Beyond the Buzzword: Applicable use of AI in Cybersecurity

Beyond the Buzzword: Applicable use of AI in Cybersecurity

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here.

The word AI, much like Zero Trust, has come with a lot of baggage in the past few years. It’s a term that’s been misused, slapped on the front of startups’ overpriced booths at RSA and Black Hat, and it feels like every cybersecurity product under the sun now supports it in some flavor or fashion. It's the same cycle we’ve been in the past, but this time everyone is jumping in. This week we are getting in front of the bandwagon and chat with a pioneer in the cybersec AI space who has seen how the technology has been evolving over the past decade, Oliver Tavakoli, the CTO of Vectra AI.

“My contemporaneous definition of AI at any given moment in time is there's got to be enough pixie dust in it for people to view it as somewhat magical; so that's my incredibly technical definition. I'd say over the past 10-15 years, that is typically meant neural nets-that has those have been a stand in-and and obviously, neural nets can be used for discrimination [As opposed to a generative AI model]. Again, the example of cat (You search “Cat” on Google images, and it returns results that show images, in theory, of only cats) is an example of how they can be used in a generative sense, which is really the latest revolution that you see. And then the other thing is how broadly applicable they are and how well read they are.

Tavakoli’s definition of AI provides the context for how AI is primarily applicable today in cybersecurity. But, in the past, typically these concepts were held back by technology. There is also a stark difference between what has been referred to as AI, or a discriminative AI model, and what is most popular today, or generative AI.

It turns out in these large language models, as you make them bigger, there was always kind of the question of if you make them big enough. Will they just plateau or will they take off? It really wasn't a foregone conclusion that if you made them big enough they would take off, but it was a bet that was placed and a bet that turned out to have some merit to it.

And that is the crux of today’s interview: what was and will be the past and future impact of AI on cybersecurity?

Key Takeaways
  • AI plays a significant role in both offensive and defensive cybersecurity strategies.
  • Threat actors use AI to enhance their attacks, making them more believable and harder to detect.
  • Defensive uses of AI include improving workflow and making SOCs more productive.
  • Organizations must always assume that compromise is possible and focus on minimizing the impact of breaches.

Hosted on Acast. See acast.com/privacy for more information.

Episoder(58)

AZT: Quit Bugging the CISO + CIO

AZT: Quit Bugging the CISO + CIO

Season 3, Episode 2: In our conversation with Energy Solution’s CIO David Weisong we chat about how new processes, technology, and budgets are formed. Catch this episode on YouTube, Apple, Spotify, Am...

8 Feb 202446min

Hacker Valley Dishes on Breaking Into Cybersecurity

Hacker Valley Dishes on Breaking Into Cybersecurity

To start the new season, we are joined by Hacker Valley Media’s Ron Eddings and Chris Cochran, who discuss breaking into cybersecurity and the role storytelling plays. A new year, a new season, and pl...

18 Jan 202449min

From Hacktivist to White Hat Hacker. A Chat with LulzSec’s Sabu.

From Hacktivist to White Hat Hacker. A Chat with LulzSec’s Sabu.

Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can read the show notes here. PS, we're giving away a Flipper Zero on our site as a little season finale gift. Check out details o...

30 Nov 202356min

The Market For Enterprise (Secure) Browsers

The Market For Enterprise (Secure) Browsers

Season two, episode 18: Evgeniy Kharam, a founder, CISO, architect, and podcast producer discusses the rise of Enterprise (Secure) browsers.You can read the show notes here and subscribe to updates.In...

16 Nov 202346min

AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices

AZT: Zack Butcher on Building Zero Trust Standards and Securing Microservices

Season two, episode 16: Zack Butcher discusses building upon NIST’s Zero Trust policies and standards, and ZT’s influence on a service mesh as it relates to microservices. Catch this episode on YouTub...

19 Okt 202354min

AZT: API Security with John Kindervag, Chase Cunningham, and Richard Bird

AZT: API Security with John Kindervag, Chase Cunningham, and Richard Bird

Season two, episode 15: We talk ZT History and API security with the godfather of Zero Trust, Dr Zero Trust, and Richard Bird.Catch this episode on YouTube, Apple, Spotify, Amazon, or Google. You can ...

31 Aug 202338min

Adopting Zero Trust: The Illusion of Passwordless

Adopting Zero Trust: The Illusion of Passwordless

The illusion of going passwordless with Derek Hanson, Vice President Solutions Architecture and Alliances at Yubico. You can read the show notes here. True or False: The concept of passwordless is new...

10 Aug 202351min

Populært innen Teknologi

lydartikler-fra-aftenposten
romkapsel
tomprat-med-gunnar-tjomlid
teknisk-sett
energi-og-klima
shifter
nasjonal-sikkerhetsmyndighet-nsm
teknologi-og-mennesker
smart-forklart
elektropodden
fornybaren
rss-impressions-2
rss-ai-forklart
pedagogisk-intelligens
rss-alt-som-gar-pa-strom
rss-heis
rss-polypod
rss-ki-praten
kortslutning
rss-grenser-for-ki