Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd It's not your code that gets breached, it's the code you inherit. We expose the hidden dangers lurking in your Software Supply Chain and reveal the single document that can save you: the SBOM . This episode breaks down why relying on Open Source components creates major risk. Learn how the Software Bill of Materials tracks every transitive dependency, allowing instant mapping of a new CVE to your production a...
All content for Breakpoint Security Podcast is the property of Neelu Tripathy and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd It's not your code that gets breached, it's the code you inherit. We expose the hidden dangers lurking in your Software Supply Chain and reveal the single document that can save you: the SBOM . This episode breaks down why relying on Open Source components creates major risk. Learn how the Software Bill of Materials tracks every transitive dependency, allowing instant mapping of a new CVE to your production a...
S04EP02 | Reversing Large Deep Learning Models | Yashodhan Mandke
Breakpoint Security Podcast
25 minutes
2 months ago
S04EP02 | Reversing Large Deep Learning Models | Yashodhan Mandke
Have you ever thought about how an attacker might reverse-engineer an AI model? Our guest today is doing just that, going beyond passwords and keys to unpack the very DNA of deep learning! In this segment, we're diving into the groundbreaking work of reversing large deep learning models. Our guest reveals how it's possible to reverse an AI model's entire mathematical structure, exposing its architecture, critical hyperparameters, and even the internal weights and biases that define its behav...
Breakpoint Security Podcast
Guest: Anant Srivastava, Chief researcher & Founder @ Cyfinoid Research Pvt Ltd It's not your code that gets breached, it's the code you inherit. We expose the hidden dangers lurking in your Software Supply Chain and reveal the single document that can save you: the SBOM . This episode breaks down why relying on Open Source components creates major risk. Learn how the Software Bill of Materials tracks every transitive dependency, allowing instant mapping of a new CVE to your production a...