Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Welcome to the AI Security Course
|
Oct 14, 2025 |
|
Episode 50 — Automated Adversarial Generation
|
Sep 15, 2025 |
|
Episode 49 — Confidential Computing for AI
|
Sep 15, 2025 |
|
Episode 48 — Guardrails Engineering
|
Sep 15, 2025 |
|
Episode 47 — On-Device & Edge AI Security
|
Sep 15, 2025 |
|
Episode 46 — Multimodal & Cross-Modal Security
|
Sep 15, 2025 |
|
Episode 45 — Program Management Patterns (30/60/90)
|
Sep 15, 2025 |
|
Episode 44 — People & Process
|
Sep 15, 2025 |
|
Episode 43 — Enterprise Architecture Patterns
|
Sep 15, 2025 |
|
Episode 42 — Third-Party & Vendor Risk
|
Sep 15, 2025 |
|
Episode 41 — Legal & Compliance Horizon (High-Level)
|
Sep 15, 2025 |
|
Episode 40 — Content Provenance & Watermarking
|
Sep 15, 2025 |
|
Episode 39 — Deepfakes & Synthetic Media Risk
|
Sep 15, 2025 |
|
Episode 38 — Incident Response for AI Events
|
Sep 15, 2025 |
|
Episode 37 — Secure SDLC for AI
|
Sep 15, 2025 |
|
Episode 36 — OWASP GenAI/LLM Top 10
|
Sep 15, 2025 |
|
Episode 35 — Threat Modeling for AI
|
Sep 15, 2025 |
|
Episode 34 — Risk Frameworks in Practice
|
Sep 15, 2025 |
|
Episode 33 — Governance & Acceptable Use
|
Sep 15, 2025 |
|
Episode 32 — Keys, Encryption & Attestation
|
Sep 15, 2025 |
|
Episode 31 — Cloud & Infra for AI
|
Sep 15, 2025 |
|
Episode 30 — Connector/Plugin Security
|
Sep 15, 2025 |
|
Episode 29 — Code Execution & Sandboxing
|
Sep 15, 2025 |
|
Episode 28 — API Gateways & Proxies for AI
|
Sep 15, 2025 |
|
Episode 27 — Secure Fine-Tuning & Adaptation
|
Sep 15, 2025 |
|
Episode 26 — Supply Chain & Artifacts
|
Sep 15, 2025 |
|
Episode 25 — MLOps & Serving Security
|
Sep 15, 2025 |
|
Episode 24 — Cost & Resource Abuse
|
Sep 15, 2025 |
|
Episode 23 — Abuse & Fraud Detection
|
Sep 15, 2025 |
|
Episode 22 — Telemetry & Observability
|
Sep 15, 2025 |
|
Episode 21 — Evals & Test Pipelines
|
Sep 15, 2025 |
|
Episode 20 — Red Teaming Strategy for GenAI
|
Sep 15, 2025 |
|
Episode 19 — Output Validation & Policy Enforcement
|
Sep 15, 2025 |
|
Episode 18 — AuthN/Z for LLM Apps
|
Sep 15, 2025 |
|
Episode 17 — Secrets & Credential Hygiene
|
Sep 15, 2025 |
|
Episode 16 — Agents as an Attack Surface
|
Sep 15, 2025 |
|
Episode 15 — RAG Security II: Context Filtering & Grounding
|
Sep 15, 2025 |
|
Episode 14 — RAG Security I: Retrieval & Index Hardening
|
Sep 15, 2025 |
|
Episode 13 — Adversarial Evasion
|
Sep 15, 2025 |
|
Episode 12 — Model Theft & Extraction
|
Sep 15, 2025 |
|
Episode 11 — Privacy-Preserving Techniques
|
Sep 15, 2025 |
|
Episode 10 — Privacy Attacks
|
Sep 15, 2025 |
|
Episode 9 — Training-Time Integrity
|
Sep 15, 2025 |
|
Episode 8 — Data Poisoning Attacks
|
Sep 15, 2025 |
|
Episode 7 — Content Safety vs. Security
|
Sep 15, 2025 |
|
Episode 6 — Prompt Security II: Indirect & Cross-Domain Injections
|
Sep 15, 2025 |
|
Episode 5 — Prompt Security I: Injection & Jailbreaks
|
Sep 15, 2025 |
|
Episode 4 — Data Lifecycle Security
|
Sep 15, 2025 |
|
Episode 3 — System Architecture & Trust Boundaries
|
Sep 15, 2025 |
|
Episode 2 — The AI Security Landscape
|
Sep 15, 2025 |
|
Episode 1 — Course Overview & How to Use This Prepcast
|
Sep 15, 2025 |