Deconstructing Vendor AI Exaggerations - ThreatWarrior

Deconstructing Vendor AI Exaggerations

by

Artificial intelligence and machine learning are guiding research, accelerating product development, improving security and more across numerous industries including our nation’s most critical infrastructures. However, many vendors camouflage true capabilities through deceptive, sales-focused language and confusing hyperbole.

Many management teams are already confused by cybersecurity and struggle with the best way to implement new technologies. That is compounded by adding AI to the mix, with myriad vendors making all sorts of promises. Plus, plenty of studies and surveys show that decision makers think implementing AI is important, but don’t really understand how to do so.

Personally, I’ve talked to leaders who’ve evaluated multiple vendors and said that, even after sales pitches and demos, they still weren’t sure how the solution was going to deliver on what they were promised. That doesn’t sit well with me.

A lot of people aren’t aware how vastly different AI and machine learning technologies can be. For example, ThreatWarrior utilizes unsupervised neural networks for cyber defense, which is a more advanced, sophisticated method than antiquated techniques found in many solutions making outlandish promises about their AI capabilities.

Exaggerating capabilities in this regard is a dangerous and alarming trend, especially when looked at through the lens of national security and critical infrastructure resiliency. That’s why I’ve teamed up with the Institute for Critical Infrastructure Technology (ICIT) and other cybersecurity leaders to share first-hand knowledge and insights with the community.

ICIT’s Bright Minds Q&A
In continued support of its mission to cultivate a cybersecurity renaissance that will improve the resiliency of our nation’s 16 critical infrastructure sectors, defend our democratic institutions, and empower generations of cybersecurity leaders, the Institute for Critical Infrastructure Technology holds candid interviews with their Fellows — leaders in cybersecurity, national security and technology. They call these interviews Bright Minds Q&A’s.

In this Bright Minds Q&A, I chat with ICIT to help dispel some myths and deconstruct the problematic and often misleading language used to promote AI solutions. We cover:

  • Warning signs that indicate when a vendor may be disingenuous 
  • What artificial intelligence is exactly, and the differences between other advanced technologies like machine learning and deep learning
  • What to ask when evaluating AI security platforms
  • ThreatWarrior’s use of unsupervised deep neural networks

To learn more, head over to ICIT and download the full essay here.

While you’re there, check out all the great resources and research from ICIT and other cybersecurity leaders. We’re all working together to facilitate learning and educate key stakeholders to improve our public sector, private sector and national cybersecurity resiliency.

Related Insights