Summary:
At an MIT book launch in Zurich, David Shrier and Alex Pentland advertized a new book co-edited by them, “New Solutions for Cybersecurity.” Some takeaways from the event: The really dangerous cyber attacks are yet to come. All major governments are directly or indirectly involved. A promising strategy of minimizing risks relies on (i) continuous encryption; (ii) no central storage of data but case by case requests for data; and (iii) log queries to manage/monitor access. The European General Data Protection Regulation is helpful. Cybersecurity is big business.
Topics:
Dirk Niepelt considers the following as important: Blockchain, Cybersecurity, internet, Massachusetts Institute of Technology, Notes
This could be interesting, too:
At an MIT book launch in Zurich, David Shrier and Alex Pentland advertized a new book co-edited by them, “New Solutions for Cybersecurity.” Some takeaways from the event: The really dangerous cyber attacks are yet to come. All major governments are directly or indirectly involved. A promising strategy of minimizing risks relies on (i) continuous encryption; (ii) no central storage of data but case by case requests for data; and (iii) log queries to manage/monitor access. The European General Data Protection Regulation is helpful. Cybersecurity is big business.
Topics:
Dirk Niepelt considers the following as important: Blockchain, Cybersecurity, internet, Massachusetts Institute of Technology, Notes
This could be interesting, too:
Fintechnews Switzerland writes Crypto VC Funding Remains Steady at USB in 2024
Fintechnews Switzerland writes 10 Must Read Bitcoin and Blockchain Blogs and Webpages
Fintechnews Switzerland writes BlackRock Plans to Launch Bitcoin-Linked ETP in Switzerland
Dirk Niepelt writes Does the US Administration Prohibit the Use of Reserves?
At an MIT book launch in Zurich, David Shrier and Alex Pentland advertized a new book co-edited by them, “New Solutions for Cybersecurity.” Some takeaways from the event:
- The really dangerous cyber attacks are yet to come.
- All major governments are directly or indirectly involved.
- A promising strategy of minimizing risks relies on (i) continuous encryption; (ii) no central storage of data but case by case requests for data; and (iii) log queries to manage/monitor access.
- The European General Data Protection Regulation is helpful.
- Cybersecurity is big business.