The worlds of financial crime and cybercrime are colliding, converging into one. The biggest threat to businesses globally is the new cyber-enabled financial crime....
While I add a similar disclaimer to all of my public content, it's particularly important in this case to emphasize that the convictions I've...
As IoT adoption continues to proliferate, manufactures and adopters are increasingly aware of cybersecurity risks to IoT. Yet, even among the IoT security professionals,...
The topic of diversity is not one that most people find in their comfort zone. As I wrote in a previous article on diversity, increasing...
Read Part 1: Why Part 2: How One day, sitting in the shed he called home, the journalist, Oobah Butler, had an idea: he would turn...
Modern theories of the firm remain focused on transaction costs, operational efficiency, employee motivation, leadership, strategy and other related factors. While any of these...
The cybersecurity industry is constantly evolving, facing new threats and challenges every day. To stay ahead of the curve, protect sensitive information, and protect...
There are many adjectives that could be used to describe the global outbreak of COVID-19, but perhaps the simplest might be: fast. The disease has...
It's been a year of contradictions for the telecommunications industry. Like most sectors, it has been heavily impacted by the consequences of the Covid-19 pandemic,...
Where AI, robots, IoT and the so-called Fourth Industrial Revolution are taking us, and how we should prepare for it are some of the hottest topics being discussed today. Perhaps the most striking thing about these discussions is how different people’s conclusions are. Some picture a utopia where machines do all work, where all people receive a universal basic income from the revenues machines generate and where, being freed from a need to work for wages, all people devote their time to altruism, art and culture. Others picture a dystopia where a tiny elite class uses their control of AI to horde all the world’s wealth and trap everyone else in inescapable poverty. Others take a broad view that sees minimal disruption beyond adopting new workplace paradigms.

The Quantum Computing Threat

The secret sauce of quantum computing, which even Einstein called "spooky," is the ability to generate and manipulate quantum bits of data or qubits. Certain computational tasks can be executed exponentially faster on a quantum processor using qubits, than on a classical computer with 1s and 0s. A qubit can attain a third state of superimposition of 1s and 0s simultaneously, encode data into quantum mechanical properties by "entangling" pairs of qubits, manipulate that data and perform huge complex calculations very quickly.
While Stuxnet is gone, the world now knows what can be accomplished through cyber-kinetic attacks. As we approach the 10th anniversary of when Stuxnet was...
It’s almost impossible to turn around nowadays without finding another article predicting the impact that AI and other emerging technologies – the so-called Fourth...
The maritime industry faces a not-so-distant future when ships will be completely autonomous, using navigation data that they receive to plot their own courses...
Several comments in response to my recent competency-focused post led me to also consider the importance of curiosity in the workplace. Interestingly enough, recent experiences have...