Tag: CyberSecurity
Lucius Fox, The Dark Knight, The Panopticon Penitentiary and The Democratic Geneva Convention. Same Same but not all that different.
by jacobd3 on November 5, 2018 5:24 pm
Fact: Your body sheds 50 million skin cells every day in homeostatic conditions. Fact: An American adult will spend up to 11 hours per day engaging in watching, reading, listening or simply interacting with media on a daily basis. Our dermis carries in it our DNA telling a story of our epigenetic environment. Similarly, the… Read more Lucius Fox, The Dark Knight, The Panopticon Penitentiary and The Democratic Geneva Convention. Same Same but not all that different.
IoT and the implications of the Second Machine Age
by Howard Chen on August 2, 2018 9:55 pm
The ubiquity of Internet connectivity is inescapable for many people today. Almost everyone has at least a smart phone, loaded with personal information and virtually limitless capability to interact with other devices; families can automate their home environments with climate control systems like Nest, security and safety cameras, smart entertainment systems that learn your watching… Read more IoT and the implications of the Second Machine Age
IoT and Edge Computing Services
by Stefan Schmitt on August 2, 2018 8:33 pm
The Internet of Things (IoT) is one of the most hyped topics in today’s technology coverage. But what really is IoT? The term IoT summarizes all connected “entities”. The Internet of Things is made up of the smallest machines up to the largest computers. All of them have in common that they use networking technology… Read more IoT and Edge Computing Services
Internet of Everything
by Varun Bharadwaj on August 2, 2018 8:01 pm
What will we do with all this data?! Continuing the tone from my last post about the future of technologies hinging on how we approach cybersecurity, we’ll now take a look at the exponential explosion in the number of connected devices. IoT or “Internet of Things” is another word being thrown around lately – however,… Read more Internet of Everything
Hacking: For Money or Change
by Sharon Chen on July 27, 2018 1:12 pm
A few years back, I became slightly obsessed with the show Black Mirror. One of it’s episodes, “Shut Up and Dance,” thoroughly freaked me out and got me paranoid about whether hackers could see what I was doing on my laptop screen or see my face while I was on my laptop (I covered up… Read more Hacking: For Money or Change
Moderated AI: Humans supplementing AI, and not the other way round
by Jasmine Poon on July 27, 2018 11:29 am
Humans assist AI with filtering and with training subjective topics, such as hate speech in the form of sarcastic comments. It is not so much AI assisting humans, but sustaining a reciprocal mutualistic relationship. Case Study: Facebook’s Filters Facebook employs thousands of human content moderators and struck partnerships with human fact-checking organizations, as A.I. alone… Read more Moderated AI: Humans supplementing AI, and not the other way round
From Cyber to BlockChain, How Can Security Carry On
by Hailun Yang on July 27, 2018 11:11 am
Ever since web 1.0, 30 years of human efforts have been made to guard the security of WWW. Together with the technology breakthroughs like online banking, cloud computing and IoT, cyber attack also diverges into multiple directions. As Steve Herrod, Managing Director of General Catalyst and Ex-CTO of VMWare, mentioned last week, those attacks widely… Read more From Cyber to BlockChain, How Can Security Carry On
THE CURIOUS CASE OF CYBERSECURITY
by Sara Sun on July 27, 2018 10:48 am
BLUF (Bottom Line Up Front) Cybersecurity ventures saw longer time-to-exits and lower multiples The worsening supply-demand gap for cybersecurity professionals is an economics puzzle Cybersecurity’s prevention-centric value proposition is a tough sell (and the old FUD sales pitch is not helping!) Cyber Picks: Value or Value “Traps”? Someone asked me the other day, “what is… Read more THE CURIOUS CASE OF CYBERSECURITY
Big Data and Business
by Stefan Schmitt on July 27, 2018 9:24 am
The presentation form Srijan Kumar (Stanford) gave insights on the components of Big Data and data mining. Describing Big Data as the combination of: Machine Learning Statistics Artificial Intelligence Databases is a great way to look at it. I would like to add the notion that we can think of Artificial Intelligence as the combination… Read more Big Data and Business
Cybersecurity and the Internet of Things
by Yu Ching Tan on July 27, 2018 8:08 am
With hackers constantly reinventing themselves (think: the evolution of Nigerian price scams into specific, targeted methods including ransomware), there is a pressing need for cybersecurity efforts to be shored up and reinforced. Breaches can be costly too – a study by the Ponemon Institute sponsored by IBM estimated that the average cost of one… Read more Cybersecurity and the Internet of Things