Remove articles where-does-cybersecurity-go-from-here
article thumbnail

AI’s ‘SolarWinds Moment’ Will Occur; It’s Just a Matter of When

O'Reilly

Cybersecurity itself was considered an esoteric backroom technology problem until we learned of the Equifax breach, the Colonial Pipeline ransomware attack, Log4j vulnerability, and the massive SolarWinds hack. We didn’t really care about cybersecurity until events forced us to pay attention.

article thumbnail

AI Powered Misinformation and Manipulation at Scale #GPT-3

O'Reilly

Open source projects such as EleutherAI have drawn inspiration from GPT-3. Projects such as EleutherAI are going to be powerful models for specific use cases and audiences, and these models are going to be easier to produce because they are trained on a smaller set of data than GPT-3. Among other things.

article thumbnail

What Are ChatGPT and Its Friends?

O'Reilly

What is it, how does it work, what can it do, and what are the risks of using it? Many of these go slightly (but not very far) beyond your initial expectations: you can ask it to generate a list of terms for search engine optimization, you can ask it to generate a reading list on topics that you’re interested in. How Does It Work?

Google 104