article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Claude (Anthropic’s LLM) was given this prompt: Please summarize the themes and arguments of Bruce Schneier’s book Beyond Fear. Then lay out the most salient criticisms of the book. Key Arguments: Analyze risks empirically using evidence, statistics, and probability rather than intuition. It’s interesting.

article thumbnail

How Surveillance Inhibits Freedom of Expression

Schneier on Security

In my book Data and Goliath , I write about the value of privacy. We know that surveillance has a chilling effect on freedom. People change their behavior when they live their lives under surveillance. This is obviously true for government surveillance, but is true for corporate surveillance as well.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: New book on cyber warfare foreshadows attacks on elections, remote workers

The Last Watchdog

Related: The Golden Age of cyber spying A new book by Dr. Chase Cunningham — Cyber Warfare – Truth, Tactics, and Strategies — accomplishes this in a compelling, accessible way. If you look at the way your IPhone and a Surface Book sign in works that’s where we are going.

Passwords 149
article thumbnail

Information risk and security for professional services

Notice Bored

When you acquire or provide professional services, how do you address the associated information risks? In theory, clients and providers should proactively identify, evaluate and address information risks relating to or arising from professional services in order to avoid, reduce or limit the damage arising from such incidents.

Risk 72
article thumbnail

4 Critical Capabilities Your Cyber Risk Management Tools Should Have

Centraleyes

There’s no avoiding digital risk. However, that doesn’t mean there aren’t plenty of ways to minimize these risks. It’s important your cybersecurity teams have a cyber risk management program in place for this purpose. Efficient risk and vulnerability assessment is another area where automation shines.

article thumbnail

AI and the Evolution of Social Media

Schneier on Security

Now front pages are splashed with stories of social platforms’ role in misinformation , business conspiracy , malfeasance , and risks to mental health. These techniques border on the manipulative, but the biggest risk to users comes from advertising within AI chatbots. And IBM is confident its Watson AI will make your ads better.

Media 296
article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. This was before David Miranda, Greenwald’s partner, was detained at Heathrow airport by the UK authorities; but even without that, I knew there was a risk. It started getting weird.