-
Cyber-Kinetic Security
IEMI – Threat of Intentional Electromagnetic Interference
As our cities, our transportation, our energy and manufacturing – our everything – increasingly embrace Internet of Things (IoT) and Industrial Controls Systems (ICS), securing its underlying cyber-physical systems (CPS) grows ever more crucial. Yet, even among engineers and cybersecurity…
Read More » -
Cyber-Kinetic Security
When Hackers Threaten your Life – Cyber-Kinetic Attacks Intro
The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the last lights shining through the windows of the house had just flickered out. She tugged the…
Read More » -
Leadership
Destructive Criticism – My experiences with negative feedback across cultures
Giving feedback is hard. Giving good feedback is even harder. Giving good feedback across cultures is next to impossible. I learned this the hard way on my first project in Canada. After years of working in very direct-feedback cultures, I…
Read More » -
5G Security
If You Thought 5G Was About Mobile Phones, You Were Wrong
Everybody has been confused about the furore over 5G recently. The confusion, of course, being why would anybody be so concerned with 5G now compared to 4G or 3G or indeed any of the past cellular mobile communications specifications. Why…
Read More » -
Society 5.0
Getting Street Smart – The Inherent Privacy Risks of Smart Cities
Humans are moving to cities at an unprecedented rate. Today 55% of the world’s population lives in urban areas with that number expected to grow to 68% by 2050. The trend of urbanization is dramatic enough, but when it is…
Read More » -
Cyber-Kinetic Security
Defeating 21st Century Pirates: the Maritime Cyberattacks
The maritime industry faces a not-so-distant future when ships will be completely autonomous, using navigation data that they receive to plot their own courses with only minimal input from shoreside control centers. The efficiencies this could bring are massive, but…
Read More » -
Post-Quantum, PQC, Quantum Security
Brassard–Høyer–Tapp (BHT) Quantum Collision Algorithm and Post-Quantum Security
The Brassard–Høyer–Tapp (BHT) algorithm is a quantum algorithm discovered in 1997 that finds collisions in hash functions faster than classical methods. In cryptography, a collision means finding two different inputs that produce the same hash output, undermining the hash’s collision…
Read More » -
AI Security
Adaptive Attacks: Learning to Evade Machine Learning-Based IDS
Attackers, often employing techniques like model querying, can gather valuable information regarding the target model’s structure, parameters, and learned features, thereby gaining insights into crafting inputs that the model fails to classify correctly. This reconnaissance allows attackers to meticulously modify…
Read More » -
Leadership
Those with Interpersonal Skills Have Least to Worry About the AI
Artificial Intelligence (AI) is becoming ever more important, and not just in automating repetitive, manual labor jobs. Increasingly, it also enters the realm of highly trained knowledge workers. New. AI-driven world will require different skills. Systems like IBM Watson augment…
Read More » -
5G Security
Regulating the Security of the Internet of Things (IoT) in a 5G World
In one of those strange inversions of reason, The Internet of Things (IoT) arguably began before the Internet itself. In 1980, a thirsty graduate in Carnegie Mellon University’s computer science department, David Nichols, eventually grew tired of hiking to the…
Read More » -
Industry
The Argument Against Quantum Computers
And now for something different from our regular programming. Quanta Magazine just published an interesting article, “The Argument Against Quantum Computers,” by Katia Moskvitch. The article discusses Gil Kalai’s skepticism about the feasibility of quantum computers. Kalai, a mathematician, argues…
Read More » -
Society 5.0
The Future of Privacy in our Smart Living – Part 2
In a world where the population is increasing and resources are finite, we need to find smarter ways of living together. Smart technologies hold the key to making this happen but we need to proceed with caution and build a…
Read More » -
Leadership
Driving Change as Assimilators in the Age of AI
AI leaders must adapt to the changing culture as young workers enter the job market with expectations strikingly different from the ones that leaders traditionally have encountered. These changes within their own business culture are not, though, the only culture…
Read More » -
Cyber-Kinetic Security
Tangible Threat of Cyber-Kinetic Attacks
Connecting physical objects and processes to the cyber world offers us capabilities that exponentially exceed the expectations of science fiction writers and futurists of past generations. But it also introduces disquieting possibilities. Those possibilities reach beyond cyberspace to threaten the…
Read More » -
Leadership
AI Is Neither the End of Civilization nor the Beginning of Nirvana
Where AI, robots, IoT and the so-called Fourth Industrial Revolution are taking us, and how we should prepare for it are some of the hottest topics being discussed today. Perhaps the most striking thing about these discussions is how different…
Read More »