How to scam an AI agent, DDoS attack trends and busting cybersecurity myths

What does it take to trick an AI agent? Not a whole lot, it turns out.

This week, panelists Nick Bradley, Claire Nuñez and Jeff Crume join host Matt Kosinski to discuss a couple of new methods for hijacking AI agents and breaking their guardrails. We also talk recent evolutions in DDoS attack trends, the legacy of zero trust and some glaring security flaws in an extremely popular AI training app.

Plus: We ring in Cybersecurity Awareness Month with the traditional airing of grievances. 

All this and more, on Security Intelligence.   

The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity. 

Subscribe now on your favorite platform YouTube Spotify Apple Podcasts Casted
AI apocalypse?

In episode 3, our host, Matt Kosinski, asked our guests what’s the thing that worries you most about ai from the securtiy perspective? Watch their responses below!

 

Close-up of a person writing code on a laptop
We can't stop social engineering for good, but we can fight back Why does social engineering work?
Team of programmers in data center
What is social engineering?
An email that seems to be from a trusted coworker requesting sensitive information, a threatening voicemail claiming to be from the IRS are just a few examples of social engineering.
Laptop with binary codes on screen at desk
What is cybersecurity?
By one estimate, cybercrime will cost the world economy USD 10.5 trillion per year by 2025.
What is cloud security?
Dive deep with Nataraj Nagaratnam from IBM® Cloud® as he explains cloud security and how enterprises can incorporate it into their business operations.
You might like
3D render of translucent cubes
Cost of a Data Breach Report 2025
Artwork for the X-Force 2025 thought leadership
IBM X-Force® 2025 Threat Intelligence Index
Cost of a Data Breach Report 2025 artwork
Cost of a Data Breach Report 2025

Latest podcast episodes

Follow us

Follow us on Apple Podcasts and Spotify.

Catch every episode
Cyber security concept and internet privacy data protection Modern showing padlock protecting business and financial data to protect persona