{"id":198244,"date":"2024-10-09T04:01:00","date_gmt":"2024-10-09T04:19:14","guid":{"rendered":"https:\/\/www.cyberark.com\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/"},"modified":"2026-05-13T18:15:15","modified_gmt":"2026-05-13T22:15:15","slug":"ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities","status":"publish","type":"podcast","link":"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/","title":{"rendered":"EP 63 &#8211; Jailbreaking AI: The Risks and Realities of Machine Identities"},"content":{"rendered":"<p>In this episode of Trust Issues, host David Puner welcomes back Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, for a discussion covering the latest developments in generative AI and the emerging cyberthreats associated with it. Lavi shares insights on how machine identities are becoming prime targets for threat actors and discusses the innovative research being conducted by CyberArk Labs to understand and mitigate these risks. The conversation also touches on the concept of responsible AI and the importance of building secure AI systems. Tune in to learn about the fascinating world of AI security and the cutting-edge techniques used to protect against AI-driven cyberattacks.<\/p>\n","protected":false},"featured_media":213918,"template":"","class_list":["post-198244","podcast","type-podcast","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>EP 63 - Jailbreaking AI: The Risks and Realities of Machine Identities | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/\" \/>\n<meta property=\"og:locale\" content=\"zh_TW\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EP 63 - Jailbreaking AI: The Risks and Realities of Machine Identities\" \/>\n<meta property=\"og:description\" content=\"In this episode of Trust Issues, host David Puner welcomes back Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, for a discussion covering the latest developments in generative AI and the emerging cyberthreats associated with it. Lavi shares...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-13T22:15:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/OWIyMi5qcGc-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u9810\u4f30\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/\",\"url\":\"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/\",\"name\":\"EP 63 - Jailbreaking AI: The Risks and Realities of Machine Identities | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/OWIyMi5qcGc-1.jpg\",\"datePublished\":\"2024-10-09T04:19:14+00:00\",\"dateModified\":\"2026-05-13T22:15:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/#breadcrumb\"},\"inLanguage\":\"zh-TW\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/OWIyMi5qcGc-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/OWIyMi5qcGc-1.jpg\",\"width\":1400,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/zh-hant\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"EP 63 &#8211; Jailbreaking AI: The Risks and Realities of Machine Identities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/#website\",\"url\":\"https:\/\/www.cyberark.com\/zh-hant\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/zh-hant\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-TW\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/zh-hant\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-TW\",\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/zh-hant\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"EP 63 - Jailbreaking AI: The Risks and Realities of Machine Identities | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/","og_locale":"zh_TW","og_type":"article","og_title":"EP 63 - Jailbreaking AI: The Risks and Realities of Machine Identities","og_description":"In this episode of Trust Issues, host David Puner welcomes back Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, for a discussion covering the latest developments in generative AI and the emerging cyberthreats associated with it. Lavi shares...","og_url":"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-05-13T22:15:15+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/OWIyMi5qcGc-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u9810\u4f30\u95b1\u8b80\u6642\u9593":"1 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/","url":"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/","name":"EP 63 - Jailbreaking AI: The Risks and Realities of Machine Identities | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/zh-hant\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/OWIyMi5qcGc-1.jpg","datePublished":"2024-10-09T04:19:14+00:00","dateModified":"2026-05-13T22:15:15+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/#breadcrumb"},"inLanguage":"zh-TW","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/"]}]},{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/OWIyMi5qcGc-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2024\/10\/OWIyMi5qcGc-1.jpg","width":1400,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/zh-hant\/podcasts\/ep-63-jailbreaking-ai-the-risks-and-realities-of-machine-identities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/zh-hant\/"},{"@type":"ListItem","position":2,"name":"EP 63 &#8211; Jailbreaking AI: The Risks and Realities of Machine Identities"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/zh-hant\/#website","url":"https:\/\/www.cyberark.com\/zh-hant\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/zh-hant\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/zh-hant\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-TW"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/zh-hant\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/zh-hant\/","logo":{"@type":"ImageObject","inLanguage":"zh-TW","@id":"https:\/\/www.cyberark.com\/zh-hant\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/zh-hant\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/podcast\/198244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/media\/213918"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=198244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}