Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Generative AI – the current state of play
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Generative AI – the current state of play
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Cybersecurity ExecutivesExpert OpinionsAI

Generative AI – the current state of play

Editorial Team
November 14, 2024 at 11:15 AM
By Editorial Team Editorial Team
Share
Mike Finley, the Co-Founder and CTO of AnswerRocket
SHARE
Mike Finley, the Co-Founder and CTO of AnswerRocket
Mike Finley, the Co-Founder and CTO of AnswerRocket

In an exclusive interview with Cyber Intelligence, Mike Finley, the Co-Founder and CTO of AnswerRocket, a business intelligence platform that deals with big data and AI agents, explains what generative AI can do for companies right now.

Cyber Intelligence: Where are we right now regarding the successful adoption of generative artificial intelligence (AI)?

Mike Finley: AI is changing faster than people are capable of understanding. So the general misunderstanding of what AI can do is going to be a lasting problem. The fact is that key scientists believe AI is now capable of improving itself, meaning we are at the start of a runaway path forward. At AnswerRocket, our basic DNA is artificial intelligence (AI) to enable business intelligence (BI). This obviously took a new direction with the widespread introduction of generative AI, but our basic approach remains the same.

Cyber Intelligence: How can small or medium-sized organizations take advantage of generative AI while avoiding the pitfalls of what is obviously a fairly nascent technology?

Mike Finley: One of the ways of adopting early forms of generative AI to even a relatively small organization’s benefit is to use what we call “evergreen” uses for AI that can benefit everyone in an organization. The best way to instigate AI is to start training AI models with examples of what your company wishes to achieve. This is a tremendous opportunity for SMEs.

Cyber Intelligence: Can you give a practical example of ways in which a medium-sized organization can use generative AI to its advantage right now?

Mike Finley: Microservices are a good example. For example, product returns are a microservice. Merely instigating chatbots is not really a workable strategy. If generative AI is to be genuinely useful then it must replace human decision-making at a simplistic level, such as product returns, but guardrails must be firmly in place for this to work effectively. If the company has a 90-day return policy, then AI can be instructed to follow this rule. There are also seemingly little things that AI is easily capable of doing right now that can make a tremendous difference in terms of streamlining time and resources. One obvious one is ensuring that pictures are in focus. For example, a dissatisfied customer may have uploaded a picture of a faulty product. AI can then inform the customer if the picture they have sent is in focus or not.

Cyber Intelligence: Are there any examples of ‘evergreen’ applications of generative AI today?

Mike Finley: The Oak Ridge National Laboratory in the US is already using drones to investigate incidents such as a power outage after a storm. Sending a human team could cost $1,500 per incident, whereas drones can perform the same checks for around $25. The key to being an efficient early adopter of generative AI is to start small but not slow.

Cyber Intelligence: Can you think of any more uses for generative AI that could be applied more generally?

Mike Finley: Computer programming is a key example. Using highly paid IT staff to carry out simple programming tasks is analogous to hiring a stone mason to carve gargoyles onto Notre Dame. Today, we would cast the whole lot in concrete. In a similar way, AI can already be used to carry out straightforward programming tasks.

Cyber Intelligence: What do think the new incoming US administration in Washington will mean for the rollout of generative AI in 2025? While the incoming president has proven business skills and political acumen, it seems that billionaire entrepreneur Elon Musk will be consulted regarding technological issues such as AI. How will this work in practice?

Mike Finley: I think it will be interesting to see how Musk’s AI offering, Grok, handles some of the challenges facing generative AI as I think it is set to be one of the strongest players.

Cyber Intelligence: What kind of challenges are those?

Mike Finley: There is a growing view that generative AI will have to teach itself how to be morally good in a human sense. The danger in telling it that some areas are bad and, therefore, off limits is that AI will become unduly curious about these off-limits hidden corners or knowledge. The new approach is that, by not teaching it to be good, it can learn to be good.

Cyber Intelligence: Thank you.

TAGGED: elon musk, answerrocket, exclusive cyber, Cybersecurity, exclusive interview, cyber espionage, ai vulnerability, artificial intelligence, business intelligence, generative ai, medium businesses, surveillance, drone technology, small business, machine learning
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article law enforcement impersonation Cybercriminals pose as law enforcement agencies
Next Article crypto pig butcher arrested Cryptocurrency Laundering Top Dog Arrested
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsSpyware

Spyware poses a growing threat

“Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware,” warns the Atlantic Council, a Washington, DC-based organization that promotes transatlantic cooperation and global economic prosperity. The number of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors, according to a report published by the Atlantic Council on September 10: Mythical Beasts: Diving into the depths of the global spyware market.

September 12, 2025
NewsCybergangs

Teenage hackers take down JLR

Carmaker Jaguar Land Rover (JLR) has shut down its systems after suffering a cyber-attack. The group claiming responsibility for the attack, The Com, also referred to as Scattered Spider, is a loosely affiliated online community of predominantly teenage English-speaking hackers based in the UK and the US.

September 5, 2025
NewsCyber EspionageGovernmentGeopolitics

Over half of cyber-attacks are state-sponsored

Over half of cyber-attacks exploiting known vulnerabilities are the work of state-sponsored groups from abroad, mainly from China. According to cybersecurity company Recorded Future’s research arm, Insikt Group, 53 percent of observed exploitation activity in the first half of this year was driven by state-sponsored and suspected state-sponsored actors and conducted for espionage, surveillance, or other geopolitical objectives.

September 2, 2025
SpywareNewsChinaCyber EspionageSurveillance

China is now spying on you

The Chinese government now has a vast storehouse of confidential information belonging to key industries and individuals in the US and UK and many other countries. According to an urgent joint cybersecurity advisory issued by the US National Security Agency (NSA) and other U.S. and foreign organizations, threat actors sponsored by the Chinese government, notably Salt Typhoon, have been consistently targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally.

August 29, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?