『AI Security Ops』のカバーアート

AI Security Ops

AI Security Ops

著者: Black Hills Information Security
無料で聴く

概要

Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation).© 2025 Black Hills Information Security 政治・政府
エピソード
  • Claude Cowork Discussion | Episode 42
    2026/03/06

    We discuss the meaning of AI life In episode 42 of "BHIS Presents: AI Security Ops." Derek Banks is joined by Bronwen Aker and Brian Fehrman to break down Anthropic’s latest agentic desktop experiment: Claude Cowork.

    Claude Cowork brings large language models directly onto the endpoint — giving Claude the ability to read, write, and organize files on your local machine. It’s designed to make powerful AI workflows accessible to non-technical users… but as with any tool that operates at the OS level, the security implications are significant.

    We explore what happens when AI moves closer to your data, your filesystem, and your browser — and what that means for defenders.

    We dig into:
    - What Claude Cowork is and how it differs from Claude Code
    - Agentic desktop tools vs. command-line workflows
    - Local file access and OS-level interaction risks
    - Skills, automation, and task iteration
    - Chrome plugins and expanded attack surface
    - Overly broad permissions and least-privilege concerns
    - SaaS disruption and shifting trust boundaries
    - Endpoint monitoring challenges
    - The speed of AI releases vs. security review cycles
    - Balancing innovation with responsible deployment

    This conversation looks at the real-world operational and defensive considerations of agentic AI tools running directly on user systems. If you’re evaluating AI productivity tools inside your organization — or defending environments where they’re already being adopted — this episode will help you think through the risks and tradeoffs.

    • (00:00) - Intro & Episode Overview
    • (02:31) - What Is Claude Cowork?
    • (04:26) - Desktop Agents vs. Command Line Users
    • (06:35) - Agentic Workflows & Task Automation
    • (08:31) - Building Fast with Claude (Speed of Development)
    • (09:52) - Browser Plugins & Expanding Capabilities
    • (11:29) - Permission Models & “Just Give It Access to Everything”
    • (13:03) - SaaS Disruption & Enterprise Impact
    • (15:01) - Overly Broad File Access Risks
    • (16:50) - Organizational Disruption & Workforce Impact
    • (18:32) - Security Lag vs. Rapid AI Releases
    • (20:09) - Final Thoughts & Wrap-Up

    Click here to watch this episode on YouTube.

    Creators & Guests
    • Derek Banks - Host
    • Bronwen Aker - Host
    • Brian Fehrman - Host

    Brought to you by:

    Black Hills Information Security

    https://www.blackhillsinfosec.com


    Antisyphon Training

    https://www.antisyphontraining.com/


    Active Countermeasures

    https://www.activecountermeasures.com


    Wild West Hackin Fest

    https://wildwesthackinfest.com

    🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits
    https://poweredbybhis.com

    Click here to view the episode transcript.


    🧦 SOC Summit 2026
    https://www.antisyphontraining.com/event/soc-summit/

    続きを読む 一部表示
    22 分
  • OpenClaw and Moltbook with Guests Beau Bullock and Hayden Covington | Episode 41
    2026/02/26

    In this episode of BHIS Presents: AI Security Ops, we’re joined by Beau Bullock and Hayden Covington to unpack one of the most talked-about AI agent experiments in recent memory: OpenClaw and its companion platform, Moltbook.

    OpenClaw exploded onto the scene as an autonomous AI agent capable of operating Claude Code from the command line — executing tasks, monitoring output, and iterating with minimal human involvement. Shortly after, Moltbook emerged as a social platform designed specifically for AI agents to interact with one another.

    But as with most cutting-edge AI experiments, things moved fast… and broke fast.

    We dig into:

    • What OpenClaw actually is and how it works
    • AI agents operating other AI systems (Claude Code in the loop)
    • The concept of “skills” and extending agent capabilities
    • The one-click RCE vulnerability discovered shortly after release
    • Moltbook as a social network for AI agents
    • API keys, agent-only access, and how humans bypassed it
    • Beacons, autonomy, and what “control” really means
    • Where the line is between automation and true autonomy
    • Short-term workforce impacts vs. long-term AI risk


    This conversation moves beyond hype into the practical and security implications of rapidly deployed autonomous agents. If you’re experimenting with AI agents — or defending against them — this episode will give you a grounded perspective on what’s possible today, what’s fragile, and what’s coming next.

    • (00:00) - Intro & Guest Welcome
    • (02:01) - AI Agents in the News
    • (03:46) - From “Moltbot” to OpenClaw
    • (04:36) - What Is OpenClaw? How It Works
    • (05:36) - Claude Code + Agent-in-the-Middle Model
    • (07:59) - Extending OpenClaw with Skills
    • (09:05) - Release Timeline & Rapid Adoption
    • (10:39) - One-Click RCE in OpenClaw
    • (12:08) - Introducing Moltbook (AI Social Network)
    • (14:26) - How Moltbook Actually Worked
    • (18:18) - “I Am a Robot” & Agent Authentication
    • (20:51) - Beaconing & Operational Behavior
    • (27:07) - Automation vs. True Autonomy
    • (27:49) - Control, Kill Switches & Agent Boundaries
    • (31:22) - Workforce Impact & Near-Term Concerns
    • (35:57) - AI Apocalypse? Final Thoughts & Wrap-Up

    Click here to watch this episode on YouTube.

    Creators & Guests
    • Beau Bullock - Guest
    • Hayden Covington - Guest
    • Derek Banks - Host
    • Brian Fehrman - Host
    • Bronwen Aker - Host

    Brought to you by:

    Black Hills Information Security

    https://www.blackhillsinfosec.com


    Antisyphon Training

    https://www.antisyphontraining.com/


    Active Countermeasures

    https://www.activecountermeasures.com


    Wild West Hackin Fest

    https://wildwesthackinfest.com

    🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits
    https://poweredbybhis.com

    Click here to view the episode transcript.


    🧦 SOC Summit 2026
    https://www.antisyphontraining.com/event/soc-summit/

    続きを読む 一部表示
    36 分
  • AI in the SOC: Interview with Hayden Covington and Ethan Robish from the BHIS SOC | Episode 40
    2026/02/20

    AI in the SOC: Interview with Hayden Covington and Ethan Robish from the BHIS SOC | Episode 40

    In this episode of BHIS Presents: AI Security Ops, we sit down with Hayden Covington and Ethan Robish from the BHIS Security Operations Center (SOC) to explore how AI is actually being used in modern defensive operations.

    From foundational machine learning techniques like statistical baselining and clustering to large language models assisting with alert triage and reporting, we dig into what works, what doesn’t, and what SOC teams should realistically expect from AI today.

    We break down:

    - How AI helps reduce alert fatigue and improve triage
    - Practical automation inside a real-world SOC
    - The difference between traditional ML approaches and LLM-powered workflows
    - Foundational techniques like K-means, anomaly detection, and behavioral baselining
    - Using LLMs for enrichment, investigation, and report drafting
    - Where AI struggles: hallucinations, inconsistency, and edge cases
    - Risks around over-trusting AI in security operations
    - How to responsibly integrate AI into analyst workflows

    This episode is grounded in real operational experience—not vendor demos. If you’re running a SOC, building AI tooling, or just trying to separate hype from reality, this conversation will help you think clearly about augmentation vs. automation in defensive security.


    • (00:00) - Intro & Guest Introductions
    • (04:44) - Alert Triage & SOC Pain Points
    • (06:04) - Automation Inside the SOC
    • (09:59) - “Boring AI”: Clustering, Baselining & Statistics
    • (17:06) - AI-Assisted Reporting & Client Communication
    • (18:34) - Limitations, Edge Cases & Model Risk
    • (22:56) - Hallucinations & Inconsistent Outputs
    • (25:04) - AI Demos vs. Real-World Security Work
    • (28:35) - Final Thoughts & Closing

    Click here to watch this episode on YouTube.

    Creators & Guests
    • Hayden Covington - Guest
    • Ethan Robish - Guest
    • Bronwen Aker - Host
    • Derek Banks - Host
    • Brian Fehrman - Host

    Brought to you by:

    Black Hills Information Security

    https://www.blackhillsinfosec.com


    Antisyphon Training

    https://www.antisyphontraining.com/


    Active Countermeasures

    https://www.activecountermeasures.com


    Wild West Hackin Fest

    https://wildwesthackinfest.com

    🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits
    https://poweredbybhis.com

    続きを読む 一部表示
    30 分
まだレビューはありません