Katharine Hayhoe: The most important climate equation | Starmus highlights Security The atmospheric scientist makes a compelling case for a head-to-heart-to-hands… rooter February 19, 2025 1 min read 0
Story About Medical Device Security Security Ben Rothke relates a story about me working with a… rooter February 18, 2025 1 min read 0
What is Cloud Security? Security Cloud security encompasses the technologies, policies, controls, and services that… rooter February 18, 2025 1 min read 0
Atlas of Surveillance Security The EFF has released its Atlas of Surveillance, which documents… rooter February 17, 2025 1 min read 0
Brian Greene: Until the end of time | Starmus highlights Security The renowned physicist explores how time and entropy shape the… rooter February 17, 2025 1 min read 0
Roeland Nusselder: AI will eat all our energy, unless we make it tiny | Starmus highlights Security Left unchecked, AI’s energy and carbon footprint could become a… rooter February 17, 2025 1 min read 0
Untrustworthy AI: How to deal with data poisoning Security You should think twice before trusting your AI assistant, as… rooter February 17, 2025 1 min read 0
This month in security with Tony Anscombe – January 2025 edition Security DeepSeek’s bursting onto the AI scene, apparent shifts in US… rooter February 17, 2025 1 min read 0
How scammers are exploiting DeepSeek’s rise Security As is their wont, cybercriminals waste no time launching attacks… rooter February 17, 2025 1 min read 0
Patch or perish: How organizations can master vulnerability management Security Don’t wait for a costly breach to provide a painful… rooter February 17, 2025 1 min read 0