Municipal Chaos: How Chaos Theory Explains Cyberattacks Against Smart City Architectures
When a linear act leads to non-linear results, it’s chaos. That’s not a figure of speech. Non-linear behaviors that result from an otherwise linear and deterministic system underpin chaos theory, a fascinating branch of mathematics and life sciences that results in amazing insights into our world. It shows how tiny actions in an otherwise linear system can cause dramatic effects and even outcomes that we cannot otherwise predict.
Stellar Deception: Disinformation’s Threat to Effective Space Incident Response
Identification of disinformation threats must be integrated into space incident response and cybersecurity frameworks.
How a Trump or Harris presidency could impact the future of AI
Quoted in the article
Business Insider spoke to five experts with experience in government and the private sector about how each administration might regulate AI, which is evolving at breakneck speed and influencing nearly every factor of American life.
The Economic case for a Space Critical Infrastructure model
The utility of space-based services and information is beyond reproach, as reflected in the increasing demand for space services on the part of Earthlings. So great is the demand that space systems are being (or already have been) integrated into all manner of Earthly functions, from driving directions to military operations. Few of those familiar with the space economy would doubt how increasingly critical it is to our life on terra firma.
A Trump Win Could Unleash Dangerous AI
Quoted in the article.
Donald Trump's opposition to “woke” safety standards for artificial intelligence would likely mean the dismantling of regulations that protect Americans from misinformation, discrimination, and worse.
The Quantum Insider: Is Quantum Computing Resolving Problems For Auditors?
Quoted in the Article
Quantum computing offers auditors faster, more efficient data analysis but presents significant cybersecurity risks, especially concerning public key encryption
CNBC: Connecting your phone to rental car infotainment system? There is a big, hidden privacy risk
Quoted in the article.
Syncing your mobile device to a rental car’s infotainment system is an often overlooked security risk that can be avoided, and car rental companies like Avis and Enterprise place the legal responsibility on the customer.
Riskgaming Podcast: The how and why of the most successful supply-chain attack in history
The recent supply-chain attack on Hezbollah exemplifies the evolving nature of threats, integrating technology to cause physical harm rather than mere cyber intrusion. Emerging technologies and public-private partnerships are crucial for addressing national security challenges and enhancing the resilience of supply chains against sophisticated attacks
All Things Internal Audit Tech Podcast: Quantum Computing in Internal Auditing
Discover how this cutting-edge technology could revolutionize the profession and learn practical tips on how internal auditors can stay ahead of the curve.
Better Satellite world Podcast: UAPs
The question “are we alone?” has never been fully answered. With each image and data set arriving back from Hubble and James Webb the frivolous, Sci-Fi cultural expression of alien life is less frivolous. There is an anxiety about our place in the Universe and it impacts our human community in many ways.
Daily Mail: Crowdstrike Outage Analysis
Quoted in the article
How a cybersecurity attack would cripple America - after catastrophic Crowdsource glitch.
Technopedia: Crowdstrike Outage Analysis
Quoted in the article.
The familiar blue screen of death (BSOD) wasn’t just a personal annoyance last week – it was a global wake-up call.
CNBC: The CrowdStrike Fail
Quoted in the article
The CrowdStrike fail and next global IT meltdown already in the making
Taking the Highest High Ground
Taking the Highest High Ground: Strategic Prepositioning of Counter Space Weapons and Impacts to Critical Infrastructure
Municipal Data Engines: Community Privacy and Homeland Security
Convergence is when two or more separate technologies are paired together to create a capability that is greater than the original technologies individually. The additional value of the converged system itself now opens up new applications as well potentially new challenges.
Simply Trade Podcast: New Strategies to Secure Ports from Cyber Attacks
As global trade increases, so do cyber threats to the maritime industry. Learn how ports, ships, and supply chains are vulnerable - and what's being done to secure this critical infrastructure.
SpaceNews: National Security Memorandum-22 omitted space entirely. Here’s a path forward.
Quoted in the article.
If you listened closely, you could hear the collective groans of the commercial space community echo through space and time on April 30, 2024. This is the infamous day that the new federal government policy on critical infrastructure (National Security Memorandum 22) was released with nary a mention of space or satellites.
Privacy Luxury?
We’ve all been there. You board a plane for a long flight, and in an annoyingly genius bit of marketing, the airline ensures they walk you right past the business class seats so you can see how comfortable you COULD be.
Space ISAC Conducts Successful TTX at CYSAT Conference
Quoted in the article.
Space Information Sharing and Analysis Center (Space ISAC) is pleased to announce the successful execution of a dynamic Tabletop Exercise named “Saving Selene: Walking on the Moon” during the 2024 CYSAT conference in Paris, marking a significant milestone in proactive space security initiatives.
Proposed Federal AI Oversight Plan Faces Hurdles
Quoted in the article.
Sen. Mitt Romney’s call for enhanced federal oversight of artificial intelligence (AI) faces hurdles, according to experts, who say the technology’s rapid advancement and wide-ranging applications pose significant challenges to effective regulation.