<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Mon, 13 Apr 2026 01:42:09 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Automation”</title>
    <link>https://securityconversations.fireside.fm/tags/automation</link>
    <pubDate>Sun, 08 Feb 2026 12:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>From Epstein to Notepad++: Redactions, Zero-Days and Supply Chain Attacks</title>
  <link>http://securityconversations.fireside.fm/epstein-notepad-plus-zerodays-supply-chain-attacks</link>
  <guid isPermaLink="false">d4b5dfb8-20b2-4dc6-aa39-6f582bd8dae8</guid>
  <pubDate>Sun, 08 Feb 2026 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d4b5dfb8-20b2-4dc6-aa39-6f582bd8dae8.mp3" length="113124412" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Thinkst Canary. Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)

Three Buddy Problem - Episode 84:  We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. 

Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft’s security executive changes, Anthropic's AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:17:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d4b5dfb8-20b2-4dc6-aa39-6f582bd8dae8/cover.jpg?v=2"/>
  <description>(Presented by Thinkst Canary (https://canary.tools): Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)
Three Buddy Problem - Episode 84:  We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. 
Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft’s security executive changes, Anthropic's AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 84</strong>:  We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. </p>

<p>Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft’s security executive changes, Anthropic&#39;s AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Thinkst Canary - Customer Love" rel="nofollow" href="https://canary.tools/love">Thinkst Canary - Customer Love</a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DamIQqfq_QYsYm7xby3ntH4bI30T98emmOSkNnQzY84/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Did a renowned hacker help Jeffrey Epstein get ‘dirt on other people&#39;?" rel="nofollow" href="https://www.yahoo.com/news/articles/did-renowned-hacker-help-jeffrey-120148711.html">Did a renowned hacker help Jeffrey Epstein get ‘dirt on other people'?</a></li><li><a title="DOJ releases details alleged talented hacker working for Jeffrey Epstein" rel="nofollow" href="https://securityaffairs.com/187515/laws-and-regulations/doj-releases-details-alleged-talented-hacker-working-for-jeffrey-epstein.html">DOJ releases details alleged talented hacker working for Jeffrey Epstein</a></li><li><a title="Claude Opus 4.6 \ Anthropic" rel="nofollow" href="https://www.anthropic.com/news/claude-opus-4-6">Claude Opus 4.6 \ Anthropic</a></li><li><a title="0-Days \ red.anthropic.com" rel="nofollow" href="https://red.anthropic.com/2026/zero-days/">0-Days \ red.anthropic.com</a></li><li><a title="JAGS&#39; Claude Code SDLC config" rel="nofollow" href="https://github.com/juanandresgs/claude-system">JAGS' Claude Code SDLC config</a></li><li><a title="CERT-Ukraine on zero-day attacks via MS Office" rel="nofollow" href="https://cert.gov.ua/article/6287250">CERT-Ukraine on zero-day attacks via MS Office</a></li><li><a title="Executive security shuffle at Microsoft" rel="nofollow" href="https://blogs.microsoft.com/blog/2026/02/04/updates-in-two-of-our-core-priorities/">Executive security shuffle at Microsoft</a></li><li><a title="TLPBLACK: What we know about the Notepad++ supply chain attack" rel="nofollow" href="https://medium.com/@costin.raiu/what-we-know-about-the-notepad-supply-chain-attack-0f428b4aee08">TLPBLACK: What we know about the Notepad++ supply chain attack</a></li><li><a title="Lotus Blossom APT targets critical infrastructure via Notepad++." rel="nofollow" href="https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/">Lotus Blossom APT targets critical infrastructure via Notepad++.</a></li><li><a title="Kaspersky: Notepad++ supply chain attack breakdown" rel="nofollow" href="https://securelist.com/notepad-supply-chain-attack/118708/">Kaspersky: Notepad++ supply chain attack breakdown</a></li><li><a title="Validin: Exploring the C2 Infrastructure of the Notepad++ Compromise" rel="nofollow" href="https://www.validin.com/blog/exploring_notepad_plus_plus_network_indicators/">Validin: Exploring the C2 Infrastructure of the Notepad++ Compromise</a></li><li><a title="Hostinger server unauthorized access case: What happened with Notepad++ and how we resolved it" rel="nofollow" href="https://www.hostinger.com/blog/notepad-unauthorized-access">Hostinger server unauthorized access case: What happened with Notepad++ and how we resolved it</a></li><li><a title="Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework" rel="nofollow" href="https://blog.talosintelligence.com/knife-cutting-the-edge/">Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework</a></li><li><a title="Palo Alto Unit 42: The Shadow Campaigns - Uncovering Global Espionage" rel="nofollow" href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">Palo Alto Unit 42: The Shadow Campaigns - Uncovering Global Espionage</a></li><li><a title="FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled" rel="nofollow" href="https://www.404media.co/fbi-couldnt-get-into-wapo-reporters-iphone-because-it-had-lockdown-mode-enabled/">FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled</a></li><li><a title="Court document: FBI Washington Post Lockdown Mode" rel="nofollow" href="https://www.documentcloud.org/documents/26808056-fbi-washington-post-lockdown-mode/">Court document: FBI Washington Post Lockdown Mode</a></li><li><a title="PIVOTcon" rel="nofollow" href="https://pivotcon.org/">PIVOTcon</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li><li><a title="Decipher podcast (Dennis Fisher)" rel="nofollow" href="https://open.spotify.com/episode/5k9xpXyD7YSlJRkYqoCQde">Decipher podcast (Dennis Fisher)</a></li><li><a title="Detection Engineering newsletter (Zack Allen)" rel="nofollow" href="https://www.detectionengineering.net/p/dew-144-pyramid-of-permanence-and">Detection Engineering newsletter (Zack Allen)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 84</strong>:  We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. </p>

<p>Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft’s security executive changes, Anthropic&#39;s AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Thinkst Canary - Customer Love" rel="nofollow" href="https://canary.tools/love">Thinkst Canary - Customer Love</a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DamIQqfq_QYsYm7xby3ntH4bI30T98emmOSkNnQzY84/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Did a renowned hacker help Jeffrey Epstein get ‘dirt on other people&#39;?" rel="nofollow" href="https://www.yahoo.com/news/articles/did-renowned-hacker-help-jeffrey-120148711.html">Did a renowned hacker help Jeffrey Epstein get ‘dirt on other people'?</a></li><li><a title="DOJ releases details alleged talented hacker working for Jeffrey Epstein" rel="nofollow" href="https://securityaffairs.com/187515/laws-and-regulations/doj-releases-details-alleged-talented-hacker-working-for-jeffrey-epstein.html">DOJ releases details alleged talented hacker working for Jeffrey Epstein</a></li><li><a title="Claude Opus 4.6 \ Anthropic" rel="nofollow" href="https://www.anthropic.com/news/claude-opus-4-6">Claude Opus 4.6 \ Anthropic</a></li><li><a title="0-Days \ red.anthropic.com" rel="nofollow" href="https://red.anthropic.com/2026/zero-days/">0-Days \ red.anthropic.com</a></li><li><a title="JAGS&#39; Claude Code SDLC config" rel="nofollow" href="https://github.com/juanandresgs/claude-system">JAGS' Claude Code SDLC config</a></li><li><a title="CERT-Ukraine on zero-day attacks via MS Office" rel="nofollow" href="https://cert.gov.ua/article/6287250">CERT-Ukraine on zero-day attacks via MS Office</a></li><li><a title="Executive security shuffle at Microsoft" rel="nofollow" href="https://blogs.microsoft.com/blog/2026/02/04/updates-in-two-of-our-core-priorities/">Executive security shuffle at Microsoft</a></li><li><a title="TLPBLACK: What we know about the Notepad++ supply chain attack" rel="nofollow" href="https://medium.com/@costin.raiu/what-we-know-about-the-notepad-supply-chain-attack-0f428b4aee08">TLPBLACK: What we know about the Notepad++ supply chain attack</a></li><li><a title="Lotus Blossom APT targets critical infrastructure via Notepad++." rel="nofollow" href="https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/">Lotus Blossom APT targets critical infrastructure via Notepad++.</a></li><li><a title="Kaspersky: Notepad++ supply chain attack breakdown" rel="nofollow" href="https://securelist.com/notepad-supply-chain-attack/118708/">Kaspersky: Notepad++ supply chain attack breakdown</a></li><li><a title="Validin: Exploring the C2 Infrastructure of the Notepad++ Compromise" rel="nofollow" href="https://www.validin.com/blog/exploring_notepad_plus_plus_network_indicators/">Validin: Exploring the C2 Infrastructure of the Notepad++ Compromise</a></li><li><a title="Hostinger server unauthorized access case: What happened with Notepad++ and how we resolved it" rel="nofollow" href="https://www.hostinger.com/blog/notepad-unauthorized-access">Hostinger server unauthorized access case: What happened with Notepad++ and how we resolved it</a></li><li><a title="Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework" rel="nofollow" href="https://blog.talosintelligence.com/knife-cutting-the-edge/">Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework</a></li><li><a title="Palo Alto Unit 42: The Shadow Campaigns - Uncovering Global Espionage" rel="nofollow" href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">Palo Alto Unit 42: The Shadow Campaigns - Uncovering Global Espionage</a></li><li><a title="FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled" rel="nofollow" href="https://www.404media.co/fbi-couldnt-get-into-wapo-reporters-iphone-because-it-had-lockdown-mode-enabled/">FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled</a></li><li><a title="Court document: FBI Washington Post Lockdown Mode" rel="nofollow" href="https://www.documentcloud.org/documents/26808056-fbi-washington-post-lockdown-mode/">Court document: FBI Washington Post Lockdown Mode</a></li><li><a title="PIVOTcon" rel="nofollow" href="https://pivotcon.org/">PIVOTcon</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li><li><a title="Decipher podcast (Dennis Fisher)" rel="nofollow" href="https://open.spotify.com/episode/5k9xpXyD7YSlJRkYqoCQde">Decipher podcast (Dennis Fisher)</a></li><li><a title="Detection Engineering newsletter (Zack Allen)" rel="nofollow" href="https://www.detectionengineering.net/p/dew-144-pyramid-of-permanence-and">Detection Engineering newsletter (Zack Allen)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Rob Ragan on the excitement of AI solving security problems</title>
  <link>http://securityconversations.fireside.fm/rob-ragan-artificial-intelligence-future-of-security</link>
  <guid isPermaLink="false">5d290c85-90a8-4e41-8e9b-f8c953259be4</guid>
  <pubDate>Thu, 07 Dec 2023 07:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/5d290c85-90a8-4e41-8e9b-f8c953259be4.mp3" length="41368098" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly, the firmware security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the leapfrog potential of AI models and their impact on various aspects of technology and  society.</itunes:subtitle>
  <itunes:duration>51:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/5d290c85-90a8-4e41-8e9b-f8c953259be4/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the potential of AI models and their impact on various aspects of technology and society and digs into the importance of improving model interaction by allowing more thoughtful and refined responses. 
We also discuss how AI can be a superpower, enabling rapid prototyping and idea generation. The discussion concludes with considerations for safeguarding AI models, including transparency, explainability, and potential regulations.
Takeaways:
Scaling pen testing can be challenging, and maintaining quality becomes difficult as the team grows. Bug bounty programs have been a net positive for businesses, providing valuable insights and incentivizing innovative research.
Attack surface management plays a crucial role in identifying vulnerabilities and continuously monitoring an organization's security posture.
Social engineering attacks, such as SIM swapping and phishing, require a multi-faceted defense strategy that includes technical controls, policies, and user education.
AI has the potential to augment human intelligence and improve efficiency and effectiveness in cybersecurity. Improving model interaction by allowing more thoughtful and refined responses can enhance the user experience. Algorithms can be used to delegate tasks and improve performance, leading to better results in complex tasks.
AI is an inflection point in technology, comparable to the internet and the industrial revolution. Can be game-changing to automate time-consuming tasks, freeing up human resources for more strategic work.
Autocomplete and code generation tools like Copilot can significantly speed up coding and reduce errors.  AI can be a superpower, enabling rapid prototyping, idea generation, and creative tasks.
Safeguarding AI models requires transparency, explainability, and consideration of potential biases. Regulations may be necessary to ensure responsible use of AI, but they should not stifle innovation. Global adoption of AI should be encouraged to prevent technological disparities between countries.  
</description>
  <itunes:keywords>artificial intelligence, generative-ai, LLMs, bug bounties, automation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the potential of AI models and their impact on various aspects of technology and society and digs into the importance of improving model interaction by allowing more thoughtful and refined responses. </p>

<p>We also discuss how AI can be a superpower, enabling rapid prototyping and idea generation. The discussion concludes with considerations for safeguarding AI models, including transparency, explainability, and potential regulations.</p>

<p><strong>Takeaways:</strong></p>

<ul>
<li>Scaling pen testing can be challenging, and maintaining quality becomes difficult as the team grows. Bug bounty programs have been a net positive for businesses, providing valuable insights and incentivizing innovative research.</li>
<li>Attack surface management plays a crucial role in identifying vulnerabilities and continuously monitoring an organization&#39;s security posture.</li>
<li>Social engineering attacks, such as SIM swapping and phishing, require a multi-faceted defense strategy that includes technical controls, policies, and user education.</li>
<li>AI has the potential to augment human intelligence and improve efficiency and effectiveness in cybersecurity. Improving model interaction by allowing more thoughtful and refined responses can enhance the user experience. Algorithms can be used to delegate tasks and improve performance, leading to better results in complex tasks.</li>
<li>AI is an inflection point in technology, comparable to the internet and the industrial revolution. Can be game-changing to automate time-consuming tasks, freeing up human resources for more strategic work.</li>
<li>Autocomplete and code generation tools like Copilot can significantly speed up coding and reduce errors.  AI can be a superpower, enabling rapid prototyping, idea generation, and creative tasks.</li>
<li>Safeguarding AI models requires transparency, explainability, and consideration of potential biases. Regulations may be necessary to ensure responsible use of AI, but they should not stifle innovation. Global adoption of AI should be encouraged to prevent technological disparities between countries. </li>
</ul><p>Links:</p><ul><li><a title="Rob Ragan&#39;s Theoradical.ai" rel="nofollow" href="https://theoradical.ai/">Rob Ragan's Theoradical.ai</a></li><li><a title="Testing LLM Algorithms While AI Tests Us" rel="nofollow" href="https://slides.com/robragan/testing-llms">Testing LLM Algorithms While AI Tests Us</a> &mdash; Testing LLM Algorithms While AI Tests Us</li><li><a title="LLM Testing Findings Templates" rel="nofollow" href="https://github.com/BishopFox/llm-testing-findings/blob/main/README.md">LLM Testing Findings Templates</a> &mdash; This collection of open-source templates is designed to facilitate the reporting and documentation of vulnerabilities and opportunities for usability improvement in LLM integrations and applications.</li><li><a title="Rob Ragan on Twitter" rel="nofollow" href="https://twitter.com/sweepthatleg">Rob Ragan on Twitter</a></li><li><a title="Rob Ragan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/robragan/">Rob Ragan on LinkedIn</a></li><li><a title="Bishop Fox Labs" rel="nofollow" href="https://bishopfox.com/labs">Bishop Fox Labs</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the potential of AI models and their impact on various aspects of technology and society and digs into the importance of improving model interaction by allowing more thoughtful and refined responses. </p>

<p>We also discuss how AI can be a superpower, enabling rapid prototyping and idea generation. The discussion concludes with considerations for safeguarding AI models, including transparency, explainability, and potential regulations.</p>

<p><strong>Takeaways:</strong></p>

<ul>
<li>Scaling pen testing can be challenging, and maintaining quality becomes difficult as the team grows. Bug bounty programs have been a net positive for businesses, providing valuable insights and incentivizing innovative research.</li>
<li>Attack surface management plays a crucial role in identifying vulnerabilities and continuously monitoring an organization&#39;s security posture.</li>
<li>Social engineering attacks, such as SIM swapping and phishing, require a multi-faceted defense strategy that includes technical controls, policies, and user education.</li>
<li>AI has the potential to augment human intelligence and improve efficiency and effectiveness in cybersecurity. Improving model interaction by allowing more thoughtful and refined responses can enhance the user experience. Algorithms can be used to delegate tasks and improve performance, leading to better results in complex tasks.</li>
<li>AI is an inflection point in technology, comparable to the internet and the industrial revolution. Can be game-changing to automate time-consuming tasks, freeing up human resources for more strategic work.</li>
<li>Autocomplete and code generation tools like Copilot can significantly speed up coding and reduce errors.  AI can be a superpower, enabling rapid prototyping, idea generation, and creative tasks.</li>
<li>Safeguarding AI models requires transparency, explainability, and consideration of potential biases. Regulations may be necessary to ensure responsible use of AI, but they should not stifle innovation. Global adoption of AI should be encouraged to prevent technological disparities between countries. </li>
</ul><p>Links:</p><ul><li><a title="Rob Ragan&#39;s Theoradical.ai" rel="nofollow" href="https://theoradical.ai/">Rob Ragan's Theoradical.ai</a></li><li><a title="Testing LLM Algorithms While AI Tests Us" rel="nofollow" href="https://slides.com/robragan/testing-llms">Testing LLM Algorithms While AI Tests Us</a> &mdash; Testing LLM Algorithms While AI Tests Us</li><li><a title="LLM Testing Findings Templates" rel="nofollow" href="https://github.com/BishopFox/llm-testing-findings/blob/main/README.md">LLM Testing Findings Templates</a> &mdash; This collection of open-source templates is designed to facilitate the reporting and documentation of vulnerabilities and opportunities for usability improvement in LLM integrations and applications.</li><li><a title="Rob Ragan on Twitter" rel="nofollow" href="https://twitter.com/sweepthatleg">Rob Ragan on Twitter</a></li><li><a title="Rob Ragan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/robragan/">Rob Ragan on LinkedIn</a></li><li><a title="Bishop Fox Labs" rel="nofollow" href="https://bishopfox.com/labs">Bishop Fox Labs</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
