
“Cybersecurity is a good example to illustrate the flywheel potential of LLMs for other enterprises, Wood said. Let’s say you start to experience a set of threats emerging in your application. These threats have subtle signals, because they’re split across multiple services and architectures. But just in a few places, you just start to see very subtle signals of a cyber attack. By using embeddings, which can find correlations between data points, LLMs are good at finding subtle differences and effectively correlating them into a larger signal. ‘So what would otherwise be split across a diluted surface area now stands out like a flashing siren,’ said Wood.”