Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/db/d0/2f/dbd02fdd-6ea6-bd1c-fcf8-da098229893b/mza_13224427537637909281.jpg/600x600bb.jpg
CGI Voices, hosted by Pete Tseronis
CGI Federal
13 episodes
5 months ago
Artificial intelligence is rapidly spreading as its capabilities mature and organizations find innovative uses for it. It’s important to understand that AI comes in different forms, and carries with some unique risks. While those risks are manageable, agencies must be aware and ready to mitigate them. Moreover, AI isn’t a solution for everything. Success requires choosing use cases that are amenable to AI assistance—and knowing which ones are not. In this lively and information di...
Show more...
Technology
RSS
All content for CGI Voices, hosted by Pete Tseronis is the property of CGI Federal and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Artificial intelligence is rapidly spreading as its capabilities mature and organizations find innovative uses for it. It’s important to understand that AI comes in different forms, and carries with some unique risks. While those risks are manageable, agencies must be aware and ready to mitigate them. Moreover, AI isn’t a solution for everything. Success requires choosing use cases that are amenable to AI assistance—and knowing which ones are not. In this lively and information di...
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/db/d0/2f/dbd02fdd-6ea6-bd1c-fcf8-da098229893b/mza_13224427537637909281.jpg/600x600bb.jpg
Securing the forgotten risk vector: firmware
CGI Voices, hosted by Pete Tseronis
48 minutes
2 years ago
Securing the forgotten risk vector: firmware
Firmware is ubiquitous in any IT environment. The code—usually hardwired onto a microchip—bridges the hardware and software in any computer, including Internet of Things devices and other surprising places. Because it is hidden and because it can be difficult to update, many IT organizations pay little attention to developing cybersecurity strategies. That omission can be a costly mistake. CGI Vice President Chris Lavergne and Director Dave Crawford, both cybersecurity experts, join CGI...
CGI Voices, hosted by Pete Tseronis
Artificial intelligence is rapidly spreading as its capabilities mature and organizations find innovative uses for it. It’s important to understand that AI comes in different forms, and carries with some unique risks. While those risks are manageable, agencies must be aware and ready to mitigate them. Moreover, AI isn’t a solution for everything. Success requires choosing use cases that are amenable to AI assistance—and knowing which ones are not. In this lively and information di...