Il futuro ibrido dell'Intelligenza Artificiale: riflessioni da Amsterdam sulla conferenza Hybrid-Human Artificial Intelligence

Di |2022-07-25T10:23:07+02:00Luglio 25th, 2022|

11 maggio 1997, New York. Dopo sei match di competizione febbrile di fronte alla scacchiera, l’allora più grande giocatore di scacchi di tutti i tempi, Garry Kasparov, si arrende. A batterlo è un giocatore capace di valutare 200 milioni di mosse al secondo: il programma DeepBlue della IBM, un’intelligenza profondamente specializzata sull’unico obiettivo di vincere [...]

"Scudo per la privacy 2.0"? – Prima reazione di Max Schrems

Di |2022-03-25T15:00:00+01:00Marzo 25th, 2022|

Oggi il presidente della Commissione Ursula von der Leyen e il presidente Biden hanno annunciato un "accordo di principio" su un nuovo sistema di condivisione dei dati UE-USA.“Scudo per la privacy 2.0”? - Prima reazione di Max SchremsOggi il presidente della Commissione Ursula von der Leyen e il presidente Biden hanno annunciato un nuovo sistema [...]

Amazon Workers demand Data-Transparency

Di |2022-03-14T15:31:00+01:00Marzo 14th, 2022|

In cooperation between the worker’s union “UNI Global” and privacy NGO “noyb.eu”, Amazon warehouse workers from Germany, UK, Italy, Poland and Slovakia filed access requests under Article 15 GDPR today. The goal is to find out how Amazon treats workers’ personal data under the EU’s General Data Protection Regulation (GDPR). Workers are so far left [...]

The Nigeria Data Protection Bureau

Di |2022-03-11T15:50:00+01:00Marzo 11th, 2022|

Did you know that the Constitution of the Federal Republic of Nigeria (CFRN) 1999 guarantees Nigerian citizens the fundamental right to privacy?This means that under Section 37 of the CFRN, citizens have the right to privacy in their homes, correspondence, phone conversations, and telegraphic communications.The Constitution, however, does not define “privacy” or contain detailed privacy [...]

Telehealth visits now available through Amazon Alexa

Di |2022-02-28T15:54:00+01:00Febbraio 28th, 2022|

Amazon customers can now connect with healthcare providers through Echo devices, the companies announced today. The service is provided by telemedicine company Teladoc, one of the largest telemedicine companies in the United States.Customers can connect with Teladoc by saying “Alexa, I want to talk to a doctor.” They’ll get a call back on their device [...]

Il "gioco" dei dati

Di |2022-02-28T08:59:46+01:00Febbraio 28th, 2022|

The data game: what Amazon knows about you and how to stop itThe tech giant has many ways of gathering information about its users’ activity – from Prime to Alexa. So what can you do to keep your life private?The GuardianKate O’FlahertyTappare le falle, evitare la dispersione di informazioni che consapevolmente, o per "legittimo interesse", [...]

Supply chain e cybersecurity

Di |2023-06-27T16:40:08+02:00Febbraio 22nd, 2022|

RFI | Evaluating and Improving NIST Cybersecurity Resources: CSF and CSCRM | CSRCNIST is seeking information to assist in evaluating and improving its cybersecurity resources—including the widely-used NIST Cybersecurity Framework (CSF) and a variety of existing and potential standards, guidelines, and other information. Comments are...National Institute of Standards and Technology logo

Supply chain e cybersecurity

Di |2023-06-27T16:40:14+02:00Febbraio 22nd, 2022|

RFI | Evaluating and Improving NIST Cybersecurity Resources: CSF and CSCRM | CSRCNIST is seeking information to assist in evaluating and improving its cybersecurity resources—including the widely-used NIST Cybersecurity Framework (CSF) and a variety of existing and potential standards, guidelines, and other information. Comments are...National Institute of Standards and Technology logo

Dati sanitari e data breach

Di |2022-02-20T13:30:00+01:00Febbraio 20th, 2022|

Tens of thousands of NHS patients’ private medical information leakedThe confidential files include test results of cervical screening and letters to parents of children needing urgent surgery at Alder Hey Children’s Hospital, Liverpool.Daily MailMichael Powell

Crittografia e privacy

Di |2022-02-20T09:00:00+01:00Febbraio 20th, 2022|

The who, what, and where of cryptography for the C-suite"However, if a data breach occurs, but the leaked data is encrypted, it can’t be used by bad actors. Essentially, cryptography is an internal barrier; if the external barrier is broken, you still have the internal barrier to protect your organization. However, when it comes to [...]

Torna in cima