AP on ComputerScienceFutures

10 Followers
14 Following
25 Posts

Avant-garde innopreneur, Australian computer scientist, futurist, data science + AI expert, vizualisation guru, cryptgrphr and information security specialist. 30+ years’ experience. +1 Snowboarder + MTBer.

PGP Key Fingerprint:

6F15 B471 6EE1 A1A9 1AC8 320E 048B FB91 86EA DCE3

Bloghttps://blog.andrewprendergast.com
LinkedInhttps://www.linkedin.com/in/aprendergast
Twitterhttps://twitter.com/CompSciFutures
Instagramhttps://www.instagram.com/CompSciFutures
GitHubhttps://github.com/CompSciFutures
ResearchGatehttps://www.researchgate.net/profile/Andrew_Prendergast5
@tychotithonus @robertatcara next stop:#Y2K38. I don’t think the new generation of kids quite have the same rigour.
Why US agencies buy personal info and what it means in the age of AI

The government faces legal restrictions on gathering personal information on citizens, but the law is largely silent on agencies purchasing the data.

Military Times

My latest urban dictionary entry...

As a computer scientist, this is particularly pertinent - I could be doing some computer science and suddenly be classified as something I'm not.

#prism #nsa #cia #ethics #DigitalEthics

@ChrisJohnRiley Oh, it wasn't easy working it out. Took me over 6 months and I went through many many books.

@ChrisJohnRiley There's actually 12 pillars, if you want to talk about necessary, sufficient & complete security.

They arrange such that you can't have any consequent pillar without it's antecedents.

See http://dx.doi.org/10.13140/RG.2.2.12609.84321

Perhaps let CMU SEI know :)

#FIRSTCON23 #CyberAttack #InfoSec #CyberSec

WHAT IS THE DIFFERENCE BETWEEN A THREAT, A VULNERABILITY AND A BUG?

In this latest excerpt from the forthcoming Software Engineering Manual of Style textbook I've been working all year on, we look at the difference between cyber threats, vulnerabilities and bugs - three closely related but very different incantations of ultimately, the same thing: risk vectors.

A PDF of the related processes with notes is available here:
http://dx.doi.org/10.13140/RG.2.2.23428.50561
(DOI: 10.13140/RG.2.2.23428.50561)

The textbook's homepage is here:
https://www.linkedin.com/pulse/software-engineering-manual-style-3rd-edition-andrew-prendergast

Follow me on LinkedIn for more updates on InfoSec, SE, CS & AI...

.\p

#cyberattack #softwaredevelopment #informationsecurity #cybersecurity #threatintelligence #vulnerability #bugs

@mariyadelano @caseynewton @zoeschiffer @alexeheath Don’t worry he’ll fix it, anyone in Silicon Valley that doesn’t have a can do attitude doesn’t last long. Twitter excluding itself from Silicon Valley is over.

Heads up, World Economic Form EU defence Live Stream starts in under an hour.

I expect Cyber Security will get a mention.

https://www.youtube.com/watch?v=_Q9z4lC2unM

#cybersecurity #cyberattack #infosec #cybersec #informationsecurity #cybersecurity #shieldsup #cyberdefense #cyberdefence #davos #davos2023 #wef2023 #worldeconomicforum

.\p

---

Following last year's landmark Versailles summit bolstering Europe’s defence capabilities and Denmark’s successful referendum to join Europe’s defence policy, are we witnessing the birth of a European defence union? The World Economic Forum (WEF) brings together the leaders of Poland, Lithuania, and opposition leader in exile Sviatlana Tsikhanouskaya to debate Europe's defense.

Speakers:
-President of Lithuania Gitanas Nauseda,
-President of Poland Andrzej Duda,
-President of North Macedonia Stevo Pendarovski,
-Belarus opposition leader Sviatlana Tsikhanouskaya,
-Spanish FM José Manuel Albares Bueno,
-Editor of Politico, Matthew K. Kaminski

Live: In Defense of Europe | World Economic Forum defense session | WEF Live

YouTube

A bit of light reading for the break.

.\p

Hello Infosec Experts.

Studying at Stanford, back in Melbs soon.

I solemly do swear that I shall only twett drunk. But always goodsh. Ethisistic, visionarish 'thoughty leadershipy' mind grenades.

Just like any Silicon Valley futurist should.