article thumbnail

December’s Reimagining Democracy Workshop

Schneier on Security

Indeed, as a technologist who studies complex systems and their security , I believe the very idea of representative government is a hack to get around the technological limitations of the past. In December 2022, I organized a workshop to discuss these and other questions. Personally, I was most interested in how these systems fail.

article thumbnail

Security Risks of AI

Schneier on Security

Stanford and Georgetown have a new report on the security risks of AI—particularly adversarial machine learning—based on a workshop they held on the topic. The understanding of how to secure AI systems, we concluded, lags far behind their widespread adoption.

Risk 101
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to activate multifactor authentication everywhere

Thales Cloud Protection & Licensing

How to activate multifactor authentication everywhere. Many employees work in areas where mobile phones are not allowed such as production workshops, data centers, hospitals, or labs that house medical analysis equipment. Make sure the solution you choose is built for security. Data security. Thu, 01/20/2022 - 10:19.

article thumbnail

How to Build a Metadata Plan in Five Steps

AIIM

How do I develop a Metadata strategy? Today, we'll be taking the next step and exploring how to build your Metadata plan. During this step, conduct interviews, surveys, or workshops to gain input from business, IT, and records management stakeholders. What is the business value of Metadata? Let's get started!

Metadata 163
article thumbnail

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. In this blog, we provide tips for getting your cyber security career started no matter your background. How much experience do you need? Do you need industry connections?

article thumbnail

How to activate multifactor authentication everywhere

Thales Cloud Protection & Licensing

How to activate multifactor authentication everywhere. Many employees work in areas where mobile phones are not allowed such as production workshops, data centers, hospitals, or labs that house medical analysis equipment. Make sure the solution you choose is built for security. Data security. Thu, 01/20/2022 - 10:19.

article thumbnail

Empirical Evaluation of Secure Development Processes

Adam Shostack

Earlier this year, I helped to organize a workshop at Schloss Dagstuhl on Empirical Evaluation of Secure Development Processes. I’m also pleased to say that the workshop report is now available at [link].