Emerging Tech Security
AI security and safety, cyber-kinetic security, 5G and mIoT security, blockchain and crypto security, and other emerging technology risk domains adjacent to quantum.
-
How Telecom Operators Can Strike Back with IoT, Fog & Cyber
Telecom operators sat back as the new over-the-top (OTT) service providers, internet and tech companies slowly ate away at their business, particularly in the B2C space. A combination of institutional laziness and poor execution on promising initiatives gave these new…
Read More » -
Navigating a Safe Course Through Maritime Cyberattacks
The open seas have long attracted those who yearned for adventure. The risk of pitting oneself against a vast and unforgiving sea has tested sailors’ mettle for millennia. It’s not surprising that the maritime industry is one that thrives on…
Read More » -
Our Smart Future and the Threat of Cyber-Kinetic Attacks
A growing number of today’s entertainment options show protagonists battling cyber-attacks that target the systems at the heart of our critical infrastructure whose failure would cripple modern society. It’s easy to watch such shows and pass off their plots as…
Read More » -
Whispering Buildings and Things That Listen to Us in the Night
How important privacy is for building smart cities and embracing the IoT In the 60s cartoon The Jetsons, the family lived in a futuristic city with flying cars, a robotic housekeeper, and even a watch that let you do video…
Read More » -
How Hong Kong’s FinTech sector is developing
The global financial services sector is accelerating its transformation in response to changing values and shifting consumer preferences. Hong Kong is responding in its own unique way. Global events over the last decade have brought home the reality that we…
Read More » -
History of Cyber-Kinetic Incidents and Research
The fact that cyber-kinetic attacks rarely appear on mainstream news doesn’t mean they don’t happen. They happen more frequently than you would think. Many, for various reasons, aren’t even reported to agencies charged with combatting them. This hinders security experts…
Read More » -
The 1956 Dartmouth Workshop: The Birthplace of Artificial Intelligence (AI)
In the summer of 1956, a small gathering of researchers and scientists at Dartmouth College, a small yet prestigious Ivy League school in Hanover, New Hampshire, ignited a spark that would forever change the course of human history. This historic…
Read More » -
Blockchain Security
Recent advances in Distributed Ledger Technology (DLT) / Blockchain have significant implications for the global economy and financial services FinTech and Decentralized Finance (DeFi) solutions. Blockchain is a set of technologies that through distributed computing and mathematics can now deliver…
Read More » -
Cybersecurity of Blockchain & Blockchain for Cybersecurity
You may have heard, over the last year or two, about the new technological miracle that is the blockchain. It seems that every banker, insurer, manufacturer, artist, lawyer and cybersecurity professional is shouting about blockchain from the highest peak and…
Read More » -
Cybercrime in China – a Growing Threat for the Chinese Economy
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much more complex than such broad-brush claims suggest. Few Westerners realize that China and its neighbours in…
Read More » -
Why Financial Crime and Cybersecurity Need to Team up
The worlds of financial crime and cybercrime are colliding, converging into one. The biggest threat to businesses globally is the new cyber-enabled financial crime. Yet businesses and even financial institutions tasked with protecting our money continue to fight this combined…
Read More » -
Financial Institutions: Key in Fighting Weapons of Mass Destruction
How would you picture those who work to prevent weapons of mass destruction (WMD) from falling into the wrong hands? Would you picture them heavily armed and with a military bearing? Then you might be surprised. Although such individuals sometimes…
Read More » -
Combatting Money Laundering & Terrorist Financing
Terrorist funding detection has been practiced the same way as money laundering detection ever since Counter Terrorism Funding (CTF) initiatives were added to Anti–Money Laundering (AML) efforts after 9/11. Although the two have similarities on the surface, a deeper look…
Read More » -
Financial Crime, Money Laundering and Terrorism Financing
In what ways has financial crime hurt you? Most people would respond with a yawn. We might think it is limited to a few fraudulent schemes that deprive a small number of people of a few hundred or a few…
Read More » -
When Hackers Threaten your Life – Cyber-Kinetic Risks
The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the last lights shining through the windows of the house had just flickered out. She tugged the…
Read More »














