Richard Seiersen and our guest, Doug Hubbard, are finishing the second edition of How to Measure Anything in Cybersecurity Risk. Doug is here to share the success of the first edition and preview the second edition. With more insights, the second edition will share more more research data, free to.
Will the millennium arrive in darkness and chaos as billions of lines of computer code containing two-digit year dates shut down hospitals, banks, police and fire departments, airlines, utilities, the Pentagon, and the White House? The nightmare scenarios are only too possible, ROBERT SAM ANSON discovers as he traces the birth of the Y2K "bug," the folly, greed, and denial that have muffled two decades of warnings from technology experts, and the ominous results of Y2K tests that lay bare the dimensions of ticking global time bomb
Most of the cameras and sensors rolling out en masse are not mobile. Still, they re not wired, which means Qualcomm s market-leading connectivity technology is becoming more critical than the processors in these devices which increasingly use cloud processing power. Let s talk about this trend and what it means to you.