{"version":"1.0","type":"rich","provider_name":"Acast","provider_url":"https://acast.com","height":250,"width":700,"html":"<iframe src=\"https://embed.acast.com/$/64ac54ede55ebb0011cb41b1/6830bdbe9cad4906be9c61aa?\" frameBorder=\"0\" width=\"700\" height=\"250\"></iframe>","title":"Protecting AI at the Edge with David Weston ","description":"<p>In this episode of The&nbsp;BlueHat&nbsp;Podcast, host&nbsp;<a href=\"https://www.linkedin.com/in/nicfill/\" rel=\"noopener noreferrer\" target=\"_blank\">Nic Fillingham</a>&nbsp;and&nbsp;<a href=\"https://www.linkedin.com/in/wendyzenone/\" rel=\"noopener noreferrer\" target=\"_blank\">Wendy Zenone</a>&nbsp;share&nbsp;<a href=\"https://www.linkedin.com/in/dwizzzle/\" rel=\"noopener noreferrer\" target=\"_blank\">David Weston’s</a>&nbsp;keynote from&nbsp;BlueHat&nbsp;India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-powered malware. He also shares insights on innovations like Windows Recall, biometric protection, and the future of secure, agentic operating systems.&nbsp;</p><p><br></p><p>&nbsp;</p><p><strong>In This Episode You Will Learn</strong>:&nbsp;&nbsp;</p><p>&nbsp;</p><ul><li>How AI integration in Windows (like Windows Recall and MS Paint) is&nbsp;evolving&nbsp;</li><li>Emerging threats from protocols like MCP and CUAs&nbsp;</li><li>What a “confused deputy” attack is, and how Microsoft is protecting users&nbsp;</li></ul><p>&nbsp;</p><p><strong>Some Questions We Ask:</strong>&nbsp;</p><p>&nbsp;</p><ul><li>What are the biggest security threats in on-device AI—data, model, or runtime?&nbsp;</li><li>Can AI be used to&nbsp;accelerate post-compromise attacks?&nbsp;</li><li>What will it take to bring Azure-level confidential computing to the consumer device?&nbsp;</li></ul><p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p><p><a href=\"https://www.linkedin.com/in/dwizzzle/\" rel=\"noopener noreferrer\" target=\"_blank\">View David Weston on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href=\"https://www.linkedin.com/in/wendyzenone/\" rel=\"noopener noreferrer\" target=\"_blank\">View Wendy Zenone on LinkedIn</a>&nbsp;&nbsp;&nbsp;</p><p><a href=\"https://www.linkedin.com/in/nicfill/\" rel=\"noopener noreferrer\" target=\"_blank\">View Nic Fillingham on LinkedIn</a>&nbsp;&nbsp;</p><p>&nbsp;</p><p>&nbsp;&nbsp;</p><p><strong>Related Microsoft Podcasts:</strong>&nbsp;&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><ul><li><a href=\"https://msthreatintelpodcast.com/\" rel=\"noopener noreferrer\" target=\"_blank\">Microsoft Threat Intelligence Podcast</a>&nbsp;&nbsp;&nbsp;</li><li><a href=\"https://afternooncybertea.com/\" rel=\"noopener noreferrer\" target=\"_blank\">Afternoon Cyber Tea with Ann Johnson</a>&nbsp;&nbsp;&nbsp;</li><li><a href=\"https://uncoveringhiddenrisks.com/\" rel=\"noopener noreferrer\" target=\"_blank\">Uncovering Hidden Risks</a>&nbsp;&nbsp;&nbsp;</li></ul><p>&nbsp;&nbsp;</p><p>&nbsp;&nbsp;</p><p>Discover and follow other Microsoft podcasts at<a href=\"https://news.microsoft.com/podcasts/\" rel=\"noopener noreferrer\" target=\"_blank\">&nbsp;microsoft.com/podcasts</a>&nbsp;&nbsp;&nbsp;</p>","author_name":"Microsoft"}