Remove Artificial Intelligence Remove Big data Remove Internet
article thumbnail

Artificial Intelligence and the Attack/Defense Balance

Schneier on Security

Artificial intelligence technologies have the potential to upend the longstanding advantage that attack has over defense on the Internet. This has to do with the relative strengths and weaknesses of people and computers, how those all interplay in Internet security, and where AI technologies might change things.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

Pervasive surveillance capitalism­ -- as practiced by the Internet companies that are already spying on everyone -- ­matters. This isn't sustainable, either for this issue or any of the other policy issues surrounding Internet security. So does society's underlying security needs. We need public-interest technologists.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity for the Public Interest

Schneier on Security

Pervasive surveillance capitalism -- ­as practiced by the Internet companies that are already spying on everyone­ -- matters. This isn't sustainable, either for this issue or any of the other policy issues surrounding Internet security. So does society's underlying security needs. We need public-interest technologists.

article thumbnail

MY TAKE: Why monetizing data lakes will require applying ‘attribute-based’ access rules to encryption

The Last Watchdog

The amount of data in the world topped an astounding 59 zetabytes in 2020, much of it pooling in data lakes. We’ve barely scratched the surface of applying artificial intelligence and advanced data analytics to the raw data collecting in these gargantuan cloud-storage structures erected by Amazon, Microsoft and Google.

article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

Uber used just some of that information to detect one-night stands; your smartphone provider and any app you allow to collect location data knows a lot more. Surveillance capitalism drives much of the internet. Who has our data? It's behind most of the "free" services, and many of the paid ones as well. He's right.

article thumbnail

The Tech Needed to Survive This Decade’s ‘Seismic’ APAC B2B Trends

Tech Republic Security

From generative AI and virtual prototyping to the Internet of Things, blockchain and data analytics, Merkle has predicted that four shifts in the business-to-business market will shape tech buying appetites.

B2B 182
article thumbnail

Cybersecurity Predictions for 2023: My Reflections

Jane Frankland

However, as traditional company perimeters are replaced by an array of network infrastructures which include cloud technologies, remote machines and their users (employees and third parties), edge computing and Internet-of-Things (IoT) devices, threats will rise due to a larger attack surface. Automated technologies.