Red-teaming AI with CounterFit

It’s an all out offensive on today’s episode while we talk about how the best defense is a good offense. But before we plan our attack, we need to know our vulnerabilities, and that’s where our guest comes in.  On this episode, hosts Nic Fillingham and Natalia Godyla are joined by Will Pearce, who discusses his role as AI Red Team Lead from the Azure Trustworthy ML Group and how he works to find weaknesses in security infrastructure to better develop ways to prevent against attacks.  In This Episode You Will Learn:  The three main functions of counterfeit  Why the best defense is a good offense Why Will and his team aren’t worried about showing their hand by releasing this software as open source  Some Questions We Ask:  What previously developed infrastructure was the counterfeit tool built upon? How AI red teaming differs from traditional specops red teaming How did the counterfeit project evolve from conception to release? Resources:  Will Pearce’s LinkedInAI security risk assessment using Counterfit Microsoft Security BlogNic’s LinkedInNatalia’s LinkedIn  Related:Listen to: Afternoon Cyber Tea with Ann JohnsonListen to: Security Unlocked: CISO Series with Bret Arsenault Discover and follow other Microsoft podcasts at microsoft.com/podcastsSecurity Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.  Hosted on Acast. See acast.com/privacy for more information.

Om Podcasten

Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us! Hosted on Acast. See acast.com/privacy for more information.