<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>AI Security | Kairos.fm</title><link>https://kairos.fm/tag/ai-security/</link><atom:link href="https://kairos.fm/tag/ai-security/index.xml" rel="self" type="application/rss+xml"/><description>AI Security</description><generator>Hugo Blox Builder (https://hugoblox.com)</generator><language>en-us</language><lastBuildDate>Mon, 11 May 2026 00:00:00 +0000</lastBuildDate><image><url>https://kairos.fm/media/logo_hu3665961374755788175.png</url><title>AI Security</title><link>https://kairos.fm/tag/ai-security/</link></image><item><title>Building Assymmetric Defenses w/ Zainab Majid</title><link>https://kairos.fm/intoaisafety/e030/</link><pubDate>Mon, 11 May 2026 00:00:00 +0000</pubDate><guid>https://kairos.fm/intoaisafety/e030/</guid><description>&lt;div style="text-align: justify">
Zainab Majid, co-founder of Asymmetric Security, joins Jacob for a conversation on the intersection between AI Safety and cybersecurity, as well as the future of digital forensics. Drawing from years of incident response work, she explains how cyber attacks actually unfold, why AI is changing both offense and defense, and how her team is building AI-native tools to investigate breaches faster and more effectively. Other topics explored in this episode include trust in the AI/cybersecurity industries, the realities behind cybersecurity hype, and the challenge of keeping humans meaningfully involved as these systems become more capable. Zainab also gives practical, actionable advice on how you can protect yourself.
&lt;p>If you&amp;rsquo;re interested in over 30 minutes of additional content, head on over to the Kairos.fm &lt;a href="https://www.patreon.com/cw/Kairosfm" target="_blank" rel="noopener">Patreon&lt;/a> where you can become a subscriber for just $2 per month, which helps make this whole podcasting thing a bit more sustainable.&lt;/p>
&lt;div class="flex flex-col items-center max-w-screen-lg mx-auto px-8 justify-center pt-6">
&lt;div style="border-radius: 10px; overflow: hidden; width: 100%; background-color: #1B4066;">
&lt;iframe id="transistor" style="visibility:hidden;" onload="this.style.visibility='visible';" width="100%" height="180" frameborder="no" scrolling="no" seamless="" src="https://share.transistor.fm/e/77307eba">&lt;/iframe>
&lt;/div>
&lt;/div>
&lt;div style="font-size: x-small;font-style: italic;padding-left: 2.25rem;">INTERVIEW RECORDED 2026.04.18; ASIDES RECORDED 2026.05.06; &lt;a href="https://share.transistor.fm/s/77307eba/transcript.txt" target="_blank" rel="noreferrer noopener">TRANSCRIPT&lt;/a>&lt;/div>
&lt;h2 id="chapters">Chapters&lt;/h2>
&lt;div style="text-align: left; font-family:monospace; ">&lt;small>
00:00:00 ❙ Intro&lt;br>
00:04:34 ❙ Zainab's Background&lt;br>
00:08:49 ❙ Jacob &amp; Zainab's History&lt;br>
00:16:03 ❙ Founding Asymmetric Security&lt;br>
00:24:49 ❙ How to Know Who You Can Trust&lt;br>
00:36:31 ❙ The Threats Asymmetric Is Built to Fight&lt;br>
01:05:54 ❙ What's Asymmetric Tackling Next?&lt;br>
01:15:33 ❙ Glasswing, Dual Use, and Power Concentration&lt;br>
01:24:21 ❙ The Relationship Between AI Safety &amp; Cybersecurity&lt;br>
01:37:01 ❙ Outro
&lt;/small>&lt;/div>
&lt;h2 id="links">Links&lt;/h2>
&lt;ul>
&lt;li>Asymmetric Security &lt;a href="https://www.asymmetricsecurity.com/" target="_blank" rel="noopener">website&lt;/a>&lt;/li>
&lt;li>The Tech Founders &lt;a href="https://thetechfounders.co.uk/news/asymmetric-security-raises-4-2m-to-shrink-cyber-investigations-from-days-to-hours/" target="_blank" rel="noopener">article&lt;/a> - Asymmetric Security Raises $4.2M to Shrink Cyber Investigations From Days to Hours&lt;/li>
&lt;/ul>
&lt;h3 id="cyberseceval-and-friends">CyberSecEval and Friends&lt;/h3>
&lt;ul>
&lt;li>EvalEval @ NeurIPS &lt;a href="https://arxiv.org/abs/2411.08813" target="_blank" rel="noopener">workshop paper&lt;/a> - Rethinking CyberSecEval&lt;/li>
&lt;li>Meta AI &lt;a href="https://arxiv.org/abs/2312.04724" target="_blank" rel="noopener">report&lt;/a> - Purple Llama CyberSecEval&lt;/li>
&lt;li>Meta AI &lt;a href="https://arxiv.org/abs/2404.13161" target="_blank" rel="noopener">report&lt;/a> - CyberSecEval 2&lt;/li>
&lt;li>Meta AI &lt;a href="https://arxiv.org/abs/2408.01605" target="_blank" rel="noopener">report&lt;/a> - CyberSecEval 3&lt;/li>
&lt;/ul>
&lt;h3 id="mythos-moment">Mythos Moment&lt;/h3>
&lt;ul>
&lt;li>Anthropic &lt;a href="https://www.anthropic.com/glasswing" target="_blank" rel="noopener">press release&lt;/a> - Project Glasswing&lt;/li>
&lt;li>Anthropic Red Team &lt;a href="https://red.anthropic.com/2026/mythos-preview/" target="_blank" rel="noopener">blogpost&lt;/a> - Assessing Claude Mythos Preview’s cybersecurity capabilities&lt;/li>
&lt;li>Schneier on Security &lt;a href="https://www.schneier.com/essays/archives/2026/04/what-anthropics-mythos-means-for-the-future-of-cybersecurity.html" target="_blank" rel="noopener">blogpost&lt;/a> - What Anthropic’s Mythos Means for the Future of Cybersecurity&lt;/li>
&lt;li>The Globe and Mail &lt;a href="https://srinstitute.utoronto.ca/news/the-mythos-question-who-decides-when-ai-is-too-dangerous" target="_blank" rel="noopener">article&lt;/a> - The Mythos question: Who decides when AI is too dangerous?&lt;/li>
&lt;/ul>
&lt;h3 id="other-resources">Other Resources&lt;/h3>
&lt;ul>
&lt;li>Nicholas Carlini&amp;rsquo;s [unprompted] &lt;a href="https://www.youtube.com/watch?v=1sd26pWhfmg" target="_blank" rel="noopener">talk&lt;/a>&lt;/li>
&lt;li>Nicholas Carlini&amp;rsquo;s personal &lt;a href="https://nicholas.carlini.com" target="_blank" rel="noopener">website&lt;/a>&lt;/li>
&lt;li>The New York Times &lt;a href="https://www.nytimes.com/2025/10/06/business/jaguar-range-rover-cyberattacks-britain.html" target="_blank" rel="noopener">article&lt;/a> - Cyberattacks Upset British Life, Disrupting Car Factories and Grocery Stores&lt;/li>
&lt;li>The Guardian &lt;a href="https://www.theguardian.com/business/2025/sep/03/hacking-group-linked-to-marks-and-spencer-cyber-attack-claim-responsibility-for-jaguar-land-rover-hack" target="_blank" rel="noopener">article&lt;/a> - Hackers linked to M&amp;amp;S breach claim responsibility for Jaguar Land Rover cyber-attack&lt;/li>
&lt;li>Entrepeneur First &lt;a href="https://www.joinef.com" target="_blank" rel="noopener">website&lt;/a>&lt;/li>
&lt;li>Asymmetric Security&amp;rsquo;s &lt;a href="https://www.joinef.com/portfolio/?company=asymmetric-security" target="_blank" rel="noopener">EF Bio&lt;/a>&lt;/li>
&lt;/ul>
&lt;!-- end of the list -->
&lt;/div></description></item></channel></rss>