Go offline with the Player FM app!
Protecting AI at the Edge with David Weston
Manage episode 485401885 series 2808508
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-powered malware. He also shares insights on innovations like Windows Recall, biometric protection, and the future of secure, agentic operating systems.
In This Episode You Will Learn:
- How AI integration in Windows (like Windows Recall and MS Paint) is evolving
- Emerging threats from protocols like MCP and CUAs
- What a “confused deputy” attack is, and how Microsoft is protecting users
Some Questions We Ask:
- What are the biggest security threats in on-device AI—data, model, or runtime?
- Can AI be used to accelerate post-compromise attacks?
- What will it take to bring Azure-level confidential computing to the consumer device?
Resources:
View Nic Fillingham on LinkedIn
Related Microsoft Podcasts:
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Hosted on Acast. See acast.com/privacy for more information.
64 episodes
Manage episode 485401885 series 2808508
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-powered malware. He also shares insights on innovations like Windows Recall, biometric protection, and the future of secure, agentic operating systems.
In This Episode You Will Learn:
- How AI integration in Windows (like Windows Recall and MS Paint) is evolving
- Emerging threats from protocols like MCP and CUAs
- What a “confused deputy” attack is, and how Microsoft is protecting users
Some Questions We Ask:
- What are the biggest security threats in on-device AI—data, model, or runtime?
- Can AI be used to accelerate post-compromise attacks?
- What will it take to bring Azure-level confidential computing to the consumer device?
Resources:
View Nic Fillingham on LinkedIn
Related Microsoft Podcasts:
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Hosted on Acast. See acast.com/privacy for more information.
64 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.