"The exponential improvement in the elements of computing is not about to run out of gas. We've got generations more of it to go. Geeks out there are going to take that computational power and that ocean of data and do things that astonish us."
In the coming months, we can expect more curves, as we watch the lines connecting problems and solutions for net neutrality.
Hackathons are taking the world by storm, and at the forefront of this movement is former MHacks Organizer Dave Fontenot.
Cyberterrorism is on the upswing and algorithmic terrorism is the next iteration. So much of our economy is underpinned by electronic trading that protecting the markets is paramount.
Computers run the world--our airports, airplanes, cars, hospitals, stock markets and power grids--and these computers too are shockingly vulnerable to attack. Though we're racing forward at breakneck speed to connect all the objects in our physical world to the Internet, we still fundamentally do not have the trustworthy computing required to make it so.
Here, finally, is the great black-ice pileup between so-called "IT" and "marketing." And banks suck it up to avoid revealing their vulnerability and lack of internal controls to regulatory watchdogs, customers -- and thieves.
ATMs randomly coughing up cash -- and a lot of it. Like an international lottery, the phenomenon has occurred in more than 30 countries, leading to potentially as much as $1 billion in stolen funds.
A lot of what passes for common sense about this subject is just plain wrong -- and often risky. Here's a list of some mistaken beliefs that can get you ripped off or hacked, or your computer infected with something nasty.
What Time Cook seems unable or unwilling to recognize, is that privacy and security are inextricably linked. You can't have the former without the latter, and just because Apple won't reveal information to the government doesn't mean that information could never be hacked by criminals.
There's now a technology to replace almost everything in your wallet. Your cash, credit cards, and loyalty programs are all on their way to becoming obsolete.
Productivity is seriously hindered once an internet blacklisting is placed on a company as a result of zombie attacks or low security posture. Don't let this happen to your company.
Cyber criminals know that their electronic attacks are likely to be both successful and profitable, and therefore no one should expect any drop in the pace or intensity of such attacks. There are steps companies can take to minimize the losses associated with such attacks.
If the government ran (or helped launch) a "trustable" federated identity (TFI) service using technology available today from the private sector, that could go a long way to securing our computing infrastructure.
Health insurance provider Anthem announced late Wednesday, Feb. 4 that it had experienced a massive security breach which exposed the information of up to 80 million of its current and former customers, as well as employees.
If the first 15 years of the 21st century were defined by the so-called Axis of Evil -- the phrase George W. Bush applied to Iraq, Iran, and North Korea for their support of terrorists -- the next 15 years will likely be defined by the Access of Evil, as state and non-state cyberterrorists use technology to bypass our defenses in ways that damage businesses, lives, and nations.
The last several years have been good for criminal hackers and bad for consumers. From last year's unprecedented string of major retailer breaches to the massive JP Morgan hack and Sony's epic debacle, hackers have been almost unstoppable. So what should consumers expect for 2015?