Unravelling Tapestries of Cryptographic Entropy

The endless unravelling of assurance at one end of this cryptographic tapestry is simultaneously the enduring incentive, obligation and functional necessity of creating more sophisticated and impermeable logical entanglements at the other end. A question which springs to mind is as to the plausible inevitability of an acceleration of applied human or machine intelligence overtaking…

The Constancy and Enduring Paranoia of Digital Security Updates

Cyber security is now just a part of everyday life. Update, update, update... all this requires is a sufficiently entertaining marketing campaign to elaborate and celebrate the fulfilment of a life spent in the gamified Panopticon of endless technical paranoia and system updates; sitcoms and lifestyle gurus explaining the invaluable personal experience of incessant technical…

Climate Change In Security: Insecurity

It may be a matter of social and psychological necessity that this kind of monumental existential threat - to which we have perhaps long been desensitised by repetition and the droning monotony of unnecessarily adversarial ideological and political competition - carry more impact, more information entropy and cultural gravity when they become a tangible, material,…

Enigma: When Strength is also Weakness

It is so often the case that the strength and the weakness of a technological or organisational system exist in (and as) that same structural and logical artefacts. The indefinite (recursive) extensibility of all material and logical systems is the foundation of, and cause for, this enigmatic duality.

“Centaur” Human/AI Teams to Guard Nasdaq

The Nasdaq will now be protected by a centaur team of human analysts and deep learning systems. The broader context of autonomous network and data system defence is clearly an accelerating arms race. If there is sufficient perceived benefit to be derived to offset the cost of development, which - as the pursuit of profit…

Cyber Security and Governance: to Centralise or not to Centralise?

Cyber security is a fascinating and rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used - compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic coherence…

Engaging Fake News: Information Security, Journalism and Artificial Intelligence

Here is some interesting content on the topic of identifying fake news and media content Verifying online information: The absolute essentials. Related to this - AI is rapidly becoming proficient at generating compelling, targeted falsehoods and dissimulating sources across diverse media artefacts, channels and contexts.  In information security there is a turn towards entirely automated…

Innovation War: Competition, Crime, AI and Security

This is a fascinating domain of analysis: artificial intelligence, cyber security and cyber crime are locked in a spiralling arc of mutual interdependence and reflexive self-definition, an evolving symmetry of mutual causation. The accelerating hyper-inflation of this logical space is complex, dynamic and non-linear.  Asserting core self-organisational principles or symmetries of the self-evident Complex Adaptive…

The Necessity of Proliferating Vulnerabilities: a General Philosophy of Cyber Security

Compressed: It is something of an inevitability of both logic and of physics that the more components a material system has - including the diverse and recombinatory abstractions and logic of algorithmic, information and energy-processing (i.e. computational) systems - the more disordered states of entropy that are also possible, indeed - probable within and as…