In principle, blockchain technology is used to create a blockchain in which counterfeit-proof redundant data structures are logged in chronological order which makes them traceable, immutable and mapped without a central instance. The cyber security properties and the necessary cyber security mechanisms play an important role in the effectiveness and robustness of the … [Read more...] about How Can Blockchain Security and Trustworthiness be Evaluated?
trust
How Causal AI is Reshaping the World
The below is an AI-generated summary of the original article on Causal AI: Causal AI is a new field that combines artificial intelligence and causal reasoning, aimed at providing more accurate predictions and decision-making. It works by understanding the underlying relationships between variables in data, similar to how humans use causal reasoning to understand the world. … [Read more...] about How Causal AI is Reshaping the World
The Top 5 Technology Trends for 2022: The Year of Decentralisation
Last year, I coined 2021 the Year of Digitalism as I foresaw the increase of corporate and governmental data surveillance. Unfortunately, it is safe to say that this has come true with Big Tech becoming more powerful than ever before and governments worldwide implementing Covid tracking apps. What also happened is that the Pandemic has been a strong catalyst for digital … [Read more...] about The Top 5 Technology Trends for 2022: The Year of Decentralisation
MOMENTUM
MOMENTUM will unite the global technology community to reimagine and advance the role of tech in building a better society and advanced economy. At this critical moment in our collective history MOMENTUM provides the ultimate platform for leading tech innovators and pioneers to showcase their insights and perspectives on how to address the fundamental questions and … [Read more...] about MOMENTUM
What is the Zero Trust Model (ZTM)
The Zero Trust Model of information security simplifies how information security is conceptualized by assuming there are no longer trusted interfaces, applications, traffic, networks, or users. It takes the old model ” trust but verify ”and inverts it, because recent breaches have proven that when an organization trusts, it doesn't verify [6]. This model requires that the … [Read more...] about What is the Zero Trust Model (ZTM)