Background Nate Fick, the Ambassador-at-Large for Cyberspace and Digital Policy (which is the head of the State Department’s Bureau of Cyberspace and Digital Policy) was also the co-chair (along with …
OODAcon 2022: The Future Hasn’t Arrived – Identifying the Next Generation of Technology Requirements
OODAcon 2022: The Future Hasn’t Arrived – Identifying the Next Generation of Technology Requirements Panel Description: In an age when the cyber and analytics markets are driving hundreds …
The promising impact of Web3 on data privacy and security
As we continue to enjoy user-generated content (UGC) and applications enabled by the current Social Web (Web 2.0), we cannot ignore the imminent rise of Web 3.0 (Web3). Dubbed the Semantic Web, Web3 …
Continue Reading about The promising impact of Web3 on data privacy and security
CSET on China’s Advanced AI Research and the China AI “Watchboard” Pilot Program
We have integrated Center for Security and Emerging Technology (CSET) research into our OODA Loop research and analysis on topics ranging from artificial intelligence, dis- misinformation and …
What business and government leaders need to know about Putin’s declared intent
Putin’s annexation speech of 30 September 2022 (see Kremlin website) included declarations of his view of the world that make it clearer than ever that he wants all of Russia to believe the West is at …
Joseph Menn on Observations From Tech Journalism
Covering technology issues, and specifically cybersecurity as a journalist is a tough endeavor. Some of these technologies are complex as are the security vulnerabilities often inherent in their …
Continue Reading about Joseph Menn on Observations From Tech Journalism
From AI Principles to AI Practice at a Global Scale
The MIT AI Policy Forum (AIPF) is a global initiative at The MIT Schwarzman College of Computing, which was launched in 2018. The Blackstone Group Chairman Stephen A. Schwarzman, donated $350 million …
Continue Reading about From AI Principles to AI Practice at a Global Scale
Will the United States Ever Accept that Cyber Espionage Is Vital for China’s National Security?
National security interests generally guide and develop states’ policy formulation particularly when governments factor in political, diplomatic, military, economic, and societal considerations into …
NSA sets 2035 post-quantum cryptography deadline; Joint Advisories with CISA and FBI
The debate about the "dual hat" leadership structure of the NSA and Cyber Command has evolved into a study group effort announced by the White House this week to review the fact that "both Cyber …
Commerce, NIST and Implementation of the CHIPS and Science Act of 2022
There were many vital takeaways from our recent What's Next? interview with Dr. Melissa Flagg and Dr. Jennifer Buss on the Chips and Science Act of 2022, but the most crucial insights from Flagg and …
Continue Reading about Commerce, NIST and Implementation of the CHIPS and Science Act of 2022