My essay that clearly separates the differences between the core infosec terms of threat, threat actor, vulnerabilty, and risk.

We're All Building a Single Digital Assistant
32:16

Why AI Will Replace Knowledge Workers
1:16:08

Why I Believe in SOTA Models Over Custom Ones
01:48