compiler series art

The New Security Landscape

Phishing. DDoS attacks. Social engineering. These are not new terms if you know anything about cybersecurity. But emerging technologies are making these well-known methods of attack easier than ever.

Bad actors are paying attention—and they are leveling up their skills accordingly.

It isn’t just cybersecurity professionals who have to be aware and responsive– people working in product security are a part of the effort, too. What do they need to know to respond to these newer attacks?

Episodes in this series

9.25.25   |   39:55 Mins   |   Security

What Is Product Security?

With some help from Emily Fox, Portfolio Security Architect at Red Hat, our hosts kick off the season with a simple question.




01.08.26   |   32 mins   |   Security

AI Is Changing The Threat Landscape

Jeff Crume, distinguished engineer at IBM, stops by to talk about AI as "the new attack surface", and explains why the technology, like so many others, can be used for both altruistic and malicious intentions.




01.22.26   |   32 Mins   |   Security

Data Security 101

Clarence Clayton, Director of Global Privacy + AI Risk and Compliance at Red Hat, lays out the foundations of data security. He covers what needs to be protected and explains some of the basic principles you should follow to keep data thieves out of your database.




02.05.26   |   29 Mins   |   Security

Data Security And AI

Clarence Clayton, Director of Global Privacy + AI Risk and Compliance at Red Hat, helps us understand the increasingly complex interplay between data and AI—because the flow of information isn't a one-way street.




02.19.26   |   28 Mins   |   Security

Understanding AI Security Frameworks

Red Hat Principal Product Security Engineer Huzaifa Sidhpurwala breaks down the emerging security frameworks designed for the AI era, and tells us why complacency is (still) the weakest point when securing systems.




03.05.26   |   32 Mins   |   Security

Post-quantum Cryptography

Red Hat Distinguished Engineer Simo Sorce breaks down the real-world implications of post-quantum security threats, and how the IT industry is shifting toward quantum-resistant services.




03.19.26   |   46 Mins   |   Security

Keeping Track Of Vulnerabilities

Jeremy West, Senior Manager of Product Security Engineering at Red Hat, walks us through the CVE tracking and remediation process—and explains why having a common standard is vital for everyone's security.




04.02.26   |   20:24 Mins   |   Security

Collaboration In Product Security

How do security professionals work together to manage the known and the unknown? The Compiler team wraps up their exploration of product security by focusing on how teams across companies and projects work together effectively.