Remove 12
Remove 2009 Remove Data collection Remove How To Remove Security
article thumbnail

How AI Could Write Our Laws

Schneier on Security

Consider, for example, a 2013 Massachusetts bill that tried to restrict the commercial use of data collected from K-12 students using services accessed via the internet. But lobbying strategies are not always so blunt, and the interests involved are not always so obvious. Political scientist Amy McKay coined the term.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Luckily for cybersecurity startups, there’s no shortage of interest in tomorrow’s next big security vendors. Investments in cybersecurity more than doubled from $12 billion to $29.5 How Do VC Firms Work? How to Land a Round of Funding Securing Data and Infrastructure is Hot. a16z Investments.