Menu

Blog

Archive for the ‘security’ category: Page 27

Feb 7, 2023

Monica Medina, Assistant U.S. Secretary, Oceans & International Environmental & Scientific Affairs

Posted by in categories: law, policy, security, sustainability

Monica P. Medina (https://www.state.gov/biographies/monica-p-medina/) is Assistant Secretary for the Bureau of Oceans and International Environmental and Scientific Affairs at the U.S. Department of State. She was also recently appointed as United States Special Envoy for Biodiversity and Water Resources.

Previously, Secretary Medina was an adjunct professor at Georgetown University’s School of Foreign Service. She was also a Senior Associate on the Stephenson Ocean Security Project at the Center for Strategic and International Studies, and Co-Founder and Publisher of Our Daily Planet, an e-newsletter on conservation and the environment.

Continue reading “Monica Medina, Assistant U.S. Secretary, Oceans & International Environmental & Scientific Affairs” »

Feb 3, 2023

Google invests $300 million in Anthropic as race to compete with ChatGPT heats up

Posted by in categories: robotics/AI, security

Check out all the on-demand sessions from the Intelligent Security Summit here.

According to new reporting from the Financial Times, Google has invested $300 million in one of the most buzzy OpenAI rivals, Anthropic, whose recently-debuted generative AI model Claude is considered competitive with ChatGPT.

According to the reporting, Google will take a stake of around 10% and Anthropic will be required to use the money to buy computing resources from Google Cloud. The new funding will value the San Francisco-based company at around $5 billion.

Jan 30, 2023

QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates

Posted by in category: security

QNAP has released security updates to address a critical vulnerability (CVE-2022–27596 / CVSS 9.8) in the NAS devices.

Jan 28, 2023

ISC Releases Security Patches for New BIND DNS Software Vulnerabilities

Posted by in category: security

ISC has released patches for multiple vulnerabilities in the BIND DNS software suite that could lead to a DoS condition and system failures.

Jan 27, 2023

Where Is Tech Going in 2023?

Posted by in categories: business, robotics/AI, security

A group of McKinsey’s technology practice leaders have taken a look at what 2023 might hold, and offer a few new year’s tech resolutions to consider: 1) Look for combinatorial trends, in which the sum impact of new technologies create new opportunities. 2) Prep boards for tipping point technologies. 3) Relieve the bureaucratic burden on your engineers to increase their productivity. 4) Look for new opportunities in the cloud. 5) Take advantage of how the cloud is changing security. 6) Take advantage of decentralized AI capabilities — and what this technology might mean for your business model.

Page-utils class= article-utils—vertical hide-for-print data-js-target= page-utils data-id= tag: blogs.harvardbusiness.org, 2007/03/31:999.346784 data-title= Where Is Tech Going in 2023? data-url=/2023/01/where-is-tech-going-in-2023 data-topic= AI and machine learning data-authors= Aamer Baig; Jan Shelly Brown; William Forrest; Vinayak HV; Klemens Hjartar; Lareina Yee data-content-type= Digital Article data-content-image=/resources/images/article_assets/2023/01/Jan23_06_1405011898-383x215.jpg data-summary=

Six trends that will define the next year, according to McKinsey experts.

Jan 27, 2023

Chrome for Android now lets you lock your incognito session

Posted by in categories: privacy, robotics/AI, security

Chrome is rolling out an update for Android users that lets them lock their incognito sessions with a password code or biometric info when they exit the app. The feature has been available for iOS users for some time, but now it’s being made available to folks using Chrome on Android.

Users can activate this feature by going to Chrome Settings Privacy & Security and turning on the “Lock incognito tabs when you close Chrome” toggle. So next time when a user exits Chrome, their incognito session will automatically be locked. To unlock the incognito tabs, you can use the biometric unlock on the phone such as a fingerprint unlock or lock code.

Jan 27, 2023

Researchers find ways to improve the storage time of quantum information in a spin rich material

Posted by in categories: chemistry, computing, quantum physics, security

An international team of scientists have demonstrated a leap in preserving the quantum coherence of quantum dot spin qubits as part of the global push for practical quantum networks and quantum computers.

These technologies will be transformative to a broad range of industries and research efforts: from the security of information transfer, through the search for materials and chemicals with novel properties, to measurements of fundamental physical phenomena requiring precise time synchronization among the sensors.

Spin-photon interfaces are elementary building blocks for that allow converting stationary quantum information (such as the quantum state of an ion or a solid-state spin qubit) into light, namely photons, that can be distributed over large distances. A major challenge is to find an interface that is both good at storing quantum information and efficient at converting it into light.

Jan 26, 2023

Quantum Safe Cryptography — A Quantum Leap Needed Now

Posted by in categories: biotech/medical, computing, encryption, finance, information science, internet, mathematics, quantum physics, security

Whether we realize it or not, cryptography is the fundamental building block on which our digital lives are based. Without sufficient cryptography and the inherent trust that it engenders, every aspect of the digital human condition we know and rely on today would never have come to fruition much less continue to evolve at its current staggering pace. The internet, digital signatures, critical infrastructure, financial systems and even the remote work that helped the world limp along during the recent global pandemic all rely on one critical assumption – that the current encryption employed today is unbreakable by even the most powerful computers in existence. But what if that assumption was not only challenged but realistically compromised?

This is exactly what happened when Peter Shor proposed his algorithm in 1995, dubbed Shor’s Algorithm. The key to unlocking the encryption on which today’s digital security relies is in finding the prime factors of large integers. While factoring is relatively simple with small integers that have only a few digits, factoring integers that have thousands of digits or more is another matter altogether. Shor proposed a polynomial-time quantum algorithm to solve this factoring problem. I’ll leave it to the more qualified mathematicians to explain the theory behind this algorithm but suffice it to say that when coupled with a quantum computer, Shor’s Algorithm drastically reduces the time it would take to factor these larger integers by multiple orders of magnitude.

Prior to Shor’s Algorithm, for example, the most powerful computer today would take millions of years to find the prime factors of a 2048-bit composite integer. Without Shor’s algorithm, even quantum computers would take such an inordinate amount of time to accomplish the task as to render it unusable by bad actors. With Shor’s Algorithm, this same factoring can potentially be accomplished in a matter of hours.

Jan 24, 2023

Joelle Elbez-Uzan — Head, Nuclear Safety Office — DEMO Fusion Reactor — EUROfusion

Posted by in categories: nuclear energy, physics, security

Is the Head, Nuclear Safety Office, overseeing the development of the DEMO Fusion Reactor (https://euro-fusion.org/programme/demo/), at EUROfusion.

DEMO (DEMOnstration Power Plant) refers to a proposed class of nuclear fusion experimental reactors that are intended to demonstrate the net production of electric power from nuclear fusion.

Continue reading “Joelle Elbez-Uzan — Head, Nuclear Safety Office — DEMO Fusion Reactor — EUROfusion” »

Jan 19, 2023

New nanoparticles deliver therapy throughout the brain and edit Alzheimer’s gene in mice

Posted by in categories: biotech/medical, engineering, genetics, nanotechnology, neuroscience, security

Gene therapies have the potential to treat neurological disorders like Alzheimer’s and Parkinson’s diseases, but they face a common barrier—the blood-brain barrier. Now, researchers at the University of Wisconsin-Madison have developed a way to move therapies across the brain’s protective membrane to deliver brain-wide therapy with a range of biological medications and treatments.

“There is no cure yet for many devastating disorders,” says Shaoqin “Sarah” Gong, UW-Madison professor of ophthalmology and visual sciences and biomedical engineering and researcher at the Wisconsin Institute for Discovery. “Innovative brain-targeted delivery strategies may change that by enabling noninvasive, safe and efficient delivery of CRISPR genome editors that could, in turn, lead to genome-editing therapies for these diseases.”

CRISPR is a molecular toolkit for editing (for example, to correct mutations that may cause disease), but the toolkit is only useful if it can get through security to the job site. The is a membrane that selectively controls access to the brain, screening out toxins and pathogens that may be present in the bloodstream. Unfortunately, the bars some beneficial treatments, like certain vaccines and gene therapy packages, from reaching their targets because in lumps them in with hostile invaders.

Page 27 of 134First2425262728293031Last