Episode 48: Threats, signals, and controls
Resources mentioned in this episode
Red Canary AI Content Hub
Your one-stop destination for understanding, securing, and implementing AI in your security operations.
Red Canary Blog
Double agents: How adversaries can abuse “agent mode” in commercial AI products
Part 1
AI in the SOC - Fundamentals of building AI agent workflows in the SOC
Related Resources
Red Canary Office Hours: Episode 51 – Signal to story: A threat hunt deconstructed
Red Canary Office Hours: Episode 51 – Signal to story: A threat hunt deconstructed
Red Canary Office Hours: Episode 50 – Build vs. buy for AI in the SOC
Red Canary Office Hours: Episode 50 – Build vs. buy for AI in the SOC
Red Canary Office Hours: Episode 49 – Measuring impact: The true ROI of AI in the SOC
Red Canary Office Hours: Episode 49 – Measuring impact: The true ROI of AI in the SOC
Red Canary Office Hours: Episode 47 – Fundamentals of building AI agent workflows in the SOC
Red Canary Office Hours: Episode 47 – Fundamentals of building AI agent workflows in the SOC