Layer 8 HackingHacking above and beyond the technical layers; hacking by targeting the user, the business processes, or the organisation itself.
For further information visit this external link. |
IoT SecurityIn the future, IoT devices will have a white-goods-equivalent rating scale, measuring not energy, but controls.
For further information visit this external link. |
AI SecuritySecurity audits for Human Compatible Algorithms (HCAs) check human values are included in the goals of the machines.
For further information visit this external link. |