The Achilles’ heel of law technologies: training. Only 10% of such initiatives are aimed at law students, so how should this issue be managed to win the AI race?
Ensuring the integrity of democratic elections from hackers and electronic tampering, and boosting public confidence in democracy, isn’t very difficult, nor expensive.
As South American countries recover from a massive blackout, the US isn’t immune: The Northeast Blackout of 2003 cut power to 50 million people, and many threats to the electricity grid remain.
Power utilities’ cybersecurity practices may be effective, but need to evolve over time. And all companies operating elements of the grid – even the small ones – should step up.
As the microchip industry celebrates the 50th anniversary of chipmaker Intel’s founding, engineers and researchers call for a complete rethinking of computer architecture.
Russian government agents allegedly penetrated US state and county election databases. Scholars of election security offer insight and recommendations about what to do now.
IAFEI and partners Duke University and Grenoble EM regularly survey CFOs across the world. For the second quarter 2018, the poll ran from May 13 to June 7, 2018.
Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
A new report highlights the worrying trends confronting security professionals – from more sophisticated hacking methods to hack-for-hire products and targeted attacks on tourism websites.
Keith Martin, Royal Holloway University of London et Rory Hopcraft, Royal Holloway University of London
Cyber vulnerabilities in shipping show how far the industry has to go. But proper cyber security of ships is more complex than you might initially think.
It is hard to know whether metadata retention has been effective or necessary. We can only hope that the debate over accessing and analysing encrypted services is a little more enlightening.