Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by VerSprite Cybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by VerSprite Cybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Ep. 11 - AI in Offensive Security - Cutting Through the Hype

57:46
 
Share
 

Manage episode 499085794 series 3426400
Content provided by VerSprite Cybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by VerSprite Cybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Episode 12 - AI in Offensive Security: Cutting Through the Hype
Host: Tony UV - https://www.linkedin.com/in/tonyuv/
Guest: Andrew Wilson - https://www.linkedin.com/in/awilsonaz/
Is AI revolutionizing offensive security, or simply accelerating what humans already do? In this episode, we cut through the hype and get real about how AI is reshaping vulnerability discovery, exploit development, and red team operations.
šŸ” Topics Covered:
1. AI-Powered Vulnerability Discovery
- Static analysis vs LLMs
- AI-guided fuzzing performance
- Signal-to-noise improvements
- Case study: AI vs human researcher
- Scaling AI across enterprise vs startup teams
2. Exploit Development Automation
- Can AI reliably build working exploits?
- Adaptability to target environments
- Evasion techniques vs modern defenses
- What red teams are actually using
3. Large-Scale Offensive Operations
- AI orchestration across thousands of assets
- Prioritization and continuous assessment
- Managing AI-generated data
- Measuring ROI of AI-enhanced testing
4. The AI Arms Race
- Offensive vs defensive AI
- Behavioral mimicry and detection evasion
- Speed, scale, and resource asymmetry
- Autonomous threat modeling
5. Implementation Reality Check
- Where to start with AI in OffSec
- Tool integration and team training
- Budgeting and vendor evaluation
- Compliance and regulatory concerns
šŸ’” Whether you're a security leader, red teamer, or just trying to separate signal from noise, this episode delivers practical insights and strategic foresight.
šŸ“ŗ Watch, subscribe, and join the conversation.
#AIinSecurity #OffensiveSecurity #RedTeamOps #ThreatModeling #CybersecurityPodcast #DirtySouthSecurity #VerSprite #TonyUV #AndrewWilson

// FIND VERSPRITE’S CYBERSECURITY TEAM ONLINE //

// ABOUT VERSPRITE //
VerSprite is a leader in risk-based cybersecurity services and PASTA threat modeling, enabling businesses to improve the protection of critical assets, ensure compliance, and manage risk. Our mission is to help you understand and improve your organization’s cybersecurity posture. With cyberattacks increasing in number and sophistication daily, it is crucial to protect your organization’s assets, protect your clients, and maintain the same, excellent reputation and trust you have worked hard to build. We believe that an integrated approach will result in better and more cost-effective security practices and business outcomes.

  continue reading

12 episodes

Artwork
iconShare
 
Manage episode 499085794 series 3426400
Content provided by VerSprite Cybersecurity. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by VerSprite Cybersecurity or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Episode 12 - AI in Offensive Security: Cutting Through the Hype
Host: Tony UV - https://www.linkedin.com/in/tonyuv/
Guest: Andrew Wilson - https://www.linkedin.com/in/awilsonaz/
Is AI revolutionizing offensive security, or simply accelerating what humans already do? In this episode, we cut through the hype and get real about how AI is reshaping vulnerability discovery, exploit development, and red team operations.
šŸ” Topics Covered:
1. AI-Powered Vulnerability Discovery
- Static analysis vs LLMs
- AI-guided fuzzing performance
- Signal-to-noise improvements
- Case study: AI vs human researcher
- Scaling AI across enterprise vs startup teams
2. Exploit Development Automation
- Can AI reliably build working exploits?
- Adaptability to target environments
- Evasion techniques vs modern defenses
- What red teams are actually using
3. Large-Scale Offensive Operations
- AI orchestration across thousands of assets
- Prioritization and continuous assessment
- Managing AI-generated data
- Measuring ROI of AI-enhanced testing
4. The AI Arms Race
- Offensive vs defensive AI
- Behavioral mimicry and detection evasion
- Speed, scale, and resource asymmetry
- Autonomous threat modeling
5. Implementation Reality Check
- Where to start with AI in OffSec
- Tool integration and team training
- Budgeting and vendor evaluation
- Compliance and regulatory concerns
šŸ’” Whether you're a security leader, red teamer, or just trying to separate signal from noise, this episode delivers practical insights and strategic foresight.
šŸ“ŗ Watch, subscribe, and join the conversation.
#AIinSecurity #OffensiveSecurity #RedTeamOps #ThreatModeling #CybersecurityPodcast #DirtySouthSecurity #VerSprite #TonyUV #AndrewWilson

// FIND VERSPRITE’S CYBERSECURITY TEAM ONLINE //

// ABOUT VERSPRITE //
VerSprite is a leader in risk-based cybersecurity services and PASTA threat modeling, enabling businesses to improve the protection of critical assets, ensure compliance, and manage risk. Our mission is to help you understand and improve your organization’s cybersecurity posture. With cyberattacks increasing in number and sophistication daily, it is crucial to protect your organization’s assets, protect your clients, and maintain the same, excellent reputation and trust you have worked hard to build. We believe that an integrated approach will result in better and more cost-effective security practices and business outcomes.

  continue reading

12 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play