Sublime
An inspiration engine for ideas
author. I recall thinking that this paper would be the least interesting paper that I will ever be on.” Adleman could not have been more wrong. The system, dubbed RSA (Rivest, Shamir, Adleman) as opposed to ARS, went on to become the most influential cipher in modern cryptography.
Simon Singh • The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Architecture Defensibility : With asset inventory in hand, how well is your organization able to defend its digital assets? Does the topology of your enterprise architecture map to the current communication flows? Where are the short circuits in your communication flows? The CRQ examines the robustness of this architecture, focusing on network seg
... See moreRik Ferguson • The Cybersecurity Resilience Quotient Measuring Security Effectiveness
legitimate activities with appropriate safeguards by a
Brian Hitchen • GDPR: Guiding Your Business To Compliance: A practical guide to meeting GDPR regulations. (Edition 2)
Although such labels are helpful for grouping risk, these categories need to be decomposed one more level to get a fully qualified risk scenario that provides a greater degree of precision in the risk assessment. For instance, “Theft of data from critical applications” is a useful category, but it does not provide enough detail about what is happen
... See moreISACA • Home / Resources / ISACA Journal / Issues / 2020 / Volume 3 / Communicating Technology Risk to Nontechnical People
The emergence of big data and Artificial Intelligence (AI) technology is reshaping the world. While the technological revolution improves the quality of our life, new concerns are triggered. The superhuman capability enables AI to outperform human workers in many data- and/or computing-intensive tasks. Also, digital superpowers are showing arroganc
... See moreYu Chen • Constructing Trustworthy and Safe Communities on a Blockchain-Enabled Social Credits System
Zefram Lou • Why Voting Tokens Are F**king Horrible, And 4 Ways to Fix Them
Mike Goldin • Token-Curated Registries 1.0
For pseudonyms to have a value, they need to be underwritten by trusted institutions.