Remove Data collection Remove Government Remove Technology
article thumbnail

New survey shows US adults split on COVID-19 cell phone tracking and data collection

Tech Republic Security

Governments and organizations are unleashing new technologies to fight the spread of the coronavirus, adding to privacy and data collection concerns.

article thumbnail

How boards can manage digital governance in the age of AI

BH Consulting

If there is one statistic that sums up the increasing pace of technological change, it might well be this. In a presentation titled Digital governance for boards and senior executives: AI, cybersecurity, and privacy , she called on her extensive experience advising boards on these areas. Where should they focus their attention?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Modern Mass Surveillance: Identify, Correlate, Discriminate

Schneier on Security

Communities across the United States are starting to ban facial recognition technologies. Forty major music festivals pledged not to use the technology, and activists are calling for a nationwide ban. Many Democratic presidential candidates support at least a partial ban on the technology.

article thumbnail

AI Governance

Centraleyes

What is the Centraleyes AI Governance Framework? The AI Governance assessment, created by the Analyst Team at Centraleyes, is designed to fill a critical gap for organizations that use pre-made or built-in AI tools. What are the requirements for AI Governance? The primary goals of the AI Governance assessment are threefold.

article thumbnail

How threat actors can use generative artificial intelligence?

Security Affairs

The increasing sophistication of these technologies has made it harder than ever to distinguish real content from fake. A study by the Massachusetts Institute of Technology (MIT) presented in 2019 revealed that deepfakes generated by AI could deceive humans up to 60% of the time. As the technology evolves, so will its misuse.

article thumbnail

Web 3.0 Requires Data Integrity

Schneier on Security

As Web technologies matured, the focus shifted to protecting the vast amounts of data flowing through online systems. Success will require following practical guidelines for maintaining data integrity throughout the AI lifecycle—from data collection through model training and finally to deployment, use, and evolution.

article thumbnail

Secret Service Investigates Breach at U.S. Govt IT Contractor

Krebs on Security

Secret Service is investigating a breach at a Virginia-based government technology contractor that saw access to several of its systems put up for sale in the cybercrime underground, KrebsOnSecurity has learned. government IT contractor that does business with more than 20 federal agencies, including several branches of the military.