So we adopt an “assume breach” mentality, which means we also work with AI companies that are narrowly focused. They simulate the red teams, the attackers. Basically we just get their software, install it in a staging area, and start synthesizing zero days attacks, synthesizing lateral movement, just emulate a red team hacker. And that kind of technology is already on the shelf, amazingly.

Keyboard shortcuts

j previous speech k next speech