On the other hand, the great thing about making or tuning our own model is that we can include by default ways of good practices, especially around governmental agencies that do follow the cybersecurity rules. So then exactly the same threat indicator and reporting and red teaming and white hat, I mean all these terms came from the cybersecurity world anyway, can then be repurposed to surface as we did for foreign information meddling and manipulation and so on, or scamming or whatever. We reuse the same threat indicator world of cybersecurity, even the same cross-national agreements to surface that sort of harm. So, as long as data comes in that format, we have the capability of ringing the alarm bells of the world.

Keyboard shortcuts

j previous speech k next speech