We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions
cover of episode EP 182: AI Efficiencies in Cyber - A Double Edged Sword

EP 182: AI Efficiencies in Cyber - A Double Edged Sword

2024/1/10
logo of podcast Everyday AI Podcast – An AI and ChatGPT Podcast

Everyday AI Podcast – An AI and ChatGPT Podcast

Shownotes Transcript

Send Everyday AI and Jordan a text message)

There's a constant battle happening with cyber security and GenAI. While AI can benefit the evolution of cyber, it also can be a double-edged sword. Glen Pendley, Chief Technology Officer at Tenable, joins us to discuss GenAI's impact on cyber security.

Newsletter: Sign up for our free daily newsletter)**More on this Episode: **Episode Page)**Join the discussion: **Ask Jordan and Glen questions on GenAI and cyber)Upcoming Episodes: Check out the upcoming Everyday AI Livestream lineup)Website: YourEverydayAI.com)Email The Show: [email protected])**Connect with Jordan on **LinkedIn)**Timestamps:**01:45 Daily AI news04:45 About Glen and Tenable08:06 Attackers are opportunistic, protect yourself proactively.12:12 Chrome vulnerability CVE-2023 poses significant threat.14:06 AI expedites data mining for cyber threats.20:13 AI tools enhance security features for software.22:14 Keep software updated and limit user access.25:17 Preventative security is crucial, don't overlook basics.29:13 Previewing GPT store launch & daily AI updates.**Topics Covered in This Episode:1. Tenable and Its Role in Cybersecurity2. Impact of Generative AI on Cybersecurity3.  Role of Public and Private Sectors in Cybersecurity4. Phishing Attacks and Cyber Hygiene Practices5. Personal Cybersecurity Best PracticesKeywords:**OpenAI, ChatGPT Enterprise, Pennsylvania, Amazon, Alexa skills, artificial intelligence, historical figures, custom songs, Rabbit, Rabbit R1, generative AI, cybersecurity, Tenable, vulnerabilities, proactive security measures, public sector, private sector, small businesses, AI devices, deep fake technology, GPT, GPT store, CISA, phishing attacks, ransomware, cyber hygiene, end users, evolving threat landscape.