The quantum computing chimera
Quantum computing could potentially break current encryption methods, leading to a surge in research into quantum-safe cryptography, but will theymore
Read more...Quantum computing could potentially break current encryption methods, leading to a surge in research into quantum-safe cryptography, but will theymore
Read more...Alert fatigue poses a risk. It sees the security analyst overwhelmed with incidents, on top of which they’re expected to………more...
Generative artificial intelligence (GenAI) represents the latest technological shift, with significant implications for cybersecurity. However, 96% of executives believe that integrating GenAI increases the risk of a security breach within the next three years.
There has been a lot of debate regarding the imposition of moderation on social media and whether that constitutes censorship and violations of the right to free speech. That argument is specious at best. Offending content on commercial social media is removed only when it negates profitability.
Most humans moderate their speech. Sometimes we think about impulsively speaking in reaction to something that incites strong emotions. People who do not react have what is called, “self-control”. Some people don’t have that filter (I’m looking at you, Elon) and blurt out offensive, nonfactual, or dishonest responses. Sometimes they aren’t atypical, they are just selfish people without manners (still looking at you Elon). Moderation of your speech is just a civilized attitude.
Profit motive
When it comes to social media, however, especially for-profit social media, the primary factor is profit. That has been the guiding principle of all social media moderation.
Read more...Mark Zuckerberg made two announcements about major changes in Meta in the past two weeks. The first was the revelation that they would be creating hundreds of AI-driven bots to interact with users. The second was the announcement that they would stop moderation of content, “except for dangerous stuff,” according to a video posted by Zuckerberg. With a certain amount of schadenfreude, we note that Meta had to pull the accounts they had already made as users started engaging with them, finding their inherent flaws and raking them over the coals for how piss-poor their execution was.
Both of these announcements validated a decision I had made earlier this year to start divesting myself of Meta platform accounts. I made the request to deactivate all the accounts (Facebook, Instagram and Messenger) a week before both announcements. I would have done it sooner if I had known it would take Meta 30 days from my request to deactivate everything. This morning, however, I received a text from my partners in Cyber Protection Magazine asking if I thought we should deactivate our Facebook account.
Frankly, I had forgotten we had one, basically because we received zero engagement from the platform, despite the amount of content we put up there. That,.too, is a result of Meta de-emphasizing legacy media. Of course, I concurred with the team. Sometime in February, we will disappear from Facebook.
Read more...Handheld devices are inherently limited in range and sensitivity. Their compact size and basic receiver capabilities make them impractical for covering large or complex environments like military bases, office buildings, or airports. Effective WIDS solutions require continuous, widespread monitoring through strategically deployed fixed sensors that offer broader sensitivity and coverage.
We open a new year and a new season with our friend, Ian Thornton-Trump, chief information security officer at the MSSP Inversion6 and in 30 minutes we take on some pretty meaty subjects.
First, we discuss how China strategically infiltrated technology systems in the US and other countries as a geopolitical message rather than attacks. He discusses the challenges of securing complex, interconnected systems and the need for proactive defense.
Next we review the rise of corporate power and influence and how the increasing wealth and influence of individuals like Elon Musk is disrupting the traditional balance of power in democracies. The ethical concerns around wealthy individuals wielding disproportionate political influence could result in something the oligarchs are not expecting.
Finally, we review potential trade wars and the possibility of Canada and Mexico joining the BRICS alliance.
2025 is going to be bumpy but very interesting.
As we start wrapping up the year we are in planning mode, and we have questions… lots of questions. We will be asking them next year. Here are some of the things we are concerned about.
Statistics — We hear how bad the situation is in security. Lots of jobs going unfilled. Cyber attacks on the increase. The cost of cybercrime approaching $25 trillion dollars. But is it that bad?
AI-Driven Cyber Attacks — As artificial intelligence advances, cybercriminals are expected to use it to craft highly sophisticated phishing scams, automate attacks, and develop malware that can rapidly evolve. Defenders will need AI-powered tools to detect and mitigate these threats in real time. Which way will….
Read more...Technologies such as Low-Code/No-Code (LCNC) and Robotic Process Automation (RPA) have become fundamental in the digital transformation of companies. These platforms can introduce risks related to controlling and protecting corporate data.
Read more...The relentless pursuit of faster software delivery can leave gaping holes in defenses, where bad actors lie in wait. In the fast-paced world of DevOps, where agility and speed reign supreme, security often finds itself playing the dangerous second fiddle.
Read more...