Partially Redacted: Data, AI, Security & Privacy

Partially Redacted brings together leaders in engineering, data, AI, security, and privacy to share knowledge, best practices, and real world experience.

How to Subscribe
May 15, 2024

Privacy and Security Considerations for RAG with Graphlit's Kirk Marple

In this episode, Kirk Marple, CEO and Co-founder of Graphlit, joins the show. Sean and Kirk dive into the world of unstructured data management, discussing the evolution and current challenges in the field.

May 8, 2024

User Permissions at Scale with AuthZed's Jake Moshenko

In this episode, Jake Moshenko, CEO and co-founder of AuthZed, joins the show to explore the world of user permissions at scale. Inspired by Google's Zanzibar, AuthZed aims to tackle the challenges of authorization - a less common focus compared to authentication in the tech industry.

May 1, 2024

AI Deepfakes with Nametag's Aaron Painter

Aaron Painter, CEO of Nametag, joins the show to explore the evolving threat of AI deepfakes. They discuss the increasing sophistication of deepfake technology, highlighted by the significant rise in incidents such as the Retool hack, and how these technologies can manipulate public perception and security.

April 24, 2024

Protecting and Using Sensitive Health Data with Integral's Shubh Sinha

In this episode we’re joined by Shubh Sinha, CEO and Co-founder of Integral, to discuss the protection and utilization of sensitive health data.

April 17, 2024

Balancing Innovation and Responsibility in AI/ML Deployment with Jozu's Brad Micklea

In this episode, we dive into the world of MLOps, the engine behind secure and reliable AI/ML deployments. MLOps focuses on the lifecycle of machine learning models, ensuring they are developed and deployed efficiently and responsibly.

March 27, 2024

Prompt Injection Attacks with SVAM's Devansh

In this episode, we dive deep into the world of prompt injection attacks in Large Language Models (LLMs) with the Devansh, AI Solutions Lead at SVAM. We discuss the attacks, existing vulnerabilities, real-world examples, and the strategies attackers use.