Trending Misterio
iVoox
Descargar app Subir
iVoox Podcast & radio
Descargar app gratis
Unsupervised Learning with Daniel Miessler
Unsupervised Learning with Daniel Miessler
Podcast

Unsupervised Learning with Daniel Miessler 3t41o

237
23

Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming. 6z1l3o

Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.

237
23
Unified Entity Context
Unified Entity Context
🔹 Thanks to ProjectDiscovery for sponsoring today’s video. I've been using their tools like Nuclei and Subfinder for years, and now they’ve brought that power to the cloud with a full vulnerability management platform. ➡ Try it yourself at https://ul.live/PD1 For over a decade, I've been exploring how AI and context intersect—and I believe Unified Entity Context (UEC) is the key to unlocking what comes next. In this podcast, I walk through my journey—from security assessments and AI-powered tools to building real-world demos like Alma and Threshold. The core idea? That most hard decisions are only hard because we lack the necessary context. With rich, accurate, and fresh context, even complex decisions become simple. If you're building in security, investing in AI, or just trying to understand where things are heading, this concept might reframe everything. Check out the full video here: https://youtu.be/IHUqk90ch7I Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 2 semanas
0
0
7
30:18
Reviewing RSA 2025 with Jason Haddix
Reviewing RSA 2025 with Jason Haddix
What really happened at RSA 2024? Daniel Miessler and Jason Haddix break it down. Fresh off a whirlwind RSA week, Daniel sits down with Jason Haddix (Arcanum Information Security) to talk about what mattered—beyond the show floor noise. From off-site innovation summits to real-world AI implementation, this deep dive covers: -Where the real innovation happened (hint: not on the show floor) -Key takeaways from the OpenAI and Airbnb AI Security events -Jason’s talk on AI pentesting methodology and the Prompt Injection Taxonomy -The future of cybersecurity moats and the risk of AI-native disruption -Why agents aren’t the main character—data is -DARPA's AIxCC competition and the rise of Cyber Reasoning Systems -Challenges with evals, autonomous security workflows, and VDP backlash -Behind the scenes at RSA: puppies, parties, burnout, and brutal honesty They also explore content creation, the future of platform-native context, and why being opinionated (with receipts) matters more than ever in security and tech.  Jason's Company https://arcanum-sec.com Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 2 semanas
0
0
6
01:21:43
A Conversation with Bar-El Tayouri from Mend.io
A Conversation with Bar-El Tayouri from Mend.io
➡ Get full visibility, risk insights, red teaming, and governance for your AI models, AI agents, RAGs, and more—so you can securely deploy AI powered applications with ul.live/mend In this episode, I speak with Bar-El Tayouri, Head of AI Security at Mend.io, about the rapidly evolving landscape of application and AI security—especially as multi-agent systems and fuzzy interfaces redefine the attack surface. We talk about: • Modern AppSec Meets AI Agents How traditional AppSec falls short when it comes to AI-era components like agents, M servers, system prompts, and model artifacts—and why security now depends on mapping, monitoring, and understanding this entire stack. •  Threat Discovery, Simulation, and Mitigation How Mend’s AI security suite identifies unknown AI usage across an org, simulates dynamic attacks (like prompt injection via PDFs), and provides developers with precise, in-code guidance to reduce risk without slowing innovation. •  Why We’re Rethinking Identity, Risk, and Governance Why securing AI systems isn’t just about new threats—it’s about re-implementing old lessons: identity access, separation of duties, and system modeling. And why every CISO needs to integrate security into the dev workflow instead of relying on blunt-force blocking. Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler Chapters: 00:00 - From Game Hacking to AI Security: Barel’s Tech Journey03:51 - Why Application Security Is Still the Most Exciting Challenge04:39 - The Real AppSec Bottleneck: Prioritization, Not Detection06:25 - Explosive Growth of AI Components Inside Applications12:48 - Why M Servers Are a Massive Blind Spot in AI Security15:02 - Guardrails Aren’t Keeping Up With Agent Power16:15 - Why AI Security Is Maturing Faster Than Previous Tech Waves20:59 - Traditional AppSec Tools Can’t Handle AI Risk Detection26:01 - How Mend Maps, Discovers, and Simulates AI Threats34:02 - What Ideal Customers Ask For When Securing AI38:01 - Beyond Guardrails: Mend’s Guide Rails for In-Code Mitigation41:49 - Multi-Agent Systems Are the Next Security Nightmare45:47 - Final Advice for CISOs: Enable, Don’t Disable Developers Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 3 semanas
0
0
5
45:53
The 4 AAAAs of the AI ECOSYSTEM: Assistants, APIs, Agents, and Augmented Reality
The 4 AAAAs of the AI ECOSYSTEM: Assistants, APIs, Agents, and Augmented Reality
In this episode, I break down what I believe is the emerging structure of the AI-powered world we're all building—consciously or not. I call it the “Four A’s”: Assistants, APIs, Agents, and Augmented Reality. This framework helps make sense of recent developments and where it’s all headed. I talk about: 1. Digital Assistants That Understand and Optimize Your Life Your DA (like “Kai”) will know your goals, preferences, health, schedule, and context—and proactively optimize your day, from filtering messages to planning meals or surfacing relevant information in real time. 2. APIs and the Real Internet of Things Everything becomes an API—from businesses to people to physical objects. Your assistant interacts with these APIs to act on your behalf, turning the world into a navigable ecosystem of services, tools, and resources. 3. Agents and AR Bringing It All Together Agents act autonomously to complete multi-step goals, and AR glasses will display their outputs contextually as you move through the world.  These systems will collaborate, search, and act—quietly transforming how we live, work, and perceive reality. Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler See you in the next one! Chapters: 00:00 - The AI Ecosystem We’re Building Without Realizing It01:33 - Assistant: Your Most Powerful Digital Companion03:08 - APIs: How DAs Interact with the World07:54 - Agents: The Step Beyond Automation11:00 - Augmented Reality: The Interface Layer of the AI Ecosystem14:20 - Combining APIs, Agents, and UI for Real-Time Situational Awareness17:17 - Summary: A Unified Ecosystem Driven by the Four A’s23:36 - Industry Trends: How Companies Like OpenAI, Apple, and Meta Fit In25:11 - Final Thoughts on Timelines, Winners, and Interpreting AI News Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 1 mes
0
0
6
27:04
Using the Smartest AI to Rate Other AI
Using the Smartest AI to Rate Other AI
In this episode, I walk through a Fabric Pattern that assesses how well a given model does on a task relative to humans. This system uses your smartest AI model to evaluate the performance of other AIs—by scoring them across a range of tasks and comparing them to human intelligence levels. I talk about: 1. Using One AI to Evaluate AnotherThe core idea is simple: use your most capable model (like Claude 3 Opus or GPT-4) to judge the outputs of another model (like GPT-3.5 or Haiku) against a task and input. This gives you a way to benchmark quality without manual review. 2. A Human-Centric Grading SystemModels are scored on a human scale—from “uneducated” and “high school” up to “PhD” and “world-class human.” Stronger models consistently rate higher, while weaker ones rank lower—just as expected. 3. Custom Prompts That Push for Deeper EvaluationThe rating prompt includes instructions to emulate a 16,000+ dimensional scoring system, using expert-level heuristics and attention to nuance. The system also asks the evaluator to describe what would have been required to score higher, making this a meta- loop for improving future performance. Note: This episode was recorded a few months ago, so the AI models mentioned may not be the latest—but the framework and methodology still work perfectly with current models. Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler See you in the next one! Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 1 mes
0
0
5
09:34
A Conversation with Patrick Duffy from Material Security
A Conversation with Patrick Duffy from Material Security
➡ Secure what your business is made of with Martial Security:  https://material.security/ In this episode, I speak with Patrick Duffy from Material Security about modern approaches to email and cloud workspace security—especially how to prevent and contain attacks across platforms like Google Workspace and Microsoft 365. We talk about: • Proactive Security for Email and Cloud Platforms How Material goes beyond traditional detection by locking down high-risk documents and inboxes preemptively—using signals like time, access patterns, content sensitivity, and anomalous behavior. • Real-World Threats and Lateral Movement What the team is seeing in the wild—from phishing and brute-force attacks to internal data oversharing—and how attackers are increasingly moving laterally through cloud ecosystems using a single set of compromised credentials. • Customizable, Context-Aware Response Workflows How Material helps teams right-size their responses based on risk appetite, enabling fine-grained actions like MFA prompts, access revocation, or full session shutdowns—triggered by dynamic, multi-signal rule sets. Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler Chapters: 00:00 - Welcome & High-Level Overview of Material Security02:04 - Common Threats: Phishing and Lateral Movement in Cloud Office05:30 - Access Control in Collaborative Workspaces (2FA, Just-in-Time, Aging Content)08:43 - Connecting Signals: From to Exfiltration via Rule Automation12:25 - Real-World Scenario: Suspicious and Automated Response15:08 - Rules, Templates, and Customer Customization at Onboarding18:46 - Accidental Risk: Sensitive Document Sharing and Exposure21:04 - Security Misconfigurations and Internal Abuse Cases23:43 - Full Control Points: IP, Behavior, Classification, Sharing Patterns27:50 - Integrations, Notifications, and Real-Time Security Team Coordination31:13 - Lateral Movement: How Attacks Spread Across the Workspace34:25 - Use Cases Involving Google Gemini and AI Exposure Risks36:36 - Features: Deeper Remediation and Contextual Integration39:30 - Closing Thoughts and Where to Learn More Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 1 mes
0
0
8
26:47
AICAD: Artificial Intelligence Capabilities For Attack & Defense
AICAD: Artificial Intelligence Capabilities For Attack & Defense
AI is changing cybersecurity at a fundamental level—but how do we decide what to build, and when? In this episode, I outline a structured way to think about AI for security: from foundational ideas to a future-proof system that can scale with emerging threats. • Rethinking Human Workflows as Intelligence PipelinesBy mapping tasks into visual workflows, we can pinpoint exactly where human intelligence is still required—and where AI agents are most likely to replace or enhance us. • Using AI to Understand and Manage Organizational StateI introduce the concept of AI state management: building systems that track your current and desired security posture in real time, and using AI to bridge the gap—automating insights, decisions, and even actions across your environment. • Building a Cyber Defense Program Inspired by Attacker PlaybooksInstead of waiting for threats, I propose a new framework based on attacker capabilities—what they wish they could do now and in the near future—and how to proactively prepare by building a continuously adapting AI-powered defense system. Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler Chapters: 00:00 - Framing the Future: Two Key Questions on AI and Cybersecurity01:28 - Intelligence Pipelines: Visualizing Human Work as Replaceable Workflow06:10 - Theory of Constraints: How Attackers Are Bottlenecked by Human Labor10:42 - Defining Agents: What Makes AI Different From Traditional Automation12:08 - AI State Management: The Universal Use Case for Automated Intelligence16:53 - Real-World Demo: Unified Context AI for Security Program Management26:30 - Advanced Uses: Reasg Projects, Updating KPIs, and Security Reports34:58 - Automating Security Questionnaires With AI Context Awareness38:43 - ACAD Framework: Predicting and Preparing for Future Attacker Capabilities47:40 - Defender Response: Building AI-Driven Red Teams and Internal UCCs52:25 - Final Answers: How Software and Security Change With AI Agents Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 1 mes
0
0
6
42:51
A Possible Path to ASI
A Possible Path to ASI
The conversation around AGI and ASI is louder than ever—but the definitions are often abstract, technical, and disconnected from what actually matters. In this episode, I break down a human-centered way of thinking about these , why they’re important, and a system that could help us get there. I talk about:  • A Better Definition of AGI and ASI Instead of technical abstractions, AGI is defined as the ability to perform most cognitive tasks as well as a 2022 U.S.-based knowledge worker. ASI is intelligence that sures that level. Framing it this way helps us immediately understand why it matters—and what it threatens. • Invention as the Core Output of Intelligence The real value of AGI and ASI is their ability to generate novel solutions. Drawing inspiration from the Enlightenment, we explore how humans innovate—and how we can replicate that process using AI, automation, and structured experimentation. • Scaling the Scientific Method with AI By building systems that automate idea generation, recombination, and real-world testing, we can massively scale the rate of innovation. This framework—automated scientific iteration—could be the bridge from human intelligence to AGI and beyond. Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler Chapters: 00:00 - Why AGI and ASI Definitions Should Be Human-Centric01:55 - Defining AGI as a 2022-Era US Knowledge Worker03:04 - Defining ASI and Why It’s Harder to Conceptualize04:04 - The Real Reason to Care: AGI and ASI Enable Invention05:04 - How Human Innovation Happens: Idea Collisions and Enlightenment Lessons06:56 - Building a System That Mimics Human Idea Generation at Scale09:00 - The Challenge of Testing: From A/B Tests to Biotech Labs10:52 - Creating an Automated, Scalable Scientific Method With AI12:50 - A Timeline to AGI and ASI: Predictions for 2027–2030 Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 1 mes
0
0
6
10:52
A Conversation With Matt Muller From Tines
A Conversation With Matt Muller From Tines
➡ Build, run, and monitor workflows with Tines at: tines.com In this episode, I speak with Matt Muller, Field CSCO at Tines, about how automation and AI are transforming security operations at scale. We talk about: • Tines' Mission to Eliminate Manual Security Work Through Automation How Tines helps security teams streamline incident response and workflow automation without needing to write code, saving time and reducing burnout. • Applying AI to Security Operations and Analyst Workflows How AI is used in phishing analysis, threat intel reporting, and data transformation—integrated safely into workflows using tools like Workbench with private LLMs. • Tines Workbench and the Future of Agentic AI How Workbench combines chat with deterministic automation to help analysts take action securely, and how Tines is exploring agentic AI to take automation even further. Chapters: 00:00 - How Tines Automates Security to Solve SOC Burnout07:19 - The AI Arms Race: How Attackers and Defenders Are Evolving09:08 - Why Security Still Comes Down to Workflow, Logging, and Action13:41 - How CISOs Are Balancing AI Adoption and Enterprise Risk17:36 - Using AI in Tines to Transform and Automate Security Workflows20:40 - How AI Detects Business Email Compromise Better Than Rules25:26 - From Security to Data Pipelines: Tines as Workflow Orchestration28:59 - Inside Workbench: Secure AI-Powered Chat for Analysts36:00 - Automating Phishing Investigations with Trusted Tool Integrations39:19 - Where to Learn More and Try Tines for Free Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 1 mes
0
0
7
39:32
UL NO. 474 | Signal OPSEC, White-box Red-teaming LLMs, Unified Company Context (UCC), New Book Recommendations, Single A
UL NO. 474 | Signal OPSEC, White-box Red-teaming LLMs, Unified Company Context (UCC), New Book Recommendations, Single A
STANDARD EDITION: Signal OPSEC, White-box Red-teaming LLMs, Unified Company Context (UCC), New Book Recommendations, Single Apple Note Technique, and much more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive benefits here: https://newsletter.danielmiessler.com/upgrade Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 1 mes
0
0
7
18:24
A conversation with slava konstantinov from threatlocker
A conversation with slava konstantinov from threatlocker
➡ Allow what you need, block everything else with ThreatLocker: threatlocker.com In this episode, I speak with Slava Konstantinov, ThreatLocker's MacOS Lead Architect, about their zero-trust approach to endpoint security and their latest cybersecurity innovations. We talk about: • ThreatLocker’s Zero Trust Approach to Cybersecurity: How ThreatLocker enforces a default deny security model, ensuring only explicitly allowed applications and actions can run, reducing attack surfaces and unauthorized access. • Key ThreatLocker Products and Features: How ThreatLocker’s solutions—Application Control, Storage Control, Ring Fencing, Network Control, and ThreatLocker Detect—help organizations enhance security through granular policy enforcement. • New & ThreatLocker Features: How new solutions like Patch Management, Web Control, Insights, and Cloud Detect will provide even greater security, automation, and compliance for businesses managing complex IT environments. Chapters: 00:00 - Intro to ThreatLocker and Zero Trust Security 01:24 - How ThreatLocker’s Application Control Blocks Unauthorized Software 06:52 - Storage Control: Preventing Unauthorized Data Access and USB Threats 08:19 - Ring Fencing: Controlling App Permissions and Network Access 12:37 - Elevation Control: Granting Privileges Without Risk 16:23 - Network Control: Restricting Internet and Internal Network Access 19:26 - AI-Driven Security Policies: The Future of ThreatLocker Management 24:07 - Mac vs. Windows Security: Key Differences and Challenges 29:49 - ThreatLocker’s Expansion: New Products and Future Plans 32:32 - Where to Learn More About ThreatLocker’s Security Solutions Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 2 meses
0
0
9
33:29
Raycast is a Must in 2025 - The Future of Productivity?
Raycast is a Must in 2025 - The Future of Productivity?
In this episode, Daniel Miessler explores how to supercharge your macOS workflow with Raycast, transforming everyday tasks into lightning-fast, AI-powered actions. He talks about: Raycast as a Universal Launcher: Daniel explains how Raycast replaces traditional launchers like Spotlight and Alfred, offering an all-in-one shortcut to apps, files, and bookmarks for unparalleled efficiency. Quick Links and Custom Searches: He demonstrates how quick links streamline navigation by replacing outdated bookmarks and enabling custom search commands that let you by the browser for faster access. Integrated Utilities and Window Management: Discover how Raycast consolidates everyday tools—from color pickers and process killers to custom window arrangements—ensuring that all your essential utilities are just a keystroke away. Advanced AI Integration: Learn how Raycast’s innovative AI commands integrate with platforms like ChatGPT and Fabric, allowing you to interact with, summarize, and analyze web content directly from your command line. Custom Commands and Productivity Hacks: Daniel reveals his secrets for creating personalized hotkeys, snippets, and aliases that reduce friction in your digital workflow, making your daily tasks smoother and more intuitive. Subscribe to the newsletter at: https://danielmiessler.com/newsletter Watch the video on YouTube at: https://www.youtube.com/c/UnsupervisedLearning Follow on Twitter at: https://twitter.com/danielmiessler See you in the next one! Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 2 meses
0
0
5
45:52
UL NO. 472 | STANDARD EDITION: 28 Open Cyber Jobs, Real-world AI Propaganda Poisoning, M Explained, Cline vs....
UL NO. 472 | STANDARD EDITION: 28 Open Cyber Jobs, Real-world AI Propaganda Poisoning, M Explained, Cline vs....
STANDARD EDITION: 28 Open Cyber Jobs, Real-world AI Propaganda Poisoning, M Explained, Cline vs. Windsurf, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member for the full version and many other exclusive benefits here: https://newsletter.danielmiessler.com/upgrade Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessle Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 2 meses
0
0
7
39:30
UL NO. 471 | STANDARD EDITION: Cyber Standing Down, China's Innovation Burst, PC vs. NPC, Why AI Can't Understand,...
UL NO. 471 | STANDARD EDITION: Cyber Standing Down, China's Innovation Burst, PC vs. NPC, Why AI Can't Understand,...
STANDARD EDITION: Cyber Standing Down, China's Innovation Burst, PC vs. NPC, Why AI Can't Understand, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member for the full version and many other exclusive benefits here: https://newsletter.danielmiessler.com/upgrade Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 2 meses
0
0
7
25:40
UL NO. 470 | Attacking Signal, Blogging Getting MORE Important, AI's Final Form, Claude 3.7 vs. World, Censorship as...
UL NO. 470 | Attacking Signal, Blogging Getting MORE Important, AI's Final Form, Claude 3.7 vs. World, Censorship as...
STANDARD EDITION: Attacking Signal, Blogging Getting MORE Important, AI's Final Form, Claude 3.7 vs. World, Censorship as a Service, and more... ➡ Protect Against Bots, Fraud, and Abuse. Check out WorkOS Radar at: workos.com/radar You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member for the full version and many other exclusive benefits here: https://newsletter.danielmiessler.com/upgrade Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 2 meses
0
0
5
41:25
UL NO. 468 | TELOS Patterns, Apple 0-Day, Gumroad Replaces Developers with AI
UL NO. 468 | TELOS Patterns, Apple 0-Day, Gumroad Replaces Developers with AI
Also: A new threat modeling framework for AI, an API security report, and being paralyzed by crisis Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 3 meses
0
0
6
49:19
UL NO. 467 | Why You Should Care About AGI (And a Definition)
UL NO. 467 | Why You Should Care About AGI (And a Definition)
Plus: DeepSeek's open database, Using o3 with Fabric, Chinese backdoors in health monitors, and much more... Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 3 meses
0
0
8
25:41
Raycast is a Must in 2025 - The Only Tool You Need?
Raycast is a Must in 2025 - The Only Tool You Need?
In this episode, Daniel Miessler explores how to supercharge your macOS workflow with Raycast, transforming everyday tasks into lightning-fast, AI-powered actions. He talks about: Raycast as a Universal Launcher: Daniel explains how Raycast replaces traditional launchers like Spotlight and Alfred, offering an all-in-one shortcut to apps, files, and bookmarks for unparalleled efficiency. Quick Links and Custom Searches: He demonstrates how quick links streamline navigation by replacing outdated bookmarks and enabling custom search commands that let you by the browser for faster access. Integrated Utilities and Window Management: Discover how Raycast consolidates everyday tools—from color pickers and process killers to custom window arrangements—ensuring that all your essential utilities are just a keystroke away. Advanced AI Integration: Learn how Raycast’s innovative AI commands integrate with platforms like ChatGPT and Fabric, allowing you to interact with, summarize, and analyze web content directly from your command line. Custom Commands and Productivity Hacks: Daniel reveals his secrets for creating personalized hotkeys, snippets, and aliases that reduce friction in your digital workflow, making your daily tasks smoother and more intuitive. Subscribe to the newsletter at: https://danielmiessler.com/newsletter Watch the video on YouTube at: https://www.youtube.com/c/UnsupervisedLearning Follow on Twitter at: https://twitter.com/danielmiessler See you in the next one! Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 3 meses
0
0
7
49:59
Using AI for Fiction Writing
Using AI for Fiction Writing
I want to explore how AI can assist in fiction writing, especially using open-source models that allow for greater control, creativity, and long-form storytelling. With tools like LM Studio and Hugging Face, we can powerful AI models capable of maintaining story coherence, helping authors generate complex narratives, and even unlocking new storytelling possibilities. So, the idea is to create a structured approach to fiction writing with AI. By organizing story elements—characters, setting, mystery, and plot—into a detailed text file ("Telus file"), we can guide AI models to produce high-quality, structured narratives. The goal is not to replace authors but to empower them with AI-assisted storytelling. Who wants to experiment with this approach? Or does anyone know of better AI tools for fiction writing? With larger context models and improving AI capabilities, we might be close to AI-assisted novels that rival human-written stories! Subscribe to the newsletter at: https://danielmiessler.com/subscribe the UL community at: https://danielmiessler.com/upgrade Follow on X: https://x.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler   Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 3 meses
0
0
6
30:14
A Conversation with Alastair Paterson from Harmonic Security
A Conversation with Alastair Paterson from Harmonic Security
In this conversation, I speak with Alastair Paterson, CEO and co-founder of Harmonic Security. We talk about: Harmonic Security’s Unique Approach to AI Data Protection: How Harmonic Security’s Zero-Touch Data Protection uses small language models to identify and prevent sensitive data leaks, differentiating it from traditional DLP solutions. Challenges of AI Adoption & Enterprise Security Risks: How enterprises are struggling to adopt Generative AI safely, as employees unknowingly expose sensitive data. The risks of shadow AI usage, and why visibility into AI applications is essential for organizations. Harmonic’s Browser-Based Solution for Secure AI Adoption: How Harmonic Security’s browser-based extension provides real-time monitoring and intervention, allowing enterprises to track AI adoption, prevent data leaks, and enforce security policies without disrupting productivity. ➡️ Get a DEMO and Take Advantage of Harmonic's GenAI Securely  ul.live/harmonic ➡️ Check out Harmonic's Data leakage report "From Payrolls to Patents" ul.live/harmonic-data-leaked 00 Intro 00:12 Guest Introduction - Alistair and Harmonic Security 01:16 Background on Digital Shadows and Transition to Harmonic Security 02:50 The Impact of ChatGPT and Generative AI on Security 04:35 The Problem with AI Data Leakage and Enterprise Risks 06:20 The Evolution of Data Protection: From DLP to AI Readiness 08:45 The Challenge of Shadow AI in Enterprises 10:30 Understanding Harmonic Security's Zero-Touch Data Protection 12:15 How Harmonic Security Works - Browser Extension Overview 14:40 Detecting Sensitive Data in AI Prompts 16:50 Live Demo - Preventing Data Leaks in AI Chatbots 19:35 Visibility and Monitoring of AI Usage Across the Enterprise 22:10 Risk Classification and Training Data Considerations 24:05 Policy Enforcement and Customization Options 26:30 Future Developments - Expanding Coverage Beyond AI Apps 28:15 Final Thoughts and Where to Learn More Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.
Internet y tecnología 3 meses
0
0
7
29:32
También te puede gustar Ver más
Clockwise
Clockwise Clockwise is a rapid-fire discussion of current technology issues hosted by Dan Moren and Mikah Sargent and featuring two special guests each week. Four people, four topics--and because we're always watching the clock, no episode is longer than 30 minutes. Hosted by Dan Moren and Mikah Sargent. Actualizado
Malicious Life
Malicious Life Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians. Actualizado
Vulnerable, el podcast de seguridad digital
Vulnerable, el podcast de seguridad digital En Vulnerable hablamos sobre seguridad online. Conducido por Bernardo López y Julio Figueroa. Cada semana estaremos comentando las noticias del mundo online que nos causan dolores de cabeza. Actualizado
Ir a Internet y tecnología