“Centaur” Human/AI Teams to Guard Nasdaq

The Nasdaq will now be protected by a centaur team of human analysts and deep learning systems. The broader context of autonomous network and data system defence is clearly an accelerating arms race. If there is sufficient perceived benefit to be derived to offset the cost of development, which - as the pursuit of profit…

Cyber Security and Governance: to Centralise or not to Centralise?

Cyber security is a fascinating and r rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used - compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic…

Engaging Fake News: Information Security, Journalism and Artificial Intelligence

Here is some interesting content on the topic of identifying fake news and media content Verifying online information: The absolute essentials. Related to this - AI is rapidly becoming proficient at generating compelling, targeted falsehoods and dissimulating sources across diverse media artefacts, channels and contexts.  In information security there is a turn towards entirely automated…

Innovation War: Competition, Crime, AI and Security

This is a fascinating domain of analysis: artificial intelligence, cyber security and cyber crime are locked in a spiralling arc of mutual interdependence and reflexive self-definition, an evolving symmetry of mutual causation. The accelerating hyper-inflation of this logical space is complex, dynamic and non-linear.  Asserting core self-organisational principles or symmetries of the self-evident Complex Adaptive…

The Necessity of Proliferating Vulnerabilities: a General Philosophy of Cyber Security

Compressed: It is something of an inevitability of both logic and of physics that the more components a material system has - including the diverse and recombinatory abstractions and logic of algorithmic, information and energy-processing (i.e. computational) systems - the more disordered states of entropy that are also possible, indeed - probable within and as…

Digital Insecurity

There exists a non-trivial difference and distance between the grandiose claims of technological consistency and efficacy made by corporations and the empirical facts of an unrelenting litany of catastrophic security failures.