Mind Matters Natural and Artificial Intelligence News and Analysis

TagComputer security (1950s vs. today)

Cyber security and extortion

Ingredients That Cybersecurity Needs To Actually Work

Software makers continue to produce open data as if we were still living in the 50s, and the Internet had never been invented.

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here as a series. Yesterday’s discussion made the point that the hacker’s target isn’t networks, computers, or users; they are just pathways to the target —gaining control of data is the target. Today, we look at the ingredients that cybersecurity needs to work. Necessary Ingredients Data in this context is digitized information. Digital information is physical, as in, it’s governed by the laws of physics. Data is the result of software converting (digitizing) human usable information into patterns of ones and zeros that are applied to “quantum small” physical substrates: microscopic transistors, electrical pulses, light, radio waves, Read More ›