Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Ave Gatton

๐Ÿ‘ค Speaker
190 total appearances

Appearances Over Time

Podcast Appearances

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

One, you still probably want to use guardrails, even though they're not perfect, because they are a semblance of security.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

I don't think they get you all the way there.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

I think you also need to implement some of these secure by design architectures.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

And essentially those boil down to having a trusted model and an untrusted model.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

And the untrusted model sees your sensitive data and may encounter prompt injection or model poisoning or something or other that causes it to be jailbroken.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

But it's answering questions from the trusted model in such a way that can never filter back to the trusted model.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

And you have papers like Camel from Google and then the Secure by Design set of papers, which I believe is from Invariant Labs, IBM, Google, ETH, Zurich, ETH AI Center, just a host of people.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

They have this paper on...

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

secure agentic design patterns.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

So the question I have is, for those designs, is do they maintain the full utility of what agentic systems, what we were promised for agentic systems?

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

With those architectures, can you still accomplish everything you need to?

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

I think the answer remains to be discovered.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

But if you're really trying to build secure systems, then you have to follow these implementation guidelines.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

Especially if you're trying to comply with strict privacy laws.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

We're early enough in the agentic revolution that I will...

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

outline a development pattern here.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

Develop your POC that does not go into production however you want.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

Aim for maximum utility.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

Then take that and shoehorn it into a secure framework.

Code Story: Insights from Startup Tech Leaders
The Gene Simmons of Data Protection - AI Inference-time Guardrails

So you might have just an agent that just natively accesses an MCP server and gets information from your database and that does some transformation with it and then kicks you out the result.