Rich Harang

Rich Harang is a Principal Security Architect at NVIDIA, specializing in ML/AI systems, with over a decade of experience at the intersection of computer security, machine learning, and privacy. He received his PhD in Statistics from the University of California Santa Barbara in 2010. Prior to joining NVIDIA, he led the Algorithms Research team at Duo, led research on using machine learning models to detect malicious software, scripts, and web content at Sophos AI, and worked as a Team Lead at the US Army Research Laboratory. His research interests include adversarial machine learning, addressing bias and uncertainty in machine learning, and ways to use machine learning to support human analysis. Richard’s work has been presented at USENIX, BlackHat, IEEE S&P workshops, and DEF CON AI Village, among others, and has also been featured in The Register and KrebsOnSecurity.
Avatar photo

Posts by Rich Harang

A cybersecurity image.
Cybersecurity

Practical LLM Security Advice from the NVIDIA AI Red Team

Over the last several years, the NVIDIA AI Red Team (AIRT) has evaluated numerous and diverse AI-enabled systems for potential vulnerabilities and security... 8 MIN READ
Cybersecurity

Why CVEs Belong in Frameworks and Apps, Not AI Models

The Common Vulnerabilities and Exposures (CVE) system is the global standard for cataloging security flaws in software. Maintained by MITRE and backed by CISA,... 7 MIN READ
Cybersecurity

Modeling Attacks on AI-Powered Apps with the AI Kill Chain Framework

AI-powered applications are introducing new attack surfaces that traditional security models don’t fully capture, especially as these agentic systems gain... 12 MIN READ
Cybersecurity

Bringing Verifiable Trust to AI Models: Model Signing in NGC

AI is entering a new era—one defined by agents that reason, plan, and take action. These agentic systems dynamically interact with APIs, tools, and even the... 7 MIN READ
Cybersecurity

Securely Deploy AI Models with NVIDIA NIM

Imagine you’re leading security for a large enterprise and your teams are eager to leverage AI for more and more projects. There’s a problem, though. As... 7 MIN READ
Cybersecurity

Structuring Applications to Secure the KV Cache

When interacting with transformer-based models like large language models (LLMs) and vision-language models (VLMs), the structure of the input shapes the... 11 MIN READ