Remove technology-progress-and-climate
article thumbnail

Technology, Progress, and Climate

We Live Security

The climate solutions we need to transform every sector are here. The post Technology, Progress, and Climate appeared first on WeLiveSecurity. The question is: what role will you play in this transformation? You, your community, your business, your government?

article thumbnail

Existential Risk and the Fermi Paradox

Schneier on Security

In A Hacker’s Mind (coming in February 2023), I write: Our societal systems, in general, may have grown fairer and more just over the centuries, but progress isn’t linear or equitable. Technology changes the amplitude of the noise. This becomes catastrophic as the effects of that attack become greater.

Risk 257
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why We Need To Talk About DigitALL

Jane Frankland

It’s run by the United Nation’s and this year, their theme was ‘DigitALL: Innovation & Technology for Gender Equality.’ It’s run by the United Nation’s and this year, their theme was ‘DigitALL: Innovation & Technology for Gender Equality.’

Education 130
article thumbnail

MY TAKE: ‘Digital trust’ has a huge role to play mitigating cybersecurity threats, going forward

The Last Watchdog

I had the chance to talk about DigiCert’s perspective with Jason Sabin, DigiCert’s Chief Technology Officer. Modern digital systems simply could not exist without trusted operations, processes and connections. They require integrity, authentication, trusted identity and encryption. Related: Leveraging PKI to advance electronic signatures.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. The Crypto Wars have been waging off-and-on for a quarter-century. These benefits are mutually exclusive.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

It's an impassioned debate, acrimonious at times, but there are real technologies that can be brought to bear on the problem: key-escrow technologies, code obfuscation technologies, and backdoors with different properties. The Crypto Wars have been waging off-and-on for a quarter-century. These benefits are mutually exclusive.

article thumbnail

Consumer cyberthreats: predictions for 2024

SecureList

As ChatGPT went viral, other chatbots powered by generative AI appeared, and these technologies were quickly adopted as assistants in diverse areas including education. As we look to 2024, we believe that the consumer threat landscape will be heavily influenced by political, cultural, and technological events and trends.

VPN 90