article thumbnail

Policy vs Technology

Schneier on Security

I teach cybersecurity policy and technology at the Harvard Kennedy School of Government. My most recent two books, Data and Goliath -- about surveillance -- and Click Here to Kill Everybody -- about IoT security -- are really about the policy implications of technology. Technology is inherently future focused.

article thumbnail

Book Review: Present Future — Business, Science and the Deep Tech Revolution

Lohrman on Security

Guy Perelmuter offers an insightful, easy to read, helpful guide to present and future technology in business areas ranging from the future of jobs to AI and from cryptocurrencies to quantum computing.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SOC Technology Failures?—?Do They Matter?

Anton on Security

SOC Technology Failures?—?Do img src: [link] Most failed Security Operations Centers (SOCs) that I’ve seen have not failed due to a technology failure. Let’s stick to mostly technology focused failures. Perhaps the tool vendor made some incorrect assumptions about how their technology is really used in the real world?

article thumbnail

Making Sense of Operational Technology Attacks: The Past, Present, and Future

The Hacker News

When you read reports about cyber-attacks affecting operational technology (OT), it’s easy to get caught up in the hype and assume every single one is sophisticated. But are OT environments all over the world really besieged by a constant barrage of complex cyber-attacks?

article thumbnail

Considerations for Operational Technology Cybersecurity

The Hacker News

Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes, and events. Unlike traditional Information Technology (IT) systems, OT systems directly impact the physical world.

article thumbnail

Facial Scanning by Burger King in Brazil

Schneier on Security

“BK presents Hangover Whopper, a technology that scans your hangover level and offers a discount on the ideal combo to help combat it.” ” The stunt runs until January 2nd.

Marketing 338
article thumbnail

From Past to Present: User Authentication’s Evolution and Challenges

Security Boulevard

From the humble beginnings of legacy authentication mechanisms to today's sophisticated technologies, the journey of user authentication has been a captivating evolution marked by relentless innovation. The post From Past to Present: User Authentication’s Evolution and Challenges appeared first on Security Boulevard.