
Sign up to save your podcasts
Or


In this episode, the hosts discuss the evolving landscape of AI infrastructure security, focusing on the complexities of building and maintaining AI data centers. They explore the critical role of Baseboard Management Controllers (BMCs) as an attack surface, the importance of supply chain security, and best practices for hardware procurement. The conversation underscores the importance of validating hardware and firmware integrity for organizations while also addressing the significant security risks associated with AI workloads. As AI data centers continue to grow, understanding these challenges and implementing robust security measures will be essential for future success.
Chapters
00:00 Introduction to Zero Trust and Its Evolution
03:33 Current State of Zero Trust Implementation
05:22 Micro-Segmentation and Infrastructure Security
10:02 Zero Trust and Lateral Movement Prevention
11:32 The Role of Zero Trust in Ransomware Defense
14:51 Chase Cunningham's Insights on Cyber Warfare
16:23 The Intersection of Cyber Warfare and Modern Conflicts
21:35 The Future of Warfare: Drones and Cybersecurity
24:01 Understanding the Drone Threat
28:28 The Evolution of Cyber Warfare
35:00 The State of Critical Infrastructure
39:26 The Economics of Breaches
44:29 Incentivizing Cybersecurity Improvements
By Eclypsium5
22 ratings
In this episode, the hosts discuss the evolving landscape of AI infrastructure security, focusing on the complexities of building and maintaining AI data centers. They explore the critical role of Baseboard Management Controllers (BMCs) as an attack surface, the importance of supply chain security, and best practices for hardware procurement. The conversation underscores the importance of validating hardware and firmware integrity for organizations while also addressing the significant security risks associated with AI workloads. As AI data centers continue to grow, understanding these challenges and implementing robust security measures will be essential for future success.
Chapters
00:00 Introduction to Zero Trust and Its Evolution
03:33 Current State of Zero Trust Implementation
05:22 Micro-Segmentation and Infrastructure Security
10:02 Zero Trust and Lateral Movement Prevention
11:32 The Role of Zero Trust in Ransomware Defense
14:51 Chase Cunningham's Insights on Cyber Warfare
16:23 The Intersection of Cyber Warfare and Modern Conflicts
21:35 The Future of Warfare: Drones and Cybersecurity
24:01 Understanding the Drone Threat
28:28 The Evolution of Cyber Warfare
35:00 The State of Critical Infrastructure
39:26 The Economics of Breaches
44:29 Incentivizing Cybersecurity Improvements

228,750 Listeners

2,004 Listeners

209 Listeners

265 Listeners

374 Listeners

637 Listeners

89 Listeners

322 Listeners

8,020 Listeners

61 Listeners

586 Listeners

1 Listeners