( ) Zoom's security has been hammered since last week. First, Zoom was caught sending user meta-data to Facebook, then deception around end-to-end encryption, and now this: Unfortunately, this is the software that most colleges and K-12 schools are using to provide remote instruction to students.…
cyber-security
Is an inability to define security the main cause of the cybersecurity skills gap? If we can't truly define what security is, how can organizations design the right cybersecurity jobs for their needs?…
Understanding China's AI Strategy by Gregory C. Allen In the second half of 2018, I traveled to China on four separate trips to attend major diplomatic, military, and private-sector conferences focusing on Artificial Intelligence (AI). During these trips, I participated in a series of meetings with high-ranking Chinese officials in China’s Ministry of Foreign Affairs, leaders of China’s military AI research organizations, government think tank experts, and corporate executives at Chinese AI companies. From these discussions – as well as…
( ) ! I think is a continuation of the work the Jericho Forum123 was doing back in the early mid 00’s when talking about perimeter-less networks and open-network environments. I think Google is doing some fascinating and useful work here and they are self-dog fooding. I expect they have all the data to prove their point of view. I'm doubtful that many CISO are ready to embrace this and even if they are, maybe reluctant to bring it before…
https://vimeo.com/195371513 This humorous phishing video shows the effectiveness of social engineering and phishing, even in a galaxy far far away,…