Cyber Security and Governance: to Centralise or not to Centralise?

Cyber security is a fascinating and r rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used - compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic…

Engaging Fake News: Information Security, Journalism and Artificial Intelligence

Here is some interesting content on the topic of identifying fake news and media content Verifying online information: The absolute essentials. Related to this - AI is rapidly becoming proficient at generating compelling, targeted falsehoods and dissimulating sources across diverse media artefacts, channels and contexts.  In information security there is a turn towards entirely automated…

The Necessity of Proliferating Vulnerabilities: a General Philosophy of Cyber Security

Compressed: It is something of an inevitability of both logic and of physics that the more components a material system has - including the diverse and recombinatory abstractions and logic of algorithmic, information and energy-processing (i.e. computational) systems - the more disordered states of entropy that are also possible, indeed - probable within and as…

Cyber Insecurity: Endless Breaches

Context: New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report There is an enigma here, far beyond the rank foolishness of keeping vast quantities of such sensitive data in an unencrypted format (see the linked article), there is a deeper problem. The more valuable any data is, the more incentive there…