2019-07-03 - Max Maxfield

Blog: Where Security Meets Privacy

Our technological capabilities are developing faster than are the laws that dictate how they can be used. There are also…

2019-06-25 - Hailey Lynne McKeefry

Securing IoT Devices Against Cybercrime

As more electronics devices are connected and hence hackable, OEMs are having to bring good security practices, designs, and devices…

2019-06-24 - Sally Ward-Foxton

The Current Reality of Facial Recognition

AI is making automated facial recognition for mass surveillance a reality - but at what cost?

2019-05-27 - Tim Bajarin

Blog: Silicon Valley’s Deteriorating Image

Silicon Valley is losing its allure in the eyes of today's college graduates, says a veteran analyst

2019-05-14 - Junko Yoshida

Blog: Should ‘Fairness’ be Irrelevant to Engineers?

"Fairness" strikes many in the engineering community as a nebulous, uncomfortable topic. It seems to them irrelevant to what they…

2019-05-09 - Rick Merritt

Key Takeaways from Google I/O

Google showed expanding use of on-device neural networks to make smartphones more useful and private at its annual developer conference

2019-03-07 - Dylan McGrath

Cryptographers Fear Misguided Encryption Laws

Tal Rabin, manager of the Cryptographic Research Group, said regulations such as GDPR and CCPA will act as a catalyst,…