Summary:
At an MIT book launch in Zurich, David Shrier and Alex Pentland advertized a new book co-edited by them, “New Solutions for Cybersecurity.” Some takeaways from the event: The really dangerous cyber attacks are yet to come. All major governments are directly or indirectly involved. A promising strategy of minimizing risks relies on (i) continuous encryption; (ii) no central storage of data but case by case requests for data; and (iii) log queries to manage/monitor access. The European General Data Protection Regulation is helpful. Cybersecurity is big business.
Topics:
Dirk Niepelt considers the following as important: Blockchain, Cybersecurity, internet, Massachusetts Institute of Technology, Notes
This could be interesting, too:
At an MIT book launch in Zurich, David Shrier and Alex Pentland advertized a new book co-edited by them, “New Solutions for Cybersecurity.” Some takeaways from the event: The really dangerous cyber attacks are yet to come. All major governments are directly or indirectly involved. A promising strategy of minimizing risks relies on (i) continuous encryption; (ii) no central storage of data but case by case requests for data; and (iii) log queries to manage/monitor access. The European General Data Protection Regulation is helpful. Cybersecurity is big business.
Topics:
Dirk Niepelt considers the following as important: Blockchain, Cybersecurity, internet, Massachusetts Institute of Technology, Notes
This could be interesting, too:
Dirk Niepelt writes Budgetary Effects of Ageing and Climate Policies in Switzerland
Dirk Niepelt writes SNB Annual Report
Dirk Niepelt writes Banks and Privacy, U.S. vs Canada
Dirk Niepelt writes Bank of England CBDC Academic Advisory Group
At an MIT book launch in Zurich, David Shrier and Alex Pentland advertized a new book co-edited by them, “New Solutions for Cybersecurity.” Some takeaways from the event:
- The really dangerous cyber attacks are yet to come.
- All major governments are directly or indirectly involved.
- A promising strategy of minimizing risks relies on (i) continuous encryption; (ii) no central storage of data but case by case requests for data; and (iii) log queries to manage/monitor access.
- The European General Data Protection Regulation is helpful.
- Cybersecurity is big business.