Phoenix Cast

Task Force Phoenix

A podcast about cybersecurity, technology and innovation issues in the military.

  1. -2 ДН.

    Katie Moussouris & Project Glasswing

    In this episode of Phoenix Cast, hosts John, Rich, and Kyle welcome Katie Moussouris — founder and CEO of Luta Security, creator of Microsoft’s first bug bounty program, and architect of Hack the Pentagon — to break down Anthropic’s Project Glasswing and what it means when an AI model can find hundreds of real-world vulnerabilities at scale. Katie walks through the staggering complexity of coordinating multi-party vulnerability disclosure across 40 organizations, drawing on her own experience running similar efforts at Microsoft, and doesn’t shy away from the hard questions about whether the cybersecurity workforce is cooked or about to boom. The conversation heats up as the crew debates how much of Glasswing is marketing versus genuine emergency, whether offensive and defensive AI use can coexist responsibly, and what all of this means for critical infrastructure, supply chains, and the warfighter. Katie closes with a bold call for universal basic income funded by AI productivity — and if that doesn’t make you hit play, nothing will. We'd love to hear your thoughts! Tweet us @ThePhoenixCast, and don't forget to join our LinkedIn Group to connect with fellow Phoenix Casters. If you enjoyed the episode, help us out by leaving one of those coveted 5-star reviews on Apple Podcasts. Thanks for listening! Links: Project Glasswing (Anthropic): https://www.anthropic.com/glasswing  Luta Security: https://www.lutasecurity.com  Hack the Pentagon (USDS): https://www.usds.gov/projects/hack-the-pentagon  Katie Moussouris - "Fixing a Hole: The Labor Market for Bugs" (MIT Press): https://direct.mit.edu/books/edited-volume/3582/chapter-abstract/120140/ Obligatory XKCD https://xkcd.com/2347/

    1 ч. 23 мин.
  2. 24 МАР.

    Gen AI Conference

    In this episode of Phoenix Cast, hosts John, Rich, and Kyle break down the recent “hack” of McKinsey’s internal AI platform Lilly — where a security startup’s automated agent gained full root access through unsecured API endpoints in under two hours — sparking a lively debate on what actually constitutes a hack and why zero trust architecture still matters more than ever. The crew covers exciting new GenAI.mil features including Agent Builder and API key access, Anthropic’s upgrade of Claude Code’s context window from 200K to a million tokens, and what context rot means for power users. Kyle then delivers a fired-up debrief from the USMC Generative AI Workshop at Quantico, where Marines from across the Corps showcased everything from AI-powered recruiting simulations to homegrown tools, and the hosts challenge listeners to start building MOS-specific prompt libraries to multiply impact across the force. If you want a masterclass in both the promise and the pitfalls of AI adoption in the military, this one’s packed from start to finish. We'd love to hear your thoughts! Tweet us @ThePhoenixCast, and don't forget to join our LinkedIn Group to connect with fellow Phoenix Casters. If you enjoyed the episode, help us out by leaving one of those coveted 5-star reviews on Apple Podcasts. Thanks for listening! Links: MCKINSEY HACKhttps://www.inc.com/leila-sheridan/an-ai-agent-broke-into-mckinseys-internal-chatbot-and-accessed-millions-of-records-in-just-2-hours/91314432 WHAT IS AN API?http://en.wikipedia.org/wiki/API WHAT IS BOLA?https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/12-API_Testing/02-API_Broken_Object_Level_Authorization OBLIGATORY XKCD:  https://xkcd.com/327/

    1 ч. 9 мин.
  3. 4 МАР.

    Every Marine an AI Rifleman

    In this episode of Phoenix Cast, hosts John, Rich, and Kyle dive into a passionate debate about why the military needs to stop relying on a single "AI guy" in every unit and instead adopt an "every Marine an AI rifleman" mentality — training all service members in AI fundamentals the same way every Marine learns basic marksmanship. Kyle breaks down what AI "marksmanship" actually looks like (spoiler: it's way more approachable than you think, and it doesn't require a data science degree), while Rich draws on his experience driving an AI-enabled vehicle to illustrate what real human-machine teaming feels like in practice. The crew also unpacks a recent Claude Code "vulnerability" headline that turns out to be more about prompt injection basics than a true sky-is-falling flaw, and they geek out over Claude Code's new Remote Control feature that lets developers manage coding sessions from their phone while out grabbing groceries. Whether you're a senior leader wondering how to roll out AI training or a Lance Corporal curious about where to start, this one's packed with practical takes and a few great book recommendations to get you moving. We'd love to hear your thoughts! Tweet us @ThePhoenixCast, and don't forget to join our LinkedIn Group to connect with fellow Phoenix Casters. If you enjoyed the episode, help us out by leaving one of those coveted 5-star reviews on Apple Podcasts. Thanks for listening! Links: Claude Remote Code: https://thehackernews.com/2026/02/claude-code-flaws-allow-remote-code.html Claude Remote Control: https://code.claude.com/docs/en/remote-control GenAI.mil:https://www.war.gov/News/Releases/Release/Article/4376420/war-department-launches-ai-acceleration-strategy-to-secure-american-military-ai/

    1 ч. 2 мин.
  4. 14 ЯНВ.

    Current Events to start 2026

    In this episode of the Phoenix Cast, hosts John and Kyle kick off 2026 with a jam-packed current events roundup covering the React to Shell vulnerability (think Log4Shell but for the front end), the Marine Corps' new drone training requirements, Google's TPU announcements that might have NVIDIA sweating, and the launch of GenAI.mil. They also share some exciting podcast milestones, dish out their 2026 predictions, and Kyle reveals his holiday vendetta against PowerPoint that resulted in building his own AI-powered presentation tool. We'd love to hear your thoughts! Tweet us at our new handle, @ThePhoenixCast, and don't forget to join our LinkedIn Group to connect with fellow Phoenix Casters. If you enjoyed the episode, help us out by leaving one of those coveted 5-star reviews on Apple Podcasts. Thanks for listening! Links Kyle’s “The 8 Levels of AI Learning for Modern Commanders”https://www.linkedin.com/pulse/8-levels-ai-learning-modern-commanders-kyle-kmo-moschetto-mxuyc ReactShell: https://securityboulevard.com/2026/01/top-cves-of-december-2025/ TorchTPU: https://hyperframeresearch.com/2025/12/24/can-googles-torchtpu-eventually-bridge-nvidias-cuda-moat/  WSJ: “Why AI Will Widen the Gap Between Superstars and Everybody Else”https://www.wsj.com/lifestyle/workplace/ai-workplace-tensions-what-to-do-c45f6b51?reflink=desktopwebshare_permalink  USMC drone program:  https://www.marines.mil/News/Messages/Messages-Display/Article/4366306/approved-training-requirements-for-small-unmanned-aerial-systems/ USMC AI WORKSHOP MARADMINhttps://www.marines.mil/News/Messages/Messages-Display/Article/4367572/united-states-marines-corps-generative-and-agentic-artificial-intelligence-work/ II MEF Leadership AI: https://www.iimef.marines.mil/News/article-display/Article/4364616/ii-mef-advanced-ai-command-course/  Self-Paced AI Training (Military discount available) https://ftcg.io/self-paced-training  Vibe Coding book (Gene Kim and Steve Yegge): https://itrevolution.com/product/vibe-coding-book/ Gas Town: https://steve-yegge.medium.com/welcome-to-gas-town-4f25ee16dd04

    1 ч. 1 мин.
4,7
из 5
Оценок: 56

Об этом подкасте

A podcast about cybersecurity, technology and innovation issues in the military.

Вам может также понравиться