Intel on AI Privacy and Security

By | 2017-10-18T10:41:50+00:00 October 18th, 2017|

Intel today published a new report on artificial intelligence and public policy that includes specific recommendations on privacy and security: "Where the data used for AI originates from identifiable individuals, appropriate protections should be implemented to ensure that data is deidentified, lawfully accessed, processed, and kept safe. Robust privacy regulatory frameworks for the protection of

Hirsch and Lamont Age of the Cyberpro

By | 2017-10-17T10:58:07+00:00 October 17th, 2017|

Dennis Hirsch and Keir Lamont have a nice analysis for IAPP of the need for cross-disciplinary training in cybersecurity.  CSU is developing an interdisciplinary Cybersecurity MS program that implements this idea with required coursework from law, business and engineering.  The initial program proposal is under review at the state. The siloed data governance professions of

Watch out: Russia’s tactics will evolve | CEPA

By | 2017-10-17T10:32:18+00:00 October 17th, 2017|

The belated is merely annoying; all the people now fussing about Kremlin interference in last year’s U.S. presidential election seem to think this was the first instance of Russian political warfare. In fact, it was just the latest and most conspicuous. Hardened participants in the struggle for freedom and democracy in and around Russia should

Don’t Worry About KRACK – Lawfare

By | 2017-10-17T10:14:05+00:00 October 17th, 2017|

DayZero: Cybersecurity Law and Policy KRACK–the vulnerability in the WPA2 security protocol proven this morning–is an interesting and amusing vulnerability from a technical standpoint and a great lesson in how our computer security is “dancing madly on the lip of a volcano”. It demonstrates a sober lesson for cybersecurity policy, showing just how tough seemingly

Government security tokens hackable-Politico Morning Cybersecurity

By | 2017-10-17T10:12:34+00:00 October 17th, 2017|

From Politico Morning Cybersecurity The physical security tokens carried by senior government officials and industry executives can be hacked, according to blockbuster research revealed Monday. The software used to generate private cryptographic keys for the tokens' chips, which are manufactured by a company called Infineon, can be reverse-engineered, letting hackers "factor" - or identify - the keys and