Podcasts about hyrum anderson

  • 9PODCASTS
  • 11EPISODES
  • 59mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jun 27, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about hyrum anderson

Latest podcast episodes about hyrum anderson

Afternoon Cyber Tea with Ann Johnson
Reflecting on 100 Episodes of Afternoon Cyber Tea

Afternoon Cyber Tea with Ann Johnson

Play Episode Listen Later Jun 27, 2024 13:45


In this milestone 100th episode of Afternoon Cyber Tea, we celebrate with a special "Best Of" compilation featuring some of our most remarkable guests. Join us as we revisit highlights from conversations with Charlie Bell, Marc Goodman, Dr. Andrea Matwyshyn, Dr. Fiona Hill, Runa Sandvik, Hyrum Anderson and Ram Shankar Siva Kumar, MK Palmore, Marene Allison, Mike Hanley, and Theresa Payton. This episode brings together a wealth of knowledge and experience, reflecting on our journey and looking ahead to future challenges and innovations.  We extend our deepest gratitude to our dedicated listeners for your invaluable support. Thank you for being a part of our Afternoon Cyber Tea community.   Please note: Afternoon Cyber Tea is going on an indefinite hiatus.  Resources:       View Ann Johnson on LinkedIn     Related Microsoft Podcasts:    Microsoft Threat Intelligence Podcast  The BlueHat Podcast   Uncovering Hidden Risks           Discover and follow other Microsoft podcasts at microsoft.com/podcasts      Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of N2K media network.   

The CyberWire
Cyber phases of two hybrid wars prominently feature influence operations. Rapid Reset is a novel and powerful DDoS vulnerability. Credential phishing resurgent. And a look back at Patch Tuesday.

The CyberWire

Play Episode Listen Later Oct 11, 2023 27:31


Cyber operations in Hamas's war, Cryptocurrency as a source of funding, and Russian hacktivist auxiliaries shifting their focus. Not all influence operations involve disinformation. Rapid Reset is a Novel DDoS attack. A resurgent credential phishing campaign. Ann Johnson from Afternoon Cyber Tea speaks with Ram Shankar Siva Kumar and Dr. Hyrum Anderson about the promise, peril, and impact of AI. Our own Rick Howard talks cyber intelligence in the medical vertical with Taylor Lehmann of Google. And a quick look back at Patch Tuesday. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/194 Selected reading. Hackers make their mark in Israel-Hamas conflict (Axios)  Hacktivists take sides in Israel-Palestinian war (Record)  Cyberattacks Targeting Israel Are Rising After Hamas Assault (Time)  Hacktivists stoke Israel-Gaza conflict online (Reuters)  Hackers, some tied to Russia, target Israeli media and government websites (MSN)  Hamas Militants Behind Israel Attack Raised Millions in Crypto (Wall Street Journal)  Cryptocurrency fueled Hamas' war machine (Quartz)  The Israeli police cyber unit, Lahav 433, has frozen the cryptocurrency accounts of Hamas (Odessa Journal)  U.S. surging cyber support to Israel (POLITICO Pro)  Savvy Israel-linked hacking group reemerges amid Gaza fighting (CyberScoop)  Israeli Cyber Companies Rally as Digital, Physical Assaults Continue (Wall Street Journal)  Hamas Seeds Violent Videos on Sites With Little Moderation (New York Times)  Social media platforms foment disinformation about war in Israel (Record)  Hamas terrorists post murder of Israeli grandmother on her Facebook page (The Telegraph)  How to limit graphic social media images from the Israel-Hamas war (Washington Post)  Briefing: EU Commissioner Asks Musk for Information on “Illegal Content and Disinformation” Spreading on X (The Information) EU warns Elon Musk of 'penalties' for disinformation circulating on X amid Israel-Hamas war (CNN)  Hamas Got Around Israel's Surveillance Prowess by Going Dark (Bloomberg)  ‘HTTP/2 Rapid Reset' Zero-Day Exploited to Launch Largest DDoS Attacks in History (SecurityWeek) New 'HTTP/2 Rapid Reset' zero-day attack breaks DDoS records (BleepingComputer)  The largest cyberattack of its kind recently happened. Here's how. (Washington Post)  New technique leads to largest DDoS attacks ever, Google and Amazon say (Record)  HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487 (Cybersecurity and Infrastructure Security Agency CISA) LinkedIn Smart Links Fuel Credential Phishing Campaign (Cofense) Microsoft Fixes Exploited Zero-Days in WordPad, Skype for Business (SecurityWeek)  Microsoft's October Patch Tuesday update resolves three zero-days (Computing)  Microsoft Releases October 2023 Security Updates (Cybersecurity and Infrastructure Security Agency CISA)  Patch Tuesday: Code Execution Flaws in Adobe Commerce, Photoshop (SecurityWeek)  Citrix Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA) Learn more about your ad choices. Visit megaphone.fm/adchoices

Afternoon Cyber Tea with Ann Johnson
AI: The Promise and Potential Peril

Afternoon Cyber Tea with Ann Johnson

Play Episode Listen Later Oct 3, 2023 37:53


AI is perhaps the most defining technology of this generation, with the potential to solve major business, scientific, and societal issues. As this powerful technology goes mainstream – it is not without its flaws and challenges. “Not With a Bug, But With a Sticker,” co-authors Ram Shankar Siva Kumar and Dr. Hyrum Anderson join Ann on this episode of Afternoon Cyber Tea to chat about the promise, peril, and impact of AI.    Resources:  View Hyrum Anderson on LinkedIn   View Ram Shankar on LinkedIn     View Ann Johnson on LinkedIn     Not with a Bug, But with a Sticker is available here.       Related Microsoft Podcasts:                   Listen to: Uncovering Hidden Risks    Listen to: Security Unlocked     Listen to: Security Unlocked: CISO Series with Bret Arsenault              Discover and follow other Microsoft podcasts at microsoft.com/podcasts    Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of The CyberWire Network.    

Crucial Tech
Episode 7.23 - Defense against the AI Arts

Crucial Tech

Play Episode Listen Later Sep 29, 2023 46:43


The rise of generative AI products for commercial use is probably the fastest and most controversial of any technological advance in history. Governments are scrambling to understand and regulate its use. Billions are being invested in development. At the same time, the general public's interest in the technology has waned and industry pioneer OpenAI announced a potential bankruptcy in 2024 unless significant new investment is forthcoming. But there is apparently no putting the genie back in the bottle and it is left to all of us to figure out what we can do with it without causing outright disaster. So, for this episode, we have brought this panel of experts to talk about how we can defend against the malicious use of the technology while we mine the benefits. Hyrum Anderson, co-Not With a Bug But a Sticker and an accomplished data scientist with a historical understanding of the tech going back decades; Haseeb Khan, Generative AI Ambassador and at Google; and representing the user base, Milan Lazich, a senior marketing executive, who will discuss concerns and best practices of generative AI. The transcript of this discussion will be available in the AI special issue of Cyber Protection Magazine and will be distributed to attendees at the it-sa exhibition and conference October 10, and then available to the magazine subscribers in an electronic version after the conference --- Send in a voice message: https://podcasters.spotify.com/pod/show/crucialtech/message Support this podcast: https://podcasters.spotify.com/pod/show/crucialtech/support

The BlueHat Podcast
Not with a Bug but with a Sticker

The BlueHat Podcast

Play Episode Listen Later Aug 23, 2023 48:29


Hyrum Anderson and Ram Shankar join Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Hyrum Anderson is a distinguished ML Engineer at Robust Intelligence. He received his Ph.D. in Electrical Engineering from the University of Washington, emphasizing signal processing and machine learning. Much of his technical career has focused on security, and he has directed research projects at MIT Lincoln Laboratory and Sandia National Laboratories. Ram Shankar works on the intersection of machine learning and security at Microsoft and founded the AI Red Team, bringing together an interdisciplinary group of researchers and engineers to proactively attack AI systems and defend them from attacks. In This Episode You Will Learn: The difference between AI and machine learningWhy embracing a holistic, healthy AI development is to our advantageThe security vulnerabilities and risks associated with AI and Machine LearningSome Questions We Ask: Who did you write this book for, and what will the readers learn? What type of vulnerabilities are you finding the most concerning currently? How do adversarial attacks exploit vulnerabilities in AI algorithms?Resources: View Hyrum Anderson on LinkedInView Ram Shankar on LinkedInView Wendy Zenone on LinkedInView Nic Fillingham on LinkedInNot with a Bug, But with a Sticker is available hereFollow Hyrum on TwitterFollow Ram on TwitterDiscover and follow other Microsoft podcasts at microsoft.com/podcasts Hosted on Acast. See acast.com/privacy for more information.

Machine Learning Podcast - Jay Shah
Risks of AI in real-world and towards Building Robust Security measures | Hyrum Anderson

Machine Learning Podcast - Jay Shah

Play Episode Listen Later Jul 12, 2023 51:33


Dr Hyrum Anderson is a Distinguished Machine Learning Engineer at Robust Intelligence. Prior to that, he was Principal Architect of Trustworthy Machine Learning at Microsoft where he also founded Microsoft's AI Red Team; he also led security research at MIT Lincoln Laboratory, Sandia National Laboratories, and Mendiant, and was Chief Scientist at Endgame (later acquired by Elastic). He's also the co-author of the book “Not a Bug, But with a Sticker” and his research interests include assessing the security and privacy of ML systems and building Robust AI models. Timestamps of the conversation 00:50 Introduction 01:40 Background in AI and ML security 04:45 Attacks on ML systems 08:20 Fractions of ML systems prone to Attacks 10:38 Operational risks with security measures 13:40 Solution from an algorithmic or policy perspective 15:46 AI regulation and policy making 22:40 Co-development of AI and security measures 24:06 Risks of Generative AI and Mitigation 27:45 Influencing an AI model 30:08 Prompt stealing on ChatGPT 33:50 Microsoft AI Red Team 38:46 Managing risks 39:41 Government Regulations 43:04 What to expect from the Book 46:40 Black in AI & Bountiful Children's Foundation Check out Rora: https://teamrora.com/jayshah Guide to STEM Ph.D. AI Researcher + Research Scientist pay: https://www.teamrora.com/post/ai-researchers-salary-negotiation-report-2023 Rora's negotiation philosophy: https://www.teamrora.com/post/the-biggest-misconception-about-negotiating-salaryhttps://www.teamrora.com/post/job-offer-negotiation-lies Hyrum's Linkedin: https://www.linkedin.com/in/hyrumanderson/ And Research: https://scholar.google.com/citations?user=pP6yo9EAAAAJ&hl=en Book - Not a Bug, But with a Sticker: https://www.amazon.com/Not-Bug-But-Sticker-Learning/dp/1119883989/ About the Host: Jay is a Ph.D. student at Arizona State University. Linkedin: https://www.linkedin.com/in/shahjay22/ Twitter: https://twitter.com/jaygshah22 Homepage: https://www.public.asu.edu/~jgshah1/ for any queries. Stay tuned for upcoming webinars! ***Disclaimer: The information contained in this video represents the views and opinions of the speaker and does not necessarily represent the views or opinions of any institution. It does not constitute an endorsement by any Institution or its affiliates of such video content.***

The CyberWire
Black Hat 2017 - Research and Investment - CyberWire Special Edition

The CyberWire

Play Episode Listen Later Aug 1, 2017 39:54


Black Hat 2017 has wrapped up, and by all accounts it was another successful conference, with an active trade show floor, exciting keynotes and engaging, informative educational sessions on a variety of topics. There was business being done, with hopeful entrepreneurs and investors alike looking to identify the next big thing in cyber security.  In this CyberWire special edition, we’ve rounded up a handful of presenters and one investor for a taste of Black Hat, to help give you a sense of the event.    Patrick Wardle is Chief Security Researcher at Synack, and creator of objective-see, an online site where he publishes the personal tools he’s created to help protect Mac OS computers. He’ll be telling us about his research on the FruitFly malware recently discovered on Mac OS.  https://objective-see.com/   Hyrum Anderson is technical director of data science at Endgame, he will discuss research he released on stage at Black Hat showing the pros and cons of using machine learning from both a defender and attacker perspective.  https://www.endgame.com/our-experts/hyrum-anderson   Zack Allen, Manager of Threat Operations, and Chaim Sanders, Security Lead, of ZeroFOX will be speaking about their Black Hat presentation on finding regressions in web application firewall (WAF) deployments.  https://www.linkedin.com/in/zack-allen-12749a76 https://www.linkedin.com/in/chaim-sanders-a7a23713/   And we’ll wrap it up with some insights from Alberto Yepez, founder and managing director of Trident Cybersecurity, on the investment environment and the changes he’s seen in the market in the last year.  https://www.linkedin.com/in/albertoyepez/

Paul's Security Weekly TV
Hyrum Anderson, Endgame - Paul's Security Weekly #504

Paul's Security Weekly TV

Play Episode Listen Later Mar 12, 2017 60:17


Hyrum Anderson is the Technical Director for Data Science at Endgame. He received his PhD in Electrical Engineering from the University of Washington and BS/MS degrees from Brigham Young University. Hyrum also has prior experience at FireEye, Mandiant, Sandia National Laboratories, and MIT Lincoln Laboratory. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode504 Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly

Paul's Security Weekly
Paul’s Security Weekly #504 - Math is Dead Sexy

Paul's Security Weekly

Play Episode Listen Later Mar 11, 2017 135:20


Hyrum Anderson of Endgame and Keith Hoodlet of Rapid7 and InfoSec Mentors Project join us for interviews, and we cover the latest security news. Stay tuned!

Paul's Security Weekly (Video-Only)
Hyrum Anderson, Endgame - Paul's Security Weekly #504

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Mar 10, 2017 60:17


Hyrum Anderson is the Technical Director for Data Science at Endgame. He received his PhD in Electrical Engineering from the University of Washington and BS/MS degrees from Brigham Young University. Hyrum also has prior experience at FireEye, Mandiant, Sandia National Laboratories, and MIT Lincoln Laboratory. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode504 Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly

Paul's Security Weekly (Podcast-Only)
Paul's Security Weekly #504 - Math is Dead Sexy

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Mar 10, 2017 135:20


Hyrum Anderson of Endgame and Keith Hoodlet of Rapid7 and InfoSec Mentors Project join us for interviews, and we cover the latest security news. Stay tuned!