Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Humans Of InfoSec Podcasts
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Unusually in-depth conversations about the world's most pressing problems and what you can do to solve them. Subscribe by searching for '80000 Hours' wherever you get podcasts. Hosted by Rob Wiblin and Luisa Rodriguez.
…
continue reading
Voices of the Vigilant is where bold conversations meet unflinching purpose. Hosted by Jess Vachon, cybersecurity leader, Buddhist minister, and founder of Vigilant Violet LLC, this podcast explores the front lines of digital resilience, ethical leadership, and equitable transformation in tech. Through authentic dialogue with boundary-pushers, disruptors, and unsung heroes, each episode dives deep into the human side of cybersecurity—where strategy meets values, and innovation is grounded in ...
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
Bringing cyber security professionals together to share their expertise. CyberTech Talks is a podcast hosted by CREST.
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
Surprising insights into IT, security and the future of work – and what they mean for your business strategy. Join host and former Ivanti CEO Jeff Abbott and a rotating cast of global executives and thought leaders as they unpack Ivanti's latest research and share their own perspectives and experiences.
…
continue reading
Join Darren Gallop as he shares his unique perspective on entrepreneurship, cybersecurity, and the intersection of work, life, and travel. A linguist, musician, and world traveler, Darren brings a diverse background to his experiences building a startup. Tune in as he delves into the challenges and triumphs of being an entrepreneur, offers insights on the field of cybersecurity, and reflects on the ways in which his love of language and music have shaped his journey. Whether you're an entrep ...
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading

1
New Book: SPIES, LIES, AND CYBER CRIME | Former FBI Spy Hunter Eric O'Neill Explains How Cybercriminals Use Espionage techniques to Attack Us | Redefining Society And Technology Podcast With Marco Ciappelli ...
48:16
48:16
Play later
Play later
Lists
Like
Liked
48:16____________Podcast Redefining Society and Technology Podcast With Marco Ciappelli https://redefiningsocietyandtechnologypodcast.com ____________Host Marco Ciappelli Co-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybe…
…
continue reading

1
Why I Think Karpathy is Wrong on the AGI Timeline
9:54
9:54
Play later
Play later
Lists
Like
Liked
9:54Karpathy is confusing LLM limitations with AI system limitations, and that makes all the difference. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading

1
Daniel Kokotajlo on what a hyperspeed robot economy might look like
2:12:01
2:12:01
Play later
Play later
Lists
Like
Liked
2:12:01When Daniel Kokotajlo talks to security experts at major AI labs, they tell him something chilling: “Of course we’re probably penetrated by the CCP already, and if they really wanted something, they could take it.” This isn’t paranoid speculation. It’s the working assumption of people whose job is to protect frontier AI models worth billions of dol…
…
continue reading

1
What If AI Took Over Your Data Security Tomorrow?
50:52
50:52
Play later
Play later
Lists
Like
Liked
50:52Send us a text In this episode, Joe sits down with Gidi Cohen, a cybersecurity expert with a rich background in the Israeli 8200 unit, to explore the evolving landscape of data security. They delve into the challenges of managing large data sets, the impact of AI on cybersecurity, and the innovative solutions offered by Bonfy AI. Whether you're a s…
…
continue reading

1
The Silent Risk in AI-Powered Business Automation: Why No-Code Needs Serious Oversight | A Conversation with Walter Haydock | Redefining CyberSecurity with Sean Martin
38:21
38:21
Play later
Play later
Lists
Like
Liked
38:21⬥GUEST⬥ Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/ ⬥HOST⬥ Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ No-Code Meets AI: Who’s Really in Control? As A…
…
continue reading

1
Beyond the Title: What It Really Takes to Be a CISO Today — Insights Following A Conversation with Solarwinds CISO, Tim Brown | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read ...
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26What does it really take to be a CISO the business can rely on? In this episode, Sean Martin shares insights from a recent conversation with Tim Brown, CISO at SolarWinds, following his keynote at AISA CyberCon and his role in leading a CISO Bootcamp for current and future security leaders. The article at the heart of this episode focuses not on te…
…
continue reading

1
The Groundbreaker: Lessons from the Many Layers of Cyber
48:08
48:08
Play later
Play later
Lists
Like
Liked
48:08Send us a text Careers aren’t linear, and the most resilient defenders are forged in the messy middle. We sit down with Andrea Pullman—Air Force veteran, former Microsoft incident responder, and enterprise security advisor—to trace a path from identity trenches to global ransomware recovery and back to the architecture that holds it all together. A…
…
continue reading

1
Novelty Exploration vs. Pattern Exploitation
3:44
3:44
Play later
Play later
Lists
Like
Liked
3:44How going from exploration to exploitation can help you as both a consumer and creator of everything. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading

1
First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli AISA CyberCon Melbourne | October 15-17, 2025 Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security opera…
…
continue reading

1
What Actually Works in Cybersecurity (And What Doesn't)
41:06
41:06
Play later
Play later
Lists
Like
Liked
41:06Are you making career moves in cybersecurity or is cybersecurity making moves around you? Welcome to Razorwire. In this episode, I sit down with Marius Poskus - CISO, consultant, podcaster and all-round cyber expert - to how to succeed in cybersecurity. We discuss career paths, why security culture fails in most organisations and the risks of rushi…
…
continue reading
Some thoughts on how novelty and attention magnify the time that we have. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.By Daniel Miessler
…
continue reading

1
Top SAP Security Threat Hunting Strategies Used by Elite Researchers
53:03
53:03
Play later
Play later
Lists
Like
Liked
53:03Send us a text A curiosity-fueled career moves from Atari and BBS days to leading research on a live SAP zero-day, with candid lessons on people skills, breaking into security, and holding the line when pressure spikes. We unpack how a benign SAP endpoint became an RCE chain and what it takes to defend complex systems at scale. • early path from Co…
…
continue reading

1
Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli
28:05
28:05
Play later
Play later
Lists
Like
Liked
28:05Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli AISA CyberCon Melbourne | October 15-17, 2025 Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the real…
…
continue reading

1
Beyond Blame: Navigating the Digital World with Our Kids - Interview with Jacqueline (JJ) Jayne | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli
24:32
24:32
Play later
Play later
Lists
Like
Liked
24:32Beyond Blame: Navigating the Digital World with Our Kids AISA CyberCon Melbourne | October 15-17, 2025 There's something fundamentally broken in how we approach online safety for young people. We're quick to point fingers—at tech companies, at schools, at kids themselves—but Jacqueline Jayne (JJ) wants to change that conversation entirely. Speaking…
…
continue reading

1
The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine’s on-location event coverage, Moore breaks …
…
continue reading

1
AI Creativity Expert Reveals Why Machines Need More Freedom - Creative Machines: AI, Art & Us Book Interview | A Conversation with Author Maya Ackerman | Redefining Society And Technology Podcast With ...
43:24
43:24
Play later
Play later
Lists
Like
Liked
43:24⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com ______Title: AI Creativity Expert Reveals Why Machines Need More Freedom - Creative Machines: AI, Art & Us Book Interview | A Conversation with Author Maya Ackerman | Redefining Society And Technology Podcast With Marco Ciappelli ______Guest: Maya Ackerma…
…
continue reading

1
When the Coders Don’t Code: What Happens When AI Coding Tools Go Dark? | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35In this issue of the Future of Cyber newsletter, Sean Martin digs into a topic that’s quietly reshaping how software gets built—and how it breaks: the rise of AI-powered coding tools like ChatGPT, Claude, and GitHub Copilot. These tools promise speed, efficiency, and reduced boilerplate—but what are the hidden trade-offs? What happens when the tool…
…
continue reading

1
From Apple’s Inside to a New Kind of Phone: Privacy, Free Speech, and Building a Third Platform
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27Send us a text We trade last‑minute schedules and kid chaos for a deep dive into how modern phones leak data, why “Ask App Not to Track” isn’t enforcement, and what a third platform built for privacy and free speech looks like. Joe shares his Apple-to-Unplugged journey, the Raxxis findings, and practical features that make privacy usable. • zero‑to…
…
continue reading

1
Lo-Fi Music and the Art of Imperfection — When Technical Limitations Become Creative Liberation | Analog Minds in a Digital World: Part 2 | Musing On Society And Technology Newsletter | Article Written ...
14:33
14:33
Play later
Play later
Lists
Like
Liked
14:33⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com _____ Newsletter: Musing On Society And Technology https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/ _____ Watch on Youtube: https://youtu.be/nFn6CcXKMM0 _____ My Website: https://www.marcociappelli.com _______________…
…
continue reading

1
The Hidden Cost of Too Many Cybersecurity Tools (Most CISOs Get This Wrong) | A Conversation with Pieter VanIperen | Redefining CyberSecurity with Sean Martin
52:20
52:20
Play later
Play later
Lists
Like
Liked
52:20⬥GUEST⬥ Pieter VanIperen, CISO and CIO of AlphaSense | On Linkedin: https://www.linkedin.com/in/pietervaniperen/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ Real-World Principles for Real-…
…
continue reading

1
There's a cheap and low-tech way to save humanity from any engineered disease | Andrew Snyder-Beattie
2:31:11
2:31:11
Play later
Play later
Lists
Like
Liked
2:31:11Conventional wisdom is that safeguarding humanity from the worst biological risks — microbes optimised to kill as many as possible — is difficult bordering on impossible, making bioweapons humanity’s single greatest vulnerability. Andrew Snyder-Beattie thinks conventional wisdom could be wrong. Andrew’s job at Open Philanthropy is to spend hundreds…
…
continue reading

1
teissTalk: From service desk to security risk - stopping social engineering at the source
42:33
42:33
Play later
Play later
Lists
Like
Liked
42:33Which techniques and methods use by threat actors are bypassing security parameters Reducing your cyber risk - using lessons learned from recent high-profile attacks Strategies to protect your service desk against identity-based attacks Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability Manager, …
…
continue reading

1
SBOMs in Application Security: From Compliance Trophy to Real Risk Reduction | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 3 | A Musing On the Future of Cybersecurity with Sean Martin and ...
2:33
2:33
Play later
Play later
Lists
Like
Liked
2:33SBOMs were supposed to be the ingredient label for software—bringing transparency, faster response, and stronger trust. But reality shows otherwise. Fewer than 1% of GitHub projects have policy-driven SBOMs. Only 15% of developer SBOM questions get answered. And while 86% of EU firms claim supply chain policies, just 47% actually fund them. So why …
…
continue reading

1
The Hidden Costs of Security Stack Consolidation (That Vendors Don't Mention)
48:15
48:15
Play later
Play later
Lists
Like
Liked
48:15Is your security stack making you safer or just adding to the chaos? Welcome to Razorwire, the podcast where we unravel the mess, myths and market realities behind today’s cybersecurity challenges. I’m your host Jim and in this episode, I’m joined by our favourite regulars Oliver Rochford and Richard Cassidy to tackle a topic that irritates every C…
…
continue reading

1
Your AI is not as secure as you think it is, and here's why
51:38
51:38
Play later
Play later
Lists
Like
Liked
51:38Send us a text David Brockler, AI security researcher at NCC Group, explores the rapidly evolving landscape of AI security and the fundamental challenges posed by integrating Large Language Models into applications. We discuss how traditional security approaches fail when dealing with AI components that dynamically change their trustworthiness base…
…
continue reading

1
Inside the Biden admin’s AI policy approach | Jake Sullivan, Biden’s NSA | via The Cognitive Revolution
1:05:58
1:05:58
Play later
Play later
Lists
Like
Liked
1:05:58Jake Sullivan was the US National Security Advisor from 2021-2025. He joined our friends on The Cognitive Revolution podcast in August to discuss AI as a critical national security issue. We thought it was such a good interview and we wanted more people to see it, so we’re cross-posting it here on The 80,000 Hours Podcast. Jake and host Nathan Labe…
…
continue reading

1
AI Will Replace Democracy: The Future of Government is Here. Or, is it? Let's discuss! | A Conversation with Eli Lopian | Redefining Society And Technology Podcast With Marco Ciappelli
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com ______Title: Tech Entrepreneur and Author's AI Prediction - The Last Book Written by a Human Interview | A Conversation with Jeff Burningham | Redefining Society And Technology Podcast With Marco Ciappelli ______Guest: Eli Lopian Founder of Typemock Ltd |…
…
continue reading

1
Why Cybersecurity Training Isn’t Working — And What To Do Instead | Human-Centered Cybersecurity Series with Co-Host Julie Haney and Guest Dr. Aunshul Rege | Redefining CyberSecurity with Sean Martin
45:26
45:26
Play later
Play later
Lists
Like
Liked
45:26⬥GUEST⬥ Aunshul Rege, Director at The CARE Lab at Temple University | On Linkedin: https://www.linkedin.com/in/aunshul-rege-26526b59/ ⬥CO-HOST⬥ Julie Haney, Computer scientist and Human-Centered Cybersecurity Program Lead, National Institute of Standards and Technology | On LinkedIn: https://www.linkedin.com/in/julie-haney-037449119/ ⬥HOST⬥ Host: S…
…
continue reading

1
Live at teissLondon2025: From gatekeeping to guardrails - proactive supply chain security at scale
49:59
49:59
Play later
Play later
Lists
Like
Liked
49:5970% of critical security debt stems from third-party code - what can be done upstream? How real-time threat intelligence and policy enforcement are closing the gap Why DORA and modern CI/CD pipelines demand pre-emptive visibility and automation Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Paul Holland, Cyber Capability M…
…
continue reading

1
A Conversation With Harry Wetherald CO-Founder & CEO At Maze
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03➡ Stay Ahead of Cyber Threats with AI-Driven Vulnerability Management with Maze: https://mazehq.com/ In this conversation, I speak with Harry about how AI is transforming vulnerability management and application security. We explore how modern approaches can move beyond endless reports and generic fixes, toward real context-aware workflows that act…
…
continue reading

1
Cloud, AI, and the Future of Identity Access Management
46:05
46:05
Play later
Play later
Lists
Like
Liked
46:05Send us a text Art Poghosyan shares his journey from IT security consultant to CEO of Britive, a cloud-native identity and access management company. His experience during economic downturns shaped his understanding of how cybersecurity services remain resilient through various market cycles. • Started in IT security right after completing a master…
…
continue reading

1
The Mentor’s Map: Empowering Pathways to Cyber
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46Send us a text Chris Lemon's cybersecurity journey defies conventional paths. As Director of Security Engineering at Secure Yeti and an educator at City Colleges of Chicago, she's building bridges between education and employment while championing diversity in tech. What makes Chris's perspective so valuable is her unique background. Before enterin…
…
continue reading

1
A Conversation With Grant Lee CO-Founder & CEO At Gamma
21:48
21:48
Play later
Play later
Lists
Like
Liked
21:48➡ Upgrade your presentations with Gamma, the best AI presentation maker: https://gamma.app In this conversation, I speak with Grant, co-founder of Gamma, about how their platform is transforming presentations and idea-sharing. Instead of starting with slides, Gamma helps you focus on the story first—then builds the visuals, structure, and delivery …
…
continue reading

1
The Psychological Toll of Working in Cybersecurity - When You Can't Unsee What You've Seen
57:20
57:20
Play later
Play later
Lists
Like
Liked
57:20Are you prepared for the psychological toll that comes with handling disturbing content in the cybersecurity world? Welcome to Razorwire, where today we’re exploring into the realities behind a career in cyber, from technical warfare to the often-overlooked human cost. In this episode, I’m joined by therapist and consultant Eve Parmiter to examine …
…
continue reading

1
Neel Nanda on leading a Google DeepMind team at 26 – and advice if you want to work at an AI company (part 2)
1:46:49
1:46:49
Play later
Play later
Lists
Like
Liked
1:46:49At 26, Neel Nanda leads an AI safety team at Google DeepMind, has published dozens of influential papers, and mentored 50 junior researchers — seven of whom now work at major AI companies. His secret? “It’s mostly luck,” he says, but “another part is what I think of as maximising my luck surface area.” Video, full transcript, and links to learn mor…
…
continue reading

1
Hack Your Way to Achievement: One Small Step at a Time
43:37
43:37
Play later
Play later
Lists
Like
Liked
43:37Send us a text Ted Harrington shares insights about achieving difficult goals through disciplined habits rather than relying on fleeting inspiration. He explains how the hacker mindset—being curious, non-conforming, committed, and creative—can help anyone overcome challenges and find overlooked opportunities. • Breaking big goals into smaller, mana…
…
continue reading

1
The Problem With Threat Modeling in Application Security: Too Slow, Too Theoretical, Not Agile | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 2 | A Musing On the Future of Cybersecurity ...
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58Threat modeling is often called the foundation of secure software design—anticipating attackers, uncovering flaws, and embedding resilience before a single line of code is written. But does it really work in practice? In this episode of AppSec Contradictions, Sean Martin explores why threat modeling so often fails to deliver: It’s treated as a one-…
…
continue reading

1
UL NO. 497: STANDARD EDITION | More NPM Shenanigans, I Open Sourced Kai, Blood Work Results, Finding Vulns in a 10-line Prompt, and more...
37:13
37:13
Play later
Play later
Lists
Like
Liked
37:13UL NO. 497: STANDARD EDITION | More NPM Shenanigans, I Open Sourced Kai, Blood Work Results, Finding Vulns in a 10-line Prompt, and more... Read this episode online: https://newsletter.danielmiessler.com/p/ul-497 Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow …
…
continue reading

1
AI in Application Security: Why False Positives Still Overwhelm Teams Despite the Hype | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 1 | A Musing On the Future of Cybersecurity with Sean ...
2:37
2:37
Play later
Play later
Lists
Like
Liked
2:37AI is everywhere in application security today — but instead of fixing the problem of false positives, it often makes the noise worse. In this first episode of AppSec Contradictions, Sean Martin explores why AI in application security is failing to deliver on its promises. False positives dominate AppSec programs, with analysts wasting time on irre…
…
continue reading

1
We Have All the Information, So Why Do We Know Less? | Analog Minds in a Digital World: Part 1 | Musing On Society And Technology Newsletter | Article Written By Marco Ciappelli
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com _____ Newsletter: Musing On Society And Technology https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/ _____ Watch on Youtube: https://youtu.be/nFn6CcXKMM0 _____ My Website: https://www.marcociappelli.com _______________…
…
continue reading

1
Can we tell if an AI is loyal by reading its mind? DeepMind's Neel Nanda (part 1)
3:01:11
3:01:11
Play later
Play later
Lists
Like
Liked
3:01:11We don’t know how AIs think or why they do what they do. Or at least, we don’t know much. That fact is only becoming more troubling as AIs grow more capable and appear on track to wield enormous cultural influence, directly advise on major government decisions, and even operate military equipment autonomously. We simply can’t tell what models, if a…
…
continue reading

1
The Future of AI: Security, Ethics, and Human Augmentation
40:19
40:19
Play later
Play later
Lists
Like
Liked
40:19Send us a text Artificial intelligence is developing at unprecedented speed, becoming a transformative force that may rival nuclear technology in its impact on human civilization. The rapid evolution of AI capabilities presents both extraordinary opportunities and profound challenges that we're only beginning to understand. • AI development is acce…
…
continue reading

1
UL NO. 496: STANDARD EDITION | New Video on Building my Personal AI System, Anthropic Reveals One-person Hacking Company using Claude, Pentagon Says China Keeps Penetrating, and more...
1:02:49
1:02:49
Play later
Play later
Lists
Like
Liked
1:02:49UL NO. 496: STANDARD EDITION | New Video on Building my Personal AI System, Anthropic Reveals One-person Hacking Company using Claude, Pentagon Says China Keeps Penetrating, and more... Read this episode online: https://newsletter.danielmiessler.com/p/ul-496 Personal AI Video I'm so excited about Subscribe to the newsletter at: https://danielmiessl…
…
continue reading