63 subscribers
با برنامه Player FM !
پادکست هایی که ارزش شنیدن دارند
حمایت شده


Deepfakes—What Can Really Be Done Today?
Manage episode 241042220 series 1264075
Rotem Guttman and Zach Kurtz explain what deepfakes are, how they work, and what kind of content it’s possible to create with current techniques and technology. The term “deepfake” refers to the use of machine learning to produce content for essays or to modify photos and videos. When it comes to photos and videos, the images are often so realistic that viewers are not able to tell that they are fake. In this Cyber Talk episode, Rotem Guttman and Zach Kurtz explain the kinds of machine learning that people use to create deepfakes, how they work, and what kind of content it’s possible to produce with current technology. Rotem and Zach also cover the techniques people use to create fraudulent content. Such techniques include using an actor to film a video and then replacing the actor’s face with someone else’s, as well as more advanced methods that can reproduce a person’s body movements, voice, speech, and facial expressions to make that person appear to say or do something that he or she did not actually say or do. Finally, they discuss the current limitations of these technologies and techniques, and they forecast advances that might occur in the coming years.
167 قسمت
Manage episode 241042220 series 1264075
Rotem Guttman and Zach Kurtz explain what deepfakes are, how they work, and what kind of content it’s possible to create with current techniques and technology. The term “deepfake” refers to the use of machine learning to produce content for essays or to modify photos and videos. When it comes to photos and videos, the images are often so realistic that viewers are not able to tell that they are fake. In this Cyber Talk episode, Rotem Guttman and Zach Kurtz explain the kinds of machine learning that people use to create deepfakes, how they work, and what kind of content it’s possible to produce with current technology. Rotem and Zach also cover the techniques people use to create fraudulent content. Such techniques include using an actor to film a video and then replacing the actor’s face with someone else’s, as well as more advanced methods that can reproduce a person’s body movements, voice, speech, and facial expressions to make that person appear to say or do something that he or she did not actually say or do. Finally, they discuss the current limitations of these technologies and techniques, and they forecast advances that might occur in the coming years.
167 قسمت
همه قسمت ها
×
1 DevSecOps: See, Use, Succeed 1:00:41

1 An Introduction to the MLOps Tool Evaluation Rubric 1:00:23



1 A New Performance Zone for Software for National Security 1:02:23









1 Independent Verification and Validation for Agile Projects 1:02:23

1 Generative AI and Software Engineering Education 1:02:05


1 Using a Scenario to Reason About Implementing a Zero Trust Strategy 1:02:22


1 The Future of Software Engineering and Acquisition with Generative AI 1:32:10


1 Ask Us Anything: Generative AI Edition 1:30:37

1 Evaluating Trustworthiness of AI Systems 1:02:08

1 Leveraging Software Bill of Materials Practices for Risk Reduction 1:02:03



1 Top 5 Challenges to Overcome on Your DevSecOps Journey 1:00:36

1 Improving Analytics Using Enriched Network Flow Data 1:02:25

1 How Can Data Science Solve Cybersecurity Challenges? 1:00:01

1 AI Next Generation Architecture 1:01:44

1 Addressing Supply Chain Risk and Resilience for Software-Reliant Systems 1:01:31


1 Finding Your Way with Software Engineering Buzzwords 1:01:38




1 Exploring an AI Engineering Body of Knowledge 1:02:21

1 What are Deepfakes, and How Can We Detect Them? 1:00:00

1 Adapting Agile and DevSecOps to Improve Non-Software Development Teams 1:03:07


1 Ask Us Anything: Zero Trust Edition 1:02:27





1 The Future of AI: Scaling AI Through AI Engineering 1:01:59

1 AI Engineering: Ask Us Anything About Building AI Better 1:04:47

1 Balanced Approaches to Insider Risk Management 1:00:53

1 Software Development Open Forum: Ask Hasan Anything! 1:03:02

1 Software Supply Chain Concerns for DevSecOps Programs 1:03:47

1 How Do We Teach Cybersecurity? 1:00:17

1 Software Supply Chain Concerns for DevSecOps Programs 1:01:06

1 Announcing IEEE 2675 DevOps Standard to Build Reliable and Secure Systems 1:03:29

1 AI Engineering: The National Initiative for Human-Centered, Robust and Secure, and Scalable AI 1:02:20

1 Amplifying Your Privacy Program: Strategies for Success 1:01:06

1 DevOps Enables Digital Engineering 1:00:44


1 SolarWinds Hack: Fallout, Recovery, and Prevention 1:01:18

1 Software Engineering for Machine Learning 1:03:11


1 What Is Cybersecurity Engineering and Why Do I Need It? 1:02:05

1 Threats for Machine Learning 1:01:23


1 Risk Management for the Enterprise–How Do You Get Executives to Care About Your Risks? 1:01:50

1 Quality Attribute Concerns for Microservices at the Edge 1:01:34



1 Solving Current Cyber Challenges: Academic and Industry Collaboration 1:02:33


1 A Discussion on DoD Software Advances and What’s Next from SEI 1:00:31

1 Top 5 Considerations Before Boarding the Container Ship 1:04:32

1 Trust, Verify & Authorize with DevSecOps 1:02:20





1 Becoming a Better Software Architect 1:02:01


1 Cyber Hygiene: Why the Fundamentals Matter 1:02:13

1 Insider Threats: Your Questions. Our Answers. 1:00:27






1 DevSecOps Implementation in the DoD: Barriers and Enablers 1:01:29

1 What Makes a Good Software Architect (2019 Edition)? 1:01:00

1 Helping You Reach the Next Level of Security - 6 Free Tools for Creating a Cyber Simulator 1:02:12

1 Improve Your Static Analysis Audits Using CERT SCALe 1:00:53

1 Blockchain: Your Questions. Our Answers. 1:01:26




1 How to Build an Effective Insider Threat Program to Comply With the New NISPOM Mandate 1:04:38





1 Next Steps with Blockchain Technology 1:01:26

1 Five Ways to Boost Cybersecurity with DevOps 1:06:13

1 Three Software Innovations that DoD Needs Now 1:02:47


1 Weaving a Fabric of Trust: Ensured Security, Privacy, Resilience, and Accountability 1:06:07

1 Is Software Spoiling Us? 1:00:56


1 Three Secrets to Successful Agile Metrics 1:24:16

1 Five Keys to Effective Agile Test Automation for Government Programs 1:29:54

1 The Evolving Role of the Chief Risk Officer 1:04:55

1 Practical Considerations in Adopting Agile-Lean in Government Settings 1:01:12



1 Building and Scaling a Malware Analysis System 1:02:28

1 How to Reduce the Graveyard of Software Tools with UI/UX Capability 1:04:57

1 From Secure Coding to Secure Software 1:04:20

1 Data Science: What It Is and How It Can Help Your Company 1:01:53

1 What Makes a Good Software Architect? 1:29:02

1 Intelligence Preparation for Operational Resilience 1:00:58

1 Structuring the Chief Information Security Officer Organization 1:02:52

1 Context Enabled Computing 1:01:36

1 Using Network Flow to Gain Cyber Situational Awareness 1:00:14

1 DevOps Security: Ignore It As Much As You Would Ignore Regular Security 1:03:47

1 A Taxonomy of Testing Types 1:03:59






1 Culture Shock: Unlocking DevOps with Collaboration and Communication 1:02:49




1 Advancing Cyber Intelligence Practices Through the SEI's Consortium 1:00:59


1 Lessons in External Dependency and Supply Chain Risk Management 1:27:53


1 Architecture Analysis with AADL 1:03:05


1 Heartbleed: Analysis, Thoughts, and Actions 1:31:52






1 Responding to a Large-Scale Cybersecurity Incident 1:01:46


به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.