Rudy Guyonneau
Rudy Guyonneau
AI & Cybersecurity

Cybersecurity playlist :
AI & Cybersecurity – Rudy Guyonneau

November 6, 2024

Igorrr - Downgrade desert

▶️ Bio your way, with a dash of cybersecurity.

I discovered cyber late in life, and very quickly asked myself how I’d missed out on it for so long.

Fortunately, I was welcomed by people who were passionate about it, often good people, and sometimes overwhelmed, to whom I was able to bring a scientific methodology acquired in the labs.

Since then, I’ve been trying to embrace cyber forms to realise the promise of a well-tempered AI.

 

▶️ What makes you want to get involved in cybersecurity every day?

That it matters, beyond the figures, and that I have the modest means to contribute to it.

Because the Defence dimension has given me a real reason to develop AI.

 

▶️ Which song have you chosen, with a direct or subtle link to cybersecurity?

‘Downgrade desert’ by Igorrr.

 

▶️ What brings this song and cybersecurity closer together.

Because cybersecurity is a counterpoint.
I could have chosen ‘L’ombre sur la mesure’, just for that very cybersecurity line:
‘je suis l’ombre sur la mesure et je sature’.

But from Bashung (the height) to La Rumeur (the anti-comfort), via Lofofora (the energy), Stupeflip (the madness), Barbara (the execution), or Deathspell Omega (the shock), it’s hard to identify the right French song related with cybersecurity.

The field is so broad, polymorphous and intellectually difficult to grasp without (cognitive) support.

So here’s a French cyber song, by one of those geniuses we regularly produce, only to ignore them while they’re still alive,

A beautiful, technical and strange song,

Connected punk, a bit crazy, definitely avant-garde, and like everything else in cybersecurity, heavily encrypted.

Open only to those who invest themselves in it
To those who pursue
Open-mindedness,
Diligence and
Excellence.

 

📢 Glossary: AI & Cybersecurity

Artificial intelligence is a powerful technology that can improve cyber security by detecting, preventing and responding to cybercriminal threats.

However, we have to consider the limitations and challenges associated with its use to ensure effective and ethical cyber security.

Techniques and approaches:

Machine learning: machine learning algorithms are trained to detect patterns of malicious behaviour and anomalies.

Neural networks: artificial neural networks are used to analyse security data and identify threats.

Behavioural analysis: AI analyses user and system behaviour to detect anomalous activity.

Integration with other technologies: AI is integrated with other cybersecurity technologies, such as network security systems, firewalls and intrusion detection systems.

Assess your company's cyber robustness.

With 1 overall score and 7 thematic scores,
find out where your strengths lie and where you need to improve, in just 5 minutes.

Your results are strictly confidential and will only be shared at your request.

Join the hundreds of cyber aficionados of the Propulsar Club .

The best cyber advice, use cases and self-assessments to help you improve your cyber skills or to benefit from the services of an expert CISO on a timeshare basis. Directly to your inbox.

You can unsubscribe at any time.
Guaranteed spam-free.

Related cyber musics

Casseurs Flowters - Si facile

Local Cybersecurity Consultant
Gaëtan Bourdillon

Mass Hysteria - Contraddiction

Head of Managed Detection & Response
Alexandre Cabrol Perales

Sidilarsen - On va tous crever

DevSecOps Architect
Bertrand Leclercq