"Despite AI’s seeming pervasiveness in almost every industry, Dr. LeCun says researchers are still decades away from building machines that can match the intelligence of humans. Even less probable is …
US Bets $100 Million on Machines That Think More Like Humans
"And now the government is pushing forward what is perhaps the most high-risk, high-reward project of our time: brain-like artificial intelligence. And they’re betting $100 million that they’ll …
Continue Reading about US Bets $100 Million on Machines That Think More Like Humans
UK CERT Introduction to Social Engineering
Social engineering is one of the most prolific and effective means of gaining access to secure systems and obtaining sensitive information, yet requires minimal technical knowledge. Attacks vary from …
Continue Reading about UK CERT Introduction to Social Engineering
Human Nature vs. Security
Social engineering in the latest crop of viruses has people jumping through hoops to open malicious attachments. How do we change the pattern? If you're asked to picture security for a house, the …
Mind Games – Social Engineering
Social engineering focuses on the weakest link of the information security chain, and considered a big security threat, according to CERT. One of the basic laws of information security is that …
HHS Launches $50 Million ARPA-H Program to Improve Hospital Cybersecurity
In the wake of the Ascension and Change/United Healthcare ransomware attacks, The Department of Health and Human Services (HHS) and the Advanced Research Projects Agency for Health (ARPA-H) recently …
Continue Reading about HHS Launches $50 Million ARPA-H Program to Improve Hospital Cybersecurity
What the Board Needs to Know About Exponential Disruption, Cybersecurity, Risk Management and Strategy
Over the course of 2023, we posted a series of post on the issues and risks which Boards of Directors should consider related to emerging technology and cybersecurity. Global polycrises, exponential …
2023 Year-end Review: Cybersecurity
Once again, 2023 was marked by security professionals reacting to threats, incidents, and vulnerabilities of a constant, unrelenting frequency, volume, and scale. Crypto continued its"desctruction …
Cyber War: Power, Prestige, International Governance, and Strategy in the Age of Global Polycrisis
Competing cyber capabilities (on a spectrum from nation-state to non-state actors alike) and cyber-based conflict will continue to restructructure, reformulate, discombobulate, and transform the very …
A Renewed Commitment and Reorientation to the First Principles Thinking of the Founders
First principles thinking is a timeless methodology that continues to influence diverse fields by encouraging deep analysis and innovative solutions. While Aristotle and Descartes are pivotal figures …