Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !
Podcast đáng để nghe
TÀI TRỢ BỞI


1 Family Secrets: Chris Pratt & Millie Bobby Brown Share Stories From Set 22:08
Beyond the Buzzword: Applicable use of AI in Cybersecurity
Manage episode 381784527 series 3462572
Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.
The word AI, much like Zero Trust, has come with a lot of baggage in the past few years. It’s a term that’s been misused, slapped on the front of startups’ overpriced booths at RSA and Black Hat, and it feels like every cybersecurity product under the sun now supports it in some flavor or fashion. It's the same cycle we’ve been in the past, but this time everyone is jumping in. This week we are getting in front of the bandwagon and chat with a pioneer in the cybersec AI space who has seen how the technology has been evolving over the past decade, Oliver Tavakoli, the CTO of Vectra AI.
“My contemporaneous definition of AI at any given moment in time is there's got to be enough pixie dust in it for people to view it as somewhat magical; so that's my incredibly technical definition. I'd say over the past 10-15 years, that is typically meant neural nets-that has those have been a stand in-and and obviously, neural nets can be used for discrimination [As opposed to a generative AI model]. Again, the example of cat (You search “Cat” on Google images, and it returns results that show images, in theory, of only cats) is an example of how they can be used in a generative sense, which is really the latest revolution that you see. And then the other thing is how broadly applicable they are and how well read they are.
Tavakoli’s definition of AI provides the context for how AI is primarily applicable today in cybersecurity. But, in the past, typically these concepts were held back by technology. There is also a stark difference between what has been referred to as AI, or a discriminative AI model, and what is most popular today, or generative AI.
It turns out in these large language models, as you make them bigger, there was always kind of the question of if you make them big enough. Will they just plateau or will they take off? It really wasn't a foregone conclusion that if you made them big enough they would take off, but it was a bet that was placed and a bet that turned out to have some merit to it.
And that is the crux of today’s interview: what was and will be the past and future impact of AI on cybersecurity?
Key Takeaways- AI plays a significant role in both offensive and defensive cybersecurity strategies.
- Threat actors use AI to enhance their attacks, making them more believable and harder to detect.
- Defensive uses of AI include improving workflow and making SOCs more productive.
- Organizations must always assume that compromise is possible and focus on minimizing the impact of breaches.
55 tập
Manage episode 381784527 series 3462572
Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.
The word AI, much like Zero Trust, has come with a lot of baggage in the past few years. It’s a term that’s been misused, slapped on the front of startups’ overpriced booths at RSA and Black Hat, and it feels like every cybersecurity product under the sun now supports it in some flavor or fashion. It's the same cycle we’ve been in the past, but this time everyone is jumping in. This week we are getting in front of the bandwagon and chat with a pioneer in the cybersec AI space who has seen how the technology has been evolving over the past decade, Oliver Tavakoli, the CTO of Vectra AI.
“My contemporaneous definition of AI at any given moment in time is there's got to be enough pixie dust in it for people to view it as somewhat magical; so that's my incredibly technical definition. I'd say over the past 10-15 years, that is typically meant neural nets-that has those have been a stand in-and and obviously, neural nets can be used for discrimination [As opposed to a generative AI model]. Again, the example of cat (You search “Cat” on Google images, and it returns results that show images, in theory, of only cats) is an example of how they can be used in a generative sense, which is really the latest revolution that you see. And then the other thing is how broadly applicable they are and how well read they are.
Tavakoli’s definition of AI provides the context for how AI is primarily applicable today in cybersecurity. But, in the past, typically these concepts were held back by technology. There is also a stark difference between what has been referred to as AI, or a discriminative AI model, and what is most popular today, or generative AI.
It turns out in these large language models, as you make them bigger, there was always kind of the question of if you make them big enough. Will they just plateau or will they take off? It really wasn't a foregone conclusion that if you made them big enough they would take off, but it was a bet that was placed and a bet that turned out to have some merit to it.
And that is the crux of today’s interview: what was and will be the past and future impact of AI on cybersecurity?
Key Takeaways- AI plays a significant role in both offensive and defensive cybersecurity strategies.
- Threat actors use AI to enhance their attacks, making them more believable and harder to detect.
- Defensive uses of AI include improving workflow and making SOCs more productive.
- Organizations must always assume that compromise is possible and focus on minimizing the impact of breaches.
55 tập
Tất cả các tập
×
1 Shadows Within Shadows: How AI is Challenging IT Teams 48:12

1 Live at ZTW2025: Cyberwire Daily’s Dave Bittner + Dr. Zero Trust 32:50

1 Rapid fire update: Silk Typhoon and DOJ's indictment of twelve Chinese nationals 3:20

1 Predicting the year of cybersecurity ahead (minus regulations) 1:02:52

1 Kicking Off Season 4 of Adoption Zero Trust (AZT) 22:43

1 The key to growing a cybersecurity career are soft skills 50:38

1 Behind the scenes of cybersecurity media and reporting 1:04:53

1 GRC tool or spreadsheets, that is the question | GRC Uncensored Preview 43:13

1 Podcast Preview: GRC Uncensored and the commoditization of compliance 41:30

1 How to prepare your operations team for Zero Trust 46:17

1 Log4j Continues to act as Organizational Vulnerability 47:56

1 Overturning of Chevron Deference’s Impact on Cybersecurity Regulation 51:44

1 Applying Vulnerability Management to Zero Trust 45:43

1 The Unstoppable Phish: A Discussion with Vivek Ramachandran 26:31

1 Breaking Down the SMB Threat Landscape and The Value of MSPs with SonicWall 46:22
Chào mừng bạn đến với Player FM!
Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.