Alongside these technological advances new ethical ideas and powerful moral ideologies have appeared which force us to consider the application of these emerging technologies. In attempting to navigate utopian and dystopian visions of the future, it becomes clear that technological progress and its moral...
Transparency is a key component of building trust in cybersecurity. Companies that are open about their security practices and publicize their security posture are typically more trustworthy. This doesn’t mean revealing every detail of your security measures but rather being upfront about your process...
Over the past few years, the notion of ethics has come up quite a bit within cybersecurity circles. One of the leading voices, has been my colleague, Ivan Kwiatkowski. Earlier this year, he gave a talk called Ethics in Cyberwar Times at the Pass The Salt conference. I sat down with ...
CISOs and their cybersecurity teams have the ethical responsibility to engage in close supervision over the behavior of their AI algorithms, tailoring the specific type of algorithm to the nature of its tasks. To stand on ethical principle, cybersecurity teams must create AI algorithms that can pr...
As voice and image fraud becomes rapidly more sophisticated, Cyber Security Professor Oli Buckley outlines the current state of the problem and provides some countermeasures. More Modern slavery Modern slavery signs that accountants are well placed to spot Article 30 Jul 2024 Businesses are inc...
Behavior is the only security factor that can be influenced–outside of technology–to improve compliance. Cybersecurity Study Reveals 64% of businesses anticipate cyber attack within the coming year. So, what can organizations do to create a culture where employee behavior follows the ethical ...
Cybersecurity is generally recognised as an important concern that requires continuous vigilance from individuals, organisations and society. It is also well recognised that some systems are easier to protect from malicious interventions than others. One distinguishing factor between more secure and less ...
An examination of the theories, laws and practices regarding the private the private ownership of intellectual work in the United States. In R. A. Spinello & H. T. Tavani (Eds.), Readings in cyberethics (pp.␣263–279). Sudbury, MA: Jones and Bartlett. Google Scholar Winkler, B. ...
We have over 40 years of experience helping organisations from every sector and corner of the world. Our in-depth knowledge of political, regulatory and operational environments coupled with deep cyber security expertise and technological capabilities helps you approach ethics, compliance and governance ...
As consumers become more mindful of the sustainability of the products they choose, they want reassurance that the materials consumed reflect responsible practices throughout the value chain Cyber security As cyber attacks become more prevalent, we are investing significantly in enhancing our cyber securi...