-
1 week ago |
cyberprotection-magazine.com | Lou Covey
The future of AI is distributed and democratic, according to renowned security technologist, Bruce Schneier, not controlled by corporations. In his talk he revealed work on developing “public” LLMs. Developments in the past few weeks indicate he may be right and that would be good news for verifiable information. Speaking at the RSAC Conference in San Francisco last week, Schneier talked of trust and how we give it to people, strangers, organizations, and technology.
-
1 week ago |
cyberprotection-magazine.com | Lou Covey
Anonymous hacked and downloaded passenger manifests, containing the names and information on deported migrants, that Trump administration lawyers have told…... You must be a Free member to access this content. Already a member? Log in here
-
2 weeks ago |
cyberprotection-magazine.com | Lou Covey
Quantum computing is not really here, yet. But companies are getting ready for it
-
3 weeks ago |
cyberprotection-magazine.com | Lou Covey
Note: Cyber Protection Magazine rarely writes about individual products unless we cannot find similar products to compare. In this case, we have not found any company providing similar benefits. DataKrypto, a California cybersecurity company, may be able to stop AI data theft and LLM poisoning using fully homomorphic encryption (FHE) combining trusted execution environment, without FHE’s processing limitations.
-
1 month ago |
cyberprotection.social | Lou Covey
The DDoS attack on X.com this week provided a certain amount of schadenfreude for people less than enamored by Elon Musk. It also rang alarm bells in the cybersecurity community as that style of attack seems to be making a comeback, and not for financial gain. All indications are corporations, and, in particular, government institutions are not ready to repel attacks motivated by political revenge.
-
1 month ago |
cyberprotection.social | Lou Covey
Encryption became a hot topic in the news in the past month. The United Kingdom, Sweden, France and the EU are considering requiring “back doors” to encryption protections. The “Signalgate” scandal in Washington, DC started most people asking, “What is this encryption stuff?” So we decided to provide a primer on the state of encryption today. While the technology behind encryption is complex, it is not new.
-
1 month ago |
cyberprotection.social | Lou Covey
As quickly as the artificial intelligence (AI) industry appeared, it may disappear just as quickly. That may have significant ramifications for cybersecurity, according to industry watchers, as the technology falls into the trough of disillusionment. When OpenAI burst on the scene more than two years ago, Microsoft was a significant instigator in its growth and adoption.
-
1 month ago |
cyberprotection-magazine.com | Lou Covey
Encryption became a hot topic in the news in the past month. The United Kingdom, Sweden, France and the EU are considering requiring “back doors” to encryption protections. The “Signalgate” scandal in Washington, DC started most people asking, “What is this encryption stuff?” So we decided to provide a primer on the state of encryption today. While the technology behind encryption is complex, it is not new.
-
1 month ago |
cyberprotection-magazine.com | Lou Covey
As quickly as the artificial intelligence (AI) industry appeared, it may disappear just as quickly. That may have significant ramifications for cybersecurity, according to industry watchers, as the technology falls into the trough of disillusionment. When OpenAI burst on the scene more than two years ago, Microsoft was a significant instigator in its growth and adoption.
-
2 months ago |
cyberprotection-magazine.com | Lou Covey |Andy Swift |Darron Antill |Andrew Grealy
The EU's Digital Operational Resiliency Act (DORA) went live in January. This legislation's goals seem to conflict with the US administration’s willingness to ignore technology security standards. The question is: Who will stand up to protect corporate and consumer data? DORA is highly targeted at the stability and resilience of the financial services sector. It ensures financial institutions can respond to, withstand, and recover from ICT-related threats and disruptions.