Mind Matters Natural and Artificial Intelligence News and Analysis

TagEncryption (and control of data)

big-data-futuristic-visualization-abstract-illustration-stockpack-adobe-stock
Big data futuristic visualization abstract illustration

How Software Makers Will Push Back Against Reforms

Software makers will grumble but insurers may force their hand. That, however, is NOT the Big Battle…

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here as a series. On Friday, we looked at the claim that human data collectors should own your data because it is too complex for you to manage. In this final installment, we look at how tech companies will try to avoid actually having to change anything. Preview of Coming Attractions If policymakers start to move towards implementing the policies suggested above, there will be a pushback from software makers that are not HDCs. They will be unhappy about additional software development costs, and they will play the “It’s the cyberattackers, not us!” card, saying it’s unfair to hold…

propane tanks
Gas cylinders used welding Industrial in factory

Cybersecurity: Put a Lid on the Risks. We Already Own the Lid

Security specialist David Kruger says, data must be contained when it is in storage and transit and controlled when it is in use

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here as a series. Last week’s discussion focused on the ingredients that cybersecurity needs to work. Today, the focus is on putting a lid on risks. Put a Lid on It Fortunately, we have at our disposal untold millions of man hours of safety engineering focused on safely extracting benefits from the use of hazardous things. For example, our homes and the highways we travel on are chock full of beneficial things that can easily kill us, such as high voltage electricity, flammable/explosive natural gas, and tanker trucks filled with flammable or toxic chemicals driving right next…

global-cyber-attack-around-the-world-with-planet-earth-viewed-from-space-and-internet-network-communication-under-cyberattack-with-red-icons-worldwide-propagation-of-virus-online-stockpack-adobe-stock
Global cyber attack around the world with planet Earth viewed from space and internet network communication under cyberattack with red icons, worldwide propagation of virus online

The Physicality Of Data And The Road To Cybersecurity

With cyberattacks trending upward, remember that cyberattack potential is always greater than cyberdefense potential 

“The Physicality Of Data And The Road To Cybersecurity” was originally published by Forbes, July 28, 2021. David Kruger is Co-Founder and VP of Strategy for Absio Corporation and a co-inventor of Absio’s Software-defined Distributed Key Cryptography (SDKC). This article is the second in a series on the physicality of data. The first part is here. Cybersecurity failures have been trending sharply upwards in number and severity for the past 25 years.   The target of every cyberattack is data — i.e., digitized information that is created, processed, stored and distributed by computers. Cyberattackers seek to steal, corrupt, impede or destroy data. Users, software, hardware and networks aren’t the target; they’re vectors (pathways) to the target. To protect data, the current strategy, “defense in…

dvd drive and pda
Laptop with pendrive, sd card, CD and portable hard drive. Concept of data storage

The Physicality Of Data And The Road To Personal Data Ownership

“The Physicality Of Data And The Road To Personal Data Ownership” was originally published by Forbes, July 2, 2021. David Kruger is co-founder and VP of Strategy for Absio Corporation, and a co-inventor of Absio’s Software-defined Distributed Key Cryptography (SDKC). This article is the first in a series on the physicality of data. I’ll follow up with additional installments of this series over the next several weeks, so check back to see those as they become available. All of us tend to conflate the word “data” with the word “information.” Usually, that’s OK, but collapsing data on a computer and information into one thing rather than two separate things makes thinking accurately about data ownership difficult. Here’s why: Information is…