
#S03EP04 AI for Security And Security For AI | Tamaghna Basu
08/23/24 • 60 min
In this episode, we delve into the intricate world of AI security, tackling the dual challenge of safeguarding artificial intelligence systems and utilizing AI to enhance cybersecurity.
Guest: Tamaghna Basu, Founder & CEO, DeTaSECURE
Join us as we unravel the complexities of AI security and provide valuable insights that can help you stay ahead in the ever-evolving cybersecurity landscape. Whether you're a security professional, an AI enthusiast, or simply curious about the intersection of these fields, this episode offers critical knowledge and practical tips to enhance your understanding and approach to AI security.
Glossary for Listeners
Artificial Intelligence (AI) is the creation of computer systems that can perform tasks normally requiring human intelligence. This includes recognizing speech, making decisions, and learning from data. Imagine a smart assistant like Siri or Alexa—they use AI to understand and respond to your requests.
Machine Learning (ML)
- A subset of AI focused on developing algorithms that allow computers to learn from and make predictions or decisions based on data.
Neural Networks
- Computational models inspired by the human brain, consisting of interconnected nodes (neurons) that process information in layers to recognize patterns and make decisions.
Natural Language Processing (NLP)
- A branch of AI that enables machines to understand, interpret, and respond to human language in a natural way, including tasks like translation, sentiment analysis, and chatbots.
Deep Learning
- A type of machine learning involving neural networks with many layers (deep neural networks), which excel at analyzing large datasets and performing complex tasks such as image and speech recognition.
Adversarial Attacks
- Techniques used to deceive AI models by introducing malicious input, causing the model to make incorrect predictions or classifications, highlighting vulnerabilities in AI systems.
Recommended reading/viewing for practitioners:
- Tamaghna’s BackHat Talk- Clone with AI : https://www.youtube.com/watch?v=XafJT7I71yo
- Adversarial Attacks: https://youtu.be/t5-vMJDFr8E
- T-Mobile Breach: https://www.t-mobile.com/news/network/cyberattack-against-tmobile-and-our-customers
- Samsung bans ChatGPT: https://www.forbes.com/sites/siladityaray/2023/05/02/samsung-bans-chatgpt-and-other-chatbots-for-employees-after-sensitive-code-leak/
- OpenAI Data Breach: https://openai.com/index/march-20-chatgpt-outage/
Follow us on LinkedIn: @breakpoint-security-podcast
Audio on Buzzsprout: https://breakpoint.buzzsprout.com
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy
In this episode, we delve into the intricate world of AI security, tackling the dual challenge of safeguarding artificial intelligence systems and utilizing AI to enhance cybersecurity.
Guest: Tamaghna Basu, Founder & CEO, DeTaSECURE
Join us as we unravel the complexities of AI security and provide valuable insights that can help you stay ahead in the ever-evolving cybersecurity landscape. Whether you're a security professional, an AI enthusiast, or simply curious about the intersection of these fields, this episode offers critical knowledge and practical tips to enhance your understanding and approach to AI security.
Glossary for Listeners
Artificial Intelligence (AI) is the creation of computer systems that can perform tasks normally requiring human intelligence. This includes recognizing speech, making decisions, and learning from data. Imagine a smart assistant like Siri or Alexa—they use AI to understand and respond to your requests.
Machine Learning (ML)
- A subset of AI focused on developing algorithms that allow computers to learn from and make predictions or decisions based on data.
Neural Networks
- Computational models inspired by the human brain, consisting of interconnected nodes (neurons) that process information in layers to recognize patterns and make decisions.
Natural Language Processing (NLP)
- A branch of AI that enables machines to understand, interpret, and respond to human language in a natural way, including tasks like translation, sentiment analysis, and chatbots.
Deep Learning
- A type of machine learning involving neural networks with many layers (deep neural networks), which excel at analyzing large datasets and performing complex tasks such as image and speech recognition.
Adversarial Attacks
- Techniques used to deceive AI models by introducing malicious input, causing the model to make incorrect predictions or classifications, highlighting vulnerabilities in AI systems.
Recommended reading/viewing for practitioners:
- Tamaghna’s BackHat Talk- Clone with AI : https://www.youtube.com/watch?v=XafJT7I71yo
- Adversarial Attacks: https://youtu.be/t5-vMJDFr8E
- T-Mobile Breach: https://www.t-mobile.com/news/network/cyberattack-against-tmobile-and-our-customers
- Samsung bans ChatGPT: https://www.forbes.com/sites/siladityaray/2023/05/02/samsung-bans-chatgpt-and-other-chatbots-for-employees-after-sensitive-code-leak/
- OpenAI Data Breach: https://openai.com/index/march-20-chatgpt-outage/
Follow us on LinkedIn: @breakpoint-security-podcast
Audio on Buzzsprout: https://breakpoint.buzzsprout.com
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy
Previous Episode

#S03EP03 DevOpsification of Threat Detection Development | Wasim Halani
Learn to DevOpsify your Threat Detection Development!
Guest: Wasim Halani, Director - Detection Engineering at Securonix
SOC teams face a continuous challenge of evolving threats and a difficulty in developing #analytics to detect such #threats. Recent times have seen the Detection Engineering function evolve along the lines of Software Engineering - which means the Agile and DevOps methodologies also apply to new detections being developed and deployed.
Continuous development, continuous testing and continuous deployment are part of the game.
In this episode, we dive into the challenges faced by traditional #SOC teams in building effective threat detections, explore why threat detection is inherently difficult, and discuss how #DevOps principles can enhance this process. We also cover the groundwork for implementing these principles and the most challenging aspects of developing a #detection #engineering #program.
Recommended reading/viewing for practitioners:
1. https://medium.com/anton-on-security/can-we-have-detection-as-code-96f869cfdc79
2. https://www.securonix.com/blog/ddlc-detection-development-life-cycle/
3. https://medium.com/snowflake/detection-development-lifecycle-af166fffb3bc
Follow us on LinkedIn: @breakpoint-security-podcast
Breakpoint Youtube: BreakpointSecurityPodcast
https://youtube.com/@breakpointsecuritypodcast
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy
Next Episode

#S03EP05 Mastering Application Threat Modeling at Scale | Tony UV
TOPIC: Mastering Application Threat Modeling at Scale
Guest: Tony UV, CEO & Founder of VerSprite Security, and the Author of Risk Centric Threat Modeling & PASTA Methodology
We dive deep into everything from effective threat modeling techniques for Agile and waterfall applications to scaling threat modeling across large application ecosystems. Tony shares his insights on automating this critical process, handling technical and cultural dependencies, and ensuring security practices keep up with rapid development velocity.
If you're looking to understand what a robust threat modeling program looks like and how to measure its success, you're at the right place!
Recommended reading/viewing for practitioners:
- https://www.linkedin.com/posts/tonyuv_technology-cybersecurity-threatmodeling-activity-7136353298416107520-DOxu?utm_source=share&utm_medium=member_ios- https://versprite.com/blog/organizational-threat-model-enterprise-risk-assessment/
- https://versprite.com/blog/threat-modeling-against-supply-chains/
- https://www.amazon.com/Risk-Centric-Threat-Modeling-Simulation/dp/0470500964?dplnkId=35a18e4f-f9bb-48cc-b747-46fae78757f4&nodl=1
I would love to hear your suggestions and feedbacks, please DM me. If you liked this episode, please share with others in the community. It always means a lot!
If you’re interested in a security challenge that you’re facing or would like to hear from a specific speaker/team, let me know. Buzz me on Twitter or LinkedIn; checkout my handles below:
- Twitter: @NeeluTripathy
- LinkedIn: neelutripathy
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/breakpoint-security-podcast-312962/s03ep04-ai-for-security-and-security-for-ai-tamaghna-basu-71481924"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to #s03ep04 ai for security and security for ai | tamaghna basu on goodpods" style="width: 225px" /> </a>
Copy