But This One Might Be Real
11:30–12:49 · 79s
After criticizing past tactics, Sacks concedes the cyber risk case around Mythos looks legitimate as coding models logically improve at finding and chaining exploits.
11:30–12:49 · 79s
After criticizing past tactics, Sacks concedes the cyber risk case around Mythos looks legitimate as coding models logically improve at finding and chaining exploits.
We use cookies to understand how you use our platform and to improve your experience. Click "Accept All" to consent, or "Decline non-essential" to opt out of non-essential cookies. Read our Privacy Policy.