Generative Data Intelligence

Tag: national security

How the Crypto World Is Preparing for Quantum Computing, Explained

There are two main approaches to address the potential quantum threats: whether to create a quantum-resistant layer to an existing blockchain protocol to...

White House Releases 10 AI Principles for Agencies to Follow

By AI Trends Staff The White House’s Office of Science and Technology Policy (OSTP)  this week released what it has described...

Patch Tuesday, January 2020 Edition

Microsoft today released updates to plug 50 security holes in various flavors of Windows and related software. The patch batch includes a fix...

FinTech Connects… with Brooke Navarro, Head of Business Development & Capital…

We have had the pleasure to connect with Brooke Navarro, Head of Business Development & Capital Markets, at tZERO. tZERO is the global...

Microsoft Patches Windows Vuln Discovered by the NSA

The National Security Agency is publicly acknowledged for its finding and reporting of CVE-2020-0601, marking the start of what it says is a...

How unlike cash will CBDCs be?

In this post I discuss several differences between physical cash, and what I imagine retail Central Bank Digital Currencies (CBDCs) might end up...

Translation mistakes that (might have) led to war

I don’t know exactly how the trend started, but a few years ago, overnight, “underground” Chinese restaurants became all the rage. By underground,...

New Rwandan Cybercrime Law | Step against cybecrimes in Africa

Reading Time: 5 minutesLike many countries around the world, cybercrime is a problem in Rwanda. Malware is a frequent means of conducting...

Is the New Rwandan Cybercrime Law a Step Forward for Cybersecurity in Africa?

Reading Time: 5 minutesLike many countries around the world, cybercrime is a problem in Rwanda. Malware is a frequent means of...

Day 2: RSA Conference

Reading Time: 4 minutesWithout human intervention, a stone is just a stone. But when it is lifted and placed within a broader structure,...

Day 2 RSA Conference 2018 | Comodo Cybersecurity

Reading Time: 4 minutesWithout human intervention, a stone is just a stone. But when it is lifted and placed within a broader...

Day 1 RSA Conference | What Comodo is Offering?

Reading Time: 5 minutesThere’s no better time than the present, or so they say. And when it comes to protecting sensitive data...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?