Collaboration In Product Security
How do security professionals work together to manage the known and the unknown? The Compiler team wraps up their exploration of product security by focusing on how teams across companies and projects work together effectively. Jeremy West returns to the show to share how transparency, standards, and accountability drive better outcomes when things go wrong.
Keeping Track Of Vulnerabilities With CVEs
Every lock has its weakness. That applies to the world of IT security—and any one piece of software can have multiple vulnerabilities. Code changes. Stacks evolve. The potential for incursions keeps growing. How can anyone keep track of it all? Enter the Common Vulnerabilities and Exposures Program. Jeremy West, Senior Manager of Product Security Engineering at Red Hat, walks us through the CVE tracking and remediation process—and explains why having a common standard is vital for everyone's security.
Post-quantum Cryptography
What happens when the encryption protecting the world’s most sensitive data is broken? As quantum computing advances, the standard algorithms we use for banking, healthcare, and government operations are facing an existential threat. Red Hat Distinguished Engineer Simo Sorce breaks down the real-world implications of post-quantum security threats, and how the IT industry is shifting toward quantum-resistant services.
Understanding AI Security Frameworks
With AI, traditional security methods don’t apply. Conventional defenses and ways of thinking cannot account for the myriad of attack vectors an AI model can present to a nefarious actor. Red Hat Principal Product Security Engineer Huzaifa Sidhpurwala breaks down the emerging security frameworks designed for the AI era, and tells us why complacency is (still) the weakest point when securing systems.
Data Security And AI
The relationship between data and AI is...complicated. AI is built on data. It often needs more. A wealth of data can make AI strong. But it can also be a weakness. Clarence Clayton, Director of Global Privacy + AI Risk and Compliance at Red Hat, helps us understand the increasingly complex interplay between data and AI—because the flow of information isn't a one-way street.