-
Quantum Computing
Quantum Superposition: How Qubits Live in Many States at Once
Quantum computing promises to solve problems that stump even the fastest classical supercomputers. At the heart of this promise is a mind-bending phenomenon: quantum superposition. In simple terms, superposition allows quantum bits—or qubits—to occupy multiple states at the same time,…
Read More » -
Quantum Computing
Colliding Waves: How Quantum Interference Powers Quantum Computing
Quantum interference remains the cornerstone of quantum computing’s promise. It’s the feature that distinguishes quantum computation from just a random quantum jumble. A quantum computer is not powerful simply because it can have many states at once – if that…
Read More » -
Leadership
Diversity – The Benefits of Being Uncomfortable
The topic of diversity is not one that most people find in their comfort zone. As I wrote in a previous article on diversity, increasing diversity often engenders frustration in those tasked with accomplishing it, and inspires eye rolls among diversity-fatigued…
Read More » -
AI Security
The 1956 Dartmouth Workshop: The Birthplace of Artificial Intelligence (AI)
In the summer of 1956, a small gathering of researchers and scientists at Dartmouth College, a small yet prestigious Ivy League school in Hanover, New Hampshire, ignited a spark that would forever change the course of human history. This historic…
Read More » -
Crypto Security
Blockchain Security
Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global economy and financial services FinTech and Decentralized Finance (DeFi) solutions. Blockchain is a set of technologies that through distributed computing and mathematics can now deliver…
Read More » -
Crypto Security
Cybersecurity of Blockchain & Blockchain for Cybersecurity
You may have heard, over the last year or two, about the new technological miracle that is the blockchain. It seems that every banker, insurer, manufacturer, artist, lawyer and cybersecurity professional is shouting about blockchain from the highest peak and…
Read More » -
Cyber-Kinetic Security
Cybercrime in China – a Growing Threat for the Chinese Economy
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much more complex than such broad-brush claims suggest. Few Westerners realize that China and its neighbours in…
Read More » -
Crypto Security
Why Financial Crime and Cybersecurity Need to Team up
The worlds of financial crime and cybercrime are colliding, converging into one. The biggest threat to businesses globally is the new cyber-enabled financial crime. Yet businesses and even financial institutions tasked with protecting our money continue to fight this combined…
Read More » -
Crypto Security
Financial Institutions: Key in Fighting Weapons of Mass Destruction
How would you picture those who work to prevent weapons of mass destruction (WMD) from falling into the wrong hands? Would you picture them heavily armed and with a military bearing? Then you might be surprised. Although such individuals sometimes…
Read More » -
Crypto Security
Combatting Money Laundering & Terrorist Financing
Terrorist funding detection has been practiced the same way as money laundering detection ever since Counter Terrorism Funding (CTF) initiatives were added to Anti–Money Laundering (AML) efforts after 9/11. Although the two have similarities on the surface, a deeper look…
Read More » -
Quantum Computing
Understanding “Polynomial Time” – Why Faster Algorithms Matter
Quantum computing has emerged as a new frontier of great-power competition in the 21st century. Nations around the world view advanced quantum technologies as strategic assets—keys to future economic prowess, military strength, and technological sovereignty. Governments have already poured over…
Read More » -
Crypto Security
Financial Crime, Money Laundering and Terrorism Financing
In what ways has financial crime hurt you? Most people would respond with a yawn. We might think it is limited to a few fraudulent schemes that deprive a small number of people of a few hundred or a few…
Read More » -
Leadership
Enterprise Resilience – A Model to Thrive in a World of Change
Modern theories of the firm remain focused on transaction costs, operational efficiency, employee motivation, leadership, strategy and other related factors. While any of these may support our success at various times, none of them alone will facilitate it in the…
Read More » -
Cyber-Kinetic Security
When Hackers Threaten your Life – Cyber-Kinetic Risks
The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the last lights shining through the windows of the house had just flickered out. She tugged the…
Read More » -
Quantum Computing
Key Principles and Theorems in Quantum Computing and Networks
The landscape of quantum computing and quantum networks is an exciting frontier where physics and cybersecurity intersect. We’re witnessing the early days of this quantum revolution. As quantum hardware scales and quantum protocols move from labs to real-world deployment, security…
Read More »