PodParley PodParley

Supercharge Workflows, Secure Data: Build Better Apps with AI

Episode 4 of the Cyber Sentries: AI Insight to Cloud Security podcast, hosted by TruStory FM, titled "Supercharge Workflows, Secure Data: Build Better Apps with AI" was published on March 13, 2024 and runs 23 minutes.

March 13, 2024 ·23m · Cyber Sentries: AI Insight to Cloud Security

0:00 / 0:00

Exploring the AI-Powered Future of Cloud Security with Thomas JohnsonOn this episode of Cyber Sentries, host John Richards interviews Thomas Johnson, CTO and co-founder of Multiplayer, about how AI is transforming cloud security. As AI capabilities rapidly advance, Thomas provides insights into how engineering teams can leverage AI to enhance workflows, generate code, and convert basic sketches into functional systems.John and Thomas dive into key questions surrounding AI ethics, choosing open source vs proprietary models, and best practices for handling sensitive data. Listen in to hear Thomas' advice for developers looking to integrate AI into their tech stacks.Questions we answer in this episode:How are dev teams currently using AI like Copilot?What are the main differences between neural networks and other AI?What security risks exist with generative AI models?Key TakeawaysFocus on choosing the right problem and having clean, quality data.Open source models offer more control compared to proprietary models.Do not put sensitive data into generative models.This fascinating discussion explores how AI is transforming cloud security and development workflows. Thomas provides practical insights into leveraging AI's immense potential while avoiding pitfalls. Whether you're an engineering leader or a developer new to AI, this episode offers an enlightening look at the AI-powered future of tech.Links & NotesMultiplayerLearn more about Paladin CloudGot a question? Ask us here! (00:00) - Welcome to Cyber Sentries (00:22) - Meet Thomas Johnson (01:02) - AI Background (01:58) - Neural Networks (02:47) - Current Buzz (04:43) - Integrating AI (07:41) - Improving AI (10:57) - Think About the Problem and Data (12:25) - If Data Is the Problem (14:00) - Securities and Access (15:50) - RAG Model (17:52) - Open Source v. Proprietary (19:20) - Training and Inference Side (20:35) - Multiplayer (21:43) - Wrap Up

Exploring the AI-Powered Future of Cloud Security with Thomas Johnson
On this episode of Cyber Sentries, host John Richards interviews Thomas Johnson, CTO and co-founder of Multiplayer, about how AI is transforming cloud security. As AI capabilities rapidly advance, Thomas provides insights into how engineering teams can leverage AI to enhance workflows, generate code, and convert basic sketches into functional systems.

John and Thomas dive into key questions surrounding AI ethics, choosing open source vs proprietary models, and best practices for handling sensitive data. Listen in to hear Thomas' advice for developers looking to integrate AI into their tech stacks.

Questions we answer in this episode:

  • How are dev teams currently using AI like Copilot?
  • What are the main differences between neural networks and other AI?
  • What security risks exist with generative AI models?

Key Takeaways

  • Focus on choosing the right problem and having clean, quality data.
  • Open source models offer more control compared to proprietary models.
  • Do not put sensitive data into generative models.

This fascinating discussion explores how AI is transforming cloud security and development workflows. Thomas provides practical insights into leveraging AI's immense potential while avoiding pitfalls. Whether you're an engineering leader or a developer new to AI, this episode offers an enlightening look at the AI-powered future of tech.
Links & Notes

  • (00:00) - Welcome to Cyber Sentries
  • (00:22) - Meet Thomas Johnson
  • (01:02) - AI Background
  • (01:58) - Neural Networks
  • (02:47) - Current Buzz
  • (04:43) - Integrating AI
  • (07:41) - Improving AI
  • (10:57) - Think About the Problem and Data
  • (12:25) - If Data Is the Problem
  • (14:00) - Securities and Access
  • (15:50) - RAG Model
  • (17:52) - Open Source v. Proprietary
  • (19:20) - Training and Inference Side
  • (20:35) - Multiplayer
  • (21:43) - Wrap Up
CYBER VICE Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information. Cyber Things - Elmec & CybergON Elmec Informatica Cyber Things è un podcast prodotto da CybergON, business unit di Elmec Informatica che si occupa di cybersecurity e ha l’obiettivo di spiegare meglio come funziona il mondo digitale. Tredici, la voce narrante di un hacker, vi condurrà nel mondo parallelo di internet che ha una sua organizzazione, i suoi interesse e abitanti. I nostri device digitali sono la porta verso questo mondo, ma spesso ce ne dimentichiamo e lo sottovalutiamo. Ogni puntata aggiungerà un pezzo alla vostra conoscenza e soprattutto darà dei consigli pratici per proteggervi dalle insidie del mondo digitale. Link utili:CybergON: https://cybergon.com/Elmec: https://www.elmec.com/Voce narrante: TrediciAutrice: Ivana BasaricRegia: Maria Saracino e Paolo Girella
Studio di registrazione: Tracce.studio, Roma<br Cyber Heroes IT–Security Talk DE Infinigate Deutschland In Gesprächen mit unabhängigen Experten aus allen Bereichen der IT-Security klärt unser Host Besa Agaj alle Fragen – von Cyberangriffen, Ethical Hacking und Cybersecurity über Künstliche Intelligenz bis hin zu rechtlichen Grundlagen & Tipps von erfolgreichen IT-Unternehmen. Der Cyber Heroes IT-Security Talk ist ein Podcast der Infinigate Deutschland GmbH. Cyber Security Weekly Podcast MySecurity Media Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
URL copied to clipboard!