I can still hardly believe that the tech industry at large just decided to broadly roll out LLM integration into essentially every element of their businesses, having just no idea what they actually do.
Like 2 years ago now, I was figuratively pulling my hair out, reading the discussion panel schedule for Microsoft led conferences on LLMs and cybersecurity.
Literally every topic was a different kind of way that smashing an LLM into a complex business system… increases potential failure points, broadens attack surfaces… because networked LLMs literally are security vulnerabilities.
Not a single topic about how to use LLMs defensively, how to use them to turbocharge malware signature recognition, nothing like that.
All just a bunch of ‘make sure you don’t do this!’ warnings, and then everyone did them anyway.
Ah interesting. More along the line of those ML-based intrusion detection products.
I can still hardly believe that the tech industry at large just decided to broadly roll out LLM integration into essentially every element of their businesses, having just no idea what they actually do.
Like 2 years ago now, I was figuratively pulling my hair out, reading the discussion panel schedule for Microsoft led conferences on LLMs and cybersecurity.
Literally every topic was a different kind of way that smashing an LLM into a complex business system… increases potential failure points, broadens attack surfaces… because networked LLMs literally are security vulnerabilities.
Not a single topic about how to use LLMs defensively, how to use them to turbocharge malware signature recognition, nothing like that.
All just a bunch of ‘make sure you don’t do this!’ warnings, and then everyone did them anyway.