artificial intelligence & cybersecurity
Looking forward at artificial intelligence & cybersecurity
This interview originally aired on "In the Moment" on SDPB Radio. We talk artificial intelligence and cybersecurity with Amos Aesoph, chief security officer for Xigent Solutions, and Jeff Litterick, network/security architect for the state of South Dakota. They weigh in on ChatGPT, Bard and the future of artificial intelligence. We also discuss cybersecurity and whether or not TikTok is worth the risk.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
- Government > Regional Government > North America Government > United States Government (0.40)
- Information Technology > Communications > Social Media (1.00)
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (0.40)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (0.40)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.40)
Artificial Intelligence & Cybersecurity: Attacking & Defending
Cybersecurity suffers from a skills shortage in the market. As a result, the opportunities for artificial intelligence (AI) automation are vast. In many cases, AI is used to enhance and improve certain defensive aspects of cybersecurity. Prime examples are combating spam and detecting malware. From the attacker point of view, there are many incentives to using AI when trying to penetrate others' vulnerable systems.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (0.93)
Artificial Intelligence & Cybersecurity
Both AI and cybersecurity are broad and poorly understood fields. This book helps give you an overview of the various technologies that make up AI, where they have come from, and what AI has evolved into today. Cybersecurity is another field that has evolved over the last few decades. Dive into the world of cybersecurity and then learn how AI is being applied to the battle. When you're done reading this book, you will be spouting terms like cognitive computing, machine learning, and deep learning, and know how they apply to the cybersecurity space.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)