Red-teaming AI with CounterFit
Security Unlocked
English - June 09, 2021 07:05 - 32 minutes - ★★★★ - 56 ratingsTechnology security security ai artificial intelligence machine learning microsoft microsoft security microsoft ai microsoft ml microsoft security ai nic fillingham Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
It’s an all out offensive on today’s episode while we talk about how the best defense is a good offense. But before we plan our attack, we need to know our vulnerabilities, and that’s where our guest comes in.
On this episode, hosts Nic Fillingham and Natalia Godyla are joined by Will Pearce, who discusses his role as AI Red Team Lead from the Azure Trustworthy ML Group and how he works to find weaknesses in security infrastructure to better develop ways to prevent against attacks.
In This Episode You Will Learn:
The three main functions of counterfeit
Why the best defense is a good offense
Why Will and his team aren’t worried about showing their hand by releasing this software as open source
Some Questions We Ask:
What previously developed infrastructure was the counterfeit tool built upon?
How AI red teaming differs from traditional specops red teaming
How did the counterfeit project evolve from conception to release?
Resources:
Will Pearce’s LinkedIn
AI security risk assessment using Counterfit
Microsoft Security Blog
Nic’s LinkedIn
Natalia’s LinkedIn
Related:
Listen to: Afternoon Cyber Tea with Ann Johnson
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.
It’s an all out offensive on today’s episode while we talk about how the best defense is a good offense. But before we plan our attack, we need to know our vulnerabilities, and that’s where our guest comes in.
On this episode, hosts Nic Fillingham and Natalia Godyla are joined by Will Pearce, who discusses his role as AI Red Team Lead from the Azure Trustworthy ML Group and how he works to find weaknesses in security infrastructure to better develop ways to prevent against attacks.
In This Episode You Will Learn:
The three main functions of counterfeit
Why the best defense is a good offense
Why Will and his team aren’t worried about showing their hand by releasing this software as open source
Some Questions We Ask:
What previously developed infrastructure was the counterfeit tool built upon?
How AI red teaming differs from traditional specops red teaming
How did the counterfeit project evolve from conception to release?
Resources:
AI security risk assessment using Counterfit
Related:
Listen to: Afternoon Cyber Tea with Ann Johnson
Listen to: Security Unlocked: CISO Series with Bret Arsenault
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Security Unlocked is produced by Microsoft and distributed as part of The CyberWire Network.