security practices.</p><p>The conversation lands on pragmatic guidance: reduce blast radius where you can, inventory identities and secrets, and invest in observability so you can respond fast when—not if—credentials leak. <strong>Note:</strong> This episode discusses breach scenarios and exploitation chains—be thoughtful about sharing internal security details and incident response specifics.</p><p><strong>Questions We Answer in This Episode</strong></p><ul><li>How can a simple web flaw turn into an AI supply chain attack through MCP server hosting?</li><li>Why doesn’t OAuth automatically “solve” agent security and credential risk?</li><li>What does “limiting blast radius” look like when agents need broad permissions to be useful?</li><li>How can observability help you detect and respond to secrets sprawl across AI tools?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>Treat MCP servers and agent integrations like critical supply chain dependencies—because they are.</li><li>Prefer short-lived, scoped credentials (OAuth when possible), but plan for token theft scenarios anyway.</li><li>Reduce blast radius with least privilege, separation of duties, and segmented agent access.</li><li>Build identity and secret observability so you can triage and remediate leaks quickly.</li></ul><p><strong>The Bottom Line for AI Security Teams in 2026</strong></p><p>If you’re experimenting with MCP servers or rolling out agentic workflows, this episode is a timely reminder that fundamentals still win. John and Gaetan make the case that “moving fast” doesn’t have to mean accepting unlimited credential risk—you can ship quickly while still tightening scopes, tracking identities, and watching where secrets spread. Tune in for the real-world examples and the practical mindset shift that helps teams stay productive without becoming the next supply chain headline.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.gitguardian.com/">GitGuardian</a></li><li><a href="https://www.linkedin.com/in/gaetan-f-a40497a4/">Connect with Gaetan on LinkedIn</a></li><li><a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2025">State of Secrets Sprawl Report 2025</a></li><li><a href="https://www.gitguardian.com/state-of-secrets-sprawl-report-2026">State of Secrets Sprawl Report 2026</a> (coming later in March!)</li><li><a href="https://www.cyberproof.com">CyberProof</a></li><li><a href="https://www.paladincloud.io">Learn more about Paladin Cloud</a></li><li><a href="https://share.hsforms.com/1HUPIst8wRIOGxAoY6OnkPQ2xcs8">Got a question? Ask us here!</a></li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:07) - Meet Gaetan Ferry</li>
<li>(02:19) - Attacks</li>
<li>(03:17) - Vulnerabilities</li>
<li>(07:38) - One-Off or Widespread?</li>
<li>(10:20) - Recommendations to Avoid</li>
<li>(14:19) - Exploiting</li>
<li>(16:50) - Resolving</li>
<li>(23:13) - Path Forward</li>
<li>(30:53) - Impact</li>
<li>(34:48) - Year of Supply Chain Attacks</li>
<li>(35:51) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/90e71c22/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/90e71c22/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Identity in the AI Era: Managing Enterprise Risk in the Age of AI with Jasson Casey</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Identity in the AI Era: Managing Enterprise Risk in the Age of AI with Jasson Casey</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a75aaef0-3253-479f-8350-617fd2134b4d</guid>
      <link>https://share.transistor.fm/s/4ff4cf28</link>
      <description>
        <![CDATA[<p><strong>The Evolution of Identity Security in the Age of AI</strong></p><p>In this episode of Cyber Sentries, John Richards sits down with Jasson Casey, CEO and co-founder of Beyond Identity, to explore the intersection of identity security, AI, and enterprise risk management. As organizations rapidly adopt AI tools and agents, the fundamental challenges of identity security are evolving—requiring both new approaches and a return to core principles.</p><p><strong>Identity: The Foundation of Modern Security</strong></p><p>Jasson explains how identity has become the root cause of most security incidents, with identity-based failures accounting for 80% of security tickets. The conversation explores how AI is transforming every role in modern organizations, while highlighting the security implications of this rapid adoption.</p><p>Key Takeaways:</p><ul><li>Identity security is fundamental to managing AI risk in enterprises</li><li>Traditional security concepts still apply but require new implementation approaches</li><li>Organizations need to track data flow and permissions across AI systems</li></ul><p><strong>Looking Ahead</strong></p><p>As AI adoption accelerates, organizations must balance innovation with security. Through proper identity management and understanding of data flow, enterprises can prevent most security incidents while embracing the transformative potential of AI technologies.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.beyondidentity.com">Beyond Identity</a></li><li><a href="https://www.beyondidentity.ai">AI Solutions</a></li><li><a href="https://www.linkedin.com/in/jassoncasey">Connect with Jasson Casey on LinkedIn</a></li><li><a href="https://twitter.com/jassoncasey">Connect with Jasson Casey on X</a></li><li><a href="https://www.cyberproof.com">CyberProof</a></li><li><a href="https://www.paladincloud.io">Learn more about Paladin Cloud</a></li><li><a href="https://share.hsforms.com/1HUPIst8wRIOGxAoY6OnkPQ2xcs8">Got a question? Ask us here!</a></li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:02) - Meet Jasson Casey</li>
<li>(02:51) - Regrets?</li>
<li>(08:19) - Friction Point</li>
<li>(10:28) - Identity</li>
<li>(17:08) - Adoption</li>
<li>(22:17) - The Hallmark of Network Security</li>
<li>(28:10) - Paint Analogy</li>
<li>(31:17) - Threats</li>
<li>(34:08) - Visualization Tool</li>
<li>(35:13) - Their Work in This Space</li>
<li>(37:05) - Learning More</li>
<li>(37:36) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>The Evolution of Identity Security in the Age of AI</strong></p><p>In this episode of Cyber Sentries, John Richards sits down with Jasson Casey, CEO and co-founder of Beyond Identity, to explore the intersection of identity security, AI, and enterprise risk management. As organizations rapidly adopt AI tools and agents, the fundamental challenges of identity security are evolving—requiring both new approaches and a return to core principles.</p><p><strong>Identity: The Foundation of Modern Security</strong></p><p>Jasson explains how identity has become the root cause of most security incidents, with identity-based failures accounting for 80% of security tickets. The conversation explores how AI is transforming every role in modern organizations, while highlighting the security implications of this rapid adoption.</p><p>Key Takeaways:</p><ul><li>Identity security is fundamental to managing AI risk in enterprises</li><li>Traditional security concepts still apply but require new implementation approaches</li><li>Organizations need to track data flow and permissions across AI systems</li></ul><p><strong>Looking Ahead</strong></p><p>As AI adoption accelerates, organizations must balance innovation with security. Through proper identity management and understanding of data flow, enterprises can prevent most security incidents while embracing the transformative potential of AI technologies.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.beyondidentity.com">Beyond Identity</a></li><li><a href="https://www.beyondidentity.ai">AI Solutions</a></li><li><a href="https://www.linkedin.com/in/jassoncasey">Connect with Jasson Casey on LinkedIn</a></li><li><a href="https://twitter.com/jassoncasey">Connect with Jasson Casey on X</a></li><li><a href="https://www.cyberproof.com">CyberProof</a></li><li><a href="https://www.paladincloud.io">Learn more about Paladin Cloud</a></li><li><a href="https://share.hsforms.com/1HUPIst8wRIOGxAoY6OnkPQ2xcs8">Got a question? Ask us here!</a></li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:02) - Meet Jasson Casey</li>
<li>(02:51) - Regrets?</li>
<li>(08:19) - Friction Point</li>
<li>(10:28) - Identity</li>
<li>(17:08) - Adoption</li>
<li>(22:17) - The Hallmark of Network Security</li>
<li>(28:10) - Paint Analogy</li>
<li>(31:17) - Threats</li>
<li>(34:08) - Visualization Tool</li>
<li>(35:13) - Their Work in This Space</li>
<li>(37:05) - Learning More</li>
<li>(37:36) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 04 Feb 2026 03:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/4ff4cf28/45b4c433.mp3" length="37704002" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kM65cp35FIxRGbJP97KEg6o8CF4S9ScU3YXpSO3yEsU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jOGFm/NzlhMjJlOTVlNWUz/M2UyYmVjMGYwMjgy/ZDFjNi5qcGc.jpg"/>
      <itunes:duration>2336</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>The Evolution of Identity Security in the Age of AI</strong></p><p>In this episode of Cyber Sentries, John Richards sits down with Jasson Casey, CEO and co-founder of Beyond Identity, to explore the intersection of identity security, AI, and enterprise risk management. As organizations rapidly adopt AI tools and agents, the fundamental challenges of identity security are evolving—requiring both new approaches and a return to core principles.</p><p><strong>Identity: The Foundation of Modern Security</strong></p><p>Jasson explains how identity has become the root cause of most security incidents, with identity-based failures accounting for 80% of security tickets. The conversation explores how AI is transforming every role in modern organizations, while highlighting the security implications of this rapid adoption.</p><p>Key Takeaways:</p><ul><li>Identity security is fundamental to managing AI risk in enterprises</li><li>Traditional security concepts still apply but require new implementation approaches</li><li>Organizations need to track data flow and permissions across AI systems</li></ul><p><strong>Looking Ahead</strong></p><p>As AI adoption accelerates, organizations must balance innovation with security. Through proper identity management and understanding of data flow, enterprises can prevent most security incidents while embracing the transformative potential of AI technologies.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.beyondidentity.com">Beyond Identity</a></li><li><a href="https://www.beyondidentity.ai">AI Solutions</a></li><li><a href="https://www.linkedin.com/in/jassoncasey">Connect with Jasson Casey on LinkedIn</a></li><li><a href="https://twitter.com/jassoncasey">Connect with Jasson Casey on X</a></li><li><a href="https://www.cyberproof.com">CyberProof</a></li><li><a href="https://www.paladincloud.io">Learn more about Paladin Cloud</a></li><li><a href="https://share.hsforms.com/1HUPIst8wRIOGxAoY6OnkPQ2xcs8">Got a question? Ask us here!</a></li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:02) - Meet Jasson Casey</li>
<li>(02:51) - Regrets?</li>
<li>(08:19) - Friction Point</li>
<li>(10:28) - Identity</li>
<li>(17:08) - Adoption</li>
<li>(22:17) - The Hallmark of Network Security</li>
<li>(28:10) - Paint Analogy</li>
<li>(31:17) - Threats</li>
<li>(34:08) - Visualization Tool</li>
<li>(35:13) - Their Work in This Space</li>
<li>(37:05) - Learning More</li>
<li>(37:36) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/4ff4cf28/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/4ff4cf28/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Security Data Pipelines: How to Cut SIEM Costs and Noise with Dina Kamal</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Security Data Pipelines: How to Cut SIEM Costs and Noise with Dina Kamal</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e47e4efa-50a6-4fe0-9584-ba3e21ef8b14</guid>
      <link>https://share.transistor.fm/s/f7d4a666</link>
      <description>
        <![CDATA[<p><strong>SIEM Speed Without the Sprawl—DataBahn’s Take on Security Data Pipelines</strong></p><p>In this Cyber Sentries: AI Insights for Cloud Security episode, host John Richards sits down with Dina Kamal, Chief Revenue Officer at DataBahn, to tackle a familiar cloud security problem: teams can’t get the right data into the SIEM fast enough, and when they do, costs and noise spike. After the introductions, John and Dina dig into why data integration and parsing often consume most of the timeline in SIEM projects—and how a security data pipeline layer can compress onboarding from months to weeks.</p><p>They also explore what “doing more with less” looks like in a modern SOC: filtering and routing data based on detection value, preserving what’s needed for compliance, and keeping flexibility for SIEM migrations. Dina’s bigger point is that AI only becomes truly useful when it’s paired with domain expertise and real operational context—otherwise it’s easy to end up with impressive-looking outputs that don’t hold up under investigation pressure.</p><p>Questions We Answer in This Episode</p><ul><li>Why do SIEM projects stall on data onboarding, and what speeds it up?</li><li>How can you cut SIEM ingestion costs without weakening detections?</li><li>What does owning your security data change during SIEM migrations?</li><li>Where does AI help most in SOC workflows, and where do guardrails matter?</li></ul><p>Key Takeaways</p><ul><li>Data pipelines remove SIEM “plumbing” bottlenecks by automating collection, parsing, and transformation.</li><li>Cost reduction works best when you filter by security value, not just by volume.</li><li>Decoupling data collection from the SIEM reduces lock-in and simplifies vendor changes.</li><li>AI is strongest when guided by security context and experienced practitioners.</li></ul><p>The throughline is practical: better detections and faster investigations start upstream with intentional data handling. By treating the SIEM as a high-value analytics destination instead of a dumping ground, teams can regain capacity, reduce noise, and keep options open as tools and vendors change. And when AI is applied to the right parts of the workflow—with clear constraints and real-world context—it can accelerate outcomes without compromising trust.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.databahn.ai/">DataBahn</a></li><li>Connect with Dina Kamal on <a href="https://www.linkedin.com/in/dina-kamal-a77277/">LinkedIn</a></li><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:02) - Meet Dina Kamal</li>
<li>(03:14) - Data Pipeline Management</li>
<li>(05:55) - The Target</li>
<li>(07:32) - Changing Vendors</li>
<li>(08:34) - No Storage</li>
<li>(09:31) - Why People Need It</li>
<li>(13:09) - Ahead of the Curve</li>
<li>(19:54) - Capturing the Data</li>
<li>(23:02) - Useful Data</li>
<li>(26:02) - More with Less</li>
<li>(27:03) - Visibility</li>
<li>(29:40) - When to Start</li>
<li>(31:04) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>SIEM Speed Without the Sprawl—DataBahn’s Take on Security Data Pipelines</strong></p><p>In this Cyber Sentries: AI Insights for Cloud Security episode, host John Richards sits down with Dina Kamal, Chief Revenue Officer at DataBahn, to tackle a familiar cloud security problem: teams can’t get the right data into the SIEM fast enough, and when they do, costs and noise spike. After the introductions, John and Dina dig into why data integration and parsing often consume most of the timeline in SIEM projects—and how a security data pipeline layer can compress onboarding from months to weeks.</p><p>They also explore what “doing more with less” looks like in a modern SOC: filtering and routing data based on detection value, preserving what’s needed for compliance, and keeping flexibility for SIEM migrations. Dina’s bigger point is that AI only becomes truly useful when it’s paired with domain expertise and real operational context—otherwise it’s easy to end up with impressive-looking outputs that don’t hold up under investigation pressure.</p><p>Questions We Answer in This Episode</p><ul><li>Why do SIEM projects stall on data onboarding, and what speeds it up?</li><li>How can you cut SIEM ingestion costs without weakening detections?</li><li>What does owning your security data change during SIEM migrations?</li><li>Where does AI help most in SOC workflows, and where do guardrails matter?</li></ul><p>Key Takeaways</p><ul><li>Data pipelines remove SIEM “plumbing” bottlenecks by automating collection, parsing, and transformation.</li><li>Cost reduction works best when you filter by security value, not just by volume.</li><li>Decoupling data collection from the SIEM reduces lock-in and simplifies vendor changes.</li><li>AI is strongest when guided by security context and experienced practitioners.</li></ul><p>The throughline is practical: better detections and faster investigations start upstream with intentional data handling. By treating the SIEM as a high-value analytics destination instead of a dumping ground, teams can regain capacity, reduce noise, and keep options open as tools and vendors change. And when AI is applied to the right parts of the workflow—with clear constraints and real-world context—it can accelerate outcomes without compromising trust.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.databahn.ai/">DataBahn</a></li><li>Connect with Dina Kamal on <a href="https://www.linkedin.com/in/dina-kamal-a77277/">LinkedIn</a></li><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:02) - Meet Dina Kamal</li>
<li>(03:14) - Data Pipeline Management</li>
<li>(05:55) - The Target</li>
<li>(07:32) - Changing Vendors</li>
<li>(08:34) - No Storage</li>
<li>(09:31) - Why People Need It</li>
<li>(13:09) - Ahead of the Curve</li>
<li>(19:54) - Capturing the Data</li>
<li>(23:02) - Useful Data</li>
<li>(26:02) - More with Less</li>
<li>(27:03) - Visibility</li>
<li>(29:40) - When to Start</li>
<li>(31:04) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 14 Jan 2026 03:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/f7d4a666/87045a97.mp3" length="32306789" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2MhQRpEz0Tn03OdMNT7OJQcACXlaIgrG803qkUWW-pc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wYjQw/MzRkY2Q0ZmNjOGJj/NjJjMGE0NTcyYWZh/MGRmYS5qcGc.jpg"/>
      <itunes:duration>1999</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>SIEM Speed Without the Sprawl—DataBahn’s Take on Security Data Pipelines</strong></p><p>In this Cyber Sentries: AI Insights for Cloud Security episode, host John Richards sits down with Dina Kamal, Chief Revenue Officer at DataBahn, to tackle a familiar cloud security problem: teams can’t get the right data into the SIEM fast enough, and when they do, costs and noise spike. After the introductions, John and Dina dig into why data integration and parsing often consume most of the timeline in SIEM projects—and how a security data pipeline layer can compress onboarding from months to weeks.</p><p>They also explore what “doing more with less” looks like in a modern SOC: filtering and routing data based on detection value, preserving what’s needed for compliance, and keeping flexibility for SIEM migrations. Dina’s bigger point is that AI only becomes truly useful when it’s paired with domain expertise and real operational context—otherwise it’s easy to end up with impressive-looking outputs that don’t hold up under investigation pressure.</p><p>Questions We Answer in This Episode</p><ul><li>Why do SIEM projects stall on data onboarding, and what speeds it up?</li><li>How can you cut SIEM ingestion costs without weakening detections?</li><li>What does owning your security data change during SIEM migrations?</li><li>Where does AI help most in SOC workflows, and where do guardrails matter?</li></ul><p>Key Takeaways</p><ul><li>Data pipelines remove SIEM “plumbing” bottlenecks by automating collection, parsing, and transformation.</li><li>Cost reduction works best when you filter by security value, not just by volume.</li><li>Decoupling data collection from the SIEM reduces lock-in and simplifies vendor changes.</li><li>AI is strongest when guided by security context and experienced practitioners.</li></ul><p>The throughline is practical: better detections and faster investigations start upstream with intentional data handling. By treating the SIEM as a high-value analytics destination instead of a dumping ground, teams can regain capacity, reduce noise, and keep options open as tools and vendors change. And when AI is applied to the right parts of the workflow—with clear constraints and real-world context—it can accelerate outcomes without compromising trust.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.databahn.ai/">DataBahn</a></li><li>Connect with Dina Kamal on <a href="https://www.linkedin.com/in/dina-kamal-a77277/">LinkedIn</a></li><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:02) - Meet Dina Kamal</li>
<li>(03:14) - Data Pipeline Management</li>
<li>(05:55) - The Target</li>
<li>(07:32) - Changing Vendors</li>
<li>(08:34) - No Storage</li>
<li>(09:31) - Why People Need It</li>
<li>(13:09) - Ahead of the Curve</li>
<li>(19:54) - Capturing the Data</li>
<li>(23:02) - Useful Data</li>
<li>(26:02) - More with Less</li>
<li>(27:03) - Visibility</li>
<li>(29:40) - When to Start</li>
<li>(31:04) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/f7d4a666/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/f7d4a666/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Securing AI Agents: How to Stop Credential Leaks and Protect Non‑Human Identities with Idan Gour</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Securing AI Agents: How to Stop Credential Leaks and Protect Non‑Human Identities with Idan Gour</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fa56f05f-413b-4180-a8ef-78fdd6c602d5</guid>
      <link>https://share.transistor.fm/s/628d6eab</link>
      <description>
        <![CDATA[<p><strong>Bridging the AI Security Gap—Inside the Rise of Non‑Human Identities</strong></p><p>In this episode of Cyber Sentries from CyberProof, host John Richards sits down with Idan Gour, co-founder and president of Astrix Security, to unpack one of today’s fastest-emerging challenges: securing AI agents and non-human identities (NHIs) in the modern enterprise. As companies rush to adopt generative-AI tools and deploy Model Context Protocol (MCP) servers, they’re unlocking incredible automation—and a brand-new attack surface. Together, John and Idan explore how credential leakage, hard-coded secrets, and rapid “shadow-AI” experimentation are exposing organizations to unseen risks, and what leaders can do to stay ahead.</p><p><strong>From Non‑Human Chaos to Secure‑by‑Design AI</strong></p><p>Idan shares the origin story of Astrix Security—built to close the identity-security gap left behind by traditional IAM tools. He explains how enterprises can safely navigate their AI journey using the Discover → Secure → Deploy framework for managing non-human access. The conversation moves from early automation risk to today’s complex landscape of MCP deployments, secret-management pitfalls, and just-in-time credentialing. John and Idan also discuss Astrix’s open-source MCP wrapper, designed to prevent hard‑coded credentials from leaking during model integration—a practical step organizations can adopt immediately.</p><p><strong>Questions We Answer in This Episode</strong></p><ul><li>How can companies prevent AI‑agent credentials from leaking across cloud and development environments?</li><li>What’s driving the explosion of non‑human identities—and how can security teams regain control?</li><li>When should organizations begin securing AI agents in their adoption cycle?</li><li>What frameworks or first principles best guide safe AI‑agent deployment?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>Start securing AI agents early—waiting until “maturity” means you’re already behind.</li><li>Visibility is everything: you can’t protect what you don’t know exists.</li><li>Automate secret management and avoid static credentials through just‑in‑time access.</li><li>Treat AI agents and NHIs as first‑class citizens in your identity‑security program.</li></ul><p>As AI adoption accelerates within every department—from R&amp;D to customer operations—Idan emphasizes that non‑human identity management is the new frontier of cybersecurity. Getting that balance right means enterprises can innovate fearlessly while maintaining the integrity of their data, systems, and brand.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li><a href="https://astrix.security/">Learn more about Astrix Security</a></li><li><a href="https://github.com/astrix-security/mcp-secret-wrapper/">Open Source MCP Secret Wrapper</a></li><li><a href="https://www.linkedin.com/in/idangour/">Idan Gour on LinkedIn</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:21) - Meet Idan Gour</li>
<li>(03:36) - As the Vertical Started to Grow</li>
<li>(06:37) - The Journey</li>
<li>(09:24) - Struggling</li>
<li>(13:18) - Risk</li>
<li>(16:15) - Targeting</li>
<li>(17:54) - Framework</li>
<li>(20:18) - Implementing Early</li>
<li>(21:52) - Back End Risks</li>
<li>(24:04) - Bridging the Gap</li>
<li>(26:13) - When to Engage Astrix</li>
<li>(29:54) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Bridging the AI Security Gap—Inside the Rise of Non‑Human Identities</strong></p><p>In this episode of Cyber Sentries from CyberProof, host John Richards sits down with Idan Gour, co-founder and president of Astrix Security, to unpack one of today’s fastest-emerging challenges: securing AI agents and non-human identities (NHIs) in the modern enterprise. As companies rush to adopt generative-AI tools and deploy Model Context Protocol (MCP) servers, they’re unlocking incredible automation—and a brand-new attack surface. Together, John and Idan explore how credential leakage, hard-coded secrets, and rapid “shadow-AI” experimentation are exposing organizations to unseen risks, and what leaders can do to stay ahead.</p><p><strong>From Non‑Human Chaos to Secure‑by‑Design AI</strong></p><p>Idan shares the origin story of Astrix Security—built to close the identity-security gap left behind by traditional IAM tools. He explains how enterprises can safely navigate their AI journey using the Discover → Secure → Deploy framework for managing non-human access. The conversation moves from early automation risk to today’s complex landscape of MCP deployments, secret-management pitfalls, and just-in-time credentialing. John and Idan also discuss Astrix’s open-source MCP wrapper, designed to prevent hard‑coded credentials from leaking during model integration—a practical step organizations can adopt immediately.</p><p><strong>Questions We Answer in This Episode</strong></p><ul><li>How can companies prevent AI‑agent credentials from leaking across cloud and development environments?</li><li>What’s driving the explosion of non‑human identities—and how can security teams regain control?</li><li>When should organizations begin securing AI agents in their adoption cycle?</li><li>What frameworks or first principles best guide safe AI‑agent deployment?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>Start securing AI agents early—waiting until “maturity” means you’re already behind.</li><li>Visibility is everything: you can’t protect what you don’t know exists.</li><li>Automate secret management and avoid static credentials through just‑in‑time access.</li><li>Treat AI agents and NHIs as first‑class citizens in your identity‑security program.</li></ul><p>As AI adoption accelerates within every department—from R&amp;D to customer operations—Idan emphasizes that non‑human identity management is the new frontier of cybersecurity. Getting that balance right means enterprises can innovate fearlessly while maintaining the integrity of their data, systems, and brand.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li><a href="https://astrix.security/">Learn more about Astrix Security</a></li><li><a href="https://github.com/astrix-security/mcp-secret-wrapper/">Open Source MCP Secret Wrapper</a></li><li><a href="https://www.linkedin.com/in/idangour/">Idan Gour on LinkedIn</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:21) - Meet Idan Gour</li>
<li>(03:36) - As the Vertical Started to Grow</li>
<li>(06:37) - The Journey</li>
<li>(09:24) - Struggling</li>
<li>(13:18) - Risk</li>
<li>(16:15) - Targeting</li>
<li>(17:54) - Framework</li>
<li>(20:18) - Implementing Early</li>
<li>(21:52) - Back End Risks</li>
<li>(24:04) - Bridging the Gap</li>
<li>(26:13) - When to Engage Astrix</li>
<li>(29:54) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 10 Dec 2025 03:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/628d6eab/2af2e670.mp3" length="31701531" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0Dum1IzkaTDRoPeOSggvIFhsSjP_1AFDjDmAOm14oHo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MjZh/YjQ4NDc2ZjBkNGVi/OTYwNWY2NTY5NzFm/ZGZkOC5qcGc.jpg"/>
      <itunes:duration>1961</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Bridging the AI Security Gap—Inside the Rise of Non‑Human Identities</strong></p><p>In this episode of Cyber Sentries from CyberProof, host John Richards sits down with Idan Gour, co-founder and president of Astrix Security, to unpack one of today’s fastest-emerging challenges: securing AI agents and non-human identities (NHIs) in the modern enterprise. As companies rush to adopt generative-AI tools and deploy Model Context Protocol (MCP) servers, they’re unlocking incredible automation—and a brand-new attack surface. Together, John and Idan explore how credential leakage, hard-coded secrets, and rapid “shadow-AI” experimentation are exposing organizations to unseen risks, and what leaders can do to stay ahead.</p><p><strong>From Non‑Human Chaos to Secure‑by‑Design AI</strong></p><p>Idan shares the origin story of Astrix Security—built to close the identity-security gap left behind by traditional IAM tools. He explains how enterprises can safely navigate their AI journey using the Discover → Secure → Deploy framework for managing non-human access. The conversation moves from early automation risk to today’s complex landscape of MCP deployments, secret-management pitfalls, and just-in-time credentialing. John and Idan also discuss Astrix’s open-source MCP wrapper, designed to prevent hard‑coded credentials from leaking during model integration—a practical step organizations can adopt immediately.</p><p><strong>Questions We Answer in This Episode</strong></p><ul><li>How can companies prevent AI‑agent credentials from leaking across cloud and development environments?</li><li>What’s driving the explosion of non‑human identities—and how can security teams regain control?</li><li>When should organizations begin securing AI agents in their adoption cycle?</li><li>What frameworks or first principles best guide safe AI‑agent deployment?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>Start securing AI agents early—waiting until “maturity” means you’re already behind.</li><li>Visibility is everything: you can’t protect what you don’t know exists.</li><li>Automate secret management and avoid static credentials through just‑in‑time access.</li><li>Treat AI agents and NHIs as first‑class citizens in your identity‑security program.</li></ul><p>As AI adoption accelerates within every department—from R&amp;D to customer operations—Idan emphasizes that non‑human identity management is the new frontier of cybersecurity. Getting that balance right means enterprises can innovate fearlessly while maintaining the integrity of their data, systems, and brand.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li><a href="https://astrix.security/">Learn more about Astrix Security</a></li><li><a href="https://github.com/astrix-security/mcp-secret-wrapper/">Open Source MCP Secret Wrapper</a></li><li><a href="https://www.linkedin.com/in/idangour/">Idan Gour on LinkedIn</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:21) - Meet Idan Gour</li>
<li>(03:36) - As the Vertical Started to Grow</li>
<li>(06:37) - The Journey</li>
<li>(09:24) - Struggling</li>
<li>(13:18) - Risk</li>
<li>(16:15) - Targeting</li>
<li>(17:54) - Framework</li>
<li>(20:18) - Implementing Early</li>
<li>(21:52) - Back End Risks</li>
<li>(24:04) - Bridging the Gap</li>
<li>(26:13) - When to Engage Astrix</li>
<li>(29:54) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/628d6eab/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/628d6eab/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>AI Compliance Security: How Modular Systems Transform Enterprise Risk Management with Richa Kaul</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>AI Compliance Security: How Modular Systems Transform Enterprise Risk Management with Richa Kaul</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7fc13e49-f719-4d4e-bb71-30c5b8966383</guid>
      <link>https://share.transistor.fm/s/dfd3d808</link>
      <description>
        <![CDATA[<p><strong>AI-Powered Compliance: Transforming Enterprise Security</strong></p><p>In this episode of Cyber Sentries, John Richards speaks with Richa Kaul, CEO and founder of Complyance. Richa shares insights on using modular AI systems for enterprise security compliance and discusses the critical balance between automation and human oversight in cybersecurity.</p><p><strong>Why Enterprise Security Compliance Matters Now</strong></p><p>The conversation explores how enterprises struggle with increasing cyber threats and complex third-party vendor networks. Richa explains how moving from reactive to proactive compliance monitoring can transform security posture, sharing real examples from Fortune 100 companies and major sports organizations.</p><p><strong>AI Implementation That Prioritizes Security</strong></p><p>Richa details their approach to implementing AI in compliance, emphasizing their commitment to data privacy and security. The company uses a modular AI infrastructure with opt-in features and minimal data access principles, demonstrating how AI can enhance security without compromising privacy.</p><p>Questions We Answer:</p><ul><li>How can enterprises shift from reactive to proactive compliance monitoring?</li><li>What are the key considerations for implementing AI in security compliance?</li><li>How should companies manage third-party vendor risks in the AI era?</li><li>What role does employee education play in maintaining security compliance?</li></ul><p>Key Takeaways:</p><ul><li>Continuous monitoring beats point-in-time compliance checks</li><li>Modular AI systems offer better security control than all-in-one solutions</li><li>Third-party vendor risk requires automated, continuous assessment</li><li>Human elements like training and culture can't be fully automated</li></ul><p><strong>Looking Ahead: Security Challenges</strong></p><p>The discussion concludes with insights into future challenges, including quantum computing's impact on security and the growing complexity of AI-related risks. Richa emphasizes the importance of building nimble, configurable systems to address emerging threats.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://media.kitcaster.com/richa-kaul">More About Richa Kaul</a></li><li>Complyance on <a href="https://www.linkedin.com/company/complyancehq/">LinkedIn</a> and <a href="https://complyance.com/">the Web</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:13) - Meet Richa Kaul from Complyance</li>
<li>(02:32) - Areas Needing Security</li>
<li>(04:19) - Reactive vs. Proactive</li>
<li>(06:17) - Integrating AI</li>
<li>(07:59) - AI Compliance Challenges</li>
<li>(10:48) - Training Their Models</li>
<li>(12:16) - Evaluating Third Parties</li>
<li>(15:49) - The Team</li>
<li>(19:04) - Looking to the Future</li>
<li>(20:44) - How Others Are Implementing AI</li>
<li>(24:04) - Creating Capacity</li>
<li>(25:44) - Companies Doing It Well</li>
<li>(27:25) - When They Don’t Have the Resources</li>
<li>(28:50) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>AI-Powered Compliance: Transforming Enterprise Security</strong></p><p>In this episode of Cyber Sentries, John Richards speaks with Richa Kaul, CEO and founder of Complyance. Richa shares insights on using modular AI systems for enterprise security compliance and discusses the critical balance between automation and human oversight in cybersecurity.</p><p><strong>Why Enterprise Security Compliance Matters Now</strong></p><p>The conversation explores how enterprises struggle with increasing cyber threats and complex third-party vendor networks. Richa explains how moving from reactive to proactive compliance monitoring can transform security posture, sharing real examples from Fortune 100 companies and major sports organizations.</p><p><strong>AI Implementation That Prioritizes Security</strong></p><p>Richa details their approach to implementing AI in compliance, emphasizing their commitment to data privacy and security. The company uses a modular AI infrastructure with opt-in features and minimal data access principles, demonstrating how AI can enhance security without compromising privacy.</p><p>Questions We Answer:</p><ul><li>How can enterprises shift from reactive to proactive compliance monitoring?</li><li>What are the key considerations for implementing AI in security compliance?</li><li>How should companies manage third-party vendor risks in the AI era?</li><li>What role does employee education play in maintaining security compliance?</li></ul><p>Key Takeaways:</p><ul><li>Continuous monitoring beats point-in-time compliance checks</li><li>Modular AI systems offer better security control than all-in-one solutions</li><li>Third-party vendor risk requires automated, continuous assessment</li><li>Human elements like training and culture can't be fully automated</li></ul><p><strong>Looking Ahead: Security Challenges</strong></p><p>The discussion concludes with insights into future challenges, including quantum computing's impact on security and the growing complexity of AI-related risks. Richa emphasizes the importance of building nimble, configurable systems to address emerging threats.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://media.kitcaster.com/richa-kaul">More About Richa Kaul</a></li><li>Complyance on <a href="https://www.linkedin.com/company/complyancehq/">LinkedIn</a> and <a href="https://complyance.com/">the Web</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:13) - Meet Richa Kaul from Complyance</li>
<li>(02:32) - Areas Needing Security</li>
<li>(04:19) - Reactive vs. Proactive</li>
<li>(06:17) - Integrating AI</li>
<li>(07:59) - AI Compliance Challenges</li>
<li>(10:48) - Training Their Models</li>
<li>(12:16) - Evaluating Third Parties</li>
<li>(15:49) - The Team</li>
<li>(19:04) - Looking to the Future</li>
<li>(20:44) - How Others Are Implementing AI</li>
<li>(24:04) - Creating Capacity</li>
<li>(25:44) - Companies Doing It Well</li>
<li>(27:25) - When They Don’t Have the Resources</li>
<li>(28:50) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 12 Nov 2025 03:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/dfd3d808/8bf02853.mp3" length="30084535" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Hpj4-P2xtfZtiN4t7Rrhz8JGaRPiw5QprbFzfd30Wsk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YTQ3/NDdlYjkwNTY3MWUz/ZjRmNDNlOGMwNzFj/MTA0Yy5qcGc.jpg"/>
      <itunes:duration>1860</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>AI-Powered Compliance: Transforming Enterprise Security</strong></p><p>In this episode of Cyber Sentries, John Richards speaks with Richa Kaul, CEO and founder of Complyance. Richa shares insights on using modular AI systems for enterprise security compliance and discusses the critical balance between automation and human oversight in cybersecurity.</p><p><strong>Why Enterprise Security Compliance Matters Now</strong></p><p>The conversation explores how enterprises struggle with increasing cyber threats and complex third-party vendor networks. Richa explains how moving from reactive to proactive compliance monitoring can transform security posture, sharing real examples from Fortune 100 companies and major sports organizations.</p><p><strong>AI Implementation That Prioritizes Security</strong></p><p>Richa details their approach to implementing AI in compliance, emphasizing their commitment to data privacy and security. The company uses a modular AI infrastructure with opt-in features and minimal data access principles, demonstrating how AI can enhance security without compromising privacy.</p><p>Questions We Answer:</p><ul><li>How can enterprises shift from reactive to proactive compliance monitoring?</li><li>What are the key considerations for implementing AI in security compliance?</li><li>How should companies manage third-party vendor risks in the AI era?</li><li>What role does employee education play in maintaining security compliance?</li></ul><p>Key Takeaways:</p><ul><li>Continuous monitoring beats point-in-time compliance checks</li><li>Modular AI systems offer better security control than all-in-one solutions</li><li>Third-party vendor risk requires automated, continuous assessment</li><li>Human elements like training and culture can't be fully automated</li></ul><p><strong>Looking Ahead: Security Challenges</strong></p><p>The discussion concludes with insights into future challenges, including quantum computing's impact on security and the growing complexity of AI-related risks. Richa emphasizes the importance of building nimble, configurable systems to address emerging threats.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://media.kitcaster.com/richa-kaul">More About Richa Kaul</a></li><li>Complyance on <a href="https://www.linkedin.com/company/complyancehq/">LinkedIn</a> and <a href="https://complyance.com/">the Web</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:13) - Meet Richa Kaul from Complyance</li>
<li>(02:32) - Areas Needing Security</li>
<li>(04:19) - Reactive vs. Proactive</li>
<li>(06:17) - Integrating AI</li>
<li>(07:59) - AI Compliance Challenges</li>
<li>(10:48) - Training Their Models</li>
<li>(12:16) - Evaluating Third Parties</li>
<li>(15:49) - The Team</li>
<li>(19:04) - Looking to the Future</li>
<li>(20:44) - How Others Are Implementing AI</li>
<li>(24:04) - Creating Capacity</li>
<li>(25:44) - Companies Doing It Well</li>
<li>(27:25) - When They Don’t Have the Resources</li>
<li>(28:50) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/dfd3d808/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/dfd3d808/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>AI Governance Essentials: Navigating Security and Compliance in Enterprise AI with Walter Haydock</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>AI Governance Essentials: Navigating Security and Compliance in Enterprise AI with Walter Haydock</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">efdb9dc2-bfe9-46d3-b51f-d4ab862dc98f</guid>
      <link>https://share.transistor.fm/s/6cba51ca</link>
      <description>
        <![CDATA[<p><strong>AI Governance in an Era of Rapid Change</strong></p><p>In this episode of Cyber Sentries, John Richards talks with Walter Haydock, founder of StackAware, about navigating the complex landscape of AI governance and security. Walter brings unique insights from his background as a Marine Corps intelligence officer and his extensive experience in both government and private sectors.</p><p><strong>Understanding AI Risk Management</strong></p><p>Walter shares his perspective on how organizations can develop practical AI governance frameworks while balancing innovation with security. He outlines a three-step approach starting with policy development, followed by thorough inventory of AI tools, and assessment of cybersecurity implications.</p><p>The discussion explores how different industries face varying levels of AI risk, with healthcare emerging as a particularly challenging sector where both opportunities and dangers are amplified. Walter emphasizes the importance of aligning AI governance with business objectives rather than treating it as a standalone initiative.</p><p><strong>Questions We Answer in This Episode:</strong></p><ul><li>How should organizations approach AI governance and risk management?</li><li>What are the key challenges in implementing ISO 42001 for AI systems?</li><li>How can companies address the growing problem of "shadow AI"?</li><li>What are the implications of fragmented AI regulations across different jurisdictions?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Organizations need clear AI policies that define acceptable use boundaries</li><li>Risk management should integrate with existing frameworks rather than create separate systems</li><li>Companies must balance compliance requirements with innovation needs</li><li>Employee education and flexible approval processes help prevent shadow AI usage</li></ul><p><strong>The Regulatory Landscape</strong></p><p>The conversation delves into emerging AI regulations, from New York City's local laws to Colorado's comprehensive AI Act. Walter provides valuable insights into how organizations can prepare for upcoming regulatory changes while maintaining operational efficiency.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://stackaware.com/">StackAware</a></li><li>Connect with Walter on <a href="https://www.linkedin.com/in/walter-haydock/">LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:30) - Walter Haydock from Stackaware</li>
<li>(01:13) - Walter’s Background</li>
<li>(02:36) - Areas Needing Improvement</li>
<li>(03:23) - Integrating AI</li>
<li>(04:33) - Stackaware’s Role</li>
<li>(06:25) - AI Certification Standard</li>
<li>(07:17) - Implementation Challenges</li>
<li>(08:28) - Thoughts on Looser Protocols</li>
<li>(11:16) - Regulations</li>
<li>(13:01) - Approaches</li>
<li>(14:57) - Areas of Concern</li>
<li>(17:26) - Handling Risk</li>
<li>(18:37) - Who Should Own AI Governance</li>
<li>(19:43) - Pushback?</li>
<li>(21:15) - Proper Techniques</li>
<li>(22:26) - What Levels</li>
<li>(23:49) - Smaller Companies</li>
<li>(25:54) - Ideal Legislation</li>
<li>(28:48) - Plugging Walter</li>
<li>(29:36) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>AI Governance in an Era of Rapid Change</strong></p><p>In this episode of Cyber Sentries, John Richards talks with Walter Haydock, founder of StackAware, about navigating the complex landscape of AI governance and security. Walter brings unique insights from his background as a Marine Corps intelligence officer and his extensive experience in both government and private sectors.</p><p><strong>Understanding AI Risk Management</strong></p><p>Walter shares his perspective on how organizations can develop practical AI governance frameworks while balancing innovation with security. He outlines a three-step approach starting with policy development, followed by thorough inventory of AI tools, and assessment of cybersecurity implications.</p><p>The discussion explores how different industries face varying levels of AI risk, with healthcare emerging as a particularly challenging sector where both opportunities and dangers are amplified. Walter emphasizes the importance of aligning AI governance with business objectives rather than treating it as a standalone initiative.</p><p><strong>Questions We Answer in This Episode:</strong></p><ul><li>How should organizations approach AI governance and risk management?</li><li>What are the key challenges in implementing ISO 42001 for AI systems?</li><li>How can companies address the growing problem of "shadow AI"?</li><li>What are the implications of fragmented AI regulations across different jurisdictions?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Organizations need clear AI policies that define acceptable use boundaries</li><li>Risk management should integrate with existing frameworks rather than create separate systems</li><li>Companies must balance compliance requirements with innovation needs</li><li>Employee education and flexible approval processes help prevent shadow AI usage</li></ul><p><strong>The Regulatory Landscape</strong></p><p>The conversation delves into emerging AI regulations, from New York City's local laws to Colorado's comprehensive AI Act. Walter provides valuable insights into how organizations can prepare for upcoming regulatory changes while maintaining operational efficiency.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://stackaware.com/">StackAware</a></li><li>Connect with Walter on <a href="https://www.linkedin.com/in/walter-haydock/">LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:30) - Walter Haydock from Stackaware</li>
<li>(01:13) - Walter’s Background</li>
<li>(02:36) - Areas Needing Improvement</li>
<li>(03:23) - Integrating AI</li>
<li>(04:33) - Stackaware’s Role</li>
<li>(06:25) - AI Certification Standard</li>
<li>(07:17) - Implementation Challenges</li>
<li>(08:28) - Thoughts on Looser Protocols</li>
<li>(11:16) - Regulations</li>
<li>(13:01) - Approaches</li>
<li>(14:57) - Areas of Concern</li>
<li>(17:26) - Handling Risk</li>
<li>(18:37) - Who Should Own AI Governance</li>
<li>(19:43) - Pushback?</li>
<li>(21:15) - Proper Techniques</li>
<li>(22:26) - What Levels</li>
<li>(23:49) - Smaller Companies</li>
<li>(25:54) - Ideal Legislation</li>
<li>(28:48) - Plugging Walter</li>
<li>(29:36) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 08 Oct 2025 03:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/6cba51ca/4b648646.mp3" length="30167241" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/nGMdMTG6dkDbqtmXql-yVKEeUjCZMSTbl0FKr8drO8M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mM2Y4/YzJkNGE0OTkwNjk3/MDljY2MwZWE3Njll/NTgyZi5qcGc.jpg"/>
      <itunes:duration>1865</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>AI Governance in an Era of Rapid Change</strong></p><p>In this episode of Cyber Sentries, John Richards talks with Walter Haydock, founder of StackAware, about navigating the complex landscape of AI governance and security. Walter brings unique insights from his background as a Marine Corps intelligence officer and his extensive experience in both government and private sectors.</p><p><strong>Understanding AI Risk Management</strong></p><p>Walter shares his perspective on how organizations can develop practical AI governance frameworks while balancing innovation with security. He outlines a three-step approach starting with policy development, followed by thorough inventory of AI tools, and assessment of cybersecurity implications.</p><p>The discussion explores how different industries face varying levels of AI risk, with healthcare emerging as a particularly challenging sector where both opportunities and dangers are amplified. Walter emphasizes the importance of aligning AI governance with business objectives rather than treating it as a standalone initiative.</p><p><strong>Questions We Answer in This Episode:</strong></p><ul><li>How should organizations approach AI governance and risk management?</li><li>What are the key challenges in implementing ISO 42001 for AI systems?</li><li>How can companies address the growing problem of "shadow AI"?</li><li>What are the implications of fragmented AI regulations across different jurisdictions?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Organizations need clear AI policies that define acceptable use boundaries</li><li>Risk management should integrate with existing frameworks rather than create separate systems</li><li>Companies must balance compliance requirements with innovation needs</li><li>Employee education and flexible approval processes help prevent shadow AI usage</li></ul><p><strong>The Regulatory Landscape</strong></p><p>The conversation delves into emerging AI regulations, from New York City's local laws to Colorado's comprehensive AI Act. Walter provides valuable insights into how organizations can prepare for upcoming regulatory changes while maintaining operational efficiency.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://stackaware.com/">StackAware</a></li><li>Connect with Walter on <a href="https://www.linkedin.com/in/walter-haydock/">LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:30) - Walter Haydock from Stackaware</li>
<li>(01:13) - Walter’s Background</li>
<li>(02:36) - Areas Needing Improvement</li>
<li>(03:23) - Integrating AI</li>
<li>(04:33) - Stackaware’s Role</li>
<li>(06:25) - AI Certification Standard</li>
<li>(07:17) - Implementation Challenges</li>
<li>(08:28) - Thoughts on Looser Protocols</li>
<li>(11:16) - Regulations</li>
<li>(13:01) - Approaches</li>
<li>(14:57) - Areas of Concern</li>
<li>(17:26) - Handling Risk</li>
<li>(18:37) - Who Should Own AI Governance</li>
<li>(19:43) - Pushback?</li>
<li>(21:15) - Proper Techniques</li>
<li>(22:26) - What Levels</li>
<li>(23:49) - Smaller Companies</li>
<li>(25:54) - Ideal Legislation</li>
<li>(28:48) - Plugging Walter</li>
<li>(29:36) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/6cba51ca/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/6cba51ca/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Distributed AI Security: How Enterprise Systems Are Evolving for AI Integration with Mark Fussell</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Distributed AI Security: How Enterprise Systems Are Evolving for AI Integration with Mark Fussell</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">367aa007-fb92-4908-bb28-503ac785b515</guid>
      <link>https://share.transistor.fm/s/baa489d7</link>
      <description>
        <![CDATA[<p><strong>Revolutionizing Cloud Security with AI-Powered Distributed Systems</strong></p><p>In this episode of Cyber Sentries, John Richards sits down with Mark Fussell, CEO of Diagrid and co-creator of the Distributed Application Runtime (DAPR). Mark shares insights from his extensive experience in distributed systems and discusses how modern architectures are evolving to incorporate AI capabilities.</p><p><strong>The Evolution of Distributed Applications</strong></p><p>Mark explains how DAPR emerged from observing common challenges teams faced when building distributed systems. The project, which started in 2018 and became open source in 2019, has grown into a graduated Cloud Native Computing Foundation (CNCF) project used by thousands of companies worldwide. He details how DAPR's component model allows teams to swap infrastructure without changing code, providing crucial flexibility for enterprise systems.</p><p><strong>Questions We Answer in This Episode</strong></p><ul><li>How are distributed applications transforming modern software development?</li><li>What role does security play in distributed architectures?</li><li>How can organizations integrate AI agents into existing distributed systems?</li><li>What's next for distributed systems in the age of AI?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>DAPR provides essential building blocks for secure, distributed applications</li><li>Workflow durability is crucial for enterprise-ready AI agent systems</li><li>Identity-based security principles are fundamental to distributed architectures</li><li>The future of distributed systems will blend traditional microservices with AI agents</li></ul><p><strong>The Future of AI in Distributed Systems</strong></p><p>Mark discusses Diagrid's Catalyst platform, which helps organizations build enterprise-ready distributed applications with integrated AI capabilities. He emphasizes the importance of security, durability, and workflow management as organizations begin incorporating AI agents into their systems.</p><p><strong>Links &amp; Notes</strong></p><ul><li>Connect with Mark on <a href="https://www.linkedin.com/in/mfussell/">LinkedIn</a></li><li><a href="https://dapr.io/">Learn more about DAPR</a></li><li><a href="https://www.diagrid.io/">Diagrid</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:30) - Diagrid’s Mark Fussell</li>
<li>(01:07) - Meet Mark</li>
<li>(04:37) - The Journey</li>
<li>(10:55) - New AI Models</li>
<li>(15:01) - On the Security Side</li>
<li>(16:52) - Where Things Go Next</li>
<li>(20:10) - Bringing in New Agentic Models</li>
<li>(24:20) - Catalyst</li>
<li>(27:12) - Getting in Touch</li>
<li>(28:35) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Revolutionizing Cloud Security with AI-Powered Distributed Systems</strong></p><p>In this episode of Cyber Sentries, John Richards sits down with Mark Fussell, CEO of Diagrid and co-creator of the Distributed Application Runtime (DAPR). Mark shares insights from his extensive experience in distributed systems and discusses how modern architectures are evolving to incorporate AI capabilities.</p><p><strong>The Evolution of Distributed Applications</strong></p><p>Mark explains how DAPR emerged from observing common challenges teams faced when building distributed systems. The project, which started in 2018 and became open source in 2019, has grown into a graduated Cloud Native Computing Foundation (CNCF) project used by thousands of companies worldwide. He details how DAPR's component model allows teams to swap infrastructure without changing code, providing crucial flexibility for enterprise systems.</p><p><strong>Questions We Answer in This Episode</strong></p><ul><li>How are distributed applications transforming modern software development?</li><li>What role does security play in distributed architectures?</li><li>How can organizations integrate AI agents into existing distributed systems?</li><li>What's next for distributed systems in the age of AI?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>DAPR provides essential building blocks for secure, distributed applications</li><li>Workflow durability is crucial for enterprise-ready AI agent systems</li><li>Identity-based security principles are fundamental to distributed architectures</li><li>The future of distributed systems will blend traditional microservices with AI agents</li></ul><p><strong>The Future of AI in Distributed Systems</strong></p><p>Mark discusses Diagrid's Catalyst platform, which helps organizations build enterprise-ready distributed applications with integrated AI capabilities. He emphasizes the importance of security, durability, and workflow management as organizations begin incorporating AI agents into their systems.</p><p><strong>Links &amp; Notes</strong></p><ul><li>Connect with Mark on <a href="https://www.linkedin.com/in/mfussell/">LinkedIn</a></li><li><a href="https://dapr.io/">Learn more about DAPR</a></li><li><a href="https://www.diagrid.io/">Diagrid</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:30) - Diagrid’s Mark Fussell</li>
<li>(01:07) - Meet Mark</li>
<li>(04:37) - The Journey</li>
<li>(10:55) - New AI Models</li>
<li>(15:01) - On the Security Side</li>
<li>(16:52) - Where Things Go Next</li>
<li>(20:10) - Bringing in New Agentic Models</li>
<li>(24:20) - Catalyst</li>
<li>(27:12) - Getting in Touch</li>
<li>(28:35) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 10 Sep 2025 03:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/baa489d7/d35beca9.mp3" length="29312523" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/mAJpS6mRe54uNtF_tbulg-C1heQDXOTMQRnqGB9FPw4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jYThm/YmNlMzNkMjllMGJj/ZWU2NjMxMzU4NTU3/MmI4NS5qcGc.jpg"/>
      <itunes:duration>1811</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Revolutionizing Cloud Security with AI-Powered Distributed Systems</strong></p><p>In this episode of Cyber Sentries, John Richards sits down with Mark Fussell, CEO of Diagrid and co-creator of the Distributed Application Runtime (DAPR). Mark shares insights from his extensive experience in distributed systems and discusses how modern architectures are evolving to incorporate AI capabilities.</p><p><strong>The Evolution of Distributed Applications</strong></p><p>Mark explains how DAPR emerged from observing common challenges teams faced when building distributed systems. The project, which started in 2018 and became open source in 2019, has grown into a graduated Cloud Native Computing Foundation (CNCF) project used by thousands of companies worldwide. He details how DAPR's component model allows teams to swap infrastructure without changing code, providing crucial flexibility for enterprise systems.</p><p><strong>Questions We Answer in This Episode</strong></p><ul><li>How are distributed applications transforming modern software development?</li><li>What role does security play in distributed architectures?</li><li>How can organizations integrate AI agents into existing distributed systems?</li><li>What's next for distributed systems in the age of AI?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>DAPR provides essential building blocks for secure, distributed applications</li><li>Workflow durability is crucial for enterprise-ready AI agent systems</li><li>Identity-based security principles are fundamental to distributed architectures</li><li>The future of distributed systems will blend traditional microservices with AI agents</li></ul><p><strong>The Future of AI in Distributed Systems</strong></p><p>Mark discusses Diagrid's Catalyst platform, which helps organizations build enterprise-ready distributed applications with integrated AI capabilities. He emphasizes the importance of security, durability, and workflow management as organizations begin incorporating AI agents into their systems.</p><p><strong>Links &amp; Notes</strong></p><ul><li>Connect with Mark on <a href="https://www.linkedin.com/in/mfussell/">LinkedIn</a></li><li><a href="https://dapr.io/">Learn more about DAPR</a></li><li><a href="https://www.diagrid.io/">Diagrid</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:30) - Diagrid’s Mark Fussell</li>
<li>(01:07) - Meet Mark</li>
<li>(04:37) - The Journey</li>
<li>(10:55) - New AI Models</li>
<li>(15:01) - On the Security Side</li>
<li>(16:52) - Where Things Go Next</li>
<li>(20:10) - Bringing in New Agentic Models</li>
<li>(24:20) - Catalyst</li>
<li>(27:12) - Getting in Touch</li>
<li>(28:35) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/baa489d7/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/baa489d7/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>AI Security Architecture: How Data-Centric Models Transform Enterprise Security with Mohit Tiwari</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>AI Security Architecture: How Data-Centric Models Transform Enterprise Security with Mohit Tiwari</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">da60f6fd-a1e1-4f7d-a3c3-9f8ed8af4e94</guid>
      <link>https://share.transistor.fm/s/0b5f523c</link>
      <description>
        <![CDATA[<p><strong>AI-Powered Cloud Security: From Research Lab to Enterprise Reality</strong></p><p>In this episode of Cyber Sentries, John Richards talks with Mohit Tiwari, co-founder and CEO of Symmetry Systems and associate professor at UT Austin, about transforming academic research into practical enterprise security solutions. Mohit shares his journey from academic research to founding a company that's revolutionizing how organizations approach data security in the age of AI.</p><p><strong>Bridging Academia and Industry</strong></p><p>Mohit discusses how his research team at UT Austin developed innovative approaches to data security and privacy, working with organizations like NSA, Lockheed, and General Dynamics. Their work led to founding Symmetry Systems in 2020, focusing on operationalizing data flow security across enterprise environments.</p><p><strong>The Evolution of Data Security</strong></p><p>The conversation explores how traditional asset-centric security approaches are giving way to data-centric models. Mohit explains how Symmetry Systems helps organizations protect data flows across multiple applications and platforms, making security more efficient and effective than traditional bespoke solutions.</p><p><strong>Questions We Answer in This Episode:</strong></p><ul><li>How can organizations move from bespoke security solutions to systematic approaches?</li><li>What role does AI governance play in modern enterprise security?</li><li>How can companies effectively manage data security across different AI implementation scenarios?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Data-centric security approaches are becoming crucial as AI adoption increases</li><li>Organizations need interoperable policy languages for effective AI governance</li><li>Purpose-built, smaller AI models can be more effective than large, general-purpose ones</li><li>Security solutions must evolve to handle the massive scale of modern enterprise data</li></ul><p><strong>Looking Ahead: The Future of AI Security</strong></p><p>The episode concludes with insights into emerging challenges in AI security, including the need for better business purpose frameworks and advanced detection capabilities for sophisticated attacks like ransomware.</p><p><strong>Resources</strong></p><ul><li>Symmetry Systems <a href="https://www.symmetry-systems.com/">website</a></li><li>Connect with Symmetry Systems on <a href="https://www.linkedin.com/company/symmetry-systems-inc/">LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:02) - Meet Mohit</li>
<li>(03:06) - Application Examples</li>
<li>(08:15) - Key Metrics</li>
<li>(10:52) - Effects of AI</li>
<li>(14:16) - Environments and Interfaces</li>
<li>(16:39) - Tying It Together</li>
<li>(18:19) - AI in the Process</li>
<li>(22:51) - Model Decisions</li>
<li>(25:41) - Research to Project</li>
<li>(29:13) - Problems</li>
<li>(31:25) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>AI-Powered Cloud Security: From Research Lab to Enterprise Reality</strong></p><p>In this episode of Cyber Sentries, John Richards talks with Mohit Tiwari, co-founder and CEO of Symmetry Systems and associate professor at UT Austin, about transforming academic research into practical enterprise security solutions. Mohit shares his journey from academic research to founding a company that's revolutionizing how organizations approach data security in the age of AI.</p><p><strong>Bridging Academia and Industry</strong></p><p>Mohit discusses how his research team at UT Austin developed innovative approaches to data security and privacy, working with organizations like NSA, Lockheed, and General Dynamics. Their work led to founding Symmetry Systems in 2020, focusing on operationalizing data flow security across enterprise environments.</p><p><strong>The Evolution of Data Security</strong></p><p>The conversation explores how traditional asset-centric security approaches are giving way to data-centric models. Mohit explains how Symmetry Systems helps organizations protect data flows across multiple applications and platforms, making security more efficient and effective than traditional bespoke solutions.</p><p><strong>Questions We Answer in This Episode:</strong></p><ul><li>How can organizations move from bespoke security solutions to systematic approaches?</li><li>What role does AI governance play in modern enterprise security?</li><li>How can companies effectively manage data security across different AI implementation scenarios?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Data-centric security approaches are becoming crucial as AI adoption increases</li><li>Organizations need interoperable policy languages for effective AI governance</li><li>Purpose-built, smaller AI models can be more effective than large, general-purpose ones</li><li>Security solutions must evolve to handle the massive scale of modern enterprise data</li></ul><p><strong>Looking Ahead: The Future of AI Security</strong></p><p>The episode concludes with insights into emerging challenges in AI security, including the need for better business purpose frameworks and advanced detection capabilities for sophisticated attacks like ransomware.</p><p><strong>Resources</strong></p><ul><li>Symmetry Systems <a href="https://www.symmetry-systems.com/">website</a></li><li>Connect with Symmetry Systems on <a href="https://www.linkedin.com/company/symmetry-systems-inc/">LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:02) - Meet Mohit</li>
<li>(03:06) - Application Examples</li>
<li>(08:15) - Key Metrics</li>
<li>(10:52) - Effects of AI</li>
<li>(14:16) - Environments and Interfaces</li>
<li>(16:39) - Tying It Together</li>
<li>(18:19) - AI in the Process</li>
<li>(22:51) - Model Decisions</li>
<li>(25:41) - Research to Project</li>
<li>(29:13) - Problems</li>
<li>(31:25) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 13 Aug 2025 03:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/0b5f523c/c63b06cd.mp3" length="32593071" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/22YhQ7MKZhmR1tFobLu70wV0CRgYi5kNLmPF956tMOs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hYWU1/MDU4ZTcxNGI5N2E3/MTRjNzgxYmRmNGI1/ZDYzNC5qcGc.jpg"/>
      <itunes:duration>2016</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>AI-Powered Cloud Security: From Research Lab to Enterprise Reality</strong></p><p>In this episode of Cyber Sentries, John Richards talks with Mohit Tiwari, co-founder and CEO of Symmetry Systems and associate professor at UT Austin, about transforming academic research into practical enterprise security solutions. Mohit shares his journey from academic research to founding a company that's revolutionizing how organizations approach data security in the age of AI.</p><p><strong>Bridging Academia and Industry</strong></p><p>Mohit discusses how his research team at UT Austin developed innovative approaches to data security and privacy, working with organizations like NSA, Lockheed, and General Dynamics. Their work led to founding Symmetry Systems in 2020, focusing on operationalizing data flow security across enterprise environments.</p><p><strong>The Evolution of Data Security</strong></p><p>The conversation explores how traditional asset-centric security approaches are giving way to data-centric models. Mohit explains how Symmetry Systems helps organizations protect data flows across multiple applications and platforms, making security more efficient and effective than traditional bespoke solutions.</p><p><strong>Questions We Answer in This Episode:</strong></p><ul><li>How can organizations move from bespoke security solutions to systematic approaches?</li><li>What role does AI governance play in modern enterprise security?</li><li>How can companies effectively manage data security across different AI implementation scenarios?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Data-centric security approaches are becoming crucial as AI adoption increases</li><li>Organizations need interoperable policy languages for effective AI governance</li><li>Purpose-built, smaller AI models can be more effective than large, general-purpose ones</li><li>Security solutions must evolve to handle the massive scale of modern enterprise data</li></ul><p><strong>Looking Ahead: The Future of AI Security</strong></p><p>The episode concludes with insights into emerging challenges in AI security, including the need for better business purpose frameworks and advanced detection capabilities for sophisticated attacks like ransomware.</p><p><strong>Resources</strong></p><ul><li>Symmetry Systems <a href="https://www.symmetry-systems.com/">website</a></li><li>Connect with Symmetry Systems on <a href="https://www.linkedin.com/company/symmetry-systems-inc/">LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:02) - Meet Mohit</li>
<li>(03:06) - Application Examples</li>
<li>(08:15) - Key Metrics</li>
<li>(10:52) - Effects of AI</li>
<li>(14:16) - Environments and Interfaces</li>
<li>(16:39) - Tying It Together</li>
<li>(18:19) - AI in the Process</li>
<li>(22:51) - Model Decisions</li>
<li>(25:41) - Research to Project</li>
<li>(29:13) - Problems</li>
<li>(31:25) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/0b5f523c/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/0b5f523c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Biometric Identity Evolution: AI-Powered Authentication Beyond Passwords with Michael Engle</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Biometric Identity Evolution: AI-Powered Authentication Beyond Passwords with Michael Engle</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fcc2b5a5-f9e5-4038-9297-d9ba9dcc7d21</guid>
      <link>https://share.transistor.fm/s/1baa48a6</link>
      <description>
        <![CDATA[<p><strong>AI-Powered Identity Verification: Beyond Passwords and into the Future</strong></p><p>In this episode of Cyber Sentries, host John Richards sits down with Michael Engle, co-founder and CSO of 1Kosmos, to explore how AI is revolutionizing identity verification and authentication in cybersecurity. Mike brings decades of experience from Wall Street to modern startups, offering unique insights into the evolution of digital identity protection.</p><p><strong>The Identity Crisis in Modern Security</strong></p><p>Identity verification has become the new perimeter in cybersecurity, accounting for 80% of security problems. Mike explains how traditional methods like passwords and basic MFA are failing to meet current security challenges, especially as AI agents become more prevalent in our digital lives. 1Kosmos is tackling this through advanced biometric verification, behavioral analysis, and AI-powered authentication systems.</p><p><strong>Questions We Answer in This Episode:</strong></p><ul><li>How is AI changing the landscape of identity verification?</li><li>What makes biometric authentication more secure than traditional methods?</li><li>How can organizations transition from password-based to identity-based security?</li><li>What role do digital wallets play in the future of identity verification?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Identity verification has replaced perimeter security as the primary security concern</li><li>AI enables more sophisticated identity verification through behavioral analysis and pattern recognition</li><li>Biometric authentication offers a more secure alternative to traditional passwords and MFA</li><li>Digital wallets are emerging as the future of portable, verified identity</li></ul><p><strong>The Future of Digital Identity</strong></p><p>Looking ahead, Mike discusses 1Kosmos's work on digital wallets and universal identity verification systems. These innovations aim to create reusable, trusted identities that can work across multiple platforms while maintaining security through biometric verification and AI-powered fraud detection.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li><a href="https://www.1kosmos.com/">Learn more about 1Kosmos</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:03) - Meet Michael Engle</li>
<li>(03:03) - Identity Threat</li>
<li>(04:09) - With AI</li>
<li>(05:50) - What 1Kosmos Does</li>
<li>(12:48) - Adapting with AI</li>
<li>(15:42) - Protecting Credentials</li>
<li>(26:36) - Passkey Challenges</li>
<li>(28:12) - AI-Driven Development</li>
<li>(32:18) - What’s Next for 1Kosmos</li>
<li>(34:40) - Learning More</li>
<li>(35:42) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>AI-Powered Identity Verification: Beyond Passwords and into the Future</strong></p><p>In this episode of Cyber Sentries, host John Richards sits down with Michael Engle, co-founder and CSO of 1Kosmos, to explore how AI is revolutionizing identity verification and authentication in cybersecurity. Mike brings decades of experience from Wall Street to modern startups, offering unique insights into the evolution of digital identity protection.</p><p><strong>The Identity Crisis in Modern Security</strong></p><p>Identity verification has become the new perimeter in cybersecurity, accounting for 80% of security problems. Mike explains how traditional methods like passwords and basic MFA are failing to meet current security challenges, especially as AI agents become more prevalent in our digital lives. 1Kosmos is tackling this through advanced biometric verification, behavioral analysis, and AI-powered authentication systems.</p><p><strong>Questions We Answer in This Episode:</strong></p><ul><li>How is AI changing the landscape of identity verification?</li><li>What makes biometric authentication more secure than traditional methods?</li><li>How can organizations transition from password-based to identity-based security?</li><li>What role do digital wallets play in the future of identity verification?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Identity verification has replaced perimeter security as the primary security concern</li><li>AI enables more sophisticated identity verification through behavioral analysis and pattern recognition</li><li>Biometric authentication offers a more secure alternative to traditional passwords and MFA</li><li>Digital wallets are emerging as the future of portable, verified identity</li></ul><p><strong>The Future of Digital Identity</strong></p><p>Looking ahead, Mike discusses 1Kosmos's work on digital wallets and universal identity verification systems. These innovations aim to create reusable, trusted identities that can work across multiple platforms while maintaining security through biometric verification and AI-powered fraud detection.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li><a href="https://www.1kosmos.com/">Learn more about 1Kosmos</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:03) - Meet Michael Engle</li>
<li>(03:03) - Identity Threat</li>
<li>(04:09) - With AI</li>
<li>(05:50) - What 1Kosmos Does</li>
<li>(12:48) - Adapting with AI</li>
<li>(15:42) - Protecting Credentials</li>
<li>(26:36) - Passkey Challenges</li>
<li>(28:12) - AI-Driven Development</li>
<li>(32:18) - What’s Next for 1Kosmos</li>
<li>(34:40) - Learning More</li>
<li>(35:42) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 09 Jul 2025 03:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/1baa48a6/88adc11e.mp3" length="35985629" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/RKxrYEjUyMhGMAGe35EeE0I5aGv4YypqaHouHyVu92I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNDA1/OTQxNzRjYTZlMjBk/NDFkZDAxZDY1NDZl/NTY1Yi5qcGc.jpg"/>
      <itunes:duration>2228</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>AI-Powered Identity Verification: Beyond Passwords and into the Future</strong></p><p>In this episode of Cyber Sentries, host John Richards sits down with Michael Engle, co-founder and CSO of 1Kosmos, to explore how AI is revolutionizing identity verification and authentication in cybersecurity. Mike brings decades of experience from Wall Street to modern startups, offering unique insights into the evolution of digital identity protection.</p><p><strong>The Identity Crisis in Modern Security</strong></p><p>Identity verification has become the new perimeter in cybersecurity, accounting for 80% of security problems. Mike explains how traditional methods like passwords and basic MFA are failing to meet current security challenges, especially as AI agents become more prevalent in our digital lives. 1Kosmos is tackling this through advanced biometric verification, behavioral analysis, and AI-powered authentication systems.</p><p><strong>Questions We Answer in This Episode:</strong></p><ul><li>How is AI changing the landscape of identity verification?</li><li>What makes biometric authentication more secure than traditional methods?</li><li>How can organizations transition from password-based to identity-based security?</li><li>What role do digital wallets play in the future of identity verification?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Identity verification has replaced perimeter security as the primary security concern</li><li>AI enables more sophisticated identity verification through behavioral analysis and pattern recognition</li><li>Biometric authentication offers a more secure alternative to traditional passwords and MFA</li><li>Digital wallets are emerging as the future of portable, verified identity</li></ul><p><strong>The Future of Digital Identity</strong></p><p>Looking ahead, Mike discusses 1Kosmos's work on digital wallets and universal identity verification systems. These innovations aim to create reusable, trusted identities that can work across multiple platforms while maintaining security through biometric verification and AI-powered fraud detection.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li><a href="https://www.1kosmos.com/">Learn more about 1Kosmos</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:03) - Meet Michael Engle</li>
<li>(03:03) - Identity Threat</li>
<li>(04:09) - With AI</li>
<li>(05:50) - What 1Kosmos Does</li>
<li>(12:48) - Adapting with AI</li>
<li>(15:42) - Protecting Credentials</li>
<li>(26:36) - Passkey Challenges</li>
<li>(28:12) - AI-Driven Development</li>
<li>(32:18) - What’s Next for 1Kosmos</li>
<li>(34:40) - Learning More</li>
<li>(35:42) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/1baa48a6/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/1baa48a6/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>AI-Driven SOC Evolution: Transforming Security Maturity with Doron Davidson</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>AI-Driven SOC Evolution: Transforming Security Maturity with Doron Davidson</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c8545716-e175-4a5f-8b81-bd4f5dafa3af</guid>
      <link>https://share.transistor.fm/s/9f899ef6</link>
      <description>
        <![CDATA[<p><strong>AI's Evolution in Security Operations: From Support to Collaboration</strong></p><p>Doron Davidson, Managing Director of Security Operations at Cyberproof, joins John Richards to explore how AI is transforming security operations and pushing SOC maturity models into new territory. With extensive experience from telecom security to founding SecBI, Doron brings unique insights into the evolution of managed security services.</p><p><strong>Rethinking Security Maturity Models</strong></p><p>Doron outlines Cyberproof's innovative approach to service maturity, moving beyond traditional frameworks to incorporate AI capabilities. He describes how they've developed a 1-5 scale measuring people, processes, and technology—with quantifiable 20% year-over-year improvement targets.</p><p>Questions We Answer:</p><ul><li>How are security operations teams evolving with AI integration?</li><li>What does SOC maturity look like in an AI-enabled world?</li><li>How can organizations measure and verify AI's security impact?</li><li>What role will agentic AI play in future security operations?</li></ul><p>Key Takeaways:</p><ul><li>AI is enabling better collaboration between security services</li><li>Automated investigation has significantly reduced L1 analyst workload</li><li>Well-defined processes and KPIs are crucial for successful AI implementation</li><li>New maturity levels (6-8) are emerging focused on agentic AI capabilities</li></ul><p><strong>The Future of Security Operations</strong></p><p>The conversation explores how Cyberproof is moving beyond traditional AI integration toward agentic models where multiple AI agents collaborate across security functions. This shift enables enhanced threat intelligence sharing, automated investigations, and improved visualization of security metrics for stakeholders.</p><p><strong>Practical Applications and Impact</strong></p><p>From automating email attack investigations to improving cross-team collaboration, Doron shares concrete examples of how AI is reducing human error while expanding security capabilities. He emphasizes the importance of maintaining human oversight while leveraging AI's strengths.</p><p><strong>Resources</strong></p><ul><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:33) - Today’s Guest: Doron Davidson</li>
<li>(01:32) - Doron’s Background</li>
<li>(03:27) - Latest Challenges</li>
<li>(05:57) - Honesty Mindset</li>
<li>(09:16) - Current AI Strategy</li>
<li>(12:23) - Focus Areas</li>
<li>(19:43) - Shifting Models</li>
<li>(25:04) - What He’s Excited About</li>
<li>(26:40) - Maturity Model</li>
<li>(28:49) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>AI's Evolution in Security Operations: From Support to Collaboration</strong></p><p>Doron Davidson, Managing Director of Security Operations at Cyberproof, joins John Richards to explore how AI is transforming security operations and pushing SOC maturity models into new territory. With extensive experience from telecom security to founding SecBI, Doron brings unique insights into the evolution of managed security services.</p><p><strong>Rethinking Security Maturity Models</strong></p><p>Doron outlines Cyberproof's innovative approach to service maturity, moving beyond traditional frameworks to incorporate AI capabilities. He describes how they've developed a 1-5 scale measuring people, processes, and technology—with quantifiable 20% year-over-year improvement targets.</p><p>Questions We Answer:</p><ul><li>How are security operations teams evolving with AI integration?</li><li>What does SOC maturity look like in an AI-enabled world?</li><li>How can organizations measure and verify AI's security impact?</li><li>What role will agentic AI play in future security operations?</li></ul><p>Key Takeaways:</p><ul><li>AI is enabling better collaboration between security services</li><li>Automated investigation has significantly reduced L1 analyst workload</li><li>Well-defined processes and KPIs are crucial for successful AI implementation</li><li>New maturity levels (6-8) are emerging focused on agentic AI capabilities</li></ul><p><strong>The Future of Security Operations</strong></p><p>The conversation explores how Cyberproof is moving beyond traditional AI integration toward agentic models where multiple AI agents collaborate across security functions. This shift enables enhanced threat intelligence sharing, automated investigations, and improved visualization of security metrics for stakeholders.</p><p><strong>Practical Applications and Impact</strong></p><p>From automating email attack investigations to improving cross-team collaboration, Doron shares concrete examples of how AI is reducing human error while expanding security capabilities. He emphasizes the importance of maintaining human oversight while leveraging AI's strengths.</p><p><strong>Resources</strong></p><ul><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:33) - Today’s Guest: Doron Davidson</li>
<li>(01:32) - Doron’s Background</li>
<li>(03:27) - Latest Challenges</li>
<li>(05:57) - Honesty Mindset</li>
<li>(09:16) - Current AI Strategy</li>
<li>(12:23) - Focus Areas</li>
<li>(19:43) - Shifting Models</li>
<li>(25:04) - What He’s Excited About</li>
<li>(26:40) - Maturity Model</li>
<li>(28:49) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 11 Jun 2025 03:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/9f899ef6/bfb9d7a4.mp3" length="30641570" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/fOjer2jWDzH6Rm7YQXVPWHMor15lyuAxG4rTe_MGlls/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZDE0/YTI2NjA0MWIwMjdh/ZmI5NTFlYjJlOTY4/Njc0OS5qcGc.jpg"/>
      <itunes:duration>1894</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>AI's Evolution in Security Operations: From Support to Collaboration</strong></p><p>Doron Davidson, Managing Director of Security Operations at Cyberproof, joins John Richards to explore how AI is transforming security operations and pushing SOC maturity models into new territory. With extensive experience from telecom security to founding SecBI, Doron brings unique insights into the evolution of managed security services.</p><p><strong>Rethinking Security Maturity Models</strong></p><p>Doron outlines Cyberproof's innovative approach to service maturity, moving beyond traditional frameworks to incorporate AI capabilities. He describes how they've developed a 1-5 scale measuring people, processes, and technology—with quantifiable 20% year-over-year improvement targets.</p><p>Questions We Answer:</p><ul><li>How are security operations teams evolving with AI integration?</li><li>What does SOC maturity look like in an AI-enabled world?</li><li>How can organizations measure and verify AI's security impact?</li><li>What role will agentic AI play in future security operations?</li></ul><p>Key Takeaways:</p><ul><li>AI is enabling better collaboration between security services</li><li>Automated investigation has significantly reduced L1 analyst workload</li><li>Well-defined processes and KPIs are crucial for successful AI implementation</li><li>New maturity levels (6-8) are emerging focused on agentic AI capabilities</li></ul><p><strong>The Future of Security Operations</strong></p><p>The conversation explores how Cyberproof is moving beyond traditional AI integration toward agentic models where multiple AI agents collaborate across security functions. This shift enables enhanced threat intelligence sharing, automated investigations, and improved visualization of security metrics for stakeholders.</p><p><strong>Practical Applications and Impact</strong></p><p>From automating email attack investigations to improving cross-team collaboration, Doron shares concrete examples of how AI is reducing human error while expanding security capabilities. He emphasizes the importance of maintaining human oversight while leveraging AI's strengths.</p><p><strong>Resources</strong></p><ul><li><a href="https://www.cyberproof.com/">Learn more about Cyberproof</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:33) - Today’s Guest: Doron Davidson</li>
<li>(01:32) - Doron’s Background</li>
<li>(03:27) - Latest Challenges</li>
<li>(05:57) - Honesty Mindset</li>
<li>(09:16) - Current AI Strategy</li>
<li>(12:23) - Focus Areas</li>
<li>(19:43) - Shifting Models</li>
<li>(25:04) - What He’s Excited About</li>
<li>(26:40) - Maturity Model</li>
<li>(28:49) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/9f899ef6/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/9f899ef6/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Beyond the AI Hype: Real Security Solutions with Sherman Williams</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Beyond the AI Hype: Real Security Solutions with Sherman Williams</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">981ad1de-e71b-43a2-a305-9ff152f56bf7</guid>
      <link>https://share.transistor.fm/s/1d22203b</link>
      <description>
        <![CDATA[<p><strong>AI, Investment, and Security: A Venture Capitalist's Perspective</strong></p><p>Sherman Williams, managing partner at AI and Ventures, joins John Richards to explore the intersection of artificial intelligence, cloud security, and venture capital. As a Naval Academy graduate turned investor, Sherman brings unique insights from both military and commercial technology perspectives. His firm focuses on dual-use technologies - innovations that serve both government and commercial applications - making him particularly well-positioned to discuss AI's evolving role in security.</p><p>The conversation delves deep into how organizations should approach AI implementation, viewing it as a powerful tool rather than a solution in itself. Sherman shares valuable perspectives on the distinction between AI DevTools and application layer AI, and how entrepreneurs should focus on solving specific problems rather than getting caught up in AI hype. The discussion explores critical considerations around open-source versus closed-source models, particularly in sensitive sectors like government, healthcare, and insurance.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How should organizations approach AI implementation in their security strategy?</li><li>What's the difference between AI DevTools and application layer AI?</li><li>How are security concerns shaping the development of AI solutions?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>AI should be viewed as a tool for efficiency and productivity, not a standalone solution</li><li>The best AI implementations focus on solving specific, acute problems</li><li>Security considerations are driving innovation in both AI development and deployment</li></ul><p>This episode offers essential insights for anyone interested in the future of AI in security and technology development. Sherman's unique perspective, combining military experience with venture capital expertise, provides valuable context for understanding how AI is reshaping the security landscape while highlighting both opportunities and challenges ahead.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.ainventures.com/">AIN Ventures</a></li><li><a href="https://www.linkedin.com/in/sherman-williams/">Follow Sherman on LinkedIn</a></li><li><a href="https://research.google/pubs/attention-is-all-you-need/">The 2017 Google Article Mentioned</a></li><li><a href="https://phalanx.io/">Security Company Mentioned</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:34) - Sherman Williams</li>
<li>(01:02) - Sherman’s Background</li>
<li>(05:26) - AI from the Investment Space</li>
<li>(08:23) - Dev Tools or Application Layer AI</li>
<li>(12:24) - Security</li>
<li>(22:46) - Promising Work in Security</li>
<li>(33:59) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>AI, Investment, and Security: A Venture Capitalist's Perspective</strong></p><p>Sherman Williams, managing partner at AI and Ventures, joins John Richards to explore the intersection of artificial intelligence, cloud security, and venture capital. As a Naval Academy graduate turned investor, Sherman brings unique insights from both military and commercial technology perspectives. His firm focuses on dual-use technologies - innovations that serve both government and commercial applications - making him particularly well-positioned to discuss AI's evolving role in security.</p><p>The conversation delves deep into how organizations should approach AI implementation, viewing it as a powerful tool rather than a solution in itself. Sherman shares valuable perspectives on the distinction between AI DevTools and application layer AI, and how entrepreneurs should focus on solving specific problems rather than getting caught up in AI hype. The discussion explores critical considerations around open-source versus closed-source models, particularly in sensitive sectors like government, healthcare, and insurance.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How should organizations approach AI implementation in their security strategy?</li><li>What's the difference between AI DevTools and application layer AI?</li><li>How are security concerns shaping the development of AI solutions?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>AI should be viewed as a tool for efficiency and productivity, not a standalone solution</li><li>The best AI implementations focus on solving specific, acute problems</li><li>Security considerations are driving innovation in both AI development and deployment</li></ul><p>This episode offers essential insights for anyone interested in the future of AI in security and technology development. Sherman's unique perspective, combining military experience with venture capital expertise, provides valuable context for understanding how AI is reshaping the security landscape while highlighting both opportunities and challenges ahead.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.ainventures.com/">AIN Ventures</a></li><li><a href="https://www.linkedin.com/in/sherman-williams/">Follow Sherman on LinkedIn</a></li><li><a href="https://research.google/pubs/attention-is-all-you-need/">The 2017 Google Article Mentioned</a></li><li><a href="https://phalanx.io/">Security Company Mentioned</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:34) - Sherman Williams</li>
<li>(01:02) - Sherman’s Background</li>
<li>(05:26) - AI from the Investment Space</li>
<li>(08:23) - Dev Tools or Application Layer AI</li>
<li>(12:24) - Security</li>
<li>(22:46) - Promising Work in Security</li>
<li>(33:59) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 14 May 2025 03:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/1d22203b/72fa34ae.mp3" length="35657767" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/YeovjLnfKJwVTE2f5CMpdGiw2gu_aZ5QavUL7cEghbs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ODIx/MzFmYmU4YzIwYTU5/ZjhiMDIzYzExZTk4/ZWY5NC5qcGc.jpg"/>
      <itunes:duration>2208</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>AI, Investment, and Security: A Venture Capitalist's Perspective</strong></p><p>Sherman Williams, managing partner at AI and Ventures, joins John Richards to explore the intersection of artificial intelligence, cloud security, and venture capital. As a Naval Academy graduate turned investor, Sherman brings unique insights from both military and commercial technology perspectives. His firm focuses on dual-use technologies - innovations that serve both government and commercial applications - making him particularly well-positioned to discuss AI's evolving role in security.</p><p>The conversation delves deep into how organizations should approach AI implementation, viewing it as a powerful tool rather than a solution in itself. Sherman shares valuable perspectives on the distinction between AI DevTools and application layer AI, and how entrepreneurs should focus on solving specific problems rather than getting caught up in AI hype. The discussion explores critical considerations around open-source versus closed-source models, particularly in sensitive sectors like government, healthcare, and insurance.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How should organizations approach AI implementation in their security strategy?</li><li>What's the difference between AI DevTools and application layer AI?</li><li>How are security concerns shaping the development of AI solutions?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>AI should be viewed as a tool for efficiency and productivity, not a standalone solution</li><li>The best AI implementations focus on solving specific, acute problems</li><li>Security considerations are driving innovation in both AI development and deployment</li></ul><p>This episode offers essential insights for anyone interested in the future of AI in security and technology development. Sherman's unique perspective, combining military experience with venture capital expertise, provides valuable context for understanding how AI is reshaping the security landscape while highlighting both opportunities and challenges ahead.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.ainventures.com/">AIN Ventures</a></li><li><a href="https://www.linkedin.com/in/sherman-williams/">Follow Sherman on LinkedIn</a></li><li><a href="https://research.google/pubs/attention-is-all-you-need/">The 2017 Google Article Mentioned</a></li><li><a href="https://phalanx.io/">Security Company Mentioned</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:34) - Sherman Williams</li>
<li>(01:02) - Sherman’s Background</li>
<li>(05:26) - AI from the Investment Space</li>
<li>(08:23) - Dev Tools or Application Layer AI</li>
<li>(12:24) - Security</li>
<li>(22:46) - Promising Work in Security</li>
<li>(33:59) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/1d22203b/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/1d22203b/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>AI's Data Fabric Revolution: Transforming Exposure Management with Daniel Deeney</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>AI's Data Fabric Revolution: Transforming Exposure Management with Daniel Deeney</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d19de0ce-0430-427f-b730-9632bfe9d324</guid>
      <link>https://share.transistor.fm/s/08581b22</link>
      <description>
        <![CDATA[<p><strong>Transforming Cloud Security Through AI and Data Fabric</strong></p><p>Daniel Deeney, CEO and co-founder of Paladin Cloud, joins John Richards to explore how artificial intelligence is revolutionizing cloud security. With extensive experience as an enterprise software CEO and venture capitalist, Deeney brings unique insights from his successful track record of building and scaling cybersecurity companies. After his previous company's acquisition by VMware in 2019, he launched Paladin Cloud to address the growing challenges of managing security across multiple cloud environments.</p><p>The episode delves deep into the concept of data fabric and its crucial role in modern cybersecurity. Richards and Deeney discuss how organizations struggle with tool proliferation and data overload in cloud security. They explore how Paladin Cloud's innovative approach uses data fabric to unify risk assessment across various security tools while leveraging generative AI for enhanced threat intelligence. The conversation highlights practical solutions for teams dealing with overwhelming security alerts and the challenge of prioritizing threats effectively.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can organizations handle the overwhelming amount of security data from multiple tools?</li><li>What role does generative AI play in modern cloud security?</li><li>How can teams better prioritize security risks across different environments?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Data fabric technology enables unified risk assessment across multiple security tools</li><li>AI-powered risk scoring helps teams prioritize threats more effectively</li><li>Security teams need both technological solutions and services support to manage modern threats</li></ul><p>This episode offers invaluable insights for security professionals, DevOps teams, and technology leaders grappling with cloud security challenges. Whether you're dealing with alert fatigue, struggling to prioritize security risks, or looking to understand how AI can enhance your security operations, this discussion provides practical guidance and strategic perspectives on navigating the complex landscape of modern cloud security.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(01:05) - Meet Daniel Deeney</li>
<li>(01:25) - Starting Paladin Cloud</li>
<li>(02:53) - The Approach</li>
<li>(04:54) - Data Fabric Layer</li>
<li>(09:39) - Addressing Pain Points</li>
<li>(15:54) - Bringing Data Together and Normalizing</li>
<li>(18:52) - Users</li>
<li>(20:37) - Other Models</li>
<li>(26:02) - Prioritization</li>
<li>(29:19) - Customer Service</li>
<li>(31:16) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Transforming Cloud Security Through AI and Data Fabric</strong></p><p>Daniel Deeney, CEO and co-founder of Paladin Cloud, joins John Richards to explore how artificial intelligence is revolutionizing cloud security. With extensive experience as an enterprise software CEO and venture capitalist, Deeney brings unique insights from his successful track record of building and scaling cybersecurity companies. After his previous company's acquisition by VMware in 2019, he launched Paladin Cloud to address the growing challenges of managing security across multiple cloud environments.</p><p>The episode delves deep into the concept of data fabric and its crucial role in modern cybersecurity. Richards and Deeney discuss how organizations struggle with tool proliferation and data overload in cloud security. They explore how Paladin Cloud's innovative approach uses data fabric to unify risk assessment across various security tools while leveraging generative AI for enhanced threat intelligence. The conversation highlights practical solutions for teams dealing with overwhelming security alerts and the challenge of prioritizing threats effectively.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can organizations handle the overwhelming amount of security data from multiple tools?</li><li>What role does generative AI play in modern cloud security?</li><li>How can teams better prioritize security risks across different environments?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Data fabric technology enables unified risk assessment across multiple security tools</li><li>AI-powered risk scoring helps teams prioritize threats more effectively</li><li>Security teams need both technological solutions and services support to manage modern threats</li></ul><p>This episode offers invaluable insights for security professionals, DevOps teams, and technology leaders grappling with cloud security challenges. Whether you're dealing with alert fatigue, struggling to prioritize security risks, or looking to understand how AI can enhance your security operations, this discussion provides practical guidance and strategic perspectives on navigating the complex landscape of modern cloud security.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(01:05) - Meet Daniel Deeney</li>
<li>(01:25) - Starting Paladin Cloud</li>
<li>(02:53) - The Approach</li>
<li>(04:54) - Data Fabric Layer</li>
<li>(09:39) - Addressing Pain Points</li>
<li>(15:54) - Bringing Data Together and Normalizing</li>
<li>(18:52) - Users</li>
<li>(20:37) - Other Models</li>
<li>(26:02) - Prioritization</li>
<li>(29:19) - Customer Service</li>
<li>(31:16) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 09 Apr 2025 03:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/08581b22/4d11ce21.mp3" length="32560402" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/sDgVfBFZQffce_PVHcIJuzrtey8MDr3yLlqz68fY9Yk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZGFm/MTdiZDdmYWEyMDM5/YjlkZWZlZDZkMzdm/NjQzOC5qcGc.jpg"/>
      <itunes:duration>2014</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Transforming Cloud Security Through AI and Data Fabric</strong></p><p>Daniel Deeney, CEO and co-founder of Paladin Cloud, joins John Richards to explore how artificial intelligence is revolutionizing cloud security. With extensive experience as an enterprise software CEO and venture capitalist, Deeney brings unique insights from his successful track record of building and scaling cybersecurity companies. After his previous company's acquisition by VMware in 2019, he launched Paladin Cloud to address the growing challenges of managing security across multiple cloud environments.</p><p>The episode delves deep into the concept of data fabric and its crucial role in modern cybersecurity. Richards and Deeney discuss how organizations struggle with tool proliferation and data overload in cloud security. They explore how Paladin Cloud's innovative approach uses data fabric to unify risk assessment across various security tools while leveraging generative AI for enhanced threat intelligence. The conversation highlights practical solutions for teams dealing with overwhelming security alerts and the challenge of prioritizing threats effectively.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can organizations handle the overwhelming amount of security data from multiple tools?</li><li>What role does generative AI play in modern cloud security?</li><li>How can teams better prioritize security risks across different environments?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Data fabric technology enables unified risk assessment across multiple security tools</li><li>AI-powered risk scoring helps teams prioritize threats more effectively</li><li>Security teams need both technological solutions and services support to manage modern threats</li></ul><p>This episode offers invaluable insights for security professionals, DevOps teams, and technology leaders grappling with cloud security challenges. Whether you're dealing with alert fatigue, struggling to prioritize security risks, or looking to understand how AI can enhance your security operations, this discussion provides practical guidance and strategic perspectives on navigating the complex landscape of modern cloud security.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(01:05) - Meet Daniel Deeney</li>
<li>(01:25) - Starting Paladin Cloud</li>
<li>(02:53) - The Approach</li>
<li>(04:54) - Data Fabric Layer</li>
<li>(09:39) - Addressing Pain Points</li>
<li>(15:54) - Bringing Data Together and Normalizing</li>
<li>(18:52) - Users</li>
<li>(20:37) - Other Models</li>
<li>(26:02) - Prioritization</li>
<li>(29:19) - Customer Service</li>
<li>(31:16) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/08581b22/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/08581b22/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>On-Prem AI Uprising: Navigating the Future of Cloud Security</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>On-Prem AI Uprising: Navigating the Future of Cloud Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8c6abc0d-7437-48eb-a60f-bd2435dfb91c</guid>
      <link>https://share.transistor.fm/s/9b2fe227</link>
      <description>
        <![CDATA[<p><strong>Diving into the Rise of On-Prem AI and Cloud Security</strong></p><p>In this episode of Cyber Sentries, host John Richards is joined by Doron Caspin, a Senior Manager of Product Management at Red Hat, and Christopher Nuland, a Technical Marketing Manager at Red Hat. They explore the growing trend of on-premise open source models for running AI and the unique benefits and challenges that come with it. The conversation also touches on how DeepSeek has challenged the big players and validated the value of smaller agentic models.</p><p>John, Doron, and Christopher dive into the shifting landscape of AI and cloud security. They discuss the trends Red Hat is seeing in the industry, such as the move towards smaller, domain-specific language models and the importance of securing AI workloads in hybrid cloud environments. The guests share insights on the key considerations organizations face when deciding to run AI models on-premises, including compliance requirements and the need to treat AI models with the same level of security as databases.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>What are the benefits and challenges of running AI on-premises?</li><li>How can organizations secure their AI workloads in hybrid cloud environments?</li><li>What impact has DeepSeek had on the AI industry?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>On-prem AI offers unique advantages for industries with strict compliance requirements</li><li>Treating AI models like databases is crucial for ensuring robust security</li><li>The future of AI is likely to be open source, with smaller, domain-specific models gaining traction</li></ul><p>This episode is a must-listen for anyone interested in the intersection of AI and cloud security. John, Doron, and Christopher provide valuable insights and practical advice for organizations navigating this rapidly evolving landscape. Whether you're a security professional, data engineer, or business leader, you'll come away with a deeper understanding of the trends shaping the future of AI and the steps you can take to secure your AI workloads.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.redhat.com/en/technologies/cloud-computing/openshift/advanced-cluster-security-kubernetes/cloud-service/trial">Try Red Hat Advanced Cluster Security Cloud Service</a></li><li><a href="https://www.redhat.com/en/technologies/cloud-computing/openshift/advanced-cluster-security-kubernetes">Red Hat Advanced Cluster Security for Kubernetes</a></li><li><a href="https://learn.redhat.com/t5/Expert-Extra-Videos/Training-an-AI-to-Conquer-Double-Dragon-Reinforcement-Learning/ba-p/43452">Training an AI to Conquer Double Dragon: Reinforcement Learning Demo</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:31) - Red Hat</li>
<li>(01:04) - Meet Christopher and Doron</li>
<li>(05:26) - Past to Present</li>
<li>(07:54) - Trends in the Approach</li>
<li>(12:24) - The Security Side</li>
<li>(16:15) - Key Considerations</li>
<li>(19:26) - Training and Models</li>
<li>(22:33) - Iterations and Shifts</li>
<li>(25:36) - Importance of Security Foundations</li>
<li>(28:35) - Security in Agent Space</li>
<li>(30:00) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Diving into the Rise of On-Prem AI and Cloud Security</strong></p><p>In this episode of Cyber Sentries, host John Richards is joined by Doron Caspin, a Senior Manager of Product Management at Red Hat, and Christopher Nuland, a Technical Marketing Manager at Red Hat. They explore the growing trend of on-premise open source models for running AI and the unique benefits and challenges that come with it. The conversation also touches on how DeepSeek has challenged the big players and validated the value of smaller agentic models.</p><p>John, Doron, and Christopher dive into the shifting landscape of AI and cloud security. They discuss the trends Red Hat is seeing in the industry, such as the move towards smaller, domain-specific language models and the importance of securing AI workloads in hybrid cloud environments. The guests share insights on the key considerations organizations face when deciding to run AI models on-premises, including compliance requirements and the need to treat AI models with the same level of security as databases.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>What are the benefits and challenges of running AI on-premises?</li><li>How can organizations secure their AI workloads in hybrid cloud environments?</li><li>What impact has DeepSeek had on the AI industry?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>On-prem AI offers unique advantages for industries with strict compliance requirements</li><li>Treating AI models like databases is crucial for ensuring robust security</li><li>The future of AI is likely to be open source, with smaller, domain-specific models gaining traction</li></ul><p>This episode is a must-listen for anyone interested in the intersection of AI and cloud security. John, Doron, and Christopher provide valuable insights and practical advice for organizations navigating this rapidly evolving landscape. Whether you're a security professional, data engineer, or business leader, you'll come away with a deeper understanding of the trends shaping the future of AI and the steps you can take to secure your AI workloads.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.redhat.com/en/technologies/cloud-computing/openshift/advanced-cluster-security-kubernetes/cloud-service/trial">Try Red Hat Advanced Cluster Security Cloud Service</a></li><li><a href="https://www.redhat.com/en/technologies/cloud-computing/openshift/advanced-cluster-security-kubernetes">Red Hat Advanced Cluster Security for Kubernetes</a></li><li><a href="https://learn.redhat.com/t5/Expert-Extra-Videos/Training-an-AI-to-Conquer-Double-Dragon-Reinforcement-Learning/ba-p/43452">Training an AI to Conquer Double Dragon: Reinforcement Learning Demo</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:31) - Red Hat</li>
<li>(01:04) - Meet Christopher and Doron</li>
<li>(05:26) - Past to Present</li>
<li>(07:54) - Trends in the Approach</li>
<li>(12:24) - The Security Side</li>
<li>(16:15) - Key Considerations</li>
<li>(19:26) - Training and Models</li>
<li>(22:33) - Iterations and Shifts</li>
<li>(25:36) - Importance of Security Foundations</li>
<li>(28:35) - Security in Agent Space</li>
<li>(30:00) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 12 Feb 2025 03:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/9b2fe227/7554e445.mp3" length="31841439" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/A73Wj0XRFWbJWcTrTTHY51Uey4-3sD1SnU3y494DICw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMDZi/YjZmYjUzMTExZWRk/MjBhMDIwOTFjNDk4/NDM5NS5qcGc.jpg"/>
      <itunes:duration>1969</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Diving into the Rise of On-Prem AI and Cloud Security</strong></p><p>In this episode of Cyber Sentries, host John Richards is joined by Doron Caspin, a Senior Manager of Product Management at Red Hat, and Christopher Nuland, a Technical Marketing Manager at Red Hat. They explore the growing trend of on-premise open source models for running AI and the unique benefits and challenges that come with it. The conversation also touches on how DeepSeek has challenged the big players and validated the value of smaller agentic models.</p><p>John, Doron, and Christopher dive into the shifting landscape of AI and cloud security. They discuss the trends Red Hat is seeing in the industry, such as the move towards smaller, domain-specific language models and the importance of securing AI workloads in hybrid cloud environments. The guests share insights on the key considerations organizations face when deciding to run AI models on-premises, including compliance requirements and the need to treat AI models with the same level of security as databases.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>What are the benefits and challenges of running AI on-premises?</li><li>How can organizations secure their AI workloads in hybrid cloud environments?</li><li>What impact has DeepSeek had on the AI industry?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>On-prem AI offers unique advantages for industries with strict compliance requirements</li><li>Treating AI models like databases is crucial for ensuring robust security</li><li>The future of AI is likely to be open source, with smaller, domain-specific models gaining traction</li></ul><p>This episode is a must-listen for anyone interested in the intersection of AI and cloud security. John, Doron, and Christopher provide valuable insights and practical advice for organizations navigating this rapidly evolving landscape. Whether you're a security professional, data engineer, or business leader, you'll come away with a deeper understanding of the trends shaping the future of AI and the steps you can take to secure your AI workloads.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.redhat.com/en/technologies/cloud-computing/openshift/advanced-cluster-security-kubernetes/cloud-service/trial">Try Red Hat Advanced Cluster Security Cloud Service</a></li><li><a href="https://www.redhat.com/en/technologies/cloud-computing/openshift/advanced-cluster-security-kubernetes">Red Hat Advanced Cluster Security for Kubernetes</a></li><li><a href="https://learn.redhat.com/t5/Expert-Extra-Videos/Training-an-AI-to-Conquer-Double-Dragon-Reinforcement-Learning/ba-p/43452">Training an AI to Conquer Double Dragon: Reinforcement Learning Demo</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:31) - Red Hat</li>
<li>(01:04) - Meet Christopher and Doron</li>
<li>(05:26) - Past to Present</li>
<li>(07:54) - Trends in the Approach</li>
<li>(12:24) - The Security Side</li>
<li>(16:15) - Key Considerations</li>
<li>(19:26) - Training and Models</li>
<li>(22:33) - Iterations and Shifts</li>
<li>(25:36) - Importance of Security Foundations</li>
<li>(28:35) - Security in Agent Space</li>
<li>(30:00) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/9b2fe227/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/9b2fe227/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Play, Grow, Land: The Strategic Path to Enterprise AI with Jim Wilt</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Play, Grow, Land: The Strategic Path to Enterprise AI with Jim Wilt</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7c6a7caa-27d8-4bd4-8d64-f2742450e21e</guid>
      <link>https://share.transistor.fm/s/366d4cf7</link>
      <description>
        <![CDATA[<p><strong>Navigating AI Adoption: From Exploration to Implementation</strong></p><p>In this illuminating episode of Cyber Sentries, John Richards sits down with Jim Wilt, distinguished chief architect at Weave and veteran security practitioner. With decades of experience in emerging technologies since the mainframe era, Jim brings unique insights into how organizations can successfully integrate AI while maintaining robust security practices.</p><p>The conversation delves deep into a three-phase approach for AI adoption: learning, growing, and landing. Jim emphasizes the importance of experimentation before commitment, challenging the common rush to define use cases before understanding the technology's capabilities. He shares practical examples of how organizations can progress from internal testing to external deployment, while maintaining security at each stage. The discussion explores how AI isn't about replacement but enhancement - whether for individual roles or organizational processes - and why adaptability in implementation is crucial for success.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How should organizations approach their initial AI adoption?</li><li>What's the optimal timeline for moving from experimentation to implementation?</li><li>When and how should security measures be integrated into AI initiatives?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>"Replaceable architecture" is becoming more critical than "reusable architecture" in the AI era</li><li>Organizations need 9-18 months of internal testing before external AI deployment</li><li>Security measures should scale up gradually, from minimal during learning to comprehensive in production</li></ul><p>This episode provides invaluable guidance for any organization navigating AI adoption. Jim's practical, experience-based insights cut through the hype, offering a clear roadmap for sustainable AI integration while maintaining security integrity. Whether you're just starting your AI journey or looking to refine your existing approach, this discussion offers actionable strategies for success.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.forbes.com/sites/marisagarcia/2024/02/19/what-air-canada-lost-in-remarkable-lying-ai-chatbot-case/">‘What Air Canada Lost In ‘Remarkable’ Lying AI Chatbot Case’</a></li><li><a href="http://CIO.com">CIO.com</a>: <a href="https://www.cio.com/article/3550265/from-risk-to-reward-mastering-the-art-of-adopting-emerging-technologies.html">From risk to reward: Mastering the art of adopting emerging technologies</a></li><li><a href="https://www.architectureandgovernance.com/applications-technology/generative-ai-genai-a-primer/">Generative AI (GenAI) – A Primer</a></li><li><a href="https://www.architectureandgovernance.com/artificial-intelligence/genai-and-the-human-experience/">GenAI and the Human Experience</a></li><li><a href="https://www.architectureandgovernance.com/applications-technology/replaceable-is-the-new-reusable/">Replaceable is the New Reusable</a></li><li><a href="https://www.linkedin.com/showcase/appliedai-mn/posts/?feedView=all">Applied AI</a></li><li><a href="https://www.linkedin.com/in/jimwilt/">Connect with Jim on LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:55) - Meet Jim Wilt</li>
<li>(01:46) - Jim’s Background</li>
<li>(03:59) - Where to Start</li>
<li>(13:28) - Public vs. Private Models</li>
<li>(17:52) - Time in Growth Period</li>
<li>(18:48) - Use Cases</li>
<li>(21:57) - Transitioning to External Use</li>
<li>(29:06) - Scaling from Personal to Organizational</li>
<li>(31:52) - Safeguarding</li>
<li>(37:21) - Flexibility</li>
<li>(38:34) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Navigating AI Adoption: From Exploration to Implementation</strong></p><p>In this illuminating episode of Cyber Sentries, John Richards sits down with Jim Wilt, distinguished chief architect at Weave and veteran security practitioner. With decades of experience in emerging technologies since the mainframe era, Jim brings unique insights into how organizations can successfully integrate AI while maintaining robust security practices.</p><p>The conversation delves deep into a three-phase approach for AI adoption: learning, growing, and landing. Jim emphasizes the importance of experimentation before commitment, challenging the common rush to define use cases before understanding the technology's capabilities. He shares practical examples of how organizations can progress from internal testing to external deployment, while maintaining security at each stage. The discussion explores how AI isn't about replacement but enhancement - whether for individual roles or organizational processes - and why adaptability in implementation is crucial for success.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How should organizations approach their initial AI adoption?</li><li>What's the optimal timeline for moving from experimentation to implementation?</li><li>When and how should security measures be integrated into AI initiatives?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>"Replaceable architecture" is becoming more critical than "reusable architecture" in the AI era</li><li>Organizations need 9-18 months of internal testing before external AI deployment</li><li>Security measures should scale up gradually, from minimal during learning to comprehensive in production</li></ul><p>This episode provides invaluable guidance for any organization navigating AI adoption. Jim's practical, experience-based insights cut through the hype, offering a clear roadmap for sustainable AI integration while maintaining security integrity. Whether you're just starting your AI journey or looking to refine your existing approach, this discussion offers actionable strategies for success.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.forbes.com/sites/marisagarcia/2024/02/19/what-air-canada-lost-in-remarkable-lying-ai-chatbot-case/">‘What Air Canada Lost In ‘Remarkable’ Lying AI Chatbot Case’</a></li><li><a href="http://CIO.com">CIO.com</a>: <a href="https://www.cio.com/article/3550265/from-risk-to-reward-mastering-the-art-of-adopting-emerging-technologies.html">From risk to reward: Mastering the art of adopting emerging technologies</a></li><li><a href="https://www.architectureandgovernance.com/applications-technology/generative-ai-genai-a-primer/">Generative AI (GenAI) – A Primer</a></li><li><a href="https://www.architectureandgovernance.com/artificial-intelligence/genai-and-the-human-experience/">GenAI and the Human Experience</a></li><li><a href="https://www.architectureandgovernance.com/applications-technology/replaceable-is-the-new-reusable/">Replaceable is the New Reusable</a></li><li><a href="https://www.linkedin.com/showcase/appliedai-mn/posts/?feedView=all">Applied AI</a></li><li><a href="https://www.linkedin.com/in/jimwilt/">Connect with Jim on LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:55) - Meet Jim Wilt</li>
<li>(01:46) - Jim’s Background</li>
<li>(03:59) - Where to Start</li>
<li>(13:28) - Public vs. Private Models</li>
<li>(17:52) - Time in Growth Period</li>
<li>(18:48) - Use Cases</li>
<li>(21:57) - Transitioning to External Use</li>
<li>(29:06) - Scaling from Personal to Organizational</li>
<li>(31:52) - Safeguarding</li>
<li>(37:21) - Flexibility</li>
<li>(38:34) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 08 Jan 2025 03:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/366d4cf7/bef22c31.mp3" length="40894929" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/pvpDCPgvmKDJXdyMz6S94w8gOgQBybmPU3bTO3-HwoY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZTYw/MWMyNjdhMDdhNDY2/NDkwYzYyYzQzMjc1/MDMzYi5qcGc.jpg"/>
      <itunes:duration>2535</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Navigating AI Adoption: From Exploration to Implementation</strong></p><p>In this illuminating episode of Cyber Sentries, John Richards sits down with Jim Wilt, distinguished chief architect at Weave and veteran security practitioner. With decades of experience in emerging technologies since the mainframe era, Jim brings unique insights into how organizations can successfully integrate AI while maintaining robust security practices.</p><p>The conversation delves deep into a three-phase approach for AI adoption: learning, growing, and landing. Jim emphasizes the importance of experimentation before commitment, challenging the common rush to define use cases before understanding the technology's capabilities. He shares practical examples of how organizations can progress from internal testing to external deployment, while maintaining security at each stage. The discussion explores how AI isn't about replacement but enhancement - whether for individual roles or organizational processes - and why adaptability in implementation is crucial for success.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How should organizations approach their initial AI adoption?</li><li>What's the optimal timeline for moving from experimentation to implementation?</li><li>When and how should security measures be integrated into AI initiatives?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>"Replaceable architecture" is becoming more critical than "reusable architecture" in the AI era</li><li>Organizations need 9-18 months of internal testing before external AI deployment</li><li>Security measures should scale up gradually, from minimal during learning to comprehensive in production</li></ul><p>This episode provides invaluable guidance for any organization navigating AI adoption. Jim's practical, experience-based insights cut through the hype, offering a clear roadmap for sustainable AI integration while maintaining security integrity. Whether you're just starting your AI journey or looking to refine your existing approach, this discussion offers actionable strategies for success.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.forbes.com/sites/marisagarcia/2024/02/19/what-air-canada-lost-in-remarkable-lying-ai-chatbot-case/">‘What Air Canada Lost In ‘Remarkable’ Lying AI Chatbot Case’</a></li><li><a href="http://CIO.com">CIO.com</a>: <a href="https://www.cio.com/article/3550265/from-risk-to-reward-mastering-the-art-of-adopting-emerging-technologies.html">From risk to reward: Mastering the art of adopting emerging technologies</a></li><li><a href="https://www.architectureandgovernance.com/applications-technology/generative-ai-genai-a-primer/">Generative AI (GenAI) – A Primer</a></li><li><a href="https://www.architectureandgovernance.com/artificial-intelligence/genai-and-the-human-experience/">GenAI and the Human Experience</a></li><li><a href="https://www.architectureandgovernance.com/applications-technology/replaceable-is-the-new-reusable/">Replaceable is the New Reusable</a></li><li><a href="https://www.linkedin.com/showcase/appliedai-mn/posts/?feedView=all">Applied AI</a></li><li><a href="https://www.linkedin.com/in/jimwilt/">Connect with Jim on LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:55) - Meet Jim Wilt</li>
<li>(01:46) - Jim’s Background</li>
<li>(03:59) - Where to Start</li>
<li>(13:28) - Public vs. Private Models</li>
<li>(17:52) - Time in Growth Period</li>
<li>(18:48) - Use Cases</li>
<li>(21:57) - Transitioning to External Use</li>
<li>(29:06) - Scaling from Personal to Organizational</li>
<li>(31:52) - Safeguarding</li>
<li>(37:21) - Flexibility</li>
<li>(38:34) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/366d4cf7/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/366d4cf7/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>AI's Identity Revolution: Securing Disconnected Apps and Eliminating Human Error with Bel Lepe</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>AI's Identity Revolution: Securing Disconnected Apps and Eliminating Human Error with Bel Lepe</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8f2f6784-7c33-4526-a1b1-8c7ebfad0b30</guid>
      <link>https://share.transistor.fm/s/28cfcab9</link>
      <description>
        <![CDATA[<p><strong>Bel Lepe Reveals How AI Reduces Security Risks By Removing the Human Element</strong></p><p>In this episode of Cyber Sentries, host John Richards is joined by Bel Lepe, Co-founder and CEO of Cerby, to explore how removing the human factor through automation can dramatically decrease an organization's attack surface. John and Bel dive into the transformative potential of AI in identity and access management, especially for applications that don't support modern security protocols.</p><p>Bel shares his insights on the current state of identity security and how Cerby is tackling the challenge of securing disconnected apps at scale. He explains how generative AI enables Cerby to build and maintain integrations for thousands of apps without relying on standards. The discussion also touches on emerging trends in identity, including the fragmentation of identity across multiple platforms and the growing threat of AI-powered impersonation attacks.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can AI reduce security risks by removing the human element?</li><li>What are the key challenges in securing apps that don't support modern identity protocols?</li><li>How will the rise of AI shape the future of identity security?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>The majority of security incidents are caused by human error</li><li>AI allows custom integrations to be built at scale without relying on standards</li><li>Multi-factor authentication is crucial for protecting against emerging threats</li></ul><p>Whether you're a security professional looking to stay ahead of the curve or a business leader seeking to understand the impact of AI on your organization's security posture, this episode is packed with valuable insights. Tune in to learn how AI is revolutionizing identity and access management and what you can do to safeguard your organization in the face of evolving threats.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.cerby.com/">Learn more about Cerby</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(01:03) - Meet Bel Lepe</li>
<li>(02:42) - Validating the Problem</li>
<li>(04:07) - The Problem</li>
<li>(06:32) - Their Approach</li>
<li>(08:24) - Scaling</li>
<li>(10:38) - Looking to the Future</li>
<li>(15:32) - The Future of Identity</li>
<li>(22:25) - Building Better Awareness</li>
<li>(23:46) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Bel Lepe Reveals How AI Reduces Security Risks By Removing the Human Element</strong></p><p>In this episode of Cyber Sentries, host John Richards is joined by Bel Lepe, Co-founder and CEO of Cerby, to explore how removing the human factor through automation can dramatically decrease an organization's attack surface. John and Bel dive into the transformative potential of AI in identity and access management, especially for applications that don't support modern security protocols.</p><p>Bel shares his insights on the current state of identity security and how Cerby is tackling the challenge of securing disconnected apps at scale. He explains how generative AI enables Cerby to build and maintain integrations for thousands of apps without relying on standards. The discussion also touches on emerging trends in identity, including the fragmentation of identity across multiple platforms and the growing threat of AI-powered impersonation attacks.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can AI reduce security risks by removing the human element?</li><li>What are the key challenges in securing apps that don't support modern identity protocols?</li><li>How will the rise of AI shape the future of identity security?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>The majority of security incidents are caused by human error</li><li>AI allows custom integrations to be built at scale without relying on standards</li><li>Multi-factor authentication is crucial for protecting against emerging threats</li></ul><p>Whether you're a security professional looking to stay ahead of the curve or a business leader seeking to understand the impact of AI on your organization's security posture, this episode is packed with valuable insights. Tune in to learn how AI is revolutionizing identity and access management and what you can do to safeguard your organization in the face of evolving threats.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.cerby.com/">Learn more about Cerby</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(01:03) - Meet Bel Lepe</li>
<li>(02:42) - Validating the Problem</li>
<li>(04:07) - The Problem</li>
<li>(06:32) - Their Approach</li>
<li>(08:24) - Scaling</li>
<li>(10:38) - Looking to the Future</li>
<li>(15:32) - The Future of Identity</li>
<li>(22:25) - Building Better Awareness</li>
<li>(23:46) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 11 Dec 2024 03:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/28cfcab9/6a70e4d6.mp3" length="24865859" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/CS654JJKkDJ82b8xTWgOZnqWIbRfTw9p7Us24-dF-c0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNTU5/OGZhYzk2YzhkZmEy/MTk0OTg2NzU2N2Zj/YWJlNC5qcGc.jpg"/>
      <itunes:duration>1552</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Bel Lepe Reveals How AI Reduces Security Risks By Removing the Human Element</strong></p><p>In this episode of Cyber Sentries, host John Richards is joined by Bel Lepe, Co-founder and CEO of Cerby, to explore how removing the human factor through automation can dramatically decrease an organization's attack surface. John and Bel dive into the transformative potential of AI in identity and access management, especially for applications that don't support modern security protocols.</p><p>Bel shares his insights on the current state of identity security and how Cerby is tackling the challenge of securing disconnected apps at scale. He explains how generative AI enables Cerby to build and maintain integrations for thousands of apps without relying on standards. The discussion also touches on emerging trends in identity, including the fragmentation of identity across multiple platforms and the growing threat of AI-powered impersonation attacks.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can AI reduce security risks by removing the human element?</li><li>What are the key challenges in securing apps that don't support modern identity protocols?</li><li>How will the rise of AI shape the future of identity security?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>The majority of security incidents are caused by human error</li><li>AI allows custom integrations to be built at scale without relying on standards</li><li>Multi-factor authentication is crucial for protecting against emerging threats</li></ul><p>Whether you're a security professional looking to stay ahead of the curve or a business leader seeking to understand the impact of AI on your organization's security posture, this episode is packed with valuable insights. Tune in to learn how AI is revolutionizing identity and access management and what you can do to safeguard your organization in the face of evolving threats.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.cerby.com/">Learn more about Cerby</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(01:03) - Meet Bel Lepe</li>
<li>(02:42) - Validating the Problem</li>
<li>(04:07) - The Problem</li>
<li>(06:32) - Their Approach</li>
<li>(08:24) - Scaling</li>
<li>(10:38) - Looking to the Future</li>
<li>(15:32) - The Future of Identity</li>
<li>(22:25) - Building Better Awareness</li>
<li>(23:46) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/28cfcab9/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/28cfcab9/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The Adaptive CISO: Digital Defense Evolution with Timothy Youngblood</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>The Adaptive CISO: Digital Defense Evolution with Timothy Youngblood</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0581e48c-cdda-4d59-959a-c1be3e7d10a6</guid>
      <link>https://share.transistor.fm/s/0d3b680d</link>
      <description>
        <![CDATA[<p><strong>Securing the Digital Future with Former Fortune 500 CISO Tim Youngblood</strong></p><p>John Richards welcomes Timothy Youngblood, a four-time Fortune 500 CISO and current CISO in Residence at Astrix Security, to discuss the evolving landscape of cybersecurity leadership. With experience at Dell, Kimberly Clark, McDonald's, and T-Mobile, Tim brings unique insights into how security leadership must adapt to emerging threats while maintaining operational effectiveness.</p><p>The conversation explores Tim's journey from Dell's first CISO to handling security across diverse industries. John and Tim delve into fascinating security incidents, including a notable McFlurry API DDoS attack at McDonald's, demonstrating how modern security challenges can emerge from unexpected places. The discussion shifts to the critical topic of non-human identity attacks and the growing importance of managing machine identities in cloud environments. Tim shares his perspective on how AI is reshaping security practices and why education remains fundamental to effective security programs.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How do companies integrate security during acquisitions and mergers?</li><li>What unique challenges do global companies face in cybersecurity?</li><li>How should organizations approach non-human identity security?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Security leadership requires strong business acumen alongside technical expertise</li><li>Education and culture-building are crucial for successful security programs</li><li>The scale of non-human identities poses a major security blind spot for many organizations</li></ul><p>This episode offers invaluable insights for security professionals navigating complex organizational challenges while adapting to emerging threats. Whether you're a seasoned CISO or aspiring security leader, Tim's practical experiences and strategic approaches provide actionable wisdom for building robust security programs in any environment.</p><p><br>Links &amp; Notes</p><ul><li><a href="https://www.gomboc.ai/blog/cloud-control-q-a-with-tim-youngblood-on-securing-non-human-identities-and-preparing-for-ai-driven-cyber-threats">Securing Non-human Identities</a></li><li><a href="https://www.linkedin.com/in/timothyyoungblood/">Find Tim on LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:12) - Meet Tim Youngblood</li>
<li>(08:07) - Challenges</li>
<li>(11:03) - Change Management</li>
<li>(11:37) - Transitioning to Next Role</li>
<li>(16:21) - McDonald’s</li>
<li>(19:57) - Flexibility</li>
<li>(21:50) - Handling New Challenges</li>
<li>(26:11) - Non-Human Identity Attacks</li>
<li>(33:55) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Securing the Digital Future with Former Fortune 500 CISO Tim Youngblood</strong></p><p>John Richards welcomes Timothy Youngblood, a four-time Fortune 500 CISO and current CISO in Residence at Astrix Security, to discuss the evolving landscape of cybersecurity leadership. With experience at Dell, Kimberly Clark, McDonald's, and T-Mobile, Tim brings unique insights into how security leadership must adapt to emerging threats while maintaining operational effectiveness.</p><p>The conversation explores Tim's journey from Dell's first CISO to handling security across diverse industries. John and Tim delve into fascinating security incidents, including a notable McFlurry API DDoS attack at McDonald's, demonstrating how modern security challenges can emerge from unexpected places. The discussion shifts to the critical topic of non-human identity attacks and the growing importance of managing machine identities in cloud environments. Tim shares his perspective on how AI is reshaping security practices and why education remains fundamental to effective security programs.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How do companies integrate security during acquisitions and mergers?</li><li>What unique challenges do global companies face in cybersecurity?</li><li>How should organizations approach non-human identity security?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Security leadership requires strong business acumen alongside technical expertise</li><li>Education and culture-building are crucial for successful security programs</li><li>The scale of non-human identities poses a major security blind spot for many organizations</li></ul><p>This episode offers invaluable insights for security professionals navigating complex organizational challenges while adapting to emerging threats. Whether you're a seasoned CISO or aspiring security leader, Tim's practical experiences and strategic approaches provide actionable wisdom for building robust security programs in any environment.</p><p><br>Links &amp; Notes</p><ul><li><a href="https://www.gomboc.ai/blog/cloud-control-q-a-with-tim-youngblood-on-securing-non-human-identities-and-preparing-for-ai-driven-cyber-threats">Securing Non-human Identities</a></li><li><a href="https://www.linkedin.com/in/timothyyoungblood/">Find Tim on LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:12) - Meet Tim Youngblood</li>
<li>(08:07) - Challenges</li>
<li>(11:03) - Change Management</li>
<li>(11:37) - Transitioning to Next Role</li>
<li>(16:21) - McDonald’s</li>
<li>(19:57) - Flexibility</li>
<li>(21:50) - Handling New Challenges</li>
<li>(26:11) - Non-Human Identity Attacks</li>
<li>(33:55) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 13 Nov 2024 03:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/0d3b680d/5fc37288.mp3" length="35056243" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/WbgkXuleYDEmgTkMx6Nk5IIpDHXMxSm0flxGXm1m0qA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Zjgy/ZGIxYTY0NjZmNzQ1/ZjhmMjVhNDFhMTFm/MmJjOS5qcGc.jpg"/>
      <itunes:duration>2170</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Securing the Digital Future with Former Fortune 500 CISO Tim Youngblood</strong></p><p>John Richards welcomes Timothy Youngblood, a four-time Fortune 500 CISO and current CISO in Residence at Astrix Security, to discuss the evolving landscape of cybersecurity leadership. With experience at Dell, Kimberly Clark, McDonald's, and T-Mobile, Tim brings unique insights into how security leadership must adapt to emerging threats while maintaining operational effectiveness.</p><p>The conversation explores Tim's journey from Dell's first CISO to handling security across diverse industries. John and Tim delve into fascinating security incidents, including a notable McFlurry API DDoS attack at McDonald's, demonstrating how modern security challenges can emerge from unexpected places. The discussion shifts to the critical topic of non-human identity attacks and the growing importance of managing machine identities in cloud environments. Tim shares his perspective on how AI is reshaping security practices and why education remains fundamental to effective security programs.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How do companies integrate security during acquisitions and mergers?</li><li>What unique challenges do global companies face in cybersecurity?</li><li>How should organizations approach non-human identity security?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Security leadership requires strong business acumen alongside technical expertise</li><li>Education and culture-building are crucial for successful security programs</li><li>The scale of non-human identities poses a major security blind spot for many organizations</li></ul><p>This episode offers invaluable insights for security professionals navigating complex organizational challenges while adapting to emerging threats. Whether you're a seasoned CISO or aspiring security leader, Tim's practical experiences and strategic approaches provide actionable wisdom for building robust security programs in any environment.</p><p><br>Links &amp; Notes</p><ul><li><a href="https://www.gomboc.ai/blog/cloud-control-q-a-with-tim-youngblood-on-securing-non-human-identities-and-preparing-for-ai-driven-cyber-threats">Securing Non-human Identities</a></li><li><a href="https://www.linkedin.com/in/timothyyoungblood/">Find Tim on LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:12) - Meet Tim Youngblood</li>
<li>(08:07) - Challenges</li>
<li>(11:03) - Change Management</li>
<li>(11:37) - Transitioning to Next Role</li>
<li>(16:21) - McDonald’s</li>
<li>(19:57) - Flexibility</li>
<li>(21:50) - Handling New Challenges</li>
<li>(26:11) - Non-Human Identity Attacks</li>
<li>(33:55) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/0d3b680d/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/0d3b680d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Open Source AI Unleashed: Transparency, Sovereignty, and Data Control with JJ Asghar</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Open Source AI Unleashed: Transparency, Sovereignty, and Data Control with JJ Asghar</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e2fe4cc7-205c-44b5-b9cb-880a4937a7e4</guid>
      <link>https://share.transistor.fm/s/b7276841</link>
      <description>
        <![CDATA[<p><strong>Open Source AI: Transparency, Sovereignty, and Who Controls the Data</strong></p><p>In this episode of Cyber Sentries, host John Richards is joined by JJ Asghar, an Open Source Champion and Developer Advocate at IBM. They explore the importance of open source in the AI world, how transparency can allow for AI sovereignty, and why we should care about who controls the data.</p><p>JJ shares his journey into the AI space at IBM and his strong opinions formed from working on open source AI projects. The discussion delves into the differences between mainstream closed-source AI models and the emerging open-source alternatives, highlighting the privacy and trust aspects that are becoming increasingly important, especially outside the United States.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How does open source fit into the recent surge of AI?</li><li>What are the benefits of open-source AI models compared to closed-source ones?</li><li>Why is AI sovereignty important, and how does it relate to open source?</li></ul><p>The conversation covers the challenges of building and running AI models, the compute resources required, and how open-source approaches can provide more transparency and control. JJ explains the concept of AI sovereignty, where countries and organizations want to run AI within their borders and under their own rules and restrictions. This brings up issues of hardware accessibility and the lifecycle of AI models.</p><p><strong>Key Takeaways:</strong></p><ul><li>Open-source AI allows for greater transparency and trust compared to closed-source models</li><li>AI sovereignty is becoming increasingly important for countries with strict privacy laws</li><li>The lifecycle of AI involves training, fine-tuning, and inferencing, each with different compute requirements</li></ul><p>While open source offers many benefits, the discussion also touches on the challenges, such as the potential for model poisoning and the current lack of genealogy in AI models. Despite these hurdles, open source remains a powerful force in the AI world, with the potential to provide more eyes on the code and faster problem resolution.</p><p>This episode offers valuable insights into the complex world of AI, the role of open source, and the importance of data control and transparency. Whether you're a developer, a security professional, or simply interested in the future of AI, this conversation provides a thought-provoking look at the challenges and opportunities ahead.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.ibm.com/granite">IBM's open source foundational model Granite</a></li><li><a href="https://www.ibm.com/downloads/cas/X9W4O6BM">Granite Foundation Models Paper</a></li><li><a href="https://huggingface.co/">Hugging Face</a></li><li><a href="https://www.ibm.com/products/watsonx-code-assistant">IBM's coding assistance project</a></li><li><a href="https://instructlab.ai/">InstructLab</a></li><li><a href="https://www.crewai.com/">Crew AI</a></li><li><a href="https://www.politico.com/newsletters/digital-future-daily/2024/09/18/should-the-u-s-seek-ai-sovereignty-00179910">AI Sovereignty Paper</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:55) - Meet JJ Asghar</li>
<li>(03:17) - Working with AI</li>
<li>(04:29) - AI and Open Source</li>
<li>(10:31) - Approach</li>
<li>(14:38) - Sovereignty</li>
<li>(18:20) - Inferencing</li>
<li>(20:47) - Black Box Situation</li>
<li>(30:10) - Weighing the Differences</li>
<li>(35:09) - Timeline</li>
<li>(40:39) - Finding JJ</li>
<li>(42:06) - Communities</li>
<li>(44:49) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Open Source AI: Transparency, Sovereignty, and Who Controls the Data</strong></p><p>In this episode of Cyber Sentries, host John Richards is joined by JJ Asghar, an Open Source Champion and Developer Advocate at IBM. They explore the importance of open source in the AI world, how transparency can allow for AI sovereignty, and why we should care about who controls the data.</p><p>JJ shares his journey into the AI space at IBM and his strong opinions formed from working on open source AI projects. The discussion delves into the differences between mainstream closed-source AI models and the emerging open-source alternatives, highlighting the privacy and trust aspects that are becoming increasingly important, especially outside the United States.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How does open source fit into the recent surge of AI?</li><li>What are the benefits of open-source AI models compared to closed-source ones?</li><li>Why is AI sovereignty important, and how does it relate to open source?</li></ul><p>The conversation covers the challenges of building and running AI models, the compute resources required, and how open-source approaches can provide more transparency and control. JJ explains the concept of AI sovereignty, where countries and organizations want to run AI within their borders and under their own rules and restrictions. This brings up issues of hardware accessibility and the lifecycle of AI models.</p><p><strong>Key Takeaways:</strong></p><ul><li>Open-source AI allows for greater transparency and trust compared to closed-source models</li><li>AI sovereignty is becoming increasingly important for countries with strict privacy laws</li><li>The lifecycle of AI involves training, fine-tuning, and inferencing, each with different compute requirements</li></ul><p>While open source offers many benefits, the discussion also touches on the challenges, such as the potential for model poisoning and the current lack of genealogy in AI models. Despite these hurdles, open source remains a powerful force in the AI world, with the potential to provide more eyes on the code and faster problem resolution.</p><p>This episode offers valuable insights into the complex world of AI, the role of open source, and the importance of data control and transparency. Whether you're a developer, a security professional, or simply interested in the future of AI, this conversation provides a thought-provoking look at the challenges and opportunities ahead.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.ibm.com/granite">IBM's open source foundational model Granite</a></li><li><a href="https://www.ibm.com/downloads/cas/X9W4O6BM">Granite Foundation Models Paper</a></li><li><a href="https://huggingface.co/">Hugging Face</a></li><li><a href="https://www.ibm.com/products/watsonx-code-assistant">IBM's coding assistance project</a></li><li><a href="https://instructlab.ai/">InstructLab</a></li><li><a href="https://www.crewai.com/">Crew AI</a></li><li><a href="https://www.politico.com/newsletters/digital-future-daily/2024/09/18/should-the-u-s-seek-ai-sovereignty-00179910">AI Sovereignty Paper</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:55) - Meet JJ Asghar</li>
<li>(03:17) - Working with AI</li>
<li>(04:29) - AI and Open Source</li>
<li>(10:31) - Approach</li>
<li>(14:38) - Sovereignty</li>
<li>(18:20) - Inferencing</li>
<li>(20:47) - Black Box Situation</li>
<li>(30:10) - Weighing the Differences</li>
<li>(35:09) - Timeline</li>
<li>(40:39) - Finding JJ</li>
<li>(42:06) - Communities</li>
<li>(44:49) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 09 Oct 2024 02:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/b7276841/9f9cd201.mp3" length="22586913" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Sypa-sauJJJLTcm3ca0SolAaXAC5Xf_SymB-3HHOE9I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZmJk/Mjk5NmQ1Y2E3MWMw/ZWFjYjVhNjI0Y2Q3/YzljMi5qcGc.jpg"/>
      <itunes:duration>2781</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Open Source AI: Transparency, Sovereignty, and Who Controls the Data</strong></p><p>In this episode of Cyber Sentries, host John Richards is joined by JJ Asghar, an Open Source Champion and Developer Advocate at IBM. They explore the importance of open source in the AI world, how transparency can allow for AI sovereignty, and why we should care about who controls the data.</p><p>JJ shares his journey into the AI space at IBM and his strong opinions formed from working on open source AI projects. The discussion delves into the differences between mainstream closed-source AI models and the emerging open-source alternatives, highlighting the privacy and trust aspects that are becoming increasingly important, especially outside the United States.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How does open source fit into the recent surge of AI?</li><li>What are the benefits of open-source AI models compared to closed-source ones?</li><li>Why is AI sovereignty important, and how does it relate to open source?</li></ul><p>The conversation covers the challenges of building and running AI models, the compute resources required, and how open-source approaches can provide more transparency and control. JJ explains the concept of AI sovereignty, where countries and organizations want to run AI within their borders and under their own rules and restrictions. This brings up issues of hardware accessibility and the lifecycle of AI models.</p><p><strong>Key Takeaways:</strong></p><ul><li>Open-source AI allows for greater transparency and trust compared to closed-source models</li><li>AI sovereignty is becoming increasingly important for countries with strict privacy laws</li><li>The lifecycle of AI involves training, fine-tuning, and inferencing, each with different compute requirements</li></ul><p>While open source offers many benefits, the discussion also touches on the challenges, such as the potential for model poisoning and the current lack of genealogy in AI models. Despite these hurdles, open source remains a powerful force in the AI world, with the potential to provide more eyes on the code and faster problem resolution.</p><p>This episode offers valuable insights into the complex world of AI, the role of open source, and the importance of data control and transparency. Whether you're a developer, a security professional, or simply interested in the future of AI, this conversation provides a thought-provoking look at the challenges and opportunities ahead.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.ibm.com/granite">IBM's open source foundational model Granite</a></li><li><a href="https://www.ibm.com/downloads/cas/X9W4O6BM">Granite Foundation Models Paper</a></li><li><a href="https://huggingface.co/">Hugging Face</a></li><li><a href="https://www.ibm.com/products/watsonx-code-assistant">IBM's coding assistance project</a></li><li><a href="https://instructlab.ai/">InstructLab</a></li><li><a href="https://www.crewai.com/">Crew AI</a></li><li><a href="https://www.politico.com/newsletters/digital-future-daily/2024/09/18/should-the-u-s-seek-ai-sovereignty-00179910">AI Sovereignty Paper</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:55) - Meet JJ Asghar</li>
<li>(03:17) - Working with AI</li>
<li>(04:29) - AI and Open Source</li>
<li>(10:31) - Approach</li>
<li>(14:38) - Sovereignty</li>
<li>(18:20) - Inferencing</li>
<li>(20:47) - Black Box Situation</li>
<li>(30:10) - Weighing the Differences</li>
<li>(35:09) - Timeline</li>
<li>(40:39) - Finding JJ</li>
<li>(42:06) - Communities</li>
<li>(44:49) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>JJ Asghar</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/b7276841/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/b7276841/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Demystifying Zero Trust: Key Policy Checks for Cloud Native Security with Zack Butcher</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Demystifying Zero Trust: Key Policy Checks for Cloud Native Security with Zack Butcher</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">57eaf6bb-67f4-4adc-915f-fc32fe9c3915</guid>
      <link>https://share.transistor.fm/s/80e08b9e</link>
      <description>
        <![CDATA[<p><strong>Decoding Zero Trust Security for Cloud Native Environments</strong></p><p>In this episode of Cyber Sentries, John Richards welcomes Zack Butcher, Founding Engineer at Tetrate, to explore the critical components of zero trust security for cloud native and microservice environments. Zack, with deep expertise from his time at Google and work with NIST, shares practical insights on achieving a zero trust posture.</p><p>John and Zack dive into the fundamental mindset shift required for zero trust - moving from implicit to explicit trust. They break down the five key policy checks that define runtime zero trust, and how these controls can enable identity-based segmentation. Zack illuminates how this approach allows organizations to boost assurance while strategically relaxing painful network-level constraints.</p><p><strong>Questions we answer in this episode:</strong><br>• What does Zero Trust really mean in practice?<br>• How can organizations adopt a Zero Trust mindset?<br>• What role does a service mesh play in Zero Trust?</p><p><strong>Key Takeaways:</strong><br>• Zero Trust requires making all trust explicit<br>• 5 key runtime policy checks define a Zero Trust posture<br>• Identity-based policies boost assurance and agility</p><p>Whether you're wrestling with Zero Trust definitions, microservice security, or cloud native challenges, this episode delivers a wealth of battle-tested wisdom. Zack's clear explanations and examples, combined with John's knack for extracting practical takeaways, make this a must-listen for anyone navigating the complex world of cloud native security.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.linkedin.com/in/zackbutcher/">Zack on LinkedIn</a></li><li><a href="https://csrc.nist.gov/pubs/sp/800/204/final">Security Strategies for Microservices-based Application Systems</a> (Sidebar has the A-D publications)</li><li><a href="https://csrc.nist.gov/pubs/sp/800/207/a/final">A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments</a></li><li><a href="https://academy.tetrate.io/">Tetrate Academy</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:01) - Meet Zack</li>
<li>(04:55) - Reflecting on the Journey</li>
<li>(05:46) - Deep on Security Aspect</li>
<li>(09:52) - Zero Trust and Definitions </li>
<li>(15:35) - Consensus</li>
<li>(18:09) - Availability and Assurance</li>
<li>(22:28) - Driving Growth</li>
<li>(25:44) - How AI Can Be Used for Security</li>
<li>(30:07) - Links and Finding Zack</li>
<li>(30:36) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Decoding Zero Trust Security for Cloud Native Environments</strong></p><p>In this episode of Cyber Sentries, John Richards welcomes Zack Butcher, Founding Engineer at Tetrate, to explore the critical components of zero trust security for cloud native and microservice environments. Zack, with deep expertise from his time at Google and work with NIST, shares practical insights on achieving a zero trust posture.</p><p>John and Zack dive into the fundamental mindset shift required for zero trust - moving from implicit to explicit trust. They break down the five key policy checks that define runtime zero trust, and how these controls can enable identity-based segmentation. Zack illuminates how this approach allows organizations to boost assurance while strategically relaxing painful network-level constraints.</p><p><strong>Questions we answer in this episode:</strong><br>• What does Zero Trust really mean in practice?<br>• How can organizations adopt a Zero Trust mindset?<br>• What role does a service mesh play in Zero Trust?</p><p><strong>Key Takeaways:</strong><br>• Zero Trust requires making all trust explicit<br>• 5 key runtime policy checks define a Zero Trust posture<br>• Identity-based policies boost assurance and agility</p><p>Whether you're wrestling with Zero Trust definitions, microservice security, or cloud native challenges, this episode delivers a wealth of battle-tested wisdom. Zack's clear explanations and examples, combined with John's knack for extracting practical takeaways, make this a must-listen for anyone navigating the complex world of cloud native security.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.linkedin.com/in/zackbutcher/">Zack on LinkedIn</a></li><li><a href="https://csrc.nist.gov/pubs/sp/800/204/final">Security Strategies for Microservices-based Application Systems</a> (Sidebar has the A-D publications)</li><li><a href="https://csrc.nist.gov/pubs/sp/800/207/a/final">A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments</a></li><li><a href="https://academy.tetrate.io/">Tetrate Academy</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:01) - Meet Zack</li>
<li>(04:55) - Reflecting on the Journey</li>
<li>(05:46) - Deep on Security Aspect</li>
<li>(09:52) - Zero Trust and Definitions </li>
<li>(15:35) - Consensus</li>
<li>(18:09) - Availability and Assurance</li>
<li>(22:28) - Driving Growth</li>
<li>(25:44) - How AI Can Be Used for Security</li>
<li>(30:07) - Links and Finding Zack</li>
<li>(30:36) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 11 Sep 2024 02:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/80e08b9e/657a7684.mp3" length="15957087" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/1xQDyZ32vnfv0lBL0R4RNZhHgTviP50EZIHiJejxEQM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yMTYz/NjgyM2E1YmNjODA5/NjkxNjk2ZjE0N2Qw/YzMwYy5qcGc.jpg"/>
      <itunes:duration>1952</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Decoding Zero Trust Security for Cloud Native Environments</strong></p><p>In this episode of Cyber Sentries, John Richards welcomes Zack Butcher, Founding Engineer at Tetrate, to explore the critical components of zero trust security for cloud native and microservice environments. Zack, with deep expertise from his time at Google and work with NIST, shares practical insights on achieving a zero trust posture.</p><p>John and Zack dive into the fundamental mindset shift required for zero trust - moving from implicit to explicit trust. They break down the five key policy checks that define runtime zero trust, and how these controls can enable identity-based segmentation. Zack illuminates how this approach allows organizations to boost assurance while strategically relaxing painful network-level constraints.</p><p><strong>Questions we answer in this episode:</strong><br>• What does Zero Trust really mean in practice?<br>• How can organizations adopt a Zero Trust mindset?<br>• What role does a service mesh play in Zero Trust?</p><p><strong>Key Takeaways:</strong><br>• Zero Trust requires making all trust explicit<br>• 5 key runtime policy checks define a Zero Trust posture<br>• Identity-based policies boost assurance and agility</p><p>Whether you're wrestling with Zero Trust definitions, microservice security, or cloud native challenges, this episode delivers a wealth of battle-tested wisdom. Zack's clear explanations and examples, combined with John's knack for extracting practical takeaways, make this a must-listen for anyone navigating the complex world of cloud native security.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.linkedin.com/in/zackbutcher/">Zack on LinkedIn</a></li><li><a href="https://csrc.nist.gov/pubs/sp/800/204/final">Security Strategies for Microservices-based Application Systems</a> (Sidebar has the A-D publications)</li><li><a href="https://csrc.nist.gov/pubs/sp/800/207/a/final">A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments</a></li><li><a href="https://academy.tetrate.io/">Tetrate Academy</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(01:01) - Meet Zack</li>
<li>(04:55) - Reflecting on the Journey</li>
<li>(05:46) - Deep on Security Aspect</li>
<li>(09:52) - Zero Trust and Definitions </li>
<li>(15:35) - Consensus</li>
<li>(18:09) - Availability and Assurance</li>
<li>(22:28) - Driving Growth</li>
<li>(25:44) - How AI Can Be Used for Security</li>
<li>(30:07) - Links and Finding Zack</li>
<li>(30:36) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Tetrate, Zack Butcher, Zero Trust, Cloud Native Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/80e08b9e/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/80e08b9e/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Decoding Machine Language: The Next Phase of the AI Cloud Security Revolution with Murali Balcha</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Decoding Machine Language: The Next Phase of the AI Cloud Security Revolution with Murali Balcha</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bc7f21c5-4c67-471c-9804-fff4d74077e0</guid>
      <link>https://share.transistor.fm/s/937b3685</link>
      <description>
        <![CDATA[<p><strong>Decoding the Language of Machines: AI's Potential to Revolutionize Cloud Security</strong></p><p>In this episode of Cyber Sentries, host John Richards is joined by Murali Balcha, founder and CTO at Trilio, to explore how AI could transform cloud security by understanding the unique language of machines. Balcha brings over 20 years of experience in IT, particularly in storage systems, to the conversation.</p><p><strong>Harnessing AI for Proactive Security</strong><br>John and Murali dive into the potential of AI to enhance cloud security by analyzing the vast amounts of data generated by IT systems. By treating system logs as a language that AI can learn, models could be trained to identify threats and anomalies in real-time, even detecting zero-day attacks that traditional rule-based systems might miss. This shift towards proactive, AI-driven security could significantly reduce the time between a threat emerging and its detection.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can AI be applied to cloud security?</li><li>What advantages does AI offer over traditional rule-based security systems?</li><li>How can AI models be trained to understand the unique language of machines?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>AI has the potential to revolutionize cloud security by learning the language of machines</li><li>AI models can identify threats and anomalies in real-time, even detecting zero-day attacks</li><li>Shifting towards proactive, AI-driven security could significantly enhance threat detection and response times</li></ul><p>This episode offers valuable insights into the cutting-edge applications of AI in cloud security. Listeners will gain a deeper understanding of how machine learning can be harnessed to protect their systems and data, as well as a glimpse into the future of proactive, intelligent security solutions.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://medium.com/@murali.balcha/cyber-security-in-the-age-of-ai-e545f56bbdbb">Check out Murali’s blog</a></li><li>Find Murali on <a href="https://www.linkedin.com/in/muralibalcha/">LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:56) - Meet Murali Balcha</li>
<li>(03:29) - AI’s Evolution</li>
<li>(06:06) - Transferring Data</li>
<li>(14:43) - How Trillio’s Looking at AI</li>
<li>(23:36) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Decoding the Language of Machines: AI's Potential to Revolutionize Cloud Security</strong></p><p>In this episode of Cyber Sentries, host John Richards is joined by Murali Balcha, founder and CTO at Trilio, to explore how AI could transform cloud security by understanding the unique language of machines. Balcha brings over 20 years of experience in IT, particularly in storage systems, to the conversation.</p><p><strong>Harnessing AI for Proactive Security</strong><br>John and Murali dive into the potential of AI to enhance cloud security by analyzing the vast amounts of data generated by IT systems. By treating system logs as a language that AI can learn, models could be trained to identify threats and anomalies in real-time, even detecting zero-day attacks that traditional rule-based systems might miss. This shift towards proactive, AI-driven security could significantly reduce the time between a threat emerging and its detection.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can AI be applied to cloud security?</li><li>What advantages does AI offer over traditional rule-based security systems?</li><li>How can AI models be trained to understand the unique language of machines?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>AI has the potential to revolutionize cloud security by learning the language of machines</li><li>AI models can identify threats and anomalies in real-time, even detecting zero-day attacks</li><li>Shifting towards proactive, AI-driven security could significantly enhance threat detection and response times</li></ul><p>This episode offers valuable insights into the cutting-edge applications of AI in cloud security. Listeners will gain a deeper understanding of how machine learning can be harnessed to protect their systems and data, as well as a glimpse into the future of proactive, intelligent security solutions.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://medium.com/@murali.balcha/cyber-security-in-the-age-of-ai-e545f56bbdbb">Check out Murali’s blog</a></li><li>Find Murali on <a href="https://www.linkedin.com/in/muralibalcha/">LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:56) - Meet Murali Balcha</li>
<li>(03:29) - AI’s Evolution</li>
<li>(06:06) - Transferring Data</li>
<li>(14:43) - How Trillio’s Looking at AI</li>
<li>(23:36) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 14 Aug 2024 02:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/937b3685/e2ca600a.mp3" length="12988233" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/n1tYuBIw-zU87_-MATLPuABF6cgsuFAFSdIwNjEKswc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YzBk/MDJkY2M5YTA1Y2U5/NTkxMDQ3NTM2ODZk/MWI1Yy5qcGc.jpg"/>
      <itunes:duration>1620</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Decoding the Language of Machines: AI's Potential to Revolutionize Cloud Security</strong></p><p>In this episode of Cyber Sentries, host John Richards is joined by Murali Balcha, founder and CTO at Trilio, to explore how AI could transform cloud security by understanding the unique language of machines. Balcha brings over 20 years of experience in IT, particularly in storage systems, to the conversation.</p><p><strong>Harnessing AI for Proactive Security</strong><br>John and Murali dive into the potential of AI to enhance cloud security by analyzing the vast amounts of data generated by IT systems. By treating system logs as a language that AI can learn, models could be trained to identify threats and anomalies in real-time, even detecting zero-day attacks that traditional rule-based systems might miss. This shift towards proactive, AI-driven security could significantly reduce the time between a threat emerging and its detection.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can AI be applied to cloud security?</li><li>What advantages does AI offer over traditional rule-based security systems?</li><li>How can AI models be trained to understand the unique language of machines?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>AI has the potential to revolutionize cloud security by learning the language of machines</li><li>AI models can identify threats and anomalies in real-time, even detecting zero-day attacks</li><li>Shifting towards proactive, AI-driven security could significantly enhance threat detection and response times</li></ul><p>This episode offers valuable insights into the cutting-edge applications of AI in cloud security. Listeners will gain a deeper understanding of how machine learning can be harnessed to protect their systems and data, as well as a glimpse into the future of proactive, intelligent security solutions.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://medium.com/@murali.balcha/cyber-security-in-the-age-of-ai-e545f56bbdbb">Check out Murali’s blog</a></li><li>Find Murali on <a href="https://www.linkedin.com/in/muralibalcha/">LinkedIn</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:56) - Meet Murali Balcha</li>
<li>(03:29) - AI’s Evolution</li>
<li>(06:06) - Transferring Data</li>
<li>(14:43) - How Trillio’s Looking at AI</li>
<li>(23:36) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/937b3685/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/937b3685/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Navigating the AI Revolution in AppSec: Ori Bendet's Insights on the Future of Application Security</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Navigating the AI Revolution in AppSec: Ori Bendet's Insights on the Future of Application Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1a46718a-8e26-4a98-9031-81173cb05913</guid>
      <link>https://share.transistor.fm/s/b31fbf22</link>
      <description>
        <![CDATA[<p><strong>Ori Bendet Shares Insights on AppSec and Managing AI Risks</strong></p><p>In this episode of Cyber Sentries, John Richards is joined by Ori Bendet, VP of Product Management at Checkmarx, a leader in application security. They explore the critical role of application security in today's digital landscape and discuss strategies for managing the risks and opportunities presented by the rapid adoption of AI in software development.</p><p>Ori shares his journey into the cybersecurity industry and offers advice for those transitioning into the field. He emphasizes the importance of focusing on areas that are business-critical, such as application security, as more companies become software-driven. Ori also discusses the shift in application security from finding every vulnerability to prioritizing the most critical risks, given the accelerated pace of development and deployment.</p><p><strong>Questions we answer in this episode:</strong><br>• How can organizations effectively prioritize application security risks?<br>• What are the key challenges and opportunities presented by AI in software development?<br>• How should security teams adapt their practices to manage AI-generated code?</p><p>The conversation delves into the disruptive impact of AI on software development and the new types of risks it introduces, such as AI hallucination, data poisoning, and prompt injection. Ori stresses the importance of a layered approach to securing AI-generated code and the need for organizations to assess their specific use cases and risks before defining policies and tools.</p><p><strong>Key Takeaways:</strong><br>• Application security is critical as companies become increasingly software-driven.<br>• Focus on prioritizing the most critical risks rather than trying to find every vulnerability.<br>• Adopt a layered approach to securing AI-generated code and keep the human in the loop.</p><p>This episode offers valuable insights for anyone looking to understand the evolving landscape of application security and the impact of AI on software development. Ori's expertise and practical advice make this a must-listen for security professionals, developers, and business leaders alike.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://checkmarx.com/">Check out Checkmarx</a></li><li><a href="https://techcrunch.com/2022/12/28/code-generating-ai-can-introduce-security-vulnerabilities-study-finds/">The Stanford Research on Secure Code Generated by GenAI Solutions</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:56) - Meet Ori Bendet</li>
<li>(02:31) - Advice When Thrust Into Cyber Security</li>
<li>(04:34) - Application Security</li>
<li>(07:37) - Opportunities for Growth</li>
<li>(09:58) - Shift to Business Risk</li>
<li>(12:28) - Making Assessment</li>
<li>(16:08) - Core Cybersecurity Principals </li>
<li>(20:31) - Restrictions Needed?</li>
<li>(23:17) - Using AI in Checkmarx</li>
<li>(27:57) - Give Them What Matters Most</li>
<li>(29:40) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Ori Bendet Shares Insights on AppSec and Managing AI Risks</strong></p><p>In this episode of Cyber Sentries, John Richards is joined by Ori Bendet, VP of Product Management at Checkmarx, a leader in application security. They explore the critical role of application security in today's digital landscape and discuss strategies for managing the risks and opportunities presented by the rapid adoption of AI in software development.</p><p>Ori shares his journey into the cybersecurity industry and offers advice for those transitioning into the field. He emphasizes the importance of focusing on areas that are business-critical, such as application security, as more companies become software-driven. Ori also discusses the shift in application security from finding every vulnerability to prioritizing the most critical risks, given the accelerated pace of development and deployment.</p><p><strong>Questions we answer in this episode:</strong><br>• How can organizations effectively prioritize application security risks?<br>• What are the key challenges and opportunities presented by AI in software development?<br>• How should security teams adapt their practices to manage AI-generated code?</p><p>The conversation delves into the disruptive impact of AI on software development and the new types of risks it introduces, such as AI hallucination, data poisoning, and prompt injection. Ori stresses the importance of a layered approach to securing AI-generated code and the need for organizations to assess their specific use cases and risks before defining policies and tools.</p><p><strong>Key Takeaways:</strong><br>• Application security is critical as companies become increasingly software-driven.<br>• Focus on prioritizing the most critical risks rather than trying to find every vulnerability.<br>• Adopt a layered approach to securing AI-generated code and keep the human in the loop.</p><p>This episode offers valuable insights for anyone looking to understand the evolving landscape of application security and the impact of AI on software development. Ori's expertise and practical advice make this a must-listen for security professionals, developers, and business leaders alike.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://checkmarx.com/">Check out Checkmarx</a></li><li><a href="https://techcrunch.com/2022/12/28/code-generating-ai-can-introduce-security-vulnerabilities-study-finds/">The Stanford Research on Secure Code Generated by GenAI Solutions</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:56) - Meet Ori Bendet</li>
<li>(02:31) - Advice When Thrust Into Cyber Security</li>
<li>(04:34) - Application Security</li>
<li>(07:37) - Opportunities for Growth</li>
<li>(09:58) - Shift to Business Risk</li>
<li>(12:28) - Making Assessment</li>
<li>(16:08) - Core Cybersecurity Principals </li>
<li>(20:31) - Restrictions Needed?</li>
<li>(23:17) - Using AI in Checkmarx</li>
<li>(27:57) - Give Them What Matters Most</li>
<li>(29:40) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 10 Jul 2024 02:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/b31fbf22/c529ea16.mp3" length="15625781" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/cdCWcSRZAcbMNBDjevC7ROLtgUywNlY6eCucgPX3FNw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NDhj/MmU1MmU0NWIzMWIx/NTY2YWQ0ODdmOTc2/Y2UzMy5qcGc.jpg"/>
      <itunes:duration>1910</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Ori Bendet Shares Insights on AppSec and Managing AI Risks</strong></p><p>In this episode of Cyber Sentries, John Richards is joined by Ori Bendet, VP of Product Management at Checkmarx, a leader in application security. They explore the critical role of application security in today's digital landscape and discuss strategies for managing the risks and opportunities presented by the rapid adoption of AI in software development.</p><p>Ori shares his journey into the cybersecurity industry and offers advice for those transitioning into the field. He emphasizes the importance of focusing on areas that are business-critical, such as application security, as more companies become software-driven. Ori also discusses the shift in application security from finding every vulnerability to prioritizing the most critical risks, given the accelerated pace of development and deployment.</p><p><strong>Questions we answer in this episode:</strong><br>• How can organizations effectively prioritize application security risks?<br>• What are the key challenges and opportunities presented by AI in software development?<br>• How should security teams adapt their practices to manage AI-generated code?</p><p>The conversation delves into the disruptive impact of AI on software development and the new types of risks it introduces, such as AI hallucination, data poisoning, and prompt injection. Ori stresses the importance of a layered approach to securing AI-generated code and the need for organizations to assess their specific use cases and risks before defining policies and tools.</p><p><strong>Key Takeaways:</strong><br>• Application security is critical as companies become increasingly software-driven.<br>• Focus on prioritizing the most critical risks rather than trying to find every vulnerability.<br>• Adopt a layered approach to securing AI-generated code and keep the human in the loop.</p><p>This episode offers valuable insights for anyone looking to understand the evolving landscape of application security and the impact of AI on software development. Ori's expertise and practical advice make this a must-listen for security professionals, developers, and business leaders alike.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://checkmarx.com/">Check out Checkmarx</a></li><li><a href="https://techcrunch.com/2022/12/28/code-generating-ai-can-introduce-security-vulnerabilities-study-finds/">The Stanford Research on Secure Code Generated by GenAI Solutions</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:56) - Meet Ori Bendet</li>
<li>(02:31) - Advice When Thrust Into Cyber Security</li>
<li>(04:34) - Application Security</li>
<li>(07:37) - Opportunities for Growth</li>
<li>(09:58) - Shift to Business Risk</li>
<li>(12:28) - Making Assessment</li>
<li>(16:08) - Core Cybersecurity Principals </li>
<li>(20:31) - Restrictions Needed?</li>
<li>(23:17) - Using AI in Checkmarx</li>
<li>(27:57) - Give Them What Matters Most</li>
<li>(29:40) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/b31fbf22/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/b31fbf22/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Kubernetes, AI, and Edge: A Trifecta for Transforming Modern Applications with Saad Malik</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Kubernetes, AI, and Edge: A Trifecta for Transforming Modern Applications with Saad Malik</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fb511c3a-a867-4dca-9557-a31d1ad6f24b</guid>
      <link>https://share.transistor.fm/s/e963b7d5</link>
      <description>
        <![CDATA[<p><strong>Kubernetes, AI, and Edge Computing: A Powerful Combination</strong></p><p>In this episode of Cyber Sentries, John Richards is joined by Saad Malik, CTO and co-founder of SpectroCloud, to explore the intersection of Kubernetes, AI, and edge computing. Saad shares his insights on how these technologies are transforming various industries and the challenges organizations face when implementing them at scale.</p><p><strong>Unlocking the Potential of Kubernetes and AI</strong></p><p>Throughout the episode, John and Saad discuss the growing adoption of Kubernetes and AI across different environments, from public and private clouds to data centers and edge locations. Saad explains how SpectroCloud's platform simplifies the management of Kubernetes clusters, enabling organizations to leverage the unique capabilities of each environment while maintaining consistency and security.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can organizations manage Kubernetes across diverse environments?</li><li>What are the primary use cases for edge computing?</li><li>How can developers scale up their Kubernetes deployments faster?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Templating Kubernetes configurations and integrations simplifies management at scale.</li><li>Edge computing enables data pre-processing, unique experiences, and robotics applications.</li><li>AI operations (AIOps) can provide actionable insights and automate Kubernetes management.</li></ul><p>The conversation also touches on the cultural shift required to embrace AI-driven automation in Kubernetes management. Saad suggests that organizations will gradually adopt these technologies as they gain confidence in the recommendations and actions taken by AI systems.</p><p>This episode offers valuable insights for anyone interested in the future of Kubernetes, AI, and edge computing. Whether you're a developer, platform engineer, or IT decision-maker, you'll come away with a better understanding of how these technologies can be leveraged to drive innovation and efficiency in your organization.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.spectrocloud.com/">Learn more about SpectroCloud</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:57) - Saad Malik and Spectral Cloud</li>
<li>(02:33) - Environments</li>
<li>(04:29) - Spread</li>
<li>(06:06) - Edge Adoption</li>
<li>(08:47) - AI Adoption</li>
<li>(12:06) - Scaling Up Faster</li>
<li>(15:36) - Security</li>
<li>(18:20) - Integrating AI</li>
<li>(23:44) - Ownership Models</li>
<li>(25:32) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Kubernetes, AI, and Edge Computing: A Powerful Combination</strong></p><p>In this episode of Cyber Sentries, John Richards is joined by Saad Malik, CTO and co-founder of SpectroCloud, to explore the intersection of Kubernetes, AI, and edge computing. Saad shares his insights on how these technologies are transforming various industries and the challenges organizations face when implementing them at scale.</p><p><strong>Unlocking the Potential of Kubernetes and AI</strong></p><p>Throughout the episode, John and Saad discuss the growing adoption of Kubernetes and AI across different environments, from public and private clouds to data centers and edge locations. Saad explains how SpectroCloud's platform simplifies the management of Kubernetes clusters, enabling organizations to leverage the unique capabilities of each environment while maintaining consistency and security.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can organizations manage Kubernetes across diverse environments?</li><li>What are the primary use cases for edge computing?</li><li>How can developers scale up their Kubernetes deployments faster?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Templating Kubernetes configurations and integrations simplifies management at scale.</li><li>Edge computing enables data pre-processing, unique experiences, and robotics applications.</li><li>AI operations (AIOps) can provide actionable insights and automate Kubernetes management.</li></ul><p>The conversation also touches on the cultural shift required to embrace AI-driven automation in Kubernetes management. Saad suggests that organizations will gradually adopt these technologies as they gain confidence in the recommendations and actions taken by AI systems.</p><p>This episode offers valuable insights for anyone interested in the future of Kubernetes, AI, and edge computing. Whether you're a developer, platform engineer, or IT decision-maker, you'll come away with a better understanding of how these technologies can be leveraged to drive innovation and efficiency in your organization.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.spectrocloud.com/">Learn more about SpectroCloud</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:57) - Saad Malik and Spectral Cloud</li>
<li>(02:33) - Environments</li>
<li>(04:29) - Spread</li>
<li>(06:06) - Edge Adoption</li>
<li>(08:47) - AI Adoption</li>
<li>(12:06) - Scaling Up Faster</li>
<li>(15:36) - Security</li>
<li>(18:20) - Integrating AI</li>
<li>(23:44) - Ownership Models</li>
<li>(25:32) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 12 Jun 2024 02:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/e963b7d5/1375f2fe.mp3" length="13638926" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/PYlkubsBNHhayBjAtBjw5k53P-YlzH3Jm3k0FDAHTKg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xOTU0/YTM2NDVkOTZkNzg0/ZGE2NzA2ZTQxZjBk/MjJiNy5qcGc.jpg"/>
      <itunes:duration>1662</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Kubernetes, AI, and Edge Computing: A Powerful Combination</strong></p><p>In this episode of Cyber Sentries, John Richards is joined by Saad Malik, CTO and co-founder of SpectroCloud, to explore the intersection of Kubernetes, AI, and edge computing. Saad shares his insights on how these technologies are transforming various industries and the challenges organizations face when implementing them at scale.</p><p><strong>Unlocking the Potential of Kubernetes and AI</strong></p><p>Throughout the episode, John and Saad discuss the growing adoption of Kubernetes and AI across different environments, from public and private clouds to data centers and edge locations. Saad explains how SpectroCloud's platform simplifies the management of Kubernetes clusters, enabling organizations to leverage the unique capabilities of each environment while maintaining consistency and security.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can organizations manage Kubernetes across diverse environments?</li><li>What are the primary use cases for edge computing?</li><li>How can developers scale up their Kubernetes deployments faster?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Templating Kubernetes configurations and integrations simplifies management at scale.</li><li>Edge computing enables data pre-processing, unique experiences, and robotics applications.</li><li>AI operations (AIOps) can provide actionable insights and automate Kubernetes management.</li></ul><p>The conversation also touches on the cultural shift required to embrace AI-driven automation in Kubernetes management. Saad suggests that organizations will gradually adopt these technologies as they gain confidence in the recommendations and actions taken by AI systems.</p><p>This episode offers valuable insights for anyone interested in the future of Kubernetes, AI, and edge computing. Whether you're a developer, platform engineer, or IT decision-maker, you'll come away with a better understanding of how these technologies can be leveraged to drive innovation and efficiency in your organization.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.spectrocloud.com/">Learn more about SpectroCloud</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:04) - Welcome to Cyber Sentries</li>
<li>(00:57) - Saad Malik and Spectral Cloud</li>
<li>(02:33) - Environments</li>
<li>(04:29) - Spread</li>
<li>(06:06) - Edge Adoption</li>
<li>(08:47) - AI Adoption</li>
<li>(12:06) - Scaling Up Faster</li>
<li>(15:36) - Security</li>
<li>(18:20) - Integrating AI</li>
<li>(23:44) - Ownership Models</li>
<li>(25:32) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/e963b7d5/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/e963b7d5/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>AI Revolution in DevSecOps: Insights from John Bush</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>AI Revolution in DevSecOps: Insights from John Bush</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">877ce6a7-1407-4775-ba0f-b70503383844</guid>
      <link>https://share.transistor.fm/s/876768ec</link>
      <description>
        <![CDATA[<p><strong>Unlocking the Power of AI in DevSecOps</strong></p><p>In this episode of Cyber Sentries, host John Richards sits down with John Bush, solutions architect at GitLab, to explore how artificial intelligence is transforming the day-to-day lives of developers. Bush, who has been coding since childhood, shares his insights on how AI is becoming embedded into every aspect of the DevSecOps pipeline, from writing code to identifying and remediating security vulnerabilities.</p><p>John and Bush dive deep into GitLab's AI-powered features, collectively known as Duo, which are sprinkled throughout the software development process. They discuss how these features enhance productivity, automate monotonous tasks, and provide valuable insights to both developers and business users alike. Bush also sheds light on the importance of human oversight in the AI-assisted development process, emphasizing the need for thorough code reviews and security scans.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How is AI changing the daily work of developers?</li><li>What are some real-world use cases for AI in the DevSecOps pipeline?</li><li>How can organizations ensure the security and reliability of AI-generated code?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>AI is becoming an integral part of the entire software development lifecycle</li><li>Developers must still carefully review and vet AI-generated code before deployment</li><li>GitLab's AI gateway allows routing requests to the most appropriate AI models</li></ul><p>Bush provides a fascinating look at the evolution of DevSecOps, stressing the importance of considering security throughout the development process rather than as an afterthought. He explains how GitLab's AI-powered features, such as vulnerability scanning and automated remediation, help developers efficiently identify and fix security issues early on, saving time and resources in the long run.</p><p>This episode is a must-listen for anyone interested in the cutting-edge intersection of AI and DevSecOps. Whether you're a seasoned developer, a security professional, or simply curious about the future of software development, you'll come away with valuable insights and a clearer understanding of how AI is revolutionizing the industry.Episode Notes</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.linkedin.com/in/jbush/">Find John Bush on LinkedIn</a></li><li><a href="https://twitter.com/johnnyb">Find John Bush on X</a></li><li><a href="https://signup.duo.com/">Try GitLab Duo</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:58) - About John Bush</li>
<li>(03:58) - Moving to GitLab</li>
<li>(05:30) - Solution Architects</li>
<li>(06:40) - Duos AI Solutions</li>
<li>(10:26) - Context</li>
<li>(12:17) - Switching Models</li>
<li>(13:58) - Best Practices</li>
<li>(17:51) - Policy Capability</li>
<li>(22:37) - Remediate the Vulnerabilities</li>
<li>(23:59) - Dev Sec Ops in This Ecosystem</li>
<li>(26:21) - Organization Approaches</li>
<li>(28:55) - Level of Knowledge Required</li>
<li>(31:09) - Finding John</li>
<li>(32:14) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Unlocking the Power of AI in DevSecOps</strong></p><p>In this episode of Cyber Sentries, host John Richards sits down with John Bush, solutions architect at GitLab, to explore how artificial intelligence is transforming the day-to-day lives of developers. Bush, who has been coding since childhood, shares his insights on how AI is becoming embedded into every aspect of the DevSecOps pipeline, from writing code to identifying and remediating security vulnerabilities.</p><p>John and Bush dive deep into GitLab's AI-powered features, collectively known as Duo, which are sprinkled throughout the software development process. They discuss how these features enhance productivity, automate monotonous tasks, and provide valuable insights to both developers and business users alike. Bush also sheds light on the importance of human oversight in the AI-assisted development process, emphasizing the need for thorough code reviews and security scans.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How is AI changing the daily work of developers?</li><li>What are some real-world use cases for AI in the DevSecOps pipeline?</li><li>How can organizations ensure the security and reliability of AI-generated code?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>AI is becoming an integral part of the entire software development lifecycle</li><li>Developers must still carefully review and vet AI-generated code before deployment</li><li>GitLab's AI gateway allows routing requests to the most appropriate AI models</li></ul><p>Bush provides a fascinating look at the evolution of DevSecOps, stressing the importance of considering security throughout the development process rather than as an afterthought. He explains how GitLab's AI-powered features, such as vulnerability scanning and automated remediation, help developers efficiently identify and fix security issues early on, saving time and resources in the long run.</p><p>This episode is a must-listen for anyone interested in the cutting-edge intersection of AI and DevSecOps. Whether you're a seasoned developer, a security professional, or simply curious about the future of software development, you'll come away with valuable insights and a clearer understanding of how AI is revolutionizing the industry.Episode Notes</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.linkedin.com/in/jbush/">Find John Bush on LinkedIn</a></li><li><a href="https://twitter.com/johnnyb">Find John Bush on X</a></li><li><a href="https://signup.duo.com/">Try GitLab Duo</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:58) - About John Bush</li>
<li>(03:58) - Moving to GitLab</li>
<li>(05:30) - Solution Architects</li>
<li>(06:40) - Duos AI Solutions</li>
<li>(10:26) - Context</li>
<li>(12:17) - Switching Models</li>
<li>(13:58) - Best Practices</li>
<li>(17:51) - Policy Capability</li>
<li>(22:37) - Remediate the Vulnerabilities</li>
<li>(23:59) - Dev Sec Ops in This Ecosystem</li>
<li>(26:21) - Organization Approaches</li>
<li>(28:55) - Level of Knowledge Required</li>
<li>(31:09) - Finding John</li>
<li>(32:14) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 08 May 2024 02:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/876768ec/0a54d551.mp3" length="16626603" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6B6Hm-RG33wv_e6kNzA-YCvArQ74FVgtM67Ia4pI4Fs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDk5/NWQ0YWI1Yzk0MmZk/YTU3MTBlNjgxNDQx/NTFkZC5qcGc.jpg"/>
      <itunes:duration>2035</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Unlocking the Power of AI in DevSecOps</strong></p><p>In this episode of Cyber Sentries, host John Richards sits down with John Bush, solutions architect at GitLab, to explore how artificial intelligence is transforming the day-to-day lives of developers. Bush, who has been coding since childhood, shares his insights on how AI is becoming embedded into every aspect of the DevSecOps pipeline, from writing code to identifying and remediating security vulnerabilities.</p><p>John and Bush dive deep into GitLab's AI-powered features, collectively known as Duo, which are sprinkled throughout the software development process. They discuss how these features enhance productivity, automate monotonous tasks, and provide valuable insights to both developers and business users alike. Bush also sheds light on the importance of human oversight in the AI-assisted development process, emphasizing the need for thorough code reviews and security scans.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How is AI changing the daily work of developers?</li><li>What are some real-world use cases for AI in the DevSecOps pipeline?</li><li>How can organizations ensure the security and reliability of AI-generated code?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>AI is becoming an integral part of the entire software development lifecycle</li><li>Developers must still carefully review and vet AI-generated code before deployment</li><li>GitLab's AI gateway allows routing requests to the most appropriate AI models</li></ul><p>Bush provides a fascinating look at the evolution of DevSecOps, stressing the importance of considering security throughout the development process rather than as an afterthought. He explains how GitLab's AI-powered features, such as vulnerability scanning and automated remediation, help developers efficiently identify and fix security issues early on, saving time and resources in the long run.</p><p>This episode is a must-listen for anyone interested in the cutting-edge intersection of AI and DevSecOps. Whether you're a seasoned developer, a security professional, or simply curious about the future of software development, you'll come away with valuable insights and a clearer understanding of how AI is revolutionizing the industry.Episode Notes</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.linkedin.com/in/jbush/">Find John Bush on LinkedIn</a></li><li><a href="https://twitter.com/johnnyb">Find John Bush on X</a></li><li><a href="https://signup.duo.com/">Try GitLab Duo</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:58) - About John Bush</li>
<li>(03:58) - Moving to GitLab</li>
<li>(05:30) - Solution Architects</li>
<li>(06:40) - Duos AI Solutions</li>
<li>(10:26) - Context</li>
<li>(12:17) - Switching Models</li>
<li>(13:58) - Best Practices</li>
<li>(17:51) - Policy Capability</li>
<li>(22:37) - Remediate the Vulnerabilities</li>
<li>(23:59) - Dev Sec Ops in This Ecosystem</li>
<li>(26:21) - Organization Approaches</li>
<li>(28:55) - Level of Knowledge Required</li>
<li>(31:09) - Finding John</li>
<li>(32:14) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>John Bush</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/876768ec/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/876768ec/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Top Cybersecurity Trends leveraging AI with Industry Insider Mike Crowe</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Top Cybersecurity Trends leveraging AI with Industry Insider Mike Crowe</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">07a11e84-157c-4d68-aa1e-068a54e01a6d</guid>
      <link>https://share.transistor.fm/s/1b6c7d20</link>
      <description>
        <![CDATA[<p>On this episode, Paladin Cloud’s CEO and co-founder Dan Deeney steps into John Richards’ shoes to play host! He welcomes cybersecurity veteran Mike Crowe to the show. With over 30 years of experience as CIO of Colgate-Palmolive, Mike provides unique insight into the evolution of threats, strategies for defense, and trends that keep CISO’s up at night.</p><p>Dan and Mike explore the increasingly complex threat landscape companies face today. From expanding digital footprints and geopolitical instability empowering nation-state attacks, the challenge grows for security teams. However, new tools also emerge to help lighten the load, such as automation that prioritizes risks and enables efficient remediation across global organizations.</p><p>The conversation dives into specific trends like AI and how guardrails must develop alongside new capabilities. Open source models offer both risks and opportunities when thoughtfully incorporated into private LLMs. Throughout, Mike stresses finding what you don't know through proactive testing as the best way to stay ahead of attackers.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>What are the top threats keeping CISOs up at night?</li><li>How can security and DevOps teams better collaborate to reduce risks?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Continually evolve defenses as the threat landscape grows ever more complex</li><li>Automation and integration are critical to managing overwhelming workloads</li><li>Challenge your security assumptions through ethical offensive testing</li></ul><p>With Mike's wealth of practical experience, this episode provides valuable strategic perspective on cybersecurity that both new and seasoned professionals can apply to strengthening their own organizations' posture. Listeners will gain insights on current realities and where the industry is heading to stay ahead of evolving dangers.</p><p><br><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:23) - Paladin Cloud CEO Dan Deeney Talks With Mike Crowe</li>
<li>(00:51) - Meet Mike Crowe</li>
<li>(02:01) - Overall Threat Landscape’s Evolution</li>
<li>(03:55) - Example Threat</li>
<li>(05:44) - AI</li>
<li>(08:47) - Open Source</li>
<li>(10:18) - Trends and Strategies in Defense</li>
<li>(12:04) - Risk-Based Prioritization</li>
<li>(13:40) - Remediation</li>
<li>(16:55) - Ticketing Systems</li>
<li>(18:38) - IntegratingTeams</li>
<li>(21:57) - Emergence of a Hybrid Team</li>
<li>(23:51) - Final Thoughts</li>
<li>(27:20) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>On this episode, Paladin Cloud’s CEO and co-founder Dan Deeney steps into John Richards’ shoes to play host! He welcomes cybersecurity veteran Mike Crowe to the show. With over 30 years of experience as CIO of Colgate-Palmolive, Mike provides unique insight into the evolution of threats, strategies for defense, and trends that keep CISO’s up at night.</p><p>Dan and Mike explore the increasingly complex threat landscape companies face today. From expanding digital footprints and geopolitical instability empowering nation-state attacks, the challenge grows for security teams. However, new tools also emerge to help lighten the load, such as automation that prioritizes risks and enables efficient remediation across global organizations.</p><p>The conversation dives into specific trends like AI and how guardrails must develop alongside new capabilities. Open source models offer both risks and opportunities when thoughtfully incorporated into private LLMs. Throughout, Mike stresses finding what you don't know through proactive testing as the best way to stay ahead of attackers.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>What are the top threats keeping CISOs up at night?</li><li>How can security and DevOps teams better collaborate to reduce risks?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Continually evolve defenses as the threat landscape grows ever more complex</li><li>Automation and integration are critical to managing overwhelming workloads</li><li>Challenge your security assumptions through ethical offensive testing</li></ul><p>With Mike's wealth of practical experience, this episode provides valuable strategic perspective on cybersecurity that both new and seasoned professionals can apply to strengthening their own organizations' posture. Listeners will gain insights on current realities and where the industry is heading to stay ahead of evolving dangers.</p><p><br><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:23) - Paladin Cloud CEO Dan Deeney Talks With Mike Crowe</li>
<li>(00:51) - Meet Mike Crowe</li>
<li>(02:01) - Overall Threat Landscape’s Evolution</li>
<li>(03:55) - Example Threat</li>
<li>(05:44) - AI</li>
<li>(08:47) - Open Source</li>
<li>(10:18) - Trends and Strategies in Defense</li>
<li>(12:04) - Risk-Based Prioritization</li>
<li>(13:40) - Remediation</li>
<li>(16:55) - Ticketing Systems</li>
<li>(18:38) - IntegratingTeams</li>
<li>(21:57) - Emergence of a Hybrid Team</li>
<li>(23:51) - Final Thoughts</li>
<li>(27:20) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 10 Apr 2024 02:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/1b6c7d20/2dd889dd.mp3" length="14232251" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/TGZsb_g7fBqupw6T0t7R4gjQAcw7vbtgyvaSFjIsz24/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE4MjYxNzEv/MTcxMjAwMzY5My1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1736</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>On this episode, Paladin Cloud’s CEO and co-founder Dan Deeney steps into John Richards’ shoes to play host! He welcomes cybersecurity veteran Mike Crowe to the show. With over 30 years of experience as CIO of Colgate-Palmolive, Mike provides unique insight into the evolution of threats, strategies for defense, and trends that keep CISO’s up at night.</p><p>Dan and Mike explore the increasingly complex threat landscape companies face today. From expanding digital footprints and geopolitical instability empowering nation-state attacks, the challenge grows for security teams. However, new tools also emerge to help lighten the load, such as automation that prioritizes risks and enables efficient remediation across global organizations.</p><p>The conversation dives into specific trends like AI and how guardrails must develop alongside new capabilities. Open source models offer both risks and opportunities when thoughtfully incorporated into private LLMs. Throughout, Mike stresses finding what you don't know through proactive testing as the best way to stay ahead of attackers.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>What are the top threats keeping CISOs up at night?</li><li>How can security and DevOps teams better collaborate to reduce risks?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>Continually evolve defenses as the threat landscape grows ever more complex</li><li>Automation and integration are critical to managing overwhelming workloads</li><li>Challenge your security assumptions through ethical offensive testing</li></ul><p>With Mike's wealth of practical experience, this episode provides valuable strategic perspective on cybersecurity that both new and seasoned professionals can apply to strengthening their own organizations' posture. Listeners will gain insights on current realities and where the industry is heading to stay ahead of evolving dangers.</p><p><br><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:23) - Paladin Cloud CEO Dan Deeney Talks With Mike Crowe</li>
<li>(00:51) - Meet Mike Crowe</li>
<li>(02:01) - Overall Threat Landscape’s Evolution</li>
<li>(03:55) - Example Threat</li>
<li>(05:44) - AI</li>
<li>(08:47) - Open Source</li>
<li>(10:18) - Trends and Strategies in Defense</li>
<li>(12:04) - Risk-Based Prioritization</li>
<li>(13:40) - Remediation</li>
<li>(16:55) - Ticketing Systems</li>
<li>(18:38) - IntegratingTeams</li>
<li>(21:57) - Emergence of a Hybrid Team</li>
<li>(23:51) - Final Thoughts</li>
<li>(27:20) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Mike Crowe</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/1b6c7d20/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/1b6c7d20/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Supercharge Workflows, Secure Data: Build Better Apps with AI</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Supercharge Workflows, Secure Data: Build Better Apps with AI</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3ebf37cd-f5f2-4790-9baa-58b26a28b5dc</guid>
      <link>https://share.transistor.fm/s/ed633b01</link>
      <description>
        <![CDATA[<p><strong>Exploring the AI-Powered Future of Cloud Security with Thomas Johnson</strong><br>On this episode of Cyber Sentries, host John Richards interviews Thomas Johnson, CTO and co-founder of Multiplayer, about how AI is transforming cloud security. As AI capabilities rapidly advance, Thomas provides insights into how engineering teams can leverage AI to enhance workflows, generate code, and convert basic sketches into functional systems.</p><p>John and Thomas dive into key questions surrounding AI ethics, choosing open source vs proprietary models, and best practices for handling sensitive data. Listen in to hear Thomas' advice for developers looking to integrate AI into their tech stacks.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How are dev teams currently using AI like Copilot?</li><li>What are the main differences between neural networks and other AI?</li><li>What security risks exist with generative AI models?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>Focus on choosing the right problem and having clean, quality data.</li><li>Open source models offer more control compared to proprietary models.</li><li>Do not put sensitive data into generative models.</li></ul><p>This fascinating discussion explores how AI is transforming cloud security and development workflows. Thomas provides practical insights into leveraging AI's immense potential while avoiding pitfalls. Whether you're an engineering leader or a developer new to AI, this episode offers an enlightening look at the AI-powered future of tech.<br><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.multiplayer.app/">Multiplayer</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:22) - Meet Thomas Johnson</li>
<li>(01:02) - AI Background</li>
<li>(01:58) - Neural Networks</li>
<li>(02:47) - Current Buzz</li>
<li>(04:43) - Integrating AI</li>
<li>(07:41) - Improving AI</li>
<li>(10:57) - Think About the Problem and Data</li>
<li>(12:25) - If Data Is the Problem</li>
<li>(14:00) - Securities and Access</li>
<li>(15:50) - RAG Model</li>
<li>(17:52) - Open Source v. Proprietary</li>
<li>(19:20) - Training and Inference Side</li>
<li>(20:35) - Multiplayer</li>
<li>(21:43) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Exploring the AI-Powered Future of Cloud Security with Thomas Johnson</strong><br>On this episode of Cyber Sentries, host John Richards interviews Thomas Johnson, CTO and co-founder of Multiplayer, about how AI is transforming cloud security. As AI capabilities rapidly advance, Thomas provides insights into how engineering teams can leverage AI to enhance workflows, generate code, and convert basic sketches into functional systems.</p><p>John and Thomas dive into key questions surrounding AI ethics, choosing open source vs proprietary models, and best practices for handling sensitive data. Listen in to hear Thomas' advice for developers looking to integrate AI into their tech stacks.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How are dev teams currently using AI like Copilot?</li><li>What are the main differences between neural networks and other AI?</li><li>What security risks exist with generative AI models?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>Focus on choosing the right problem and having clean, quality data.</li><li>Open source models offer more control compared to proprietary models.</li><li>Do not put sensitive data into generative models.</li></ul><p>This fascinating discussion explores how AI is transforming cloud security and development workflows. Thomas provides practical insights into leveraging AI's immense potential while avoiding pitfalls. Whether you're an engineering leader or a developer new to AI, this episode offers an enlightening look at the AI-powered future of tech.<br><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.multiplayer.app/">Multiplayer</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:22) - Meet Thomas Johnson</li>
<li>(01:02) - AI Background</li>
<li>(01:58) - Neural Networks</li>
<li>(02:47) - Current Buzz</li>
<li>(04:43) - Integrating AI</li>
<li>(07:41) - Improving AI</li>
<li>(10:57) - Think About the Problem and Data</li>
<li>(12:25) - If Data Is the Problem</li>
<li>(14:00) - Securities and Access</li>
<li>(15:50) - RAG Model</li>
<li>(17:52) - Open Source v. Proprietary</li>
<li>(19:20) - Training and Inference Side</li>
<li>(20:35) - Multiplayer</li>
<li>(21:43) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 13 Mar 2024 02:00:00 -0700</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/ed633b01/49f73e9d.mp3" length="11501839" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/s3P7QrlSKJkPkdPsD9eZY_WaONDNc-ZHGrMdTpQ-FxQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE3Nzg2NTgv/MTcwOTc1MzQzNS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1395</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Exploring the AI-Powered Future of Cloud Security with Thomas Johnson</strong><br>On this episode of Cyber Sentries, host John Richards interviews Thomas Johnson, CTO and co-founder of Multiplayer, about how AI is transforming cloud security. As AI capabilities rapidly advance, Thomas provides insights into how engineering teams can leverage AI to enhance workflows, generate code, and convert basic sketches into functional systems.</p><p>John and Thomas dive into key questions surrounding AI ethics, choosing open source vs proprietary models, and best practices for handling sensitive data. Listen in to hear Thomas' advice for developers looking to integrate AI into their tech stacks.</p><p><strong>Questions we answer in this episode:</strong></p><ul><li>How are dev teams currently using AI like Copilot?</li><li>What are the main differences between neural networks and other AI?</li><li>What security risks exist with generative AI models?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>Focus on choosing the right problem and having clean, quality data.</li><li>Open source models offer more control compared to proprietary models.</li><li>Do not put sensitive data into generative models.</li></ul><p>This fascinating discussion explores how AI is transforming cloud security and development workflows. Thomas provides practical insights into leveraging AI's immense potential while avoiding pitfalls. Whether you're an engineering leader or a developer new to AI, this episode offers an enlightening look at the AI-powered future of tech.<br><strong>Links &amp; Notes</strong></p><ul><li><a href="https://www.multiplayer.app/">Multiplayer</a></li><li><a href="https://paladincloud.io/">Learn more about Paladin Cloud</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:22) - Meet Thomas Johnson</li>
<li>(01:02) - AI Background</li>
<li>(01:58) - Neural Networks</li>
<li>(02:47) - Current Buzz</li>
<li>(04:43) - Integrating AI</li>
<li>(07:41) - Improving AI</li>
<li>(10:57) - Think About the Problem and Data</li>
<li>(12:25) - If Data Is the Problem</li>
<li>(14:00) - Securities and Access</li>
<li>(15:50) - RAG Model</li>
<li>(17:52) - Open Source v. Proprietary</li>
<li>(19:20) - Training and Inference Side</li>
<li>(20:35) - Multiplayer</li>
<li>(21:43) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Thomas Johnson, MultiPlayer</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/ed633b01/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/ed633b01/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>AI for API Security: Field-Tested Insights from Cequence.ai Co-Founder Shreyans Mehta</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>AI for API Security: Field-Tested Insights from Cequence.ai Co-Founder Shreyans Mehta</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4033a701-9640-4ac5-8adf-21577b8eef78</guid>
      <link>https://share.transistor.fm/s/be1f8419</link>
      <description>
        <![CDATA[<p>John sits down with Shreyans Mehta, CTO and co-founder of Cequence Security, to discuss how AI and machine learning can be applied to improve cloud security. They provide valuable insights for security teams looking to leverage AI to protect their cloud environments and applications.</p><p>The conversation focuses on using AI for security use cases like detecting anomalies and suspicious behavior, identifying misconfigurations, and automating response. Shreyans shares real-world examples of how Cequence Security has developed AI models to analyze network traffic, APIs, logs, and other data sources to detect threats targeting cloud applications and infrastructure.</p><p>Questions we answer in this episode:</p><ul><li>How can AI improve visibility across cloud environments?</li><li>What are some common use cases for AI in cloud security?</li><li>How can AI help overburdened security teams?</li></ul><p>Key Takeaways:</p><ul><li>AI excels at detecting subtle anomalies and identifying emerging threats based on learned patterns.</li><li>AI models must be continuously trained on new data to remain effective as attacks evolve.</li><li>AI augments human analysts by automating tedious tasks so they can focus on higher-value security activities.</li><li>An advantage businesses have in the AI arms race with attackers is being able to train their AI on their unique user activity patterns.</li></ul><p>This insightful discussion highlights the transformative potential of AI to improve threat detection, investigation, and response. Security teams looking to apply AI can come away with a better understanding of where to start and how to build an effective AI strategy. John and Shreyans explore key considerations around data quality, model accuracy, and responsible AI practices.</p><p>Overall, this episode delivers practical guidance to help security leaders successfully navigate the AI landscape. Listen in to learn how to harness the power of AI to advance your cloud security program.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Paladin Cloud</a></li><li><a href="https://www.cequence.ai/">Cequence</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul><p>Got a question about cybersecurity, AI, or something else related? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>, and we'll get to it in a future episode!</p>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:22) - Meet Shreyans Mehta</li>
<li>(27:06) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>John sits down with Shreyans Mehta, CTO and co-founder of Cequence Security, to discuss how AI and machine learning can be applied to improve cloud security. They provide valuable insights for security teams looking to leverage AI to protect their cloud environments and applications.</p><p>The conversation focuses on using AI for security use cases like detecting anomalies and suspicious behavior, identifying misconfigurations, and automating response. Shreyans shares real-world examples of how Cequence Security has developed AI models to analyze network traffic, APIs, logs, and other data sources to detect threats targeting cloud applications and infrastructure.</p><p>Questions we answer in this episode:</p><ul><li>How can AI improve visibility across cloud environments?</li><li>What are some common use cases for AI in cloud security?</li><li>How can AI help overburdened security teams?</li></ul><p>Key Takeaways:</p><ul><li>AI excels at detecting subtle anomalies and identifying emerging threats based on learned patterns.</li><li>AI models must be continuously trained on new data to remain effective as attacks evolve.</li><li>AI augments human analysts by automating tedious tasks so they can focus on higher-value security activities.</li><li>An advantage businesses have in the AI arms race with attackers is being able to train their AI on their unique user activity patterns.</li></ul><p>This insightful discussion highlights the transformative potential of AI to improve threat detection, investigation, and response. Security teams looking to apply AI can come away with a better understanding of where to start and how to build an effective AI strategy. John and Shreyans explore key considerations around data quality, model accuracy, and responsible AI practices.</p><p>Overall, this episode delivers practical guidance to help security leaders successfully navigate the AI landscape. Listen in to learn how to harness the power of AI to advance your cloud security program.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Paladin Cloud</a></li><li><a href="https://www.cequence.ai/">Cequence</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul><p>Got a question about cybersecurity, AI, or something else related? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>, and we'll get to it in a future episode!</p>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:22) - Meet Shreyans Mehta</li>
<li>(27:06) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 14 Feb 2024 02:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/be1f8419/3eca12b2.mp3" length="14751002" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/OQJ3EJXi-uZKhPB4K41gz0Us2uQtjykBmqFi8fTOlNw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE3MjA4NjIv/MTcwNzI0MzQ1Mi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1801</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>John sits down with Shreyans Mehta, CTO and co-founder of Cequence Security, to discuss how AI and machine learning can be applied to improve cloud security. They provide valuable insights for security teams looking to leverage AI to protect their cloud environments and applications.</p><p>The conversation focuses on using AI for security use cases like detecting anomalies and suspicious behavior, identifying misconfigurations, and automating response. Shreyans shares real-world examples of how Cequence Security has developed AI models to analyze network traffic, APIs, logs, and other data sources to detect threats targeting cloud applications and infrastructure.</p><p>Questions we answer in this episode:</p><ul><li>How can AI improve visibility across cloud environments?</li><li>What are some common use cases for AI in cloud security?</li><li>How can AI help overburdened security teams?</li></ul><p>Key Takeaways:</p><ul><li>AI excels at detecting subtle anomalies and identifying emerging threats based on learned patterns.</li><li>AI models must be continuously trained on new data to remain effective as attacks evolve.</li><li>AI augments human analysts by automating tedious tasks so they can focus on higher-value security activities.</li><li>An advantage businesses have in the AI arms race with attackers is being able to train their AI on their unique user activity patterns.</li></ul><p>This insightful discussion highlights the transformative potential of AI to improve threat detection, investigation, and response. Security teams looking to apply AI can come away with a better understanding of where to start and how to build an effective AI strategy. John and Shreyans explore key considerations around data quality, model accuracy, and responsible AI practices.</p><p>Overall, this episode delivers practical guidance to help security leaders successfully navigate the AI landscape. Listen in to learn how to harness the power of AI to advance your cloud security program.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Paladin Cloud</a></li><li><a href="https://www.cequence.ai/">Cequence</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul><p>Got a question about cybersecurity, AI, or something else related? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>, and we'll get to it in a future episode!</p>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:22) - Meet Shreyans Mehta</li>
<li>(27:06) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Shreyans Mehta, cequence.ai, cloud security, ai security, ai</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/be1f8419/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/be1f8419/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Next Level Cloud Security: AI Opportunities with Shawn Anderson</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Next Level Cloud Security: AI Opportunities with Shawn Anderson</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6258d704-0d83-4da3-b06a-469b9ca6aed6</guid>
      <link>https://share.transistor.fm/s/1f6a2681</link>
      <description>
        <![CDATA[<p><strong>Exploring the Transformative Potential of AI for Cloud Security</strong><br>In this episode of Cyber Sentries, host John Richards speaks with Shawn Anderson, an expert in cybersecurity and current CTO at Boston Meridian. They have an insightful discussion about how artificial intelligence is transforming cloud security.</p><p>Shawn shares his valuable perspective from years of experience leading security initiatives for major corporations. He and John dive into topics like using AI to process massive amounts of data and telemetry, enabling new security capabilities. They also talk about how identity has become cybersecurity's new perimeter.</p><p><strong>Key themes from their conversation:</strong></p><ul><li>AI allows security teams to analyze data at a scale not possible for humans, identifying risks and vulnerabilities more quickly.</li><li>With cloud computing, the focus needs to be on protecting data itself, not just traditional network perimeters.</li><li>Identity is central - knowing the user and device accessing data is critical for zero trust security.</li><li>Compliance regulations help incentivize robust cybersecurity programs and controls.</li><li>AI models need transparency, accountability, and governance to avoid misuse.</li></ul><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can AI transform cloud security?</li><li>What can we learn from past technological shifts like cloud adoption?</li><li>How does identity enable zero trust security?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>AI enables security teams to find the most critical risks to prioritize.</li><li>Mindsets need to evolve as new technologies emerge.</li><li>Governance and accountability are crucial when applying AI.</li></ul><p>This insightful episode explores how AI is transforming cloud security and identity management. Shawn provides an expert viewpoint on applying AI securely and responsibly. Any cybersecurity or technology leader will gain valuable perspectives from this discussion.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Paladin Cloud</a></li><li><a href="http://www.bostonmeridian.com">Boston Meridian</a></li><li><a href="https://blog.securitycafe.com/">Sean Anderson's blog</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul><p>Got a question about cybersecurity, AI, or something else related? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>, and we'll get to it in a future episode!</p>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:57) - Meet Shawn Anderson</li>
<li>(04:09) - Cybersecurity and AI</li>
<li>(06:32) - Identifying Exploitability</li>
<li>(09:45) - Identity and Security</li>
<li>(12:06) - How to Secure</li>
<li>(14:16) - New Approaches?</li>
<li>(16:58) - Accountability</li>
<li>(22:54) - Exciting Times</li>
<li>(26:03) - Finding Shawn</li>
<li>(28:39) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Exploring the Transformative Potential of AI for Cloud Security</strong><br>In this episode of Cyber Sentries, host John Richards speaks with Shawn Anderson, an expert in cybersecurity and current CTO at Boston Meridian. They have an insightful discussion about how artificial intelligence is transforming cloud security.</p><p>Shawn shares his valuable perspective from years of experience leading security initiatives for major corporations. He and John dive into topics like using AI to process massive amounts of data and telemetry, enabling new security capabilities. They also talk about how identity has become cybersecurity's new perimeter.</p><p><strong>Key themes from their conversation:</strong></p><ul><li>AI allows security teams to analyze data at a scale not possible for humans, identifying risks and vulnerabilities more quickly.</li><li>With cloud computing, the focus needs to be on protecting data itself, not just traditional network perimeters.</li><li>Identity is central - knowing the user and device accessing data is critical for zero trust security.</li><li>Compliance regulations help incentivize robust cybersecurity programs and controls.</li><li>AI models need transparency, accountability, and governance to avoid misuse.</li></ul><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can AI transform cloud security?</li><li>What can we learn from past technological shifts like cloud adoption?</li><li>How does identity enable zero trust security?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>AI enables security teams to find the most critical risks to prioritize.</li><li>Mindsets need to evolve as new technologies emerge.</li><li>Governance and accountability are crucial when applying AI.</li></ul><p>This insightful episode explores how AI is transforming cloud security and identity management. Shawn provides an expert viewpoint on applying AI securely and responsibly. Any cybersecurity or technology leader will gain valuable perspectives from this discussion.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Paladin Cloud</a></li><li><a href="http://www.bostonmeridian.com">Boston Meridian</a></li><li><a href="https://blog.securitycafe.com/">Sean Anderson's blog</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul><p>Got a question about cybersecurity, AI, or something else related? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>, and we'll get to it in a future episode!</p>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:57) - Meet Shawn Anderson</li>
<li>(04:09) - Cybersecurity and AI</li>
<li>(06:32) - Identifying Exploitability</li>
<li>(09:45) - Identity and Security</li>
<li>(12:06) - How to Secure</li>
<li>(14:16) - New Approaches?</li>
<li>(16:58) - Accountability</li>
<li>(22:54) - Exciting Times</li>
<li>(26:03) - Finding Shawn</li>
<li>(28:39) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 10 Jan 2024 02:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/1f6a2681/b0ecf137.mp3" length="14642537" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/m1KoUFIUlGevnaT_WSaHSSJJRgFBCMDndHyQgv6c990/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE2NTY3NTIv/MTcwMzI2NzE1NS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1825</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Exploring the Transformative Potential of AI for Cloud Security</strong><br>In this episode of Cyber Sentries, host John Richards speaks with Shawn Anderson, an expert in cybersecurity and current CTO at Boston Meridian. They have an insightful discussion about how artificial intelligence is transforming cloud security.</p><p>Shawn shares his valuable perspective from years of experience leading security initiatives for major corporations. He and John dive into topics like using AI to process massive amounts of data and telemetry, enabling new security capabilities. They also talk about how identity has become cybersecurity's new perimeter.</p><p><strong>Key themes from their conversation:</strong></p><ul><li>AI allows security teams to analyze data at a scale not possible for humans, identifying risks and vulnerabilities more quickly.</li><li>With cloud computing, the focus needs to be on protecting data itself, not just traditional network perimeters.</li><li>Identity is central - knowing the user and device accessing data is critical for zero trust security.</li><li>Compliance regulations help incentivize robust cybersecurity programs and controls.</li><li>AI models need transparency, accountability, and governance to avoid misuse.</li></ul><p><strong>Questions we answer in this episode:</strong></p><ul><li>How can AI transform cloud security?</li><li>What can we learn from past technological shifts like cloud adoption?</li><li>How does identity enable zero trust security?</li></ul><p><strong>Key Takeaways:</strong></p><ul><li>AI enables security teams to find the most critical risks to prioritize.</li><li>Mindsets need to evolve as new technologies emerge.</li><li>Governance and accountability are crucial when applying AI.</li></ul><p>This insightful episode explores how AI is transforming cloud security and identity management. Shawn provides an expert viewpoint on applying AI securely and responsibly. Any cybersecurity or technology leader will gain valuable perspectives from this discussion.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Paladin Cloud</a></li><li><a href="http://www.bostonmeridian.com">Boston Meridian</a></li><li><a href="https://blog.securitycafe.com/">Sean Anderson's blog</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul><p>Got a question about cybersecurity, AI, or something else related? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>, and we'll get to it in a future episode!</p>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(00:57) - Meet Shawn Anderson</li>
<li>(04:09) - Cybersecurity and AI</li>
<li>(06:32) - Identifying Exploitability</li>
<li>(09:45) - Identity and Security</li>
<li>(12:06) - How to Secure</li>
<li>(14:16) - New Approaches?</li>
<li>(16:58) - Accountability</li>
<li>(22:54) - Exciting Times</li>
<li>(26:03) - Finding Shawn</li>
<li>(28:39) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Shawn Anderson</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/1f6a2681/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/1f6a2681/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Responsible AI for Cybersecurity: A Guide from Expert Somesh Jha</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Responsible AI for Cybersecurity: A Guide from Expert Somesh Jha</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f439eaaa-e16f-49af-b347-04e97536b5fc</guid>
      <link>https://share.transistor.fm/s/6f99a22c</link>
      <description>
        <![CDATA[<p><strong>Navigating the AI Security Landscape with Somesh Jha</strong><br>In this Cyber Sentries episode, host John Richards interviews AI expert Somesh Jha on using AI for security. They discuss the promise and perils of AI in cybersecurity, best practices for implementation, challenges with fine-tuning models, and adopting a multi-agent approach.</p><p><br>Jha provides insights on the potential of AI to transform cloud security through automating tasks like intrusion detection. However, attackers could also weaponize AI for large-scale spear phishing. As the technology matures, it remains unclear exactly what will be possible. The episode covers common mistakes like applying AI too broadly, the need for careful benchmarking to avoid hallucinations, the large data requirements for fine-tuning models, and the benefits of a multi-agent framework.</p><p><br><strong>Questions You May Have</strong></p><ul><li>How can AI be used for good and bad in cybersecurity?</li><li>What are some common mistakes when applying AI to security?</li><li>How can we evaluate if an AI model is working well for security?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>AI can automate spear phishing at scale, but also help detect intrusions</li><li>Start with a narrow security problem before expanding AI to broader ones</li><li>Careful benchmarking is crucial to evaluate AI security tools</li><li>Beware of AI hallucinations - grounding techniques can help</li><li>Fine-tuning AI models requires large datasets to work well</li><li>Adopt a multi-agent approach when building AI applications</li></ul><p>Jha advises starting with a focused security use case and doing careful benchmarking to demonstrate value before expanding AI more broadly. He notes the challenges of fine-tuning models with limited data. Jha explains how Langroid is designed around a multi-agent approach for maintainable and extensible AI code.</p><p><br>This episode provides insights for security teams on leveraging AI responsibly, with practical advice on implementation pitfalls. Jha offers perspectives on realizing the future potential of AI in cybersecurity. His expertise provides a useful guide for applying AI to security effectively.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Paladin Cloud</a></li><li><a href="https://github.com/langroid/langroid">Langroid</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(32:45) - Wrap Up</li>
</ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Navigating the AI Security Landscape with Somesh Jha</strong><br>In this Cyber Sentries episode, host John Richards interviews AI expert Somesh Jha on using AI for security. They discuss the promise and perils of AI in cybersecurity, best practices for implementation, challenges with fine-tuning models, and adopting a multi-agent approach.</p><p><br>Jha provides insights on the potential of AI to transform cloud security through automating tasks like intrusion detection. However, attackers could also weaponize AI for large-scale spear phishing. As the technology matures, it remains unclear exactly what will be possible. The episode covers common mistakes like applying AI too broadly, the need for careful benchmarking to avoid hallucinations, the large data requirements for fine-tuning models, and the benefits of a multi-agent framework.</p><p><br><strong>Questions You May Have</strong></p><ul><li>How can AI be used for good and bad in cybersecurity?</li><li>What are some common mistakes when applying AI to security?</li><li>How can we evaluate if an AI model is working well for security?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>AI can automate spear phishing at scale, but also help detect intrusions</li><li>Start with a narrow security problem before expanding AI to broader ones</li><li>Careful benchmarking is crucial to evaluate AI security tools</li><li>Beware of AI hallucinations - grounding techniques can help</li><li>Fine-tuning AI models requires large datasets to work well</li><li>Adopt a multi-agent approach when building AI applications</li></ul><p>Jha advises starting with a focused security use case and doing careful benchmarking to demonstrate value before expanding AI more broadly. He notes the challenges of fine-tuning models with limited data. Jha explains how Langroid is designed around a multi-agent approach for maintainable and extensible AI code.</p><p><br>This episode provides insights for security teams on leveraging AI responsibly, with practical advice on implementation pitfalls. Jha offers perspectives on realizing the future potential of AI in cybersecurity. His expertise provides a useful guide for applying AI to security effectively.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Paladin Cloud</a></li><li><a href="https://github.com/langroid/langroid">Langroid</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(32:45) - Wrap Up</li>
</ul>]]>
      </content:encoded>
      <pubDate>Wed, 13 Dec 2023 02:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/6f99a22c/4a2341d7.mp3" length="16904181" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2_GQgHR1m5WyRQoDUtqZHe30-j1c9TLcwhr7THPMHz0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE2MzU2MjIv/MTcwMTk2NTcxNy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2070</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Navigating the AI Security Landscape with Somesh Jha</strong><br>In this Cyber Sentries episode, host John Richards interviews AI expert Somesh Jha on using AI for security. They discuss the promise and perils of AI in cybersecurity, best practices for implementation, challenges with fine-tuning models, and adopting a multi-agent approach.</p><p><br>Jha provides insights on the potential of AI to transform cloud security through automating tasks like intrusion detection. However, attackers could also weaponize AI for large-scale spear phishing. As the technology matures, it remains unclear exactly what will be possible. The episode covers common mistakes like applying AI too broadly, the need for careful benchmarking to avoid hallucinations, the large data requirements for fine-tuning models, and the benefits of a multi-agent framework.</p><p><br><strong>Questions You May Have</strong></p><ul><li>How can AI be used for good and bad in cybersecurity?</li><li>What are some common mistakes when applying AI to security?</li><li>How can we evaluate if an AI model is working well for security?</li></ul><p><strong>Key Takeaways</strong></p><ul><li>AI can automate spear phishing at scale, but also help detect intrusions</li><li>Start with a narrow security problem before expanding AI to broader ones</li><li>Careful benchmarking is crucial to evaluate AI security tools</li><li>Beware of AI hallucinations - grounding techniques can help</li><li>Fine-tuning AI models requires large datasets to work well</li><li>Adopt a multi-agent approach when building AI applications</li></ul><p>Jha advises starting with a focused security use case and doing careful benchmarking to demonstrate value before expanding AI more broadly. He notes the challenges of fine-tuning models with limited data. Jha explains how Langroid is designed around a multi-agent approach for maintainable and extensible AI code.</p><p><br>This episode provides insights for security teams on leveraging AI responsibly, with practical advice on implementation pitfalls. Jha offers perspectives on realizing the future potential of AI in cybersecurity. His expertise provides a useful guide for applying AI to security effectively.</p><p><strong>Links &amp; Notes</strong></p><ul><li><a href="https://paladincloud.io/">Paladin Cloud</a></li><li><a href="https://github.com/langroid/langroid">Langroid</a></li><li>Got a question? <a href="https://coda.io/form/Ask-Cyber-Sentries-a-Question_dgpfZxN9R9-">Ask us here</a>!</li></ul>
<ul><li>(00:00) - Welcome to Cyber Sentries</li>
<li>(32:45) - Wrap Up</li>
</ul>]]>
      </itunes:summary>
      <itunes:keywords>Somesh Jha, AI, Cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/6f99a22c/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/6f99a22c/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Welcome to Cyber Sentries</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:title>Welcome to Cyber Sentries</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">7dba93f7-1821-401c-9fa5-121a3c27f496</guid>
      <link>https://share.transistor.fm/s/9939c124</link>
      <description>
        <![CDATA[<p>Welcome to Cyber Sentries, an exciting new podcast from Paladin Cloud exploring the transformative potential of AI for cloud security.</p><p><br></p><p>Each episode, host John Richards will be speaking with visionary thought leaders, pioneering developers, and cybersecurity experts about how artificial intelligence is reshaping the future of cloud security.</p><p><br></p><p>Expect mind-expanding insights, lively debates, and cutting-edge discoveries that will change how you think about AI and security. In line with our open-source-first philosophy, we also want to hear from you, our listeners. We’re looking forward to getting thoughts and questions from you and even suggestions for guests you’d like to hear on the show. </p><p><br></p><p>So plug in and get ready for an illuminating journey into the future of AI and cloud security. The first episode launches on December 13th. Be sure to subscribe now on your favorite podcast app so you don't miss it! Cyber Sentries, AI Insights to Cloud Security.</p><p>Learn more about Paladin Cloud at <a href="http://paladincloud.io">paladincloud.io</a>!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to Cyber Sentries, an exciting new podcast from Paladin Cloud exploring the transformative potential of AI for cloud security.</p><p><br></p><p>Each episode, host John Richards will be speaking with visionary thought leaders, pioneering developers, and cybersecurity experts about how artificial intelligence is reshaping the future of cloud security.</p><p><br></p><p>Expect mind-expanding insights, lively debates, and cutting-edge discoveries that will change how you think about AI and security. In line with our open-source-first philosophy, we also want to hear from you, our listeners. We’re looking forward to getting thoughts and questions from you and even suggestions for guests you’d like to hear on the show. </p><p><br></p><p>So plug in and get ready for an illuminating journey into the future of AI and cloud security. The first episode launches on December 13th. Be sure to subscribe now on your favorite podcast app so you don't miss it! Cyber Sentries, AI Insights to Cloud Security.</p><p>Learn more about Paladin Cloud at <a href="http://paladincloud.io">paladincloud.io</a>!</p>]]>
      </content:encoded>
      <pubDate>Fri, 01 Dec 2023 02:00:00 -0800</pubDate>
      <author>TruStory FM</author>
      <enclosure url="https://op3.dev/e/media.transistor.fm/9939c124/eac8dd32.mp3" length="1031618" type="audio/mpeg"/>
      <itunes:author>TruStory FM</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/bXTnhjoqwlxIUSfOtJLHJ8dDcpxYTT7j9THyHlGKBjY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MzU3Mjgv/MTY5NzIzMjgxOC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>86</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Welcome to Cyber Sentries, an exciting new podcast from Paladin Cloud exploring the transformative potential of AI for cloud security.</p><p><br></p><p>Each episode, host John Richards will be speaking with visionary thought leaders, pioneering developers, and cybersecurity experts about how artificial intelligence is reshaping the future of cloud security.</p><p><br></p><p>Expect mind-expanding insights, lively debates, and cutting-edge discoveries that will change how you think about AI and security. In line with our open-source-first philosophy, we also want to hear from you, our listeners. We’re looking forward to getting thoughts and questions from you and even suggestions for guests you’d like to hear on the show. </p><p><br></p><p>So plug in and get ready for an illuminating journey into the future of AI and cloud security. The first episode launches on December 13th. Be sure to subscribe now on your favorite podcast app so you don't miss it! Cyber Sentries, AI Insights to Cloud Security.</p><p>Learn more about Paladin Cloud at <a href="http://paladincloud.io">paladincloud.io</a>!</p>]]>
      </itunes:summary>
      <itunes:keywords>Cloud Security, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://paladincloud.io" img="https://img.transistorcdn.com/vdw_CSK3Eustau9lfLVRWWgYx2EghPIO1aSG1H2nYWA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vNGY2M2MwNjQt/NzFkMS00ZjM4LWJk/MjktNzBhMzFhMmVh/NzNiLzE2OTY5ODA4/MjEtaW1hZ2UuanBn.jpg">John Richards II</podcast:person>
    </item>
  </channel>
</rss>
