
Artificial Intelligence: Welcome to the Age of Disruptive Surprise
With the last few years of progress in artificial intelligence, it is hard to look forward without excitement…and apprehension. If you are paying attention at […] More
With the last few years of progress in artificial intelligence, it is hard to look forward without excitement…and apprehension. If you are paying attention at […] More
Ripped out of the pages of science fiction novels, artificially intelligent, self-aware weapons systems could become a global existential threat, if harbingers of doom like […] More
When we think of arms races, we are naturally drawn to the physical: missiles, satellites, fighter jets, submarines and aircraft carriers. While those assets are […] More
The UN’s Convention on Conventional Weapons (CCW) Group of Governmental Experts (GGE) met last week to discuss lethal autonomous weapons systems. But while most member […] More
Geospatial intelligence, or the collection and analysis of the physical features of the Earth, has long been an integral aspect of both strategic national security […] More
Raytheon, one of the U.S. government’s largest defense contractors, is known for making bold competitive moves. Just a couple of days ago, the company claimed […] More
The explosion of data in a digital world has exposed people to volumes of information as never before. But just as this data will increase […] More
“Rise of the Machines: A Cybernetic History” (2016) tells the story of cybernetics, a control theory of man and machine devised by mathematician Norbert Wiener […] More
The cybersecurity industry, much like other sectors, is dealing with an influx of data. In response, security experts hope to harness the power of artificial […] More
We live in an age where what used to be the figment of science fiction is now a reality, changing the way people go about […] More
The cybersecurity industry is currently enamored with concepts of autonomous defense, including elements of machine learning, behavioral analytics, and artificial intelligence—and rightly so. Programed to […] More
Many view cybersecurity as passively blocking attempts to breach networks, but security experts have long advocated more active measures in defense of sensitive networks. Advances […] More
Search