I agree that these reports should be verifiable and provide more details about the method and how to protect your own network. Even more so if they want to be heard by serious security teams.
However, regardless of the sloppy report, this is absolutely true.
>"Security teams should experiment with applying AI for defense in areas like SOC automation, threat detection, vulnerability assessment, and incident response and build experience with what works in their specific environments."
... And it will be more so with every week that goes by. We are entering a new domain and security experts need to learn how to use the tools of the attackers.
The idea of a possible new AI winter to come seems less likely with each new announcement. Robust world models can be used as an effectively infinite source of training data.
> "non-copilot form factors that more directly extend the human mind."
I think Cursor's tab completion and next edit prediction roughly fits the pattern, you don't chat, you don't ask or explain, you just do... And the more in coherent your actions are the more useful the HUB becomes.
I got Neuromancer as a birthday gift earlier this year. I found it simultaneously very captivating but requiring a lot of effort to read through the dense terminology and try to accurately form a picture of what Gibson was trying to convey. Sadly I couldn't finish it since its the type of book that, if you stop reading for a week or longer, you'll have to start from the beginning.
This post gave me more appreciation of Gibson's impact and a boost to pick it up somewhen later in the year.
However, regardless of the sloppy report, this is absolutely true.
>"Security teams should experiment with applying AI for defense in areas like SOC automation, threat detection, vulnerability assessment, and incident response and build experience with what works in their specific environments."
... And it will be more so with every week that goes by. We are entering a new domain and security experts need to learn how to use the tools of the attackers.