The Bletchley Declaration: The Imitation Game of a Different Kind
Last week, the United Kingdom hosted the AI Safety Summit, the first ever international conference on the safety and regulation of artificial intelligence. With attendees from over 30 governments and international organizations, it represented the beginning of long-term international cooperation on AI safety, with the next summit already planned in 2024 in France.
Nov 08, 2023
The Human Vector
Every cybersecurity professional who has used ChatGPT or any other GPT has had one of the four impulses our guest author Jürgen Schulze discusses in this blog.
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
Join Alexander Klimburg, Senior Fellow at the Hague Center for Strategic Studies and former Head of the Center for Cybersecurity at the World Economic Forum, as he discusses the concepts of information and cyber warfare, as well as the implications for CISOs and board dynamics.
Oct 24, 2023
Cyberkriminalität profitiert von sicheren Häfen
Cyberkriminelle nutzen Desinformationskampagnen, um Informationssicherheitssysteme auszuhöhlen. Unser Gespräch mit dem Chefredakteur des Tagesspiegel Background Cybersecurity beleuchtet, wie der Blick aufs große Ganze gewährleistet werden kann.
Oct 18, 2023
A Secure Supply Chain is Impossible. Here is why.
Cyberattacks in the global supply chain are the new wild frontier. Many will feature theft of credentials, later used for major attacks including ransomware on much larger partner companies. But the nature of supply chains means they can never be 100% secure, but we can do better if we stick together.
Sep 19, 2023
Tech vs. Law: A Dialectical Approach to Balancing Innovation and Regulation
The complex relationship between law and technology presents a world of possibilities. While some may view law as a constraint on innovation, it serves a crucial role in safeguarding public welfare and ensuring accountability. Engaging discussions on this dynamic intersection create a space for diverse voices and foster fruitful collaborations among stakeholders.
Sep 12, 2023
Navigating China's Cybersecurity Laws and Their Economic Impact
Tune in to Mary Kissel, Executive Vice President and Senior Policy Advisor at Stephens Inc. discussing the business and cyber risks emanating from the Chinese market.
Sep 07, 2023
Who is Responsible for Operational Technology Security?
We recommend that all organizations that have Operational Technology (OT) consolidate the security functions and management under the enterprise CISO. Though most organizations with OT are not aligned that way today, we predict that by 2025 more than 60% will have more centralized security control over both types of environments.
Sep 05, 2023
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Dive into the enigmatic realm of quantum computing, where advanced technology parallels magic. While space exploration and AI seamlessly integrate into daily life, quantum computing remains a captivating mystery. Quantum computers won't replace classical ones; instead, they birth novel algorithms for once-insolvable problems. The blog outlines challenges in constructing and expanding quantum computers due to their fragility and noise.
Aug 24, 2023
Beyond Boundaries: The Geopolitics of Cyberspace
The concept of sovereignty serves as the foundation for various rules and principles of international law and is considered to be the cornerstone of international law. The modern conception of the state is characterized by notions of territory as fixed boundaries, under the power and rule of specific states, and protected by international laws which legitimize the state as territorially fixed. Thus, sovereignty and the international legal personality of states are inextricably linked.
Aug 15, 2023
Securing the Digital Universe: Where Do We Even Start?
What a huge topic. The Digital Universe. Is this more than the Metaverse or less? Anyway: We live in the Digital Age. The vast majority of organizations rely on digital services to run at least parts of their business. Every one of us is consuming such digital services. They are ubiquitous. But this bigger ecosystem of connected digital services, of consumers and customers and citizens, of businesses and governments, of business partners and suppliers, of devices and things is at risk.
Aug 08, 2023
Securing the Autonomous World by Reinforcing Cybersecurity
Automation powered by artificial intelligence and machine learning has grown exponentially in the past few years. Companies are leveraging the benefits of automating to simplify complex and redundant tasks and optimize efficiency. Automation is also becoming a key player in cybersecurity for threat detection, incident response, and vulnerability management in real-time.
Aug 01, 2023
Future Cybersecurity Threats: Advanced Disinformation Campaigns
Cyberspace greatly enhances an actor's ability to engage in activities that can yield geopolitical and economic gains without resorting to the use of force. With the advent of cyberspace, various actors, including both state and non-state entities, have taken advantage of its vast interconnectedness to partake in a wide range of activities, including malicious behavior.
Jul 21, 2023
Future Cybersecurity Threats: Be Prepared
Preparing for future cybersecurity threats can be daunting, but it really doesn’t have to be the case if cyber security leaders recognize the true nature of the challenge. An analysis of past cyber-attacks reveals that they tend to be cyclic and lack any real innovation.
Jul 18, 2023
The Rise of AI Is Revolutionizing Cyber-Attacks
Artificial Intelligence (AI) has been a revolutionary force in several fields, transforming industries and increasing efficiency. Its impact, however, is not restricted to good applications. AI has also found its way into the hands of cyber attackers, allowing them to exploit weaknesses, launch targeted attacks, and evade traditional security measures more effectively. Certainly, AI can help attackers just as easily as it can help defenders.
Jul 11, 2023
Inside cyberevolution: What to Expect at KuppingerCole's New Conference
Join KuppingerCole CEO Berthold Kerl to find out what cyberevolution is all about and why you should join.
Jul 06, 2023
AI and Cybersecurity: A New Hope for Cyber Defenders?
Statistics from around the world clearly show that data breaches, ransomware attacks, and other cyberthreats are on the rise. Everyone has high hopes for Artificial Intelligence (AI) technologies that promise to reshape the cybersecurity and finally tip the scale in favor of cyber defenders.
Jul 04, 2023
The Triple Threat: AI Ethics, Bias, and Deepfakes in Cybersecurity
Artificial intelligence has radically transformed the field of cybersecurity. Although it is considered a game changer, the adoption of AI presents significant ethical challenges, bias, and the growing risk of deepfakes.
Jun 29, 2023