Artificial Friend or Virtual Foe

AI is a neutral technology, it is intrinsically good and bad at the same time (or none of the two, if you like), but we need to be sure to frame correctly its applications and uses. In a seminal paper, Floridi et al. (2018) highlight twenty different action points for a Good AI Society. Their analysis has a strong focus on Europe and concerns policy and ethical issues, but for the sake of using AI for good, I believe a few of those points are really cornerstones.

Read More

The 7 Biggest Technology Trends In 2020 Everyone Must Get Ready For Now

We are amidst the 4th Industrial Revolution, and technology is evolving faster than ever. Companies and individuals that don’t keep up with some of the major tech trends run the risk of being left behind. Understanding the key trends will allow people and businesses to prepare and grasp the opportunities. As a business and technology futurist, it is my job to look ahead and identify the most important trends. In this article, I share with you the seven most imminent trends everyone should get ready for in 2020.

Read More

Can We Build Artificial Intelligence [AI] Without Losing Control Over It

Scared of superintelligent AI? You should be, says neuroscientist and philosopher Sam Harris — and not just in some theoretical way. We’re going to build superhuman machines, says Harris, but we haven’t yet grappled with the problems associated with creating something that may treat us the way we treat ants.

Read More

The 7 Most Dangerous Technology Trends In 2020 Everyone Should Know About

As we enter new frontiers with the latest technology trends and enjoy the many positive impacts and benefits it can have on the way we work, play and live, we must always be mindful and prepare for possible negative impacts and potential misuse of the technology. Here are seven of the most dangerous technology trends:

Read More

What’s New In Gartner’s Hype Cycle For Artificial Intelligence [AI], 2019

These and many other new insights are from Gartner Hype Cycle For AI, 2019 published earlier this year and summarized in the recent Gartner blog post, Top Trends on the Gartner Hype Cycle for Artificial Intelligence, 2019. Gartner’s definition of Hype Cycles includes five phases of a technology’s lifecycle and is explained here. Gartner’s latest Hype Cycle for AI reflects the growing popularity of AutoML, intelligent applications, AI platform as a service or AI cloud services as enterprises ramp up their adoption of AI. The Gartner Hype Cycle for AI, 2019.

Read More

How To Make $1 Million From Hacking: Meet Six Hacker Millionaires

Who wants to be a hacking millionaire? For most technically competent folk starting on a cybersecurity career path the pull of a million-dollar hacking payday is tempered by the threat of a lengthy spell in jail should they get caught.

Or at least it is if your idea of a hacker is someone who breaks into stuff illegally. I call those people criminals, threat actors and, to be honest, pretty dumb. After all, there’s plenty of money to be made uncovering vulnerabilities and generally making the data-driven world we live in a little bit safer, all without breaking the law.

Apple has offered $1 million (£820,000) to anyone who can hack the iOS kernel of an iPhone without requiring any clicks by the user. Exploit acquisition platform Zerodium, meanwhile, is offering $2 million (£1.6 million) for anyone who can pull of a “zero-click” remote jailbreak of an iPhone. In the meantime, six hackers on the HackerOne bug bounty platform have now made more than $1 million each.

Here’s how they did it.

Read More

McAfee CEO Chris Young Contemplates The Future Of Cyber Security

Chris Young began his career in cyber security before the term was coined. Back in the 1990s, when Young was in his 20s, his first security company, Cyveillance, which he co-founded, considered itself to be in the “info stack” space.

After multiple leadership roles in cyber security, for the past three years, Young has been the Chief Executive Officer of McAfee, a $2.5 billion revenue device-to-cloud cybersecurity company with 97 million enterprise endpoints and 525 million consumer endpoints. McAfee operates in 189 countries, serving 80% of Fortune 100 firms, more than two-thirds of the Global 2000.

Read More

Absolute’s CEO Christy Wyatt On Leading A Cybersecurity Company And The Power Of Resilience

Christy Wyatt’s career exemplifies what you would expect from a high-performing tech leader who thrives on turning challenges into growth. Showing persistence, resiliency, and tenacity – she has a long history of scaling high-growth technology companies and infusing them with greater creative energy, ingenuity, and intensity for results. As CEO of Absolute, she’s leading the company through an evolution that is shifting its focus from simply being known as a ‘track and trace’ company to becoming the world’s most trusted security company delivering endpoint resiliency to businesses of all sizes.

Read More

A Multimillionaire Surveillance Dealer Steps Out Of The Shadows . . . And His $9 Million WhatsApp Hacking Van

On a wildflower-lined gravel track off a quiet thoroughfare in Larnaca, Cyprus, Tal Dillian is ensconced in a blacked-out truck. It’s a converted GMC ambulance, pimped out with millions of dollars of surveillance kit, antennas on top reaching out to learn what it can from any smartphone within a 1-kilometer

Read More

Unlock The Value In Improved Cybersecurity Protection

The threat, cost and complexity of cybercrime continues to rise, keeping it on the agenda of the C-suite despite the efforts and investments made to date. According to Accenture research, the average cost of cybercrime was up 11% last year across all industries, to $13 million per year. Since financial

Read More

Systematically Pre-Empting Cybersecurity Threats And Damages

At BCG, we created a methodology for determining hidden cyber vulnerabilities. This cyber methodology is called STACHT (pronounced “stacked”), which stands for “system theoretic analysis of cyber hazards and threats.” When you adopt this methodology, you can identify hidden cybersecurity vulnerabilities using a six-step method. The methodology depends upon two

Read More