This Locale cover art

All Episodes

This Locale — 65 episodes

#
Title
1

Foundations of AI & Cybersecurity - Lesson 47: Use Cases for Using Al-Enabled Tools to Facilitate Security Tasks

2

Foundations of AI & Cybersecurity - Lesson 44: Using Al-Enabled Tools to Facilitate Security Tasks

3

Foundations of AI & Cybersecurity - Lesson 43: Applying Compensating Controls

4

Foundations of AI & Cybersecurity - Lesson 42: Scenario for Determining Root Cause and Evidence Strength

5

Foundations of AI & Cybersecurity - Lesson 41: Determining Root Cause and Evidence Strength

6

Foundations of AI & Cybersecurity - Lesson 40: Scenario for Identifying Direct Model-Targeted Attacks

7

Foundations of AI & Cybersecurity - Lesson 39: Identifying Direct Model-Targeted Attacks

8

Foundations of AI & Cybersecurity - Lesson 38: Scenario on Analyzing the Attack Surface,& Classify the Attack Type

9

Foundations of AI & Cybersecurity - Lesson 37: Analyzing the Attack Surface & Classify the Attack Type

10

Foundations of AI & Cybersecurity - Lesson 36: Scenario on Identifying the Attack Indicators

11

Foundations of AI & Cybersecurity - Lesson 35: Identifying the Attack Indicators

12

Foundations of AI & Cybersecurity - Lesson 34: Scenario on Auditing Model Output for Risks

13

Foundations of AI & Cybersecurity - Lesson 33: Audit Model Output for Risks

14

Foundations of AI & Cybersecurity - Lesson 32: Scenario on Analyzing Model Behavior

15

Foundations of AI & Cybersecurity - Lesson 31: Analyze Model Behavior

16

Foundations of AI & Cybersecurity - Lesson 30: Scenario on Generating and Processing Logs

17

Foundations of AI & Cybersecurity - Lesson 29: Generate & Process Logs

18

Foundations of AI & Cybersecurity - Lesson 28: Scenario on Capture & Observe AI Activity

19

Foundations of AI & Cybersecurity - Lesson 27: Monitoring and Auditing AI systems - Capture & Observe AI Activity

20

Foundations of AI & Cybersecurity - Lesson 26: Scenario on Data Safety

21

Foundations of AI & Cybersecurity - Lesson 25: Data Safety

22

Foundations of AI & Cybersecurity - Lesson 24: Scenario Using Encryption Requirements

23

Foundations of AI & Cybersecurity - Lesson 23: Encryption requirements

24

Foundations of AI & Cybersecurity - Lesson 22: Scenario Implementing Appropriate Access controls for an AI System

25

Foundations of AI & Cybersecurity - Lesson 21: Building Secure AI - Requirements Phase with API Gateway Security and Interaction Controls

26

Foundations of AI & Cybersecurity - Lesson 20: Building Secure AI - Requirements Phase - Using Guardrail Assurance, Testing, and Validation

27

Foundations of AI & Cybersecurity - Lesson 19: Building Secure AI - Requirements Phase - Implementing Model-Level Security and Control Design

28

Foundations of AI & Cybersecurity - Lesson 18: Scenario using AI threat-modeling resources

29

Foundations of AI & Cybersecurity - Lesson 17: Explaining AI threat-modeling resources

30

Foundations of AI & Cybersecurity - Lesson 16: Bad Actors’ Use of AI in Cyber Attacks

31

Foundations of AI & Cybersecurity - Lesson 15: Secure Feedback, Audit, and Continuous Improvement

32

Foundations of AI & Cybersecurity - Lesson 14: Secure Deployment and Operational Defense

33

Foundations of AI & Cybersecurity - Lesson 13: Secure Model Engineering and Risk Controls

34

Foundations of AI & Cybersecurity - Lesson 12: Secure and Trusted Data Foundations

35

Foundations of AI & Cybersecurity - Lesson 11: Secure AI Strategy and Governance

36

Foundations of AI & Cybersecurity - Lesson 10: Retrieval Augmented Generation (RAG) - Vector Storage and Embeddings

37

Foundations of AI & Cybersecurity - Lesson 9: Model Output Watermarking and Model Parameter Watermarking

38

Foundations of AI & Cybersecurity - Lesson 8: Data Types - Structured, Semi Structured, Unstructured Data

39

Foundations of AI & Cybersecurity - Lesson 7: Module/Chapter Data Processing - Enhancement Processes with Data Augmentation, Data Balancing

40

Foundations of AI & Cybersecurity - Lesson 6: Module/Chapter 1.2.2 Data Processing - Traceability & Governance with Data Lineage, Data Provenance, and Data Governance

41

Foundations of AI & Cybersecurity - Lesson 5: Module/Chapter 1.2.1 Data Processing - Quality Assurance with Data Cleansing, Data Verification, Data Integrity

42

Foundations of AI & Cybersecurity - Lesson 4: Module/Chapter 1.1.4 Generative AI (Cross-Domain Content Creation)

43

Foundations of AI & Cybersecurity - Lesson 3: Module/Chapter 1.1.3 Language-Focused AI Systems (NLP Models)

44

Foundations of AI & Cybersecurity - Lesson 2: Module/Chapter Deep Learning & Neural Network Architectures (Modern AI Backbone)

45

Foundations of AI & Cybersecurity - Lesson 1 - Module/Chapter 1.1.1 Core Learning Paradigms (Foundational Categories)

46

The 2026 Pivot

47

November 2025 Beige Book: Proof that AI Is Replacing Workers, But Who Will Replace the Consumers?

48

The State of AI 2025 Report

49

The Rise of the Agentic Internet – pains and opportunities

50

Prosper or Peril: Restructuring the Global Trading System and the Future of the Fed

51

The Transformative Potential of AI in Higher Education

52

Post Labor Economics Part 2 - Rethinking Prosperity in an AI Dominated World Without Work

53

America’s AI Action Plan: Grand Vision Meets Ground Reality

54

Tariffs, Tech, and Hesitation - America’s Economy Is Treading Water

55

Preventing AI Catastrophe - The Hidden Risk Behind AI’s Breakneck Progress: Misaligned Power

56

Post Labor Economics - What If Owning Things, Not Working Jobs, Became the Way People Make Money?

57

AI Is Evolving Faster Than Markets Can Absorb - What Happens Next?

58

May 2025 Beige Book Review

59

AI Search is Not the Future It's the New Present

60

Current Business Economic Climate May 2025 - Better than what's being reported

61

April 2025 Beige Book Review

62

AI 2027 - Part 2 - Alternate Future Scenarios of Intelligence Emergence

63

AI 2027 - Part 1 - Future Scenario of Superintelligence Summary

64

WEF Global Risks Report 2025

65

2025 Tech Trends Report