Rust is growing in popularity. Its unique security model promises memory safety and concurrency safety, while providing the performance of C/C++. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), David Svoboda and Joe Sible, both engineers in the SEI’s CERT Division, talk with principal researcher Suzanne Miller about the Rust programming language and its security-related features. Svoboda and Sible discuss Rust’s compile-time safety guarantees, the kinds of vulnerabilities that Rust fixes and those that it does not, situations in which users would not want to use Rust, and where interested users can go to get more information about the Rust programming language.
Using Role-Playing Scenarios to Identify Bias in LLMs
Best Practices and Lessons Learned in Standing Up an AISIRT
3 API Security Risks (and How to Protect Against Them)
Evaluating Large Language Models for Cybersecurity Tasks: Challenges and Best Practices
Capability-based Planning for Early-Stage Software Development
Safeguarding Against Recent Vulnerabilities Related to Rust
Developing a Global Network of Computer Security Incident Response Teams (CSIRTs)
Automated Repair of Static Analysis Alerts
Cyber Career Pathways and Opportunities
My Story in Computing with Sam Procter
Developing and Using a Software Bill of Materials Framework
The Importance of Diversity in Cybersecurity: Carol Ware
The Importance of Diversity in Software Engineering: Suzanne Miller
The Importance of Diversity in Artificial Intelligence: Violet Turri
Using Large Language Models in the National Security Realm
Atypical Applications of Agile and DevSecOps Principles
When Agile and Earned Value Management Collide: 7 Considerations for Successful Interaction
The Impact of Architecture on Cyber-Physical Systems Safety
ChatGPT and the Evolution of Large Language Models: A Deep Dive into 4 Transformative Case Studies
The Cybersecurity of Quantum Computing: 6 Areas of Research
Create your
podcast in
minutes
It is Free