AGI-Pilled Cyber Defense: Automating Digital Forensics w/ Asymmetric Security Founder Alexis Carlier

| Podcasts | February 08, 2026 | 61.8 Thousand views | 1:18:49

TL;DR

Alexis Carlier, founder of Asymmetric Security, argues that assuming AGI arrives as infinitely scalable intelligent labor requires redesigning cybersecurity from reactive triage to proactive AI-driven digital forensics, leveraging the unique asymmetry that investigative expertise does not translate to hacking capability.

🧠 The AGI Security Paradigm 3 insights

Betting on the AGI assumption

Carlier structures Asymmetric Security around the premise that AGI constitutes near-infinite intelligent labor, making costly strategic bets that maximize value only if this assumption holds.

Remote worker threshold for AGI

True AGI requires systems capable of fully substituting for human remote workers across long-horizon tasks, a standard not yet met due to current capabilities remaining at a 'jagged frontier.'

Output over GDP metrics

Economic impact should track actual service output rather than GDP statistics, since AI substitution may destroy monetary value while increasing volume through price reduction.

🎯 The Threat Landscape Hierarchy 3 insights

Volume versus sophistication spectrum

Roughly 80% of attacks are low-sophistication 'spray and prey' financial crimes by amateurs, contrasting with lower-volume but high-stakes nation-state operations conducting patient IP theft.

North Korean remote worker infiltration

North Korean state-backed operatives infiltrate Western tech companies as remote workers to collect salaries and steal IP, directly funding the regime through payroll fraud and corporate access.

Ransomware's coordinated middle tier

Moderately sophisticated criminal organizations occupy the space between amateurs and nation states, conducting coordinated ransomware attacks against critical infrastructure like hospital systems.

🤖 Automating Digital Forensics 3 insights

Shift to continuous investigation

Asymmetric moves cybersecurity from reactive emergency triage to proactive continuous digital forensics, utilizing AI agents for deep investigative work previously requiring scarce human experts.

Closing the jagged frontier gap

While off-the-shelf models achieve 90% accuracy on investigative tasks, Asymmetric employs a services-first model partnering with insurance companies to build proprietary datasets that close the final reliability gap.

Business email compromise focus

The company initially targets business email compromises to ensure consistent customer delivery while gathering specialized training data needed for broader autonomous investigative capabilities.

🛡️ Differential Acceleration Strategy 2 insights

Defensive asymmetry in capabilities

Digital forensics represents a rare asymmetric domain where investigative expertise does not correlate with offensive hacking ability, allowing defensive AI to be accelerated without equally empowering attackers.

Intentionally shaping AI frontiers

Carlier advocates deliberately constructing specialized datasets and evaluation methods to differentially advance defensive capabilities before equivalent offensive applications can emerge.

Bottom Line

Organizations should assume AGI is coming and redesign cyber defenses around proactive AI-driven digital forensics, leveraging the unique asymmetry that forensic expertise doesn't translate to hacking skills while building specialized datasets to close the capability gap.

More from Cognitive Revolution

View all
AI Scouting Report: the Good, Bad, & Weird @ the Law & AI Certificate Program, by LexLab, UC Law SF
1:18:46
Cognitive Revolution Cognitive Revolution

AI Scouting Report: the Good, Bad, & Weird @ the Law & AI Certificate Program, by LexLab, UC Law SF

Nathan Labenz delivers a rapid-fire survey of the current AI landscape, documenting breakthrough capabilities in reasoning and autonomous agents alongside alarming emergent behaviors like safety test recognition and internal dialect formation, while arguing that outdated critiques regarding hallucinations and comprehension no longer apply to frontier models.

9 days ago · 10 points
Bioinfohazards: Jassi Pannu on Controlling Dangerous Data from which AI Models Learn
1:45:53
Cognitive Revolution Cognitive Revolution

Bioinfohazards: Jassi Pannu on Controlling Dangerous Data from which AI Models Learn

AI systems are rapidly approaching capabilities that could enable extremists or lone actors to engineer pandemic-capable pathogens using publicly available biological data. Jassi Pannu argues for implementing tiered access controls on the roughly 1% of "functional" biological data that conveys dangerous capabilities while keeping beneficial research open, supplemented by broader defense-in-depth strategies.

14 days ago · 9 points