New RFP guide helps CISOs evaluate AI governance tools, focusing on interaction-level security and vendor accountability.
By Chuck Brooks and Bill Bowers.
Every time you send a text, pay for groceries with your phone, or use your health site, you are relying on encryption. It’s an invisible shield that protects your data from prying eyes. Encryption is more than just a technological protection; it is the basis for digital trust.
Encryption is more than just safeguarding data; it is also about protecting people. It helps ensure privacy by protecting persons from spying and exploitation. And it is widely adopted to help ensure digital transaction security. For National Security it serves to protect key infrastructure and government communications. And it has a human rights function by providing citizens with peace of mind by ensuring the safety of their personal information. In places where surveillance is widespread, encryption can even defend free expression and opposition. It is a human right in this digital age.
In my book Inside Cyber: How AI, 5G, IoT, and Quantum Computing Will Transform Privacy and Security, I referred to encryption as the “linchpin of privacy and commerce in a connected society.” Without it, the digital economy would crumble under the strain of criminality, fraud, and spying.
There are currently no details on how the vulnerability is being exploited in the wild. However, Google acknowledged in its monthly Android security bulletin that “there are indications that CVE-2026–21385 may be under limited, targeted exploitation.”
Google’s March 2026 update contains patches for a total of 129 vulnerabilities, including a critical flaw in the System component (CVE-2026–0006) that could lead to remote code execution without requiring any additional privileges or user interaction. In contrast, Google addressed one Android vulnerability in January 2026 and none last month.
Also patched by Google are multiple critical-rated bugs: a privilege escalation bug in Framework (CVE-2026–0047), a denial-of-service (DoS) in System (CVE-2025–48631), and seven privilege escalation flaws in Kernel components (CVE-2024–43859, CVE-2026–0037, CVE-2026–0038, CVE-2026–0027, CVE-2026–0028, CVE-2026–0030, and CVE-2026–0031).
The increasing use of Artificial Intelligence (AI) in the workplace is leading to job displacement and raising concerns among employees about the security of their positions ## Key Insights.
Career Obsolescence Through AI
🔄 AI engineer David becomes obsolete after 7 years and 1,000 lines of code building the AI division, receiving a “sweet pink slip” as the CEO eliminates his role and takes his company car while AI assumes control of the entire division.
Existential Work Motivation.
💭 David questions whether his 7-year dedication was driven by glory, stock options, passion, art, or simply maintaining purpose (“beating heart”), confronting the irony of being replaced by the AI system he built.
Corporate Restructuring Mechanics.
This study investigated the associations between neutrophil-to-lymphocyte ratio, monocyte-to-lymphocyte ratio, and systemic immune-inflammation index with progression of CSVD.
This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.
Microsoft is rolling out new Windows 11 Insider Preview builds that improve security and performance during batch file or CMD script execution.
As Microsoft explained today, IT administrators can now enable a more secure processing mode that prevents batch files from being modified while they run by adding the LockBatchFilesInUse registry value under HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor.
Policy authors can also enable this mode using the LockBatchFilesWhenInUse application manifest control.
Nishada Ramphal, Ari Waisman et al. (Johannes Gutenberg-Universität Mainz) reveal that NIK drives neuroantigen-specific T cell priming by regulating antigen presentation and IL-23 production, identifying NIK as a key orchestrator of myeloid-driven CNS autoimmunity.
Neuroinflammation.
This website uses a security service to protect against malicious bots. This page is displayed while the website verifies you are not a bot.
Ease see my latest Forbes article and have a great weekend! Chuck Brooks by Chuck Brooks.
#artificialIntelligence #ai #future #tech Forbes
AI is redefining power, productivity, security, and sovereignty. Dual-use, convergent, and autonomous AI is the 21st-century force multiplier. Not only is technology advancing, but civilization is about to change.
The 1956 Dartmouth Conference invented the term “artificial intelligence.” Alan Turing and other pioneers shaped the conceptualization of AI. The first systems used symbolic logic and determinism. Certain expert systems excelled but struggled in dynamic, uncertain environments. Fragility, computational capacity, and data accessibility caused “AI winters.”