David Bombal

#563: Securing LLMs and fighting Prompt Injection with Algorithmic Red Teaming

Mar 23, 2026
Rick Miles, VP of Product at Cisco and former military cybersecurity operator, explains the shift from static firewalls to distributed "firewalling." He highlights the 6100 series hardware leap, eBPF-powered visibility and virtual patching, and the risks around prompt injection and poisoned models. He outlines algorithmic red teaming and the rise of agentic security as a force multiplier for engineers.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Use Encrypted Visibility Instead Of Always Decrypting

  • Inspect encrypted traffic with an encrypted visibility engine to flag suspicious flows without full decryption.
  • Cisco's encrypted visibility engine analyzes TLS handshakes and flow attributes to estimate risk and surface suspicious traffic.
INSIGHT

eBPF Enables Virtual Patching In Workloads

  • eBPF can act as a live virtual patch inside workloads, removing exploit vectors without breaking applications.
  • Rick shows eBPF deployed in Linux/Kubernetes to shield vulnerabilities during the months-long patching window.
INSIGHT

Switches Become Distributed Segmentation Points

  • Embedding firewalling into switches closes east-west blind spots by making each switch port a high-throughput segmentation point.
  • Rick Miles says top-of-rack switches can enforce L3/L4 segmentation and shine a flashlight into previously dark east-west traffic.
Get the Snipd Podcast app to discover more snips from this episode
Get the app