Episode 48: Threats, signals, and controls
Resources mentioned in this episode
Red Canary AI Content Hub
Your one-stop destination for understanding, securing, and implementing AI in your security operations.
Red Canary Blog
Double agents: How adversaries can abuse “agent mode” in commercial AI products
Part 1
AI in the SOC - Fundamentals of building AI agent workflows in the SOC
Related Resources
Red Canary Office Hours: Episode 47 – Fundamentals of building AI agent workflows in the SOC
Red Canary Office Hours: Episode 47 – Fundamentals of building AI agent workflows in the SOC
Red Canary Office Hours: Episode 46 – Strengthening app control in the new year
Red Canary Office Hours: Episode 46 – Strengthening app control in the new year
Red Canary Office Hours: Episode 45 – Unwrapping the mysteries of Shai Hulud
Red Canary Office Hours: Episode 45 – Unwrapping the mysteries of Shai Hulud
Red Canary Office Hours: Episode 44 – Naughty or nice: decoding normal vs. anomalous behavior
Red Canary Office Hours: Episode 44 – Naughty or nice: decoding normal vs. anomalous behavior