Wild Dog AI Podcast

By: Indago Technologies
  • Summary

  • A podcast that follows the evolution of intelligence and security with the precision and agility of the African wild dog, a hunter with a 92% success rate. Hosted by Buddy Jericho, Founder and CEO of Indago Technologies. Discover how advanced AI is influencing the security and intelligence industries, sharing insights from top experts, success stories from the frontlines of security operations, and in-depth exploration of new AI benchmarks for what can be achieved.

    © 2024 Wild Dog AI Podcast
    Show More Show Less
Episodes
  • Exploring OSINT: Tailwinds and Headwinds
    Aug 26 2024

    Summary

    In this episode of the Wild Dog AI podcast, Buddy Jericho interviews Chris Poulter and Jane van Tienen from OSINT Combine about the upcoming Australian OSINT Symposium. They discuss the evolution of OSINT, the role of emerging technologies, and the social responsibility of OSINT technologies. They also talk about the growth of the Symposium and the importance of networking and engagement. Chris Poulter shares his excitement about exploring the integration of AI into OSINT and the challenges and opportunities it presents. They also touch on the importance of methodology and the use of retrieval augmentation (RAG) in OSINT. The conversation explores the value of OSINT and the development of technologies like RAGs. The speakers discuss the significance of refining models and the low barrier to entry in using OSINT. They also touch on the ethical challenges of emerging technologies and the importance of international participation in the OSINT community. The OSINT Symposium is described as a learning and networking opportunity with a focus on OSINT tailwinds. The event includes keynote speeches, panel discussions, case studies, and opportunities for interaction and collaboration. The virtual training day is also highlighted as an opportunity to gain practical skills in OSINT.


    Thank you for tuning into the Wild Dog AI podcast. Stay connected with the frontier of intelligence and security by subscribing to our podcast on your favorite platform. Engage with us on LinkedIn HERE, and join the conversation by sharing your thoughts and questions. Together, let's lead the pack in understanding and leveraging the power of generative AI.

    For more insights and episodes, visit us at Wild Dog AI Podcast. Continue the journey of innovation with us-because in the race against adversarial technologies, every insight counts.

    Interested in seeing Indago in action? Visit us at indagotech.com and sign up for a free demo today. Discover how our platform can transform your intelligence report process.

    Don't forget to follow us, rate us, and leave a review. Your feedback helps us grow and improve, bringing you more of the content you need to stay ahead.

    Show More Show Less
    50 mins
  • Navigating the Grey: Unpacking Source Validation Challenges
    Aug 12 2024

    Summary

    In this episode, Senior Analyst Heather Perez discusses the importance of source validation in the age of artificial intelligence (AI). She emphasizes the need for analysts to be able to defend their assessments and validate the data they provide. Heather also highlights the limitations of AI models and the importance of human expertise in interpreting and validating the information generated by these models. She suggests that analysts should use AI as a tool to enhance their workflow, but not rely solely on it. Additionally, she discusses the challenges of validating sources in the AI era and the potential risks of misinformation. Heather also mentions the efforts being made to improve source transparency and the need for ethical frameworks and policies in AI development.

    Takeaways

    • Source validation is crucial in ensuring the accuracy and reliability of data used in AI models.
    • Analysts should be able to defend their assessments and validate the data they provide to make informed decisions.
    • AI should be used as a tool to enhance workflow, but human expertise is still essential in interpreting and validating information.
    • Validating sources in the AI era can be challenging due to the vast amount of data and the potential for misinformation.
    • Efforts are being made to improve source transparency and develop ethical frameworks in AI development.

    Chapters

    00:00 Welcome
    02:42 Understanding the Role of Language Models in Synthesizing Information
    06:13 Using AI as a Tool: Collecting and Validating Data
    09:32 Challenges of Tracking AI Data Sources
    10:00 The Implications of Misinformation in the Age of AI
    23:02 Enhancing Source Transparency
    27:10 The Role of Fact Checkers
    31:23 The Need for Ethical Frameworks
    35:10 Layering Models to Improve Accuracy




    Thank you for tuning into the Wild Dog AI podcast. Stay connected with the frontier of intelligence and security by subscribing to our podcast on your favorite platform. Engage with us on LinkedIn HERE, and join the conversation by sharing your thoughts and questions. Together, let's lead the pack in understanding and leveraging the power of generative AI.

    For more insights and episodes, visit us at Wild Dog AI Podcast. Continue the journey of innovation with us-because in the race against adversarial technologies, every insight counts.

    Interested in seeing Indago in action? Visit us at indagotech.com and sign up for a free demo today. Discover how our platform can transform your intelligence report process.

    Don't forget to follow us, rate us, and leave a review. Your feedback helps us grow and improve, bringing you more of the content you need to stay ahead.

    Show More Show Less
    41 mins
  • AI and Counterintelligence: Protecting National Interests with Smart Solutions
    Aug 5 2024

    Summary

    Jeremy Clark and Scott Sparks, co-founders of IXN Solutions, discuss the importance of counterintelligence (CI) and insider threat programs in protecting businesses and national security. They highlight the case of Lin Wai Ding, a former Google employee who sold proprietary information to China, as an example of the serious threats faced by technology companies. The conversation emphasizes the need for coordination between government and corporate entities to address these threats. Jeremy and Scott also stress the importance of building a comprehensive insider threat program that includes both technological solutions and employee engagement and education. In this conversation, Jeremy Clark and Scott Sparks discuss the importance of building an insider threat program for small and medium-sized technology companies. They provide six steps to building such a program, including understanding your supply chain, outsourcing research, and implementing a training program. They also emphasize the need for small businesses to protect against hiring foreign nationals and the importance of leveraging AI and generative AI in supply chain security and counterintelligence efforts.

    Takeaways

    • Counterintelligence and insider threat programs are crucial for protecting businesses and national security.
    • Coordination between government and corporate entities is essential in addressing insider threats.
    • Technology companies, especially those working with the government, need to prioritize the protection of their proprietary information.
    • Building a comprehensive insider threat program involves both technological solutions and employee engagement and education.
    • Considering the supply chain and ensuring the security of materials and components is vital in developing secure technologies. Small and medium-sized technology companies should prioritize building an insider threat program to protect against potential security breaches.
    • Six steps to building an insider threat program include understanding your supply chain, outsourcing research, and implementing a training program.
    • Small businesses should be cautious when hiring foreign nationals and conduct due diligence to ensure their security.
    • AI and generative AI can greatly enhance supply chain security and counterintelligence efforts by quickly categorizing and analyzing large volumes of data.
    • Technologies like Logically AI, Flashpoint, and LexisNexis can be leveraged to aid in building insider threat programs.
    • The cost of building these programs is decreasing, making it more accessible for small businesses to implement effective security measures.





    Thank you for tuning into the Wild Dog AI podcast. Stay connected with the frontier of intelligence and security by subscribing to our podcast on your favorite platform. Engage with us on LinkedIn HERE, and join the conversation by sharing your thoughts and questions. Together, let's lead the pack in understanding and leveraging the power of generative AI.

    For more insights and episodes, visit us at Wild Dog AI Podcast. Continue the journey of innovation with us-because in the race against adversarial technologies, every insight counts.

    Interested in seeing Indago in action? Visit us at indagotech.com and sign up for a free demo today. Discover how our platform can transform your intelligence report process.

    Don't forget to follow us, rate us, and leave a review. Your feedback helps us grow and improve, bringing you more of the content you need to stay ahead.

    Show More Show Less
    46 mins

What listeners say about Wild Dog AI Podcast

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.