Tag: CyberSecurity

Lucius Fox, The Dark Knight, The Panopticon Penitentiary and The Democratic Geneva Convention. Same Same but not all that different.

by on November 5, 2018 5:24 pm
Fact: Your body sheds 50 million skin cells every day in homeostatic conditions. Fact: An American adult will spend up to 11 hours per day engaging in watching, reading, listening or simply interacting with media on a daily basis. Our dermis carries in it our DNA telling a story of our epigenetic environment. Similarly, the… Read more Lucius Fox, The Dark Knight, The Panopticon Penitentiary and The Democratic Geneva Convention. Same Same but not all that different.

IoT and the implications of the Second Machine Age

by on August 2, 2018 9:55 pm
The ubiquity of Internet connectivity is inescapable for many people today. Almost everyone has at least a smart phone, loaded with personal information and virtually limitless capability to interact with other devices; families can automate their home environments with climate control systems like Nest, security and safety cameras, smart entertainment systems that learn your watching… Read more IoT and the implications of the Second Machine Age

IoT and Edge Computing Services

by on August 2, 2018 8:33 pm
The Internet of Things (IoT) is one of the most hyped topics in today’s technology coverage. But what really is IoT? The term IoT summarizes all connected “entities”. The Internet of Things is made up of the smallest machines up to the largest computers. All of them have in common that they use networking technology… Read more IoT and Edge Computing Services

Internet of Everything

by on August 2, 2018 8:01 pm
What will we do with all this data?! Continuing the tone from my last post about the future of technologies hinging on how we approach cybersecurity, we’ll now take a look at the exponential explosion in the number of connected devices. IoT or “Internet of Things” is another word being thrown around lately – however,… Read more Internet of Everything

Hacking: For Money or Change

by on July 27, 2018 1:12 pm
A few years back, I became slightly obsessed with the show Black Mirror. One of it’s episodes, “Shut Up and Dance,” thoroughly freaked me out and got me paranoid about whether hackers could see what I was doing on my laptop screen or see my face while I was on my laptop (I covered up… Read more Hacking: For Money or Change

Moderated AI: Humans supplementing AI, and not the other way round

by on July 27, 2018 11:29 am
Humans assist AI with filtering and with training subjective topics, such as hate speech in the form of sarcastic comments. It is not so much AI assisting humans, but sustaining a reciprocal mutualistic relationship. Case Study: Facebook’s Filters Facebook employs thousands of human content moderators and struck partnerships with human fact-checking organizations, as A.I. alone… Read more Moderated AI: Humans supplementing AI, and not the other way round

From Cyber to BlockChain, How Can Security Carry On

by on July 27, 2018 11:11 am
Ever since web 1.0, 30 years of human efforts have been made to guard the security of WWW. Together with the technology breakthroughs like online banking, cloud computing and IoT, cyber attack also diverges into multiple directions. As Steve Herrod, Managing Director of General Catalyst and Ex-CTO of VMWare, mentioned last week, those attacks widely… Read more From Cyber to BlockChain, How Can Security Carry On

THE CURIOUS CASE OF CYBERSECURITY

by on July 27, 2018 10:48 am
BLUF (Bottom Line Up Front) Cybersecurity ventures saw longer time-to-exits and lower multiples The worsening supply-demand gap for cybersecurity professionals is an economics puzzle Cybersecurity’s prevention-centric value proposition is a tough sell (and the old FUD sales pitch is not helping!) Cyber Picks: Value or Value “Traps”? Someone asked me the other day, “what is… Read more THE CURIOUS CASE OF CYBERSECURITY

Big Data and Business

by on July 27, 2018 9:24 am
The presentation form Srijan Kumar (Stanford)  gave insights on the components of Big Data and data mining. Describing Big Data as the combination of: Machine Learning Statistics Artificial Intelligence Databases is a great way to look at it. I would like to add the notion that we can think of Artificial Intelligence as the combination… Read more Big Data and Business

Cybersecurity and the Internet of Things

by on July 27, 2018 8:08 am
With hackers constantly reinventing themselves (think: the evolution of Nigerian price scams into specific, targeted methods including ransomware), there is a pressing need for cybersecurity efforts to be shored up and reinforced.   Breaches can be costly too – a study by the Ponemon Institute sponsored by IBM estimated that the average cost of one… Read more Cybersecurity and the Internet of Things