Intelligence analysts need to be especially cautious about artificial intelligence “hallucinations” or other false outputs, said the CIA’s Chief Technology Officer — but AI can also generate genuinely useful insights out of left field.
By Sydney J. Freedberg Jr.“I have a mantra of ‘I want to kill to the [Common Access Card] as the primary authentication mechanism for the department’,” Lt. Gen. Robert Skinner said. “Industry has better authentication, and it’s not just two-factor, it’s truly multi-factor authentication.”
By Brad D. Williams“The average time it takes to discover a data breach is about six months,” said Hickey, a deputy assistant attorney general at the Justice Department specializing in cybersecurity and China. By the time you realize you’ve been hacked, it’s too late to “hack back” and shut down your attacker.
By Sydney J. Freedberg Jr.“How do I even know what’s normal and what’s abnormal so I can detect anomalies? We simply don’t know,” says Dean Souleles, chief technology advisor for the Director of National Intelligence.
By Sydney J. Freedberg Jr.