The Reasoning Show

Using AI Reasoning to Prevent AI Scams

Massive Studios

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 34:00

Alan Lefort (CEO, @StrongestLayer) discusses how LLM-powered reasoning is transforming phishing security from reactive pattern-matching to predictive threat detection, and why traditional rule-based systems can no longer defend against sophisticated AI-generated phishing attacks.

SHOW: 965

SHOW TRANSCRIPT: The Cloudcast #965 Transcript

SHOW VIDEO: https://youtube.com/@TheCloudcastNET 

CLOUD NEWS OF THE WEEK: http://bit.ly/cloudcast-cnotw

NEW TO CLOUD? CHECK OUT OUR OTHER PODCAST: "CLOUDCAST BASICS"

SPONSORS:

  • [Interconnected] Interconnected is a new series from Equinix diving into the infrastructure that keeps our digital world running. With expert guests and real-world insights, we explore the systems driving AI, automation, quantum, and more. Just search “Interconnected by Equinix”.
  • [TestKube] TestKube is Kubernetes-native testing platform, orchestrating all your test tools, environments, and pipelines into scalable workflows empowering Continuous Testing. Check it out at TestKube.io/cloudcast

SHOW NOTES:

Topic 1 - Welcome to the show Alan. Tell us about your background and your involvement in Cybersecuity.

Topic 2 - Let's start with the core challenge. You've said that "if only AI can defend against weaponized AI" - what specific gap in traditional email security did you identify that led to this philosophy? How are AI-powered phishing attacks fundamentally different from what we've seen before?

Topic 3 - How does this attack vector demonstrate the limitations of rule-based security systems, and why can't traditional pattern matching keep up?

Topic 4 - Let's break down your TRACE (Threat Reasoning and AI Correlation Engine) architecture. You've described it as "LLM-as-master" rather than "LLM-as-add-on." What does this fundamental architectural difference mean for threat detection, and how does it help?

Topic 5 - You discuss "pre-campaign detection," which involves identifying potential phishing campaigns weeks before emails are sent. This sounds like moving from reactive to predictive security. How does your system correlate technical intelligence with business context to achieve this early warning capability?

Topic 6 - From an implementation standpoint, how do organizations integrate LLM-powered reasoning into their existing security stacks? What's the deployment model, and how do you handle the challenge of reasoning about business context without exposing sensitive organizational data?


FEEDBACK?

FEEDBACK?

Podcasts we love

Check out these other fine podcasts recommended by us, not an algorithm.

Software Defined Talk Artwork

Software Defined Talk

Software Defined Talk LLC
Dithering Preview Artwork

Dithering Preview

Ben Thompson and John Gruber
Prof G Markets Artwork

Prof G Markets

Vox Media Podcast Network
Acquired Artwork

Acquired

Ben Gilbert and David Rosenthal
theCUBE Artwork

theCUBE

SiliconANGLE, Media
The Artificial Intelligence Show Artwork

The Artificial Intelligence Show

Paul Roetzer and Mike Kaput