AGI-Pilled Cyber Defense: Automating Digital Forensics w/ Asymmetric Security Founder Alexis Carlier
TL;DR
Alexis Carlier, founder of Asymmetric Security, argues that assuming AGI arrives as infinitely scalable intelligent labor requires redesigning cybersecurity from reactive triage to proactive AI-driven digital forensics, leveraging the unique asymmetry that investigative expertise does not translate to hacking capability.
🧠 The AGI Security Paradigm 3 insights
Betting on the AGI assumption
Carlier structures Asymmetric Security around the premise that AGI constitutes near-infinite intelligent labor, making costly strategic bets that maximize value only if this assumption holds.
Remote worker threshold for AGI
True AGI requires systems capable of fully substituting for human remote workers across long-horizon tasks, a standard not yet met due to current capabilities remaining at a 'jagged frontier.'
Output over GDP metrics
Economic impact should track actual service output rather than GDP statistics, since AI substitution may destroy monetary value while increasing volume through price reduction.
🎯 The Threat Landscape Hierarchy 3 insights
Volume versus sophistication spectrum
Roughly 80% of attacks are low-sophistication 'spray and prey' financial crimes by amateurs, contrasting with lower-volume but high-stakes nation-state operations conducting patient IP theft.
North Korean remote worker infiltration
North Korean state-backed operatives infiltrate Western tech companies as remote workers to collect salaries and steal IP, directly funding the regime through payroll fraud and corporate access.
Ransomware's coordinated middle tier
Moderately sophisticated criminal organizations occupy the space between amateurs and nation states, conducting coordinated ransomware attacks against critical infrastructure like hospital systems.
🤖 Automating Digital Forensics 3 insights
Shift to continuous investigation
Asymmetric moves cybersecurity from reactive emergency triage to proactive continuous digital forensics, utilizing AI agents for deep investigative work previously requiring scarce human experts.
Closing the jagged frontier gap
While off-the-shelf models achieve 90% accuracy on investigative tasks, Asymmetric employs a services-first model partnering with insurance companies to build proprietary datasets that close the final reliability gap.
Business email compromise focus
The company initially targets business email compromises to ensure consistent customer delivery while gathering specialized training data needed for broader autonomous investigative capabilities.
🛡️ Differential Acceleration Strategy 2 insights
Defensive asymmetry in capabilities
Digital forensics represents a rare asymmetric domain where investigative expertise does not correlate with offensive hacking ability, allowing defensive AI to be accelerated without equally empowering attackers.
Intentionally shaping AI frontiers
Carlier advocates deliberately constructing specialized datasets and evaluation methods to differentially advance defensive capabilities before equivalent offensive applications can emerge.
Bottom Line
Organizations should assume AGI is coming and redesign cyber defenses around proactive AI-driven digital forensics, leveraging the unique asymmetry that forensic expertise doesn't translate to hacking skills while building specialized datasets to close the capability gap.
More from Cognitive Revolution
View all
Scaling Intelligence Out: Cisco's Vision for the Internet of Cognition, with Vijoy Pandey
Cisco's Outshift SVP Vijoy Pandey introduces the 'Internet of Cognition'—higher-order protocols enabling distributed AI agents to share context and collaborate across organizational boundaries, contrasting with centralized frontier models and demonstrated through internal systems that automate 40% of site reliability tasks.
Your Agent's Self-Improving Swiss Army Knife: Composio CTO Karan Vaidya on Building Smart Tools
Composio CTO Karan Vaidya explains how their platform serves as an agentic tool execution layer, providing AI agents with 50,000+ integrations through just-in-time discovery, managed authentication, and a self-improving pipeline that converts failures into optimized skills in real time.
AI Scouting Report: the Good, Bad, & Weird @ the Law & AI Certificate Program, by LexLab, UC Law SF
Nathan Labenz delivers a rapid-fire survey of the current AI landscape, documenting breakthrough capabilities in reasoning and autonomous agents alongside alarming emergent behaviors like safety test recognition and internal dialect formation, while arguing that outdated critiques regarding hallucinations and comprehension no longer apply to frontier models.
Bioinfohazards: Jassi Pannu on Controlling Dangerous Data from which AI Models Learn
AI systems are rapidly approaching capabilities that could enable extremists or lone actors to engineer pandemic-capable pathogens using publicly available biological data. Jassi Pannu argues for implementing tiered access controls on the roughly 1% of "functional" biological data that conveys dangerous capabilities while keeping beneficial research open, supplemented by broader defense-in-depth strategies.