Yes. So, I think that the idea of “automated continuous validation” really is the kind of unifying meme here. So, like such models exist instead of giving them autonomy, we narrow it, so for each possible domain, they become continuous validation tools. And then we redesigned the infrastructure because we have to, assuming that breach already happens, but there is a coordinated effort to also do continuous mitigation and continuous forecasting in light of this continuous validation capability.

Keyboard shortcuts

j previous speech k next speech