I spoke on a Docent Institute webinar last night co-hosted by Iowa Illinois IEEE Section – R4 and IEEE Computer Society (Iowa-Illinois Chapter). The title of the talk is, “Navigating Cybersecurity and Systemic Risk in a Rapidly Advancing Technological Landscape”where I discussed #cybersecurity and #systemic_risk. Thanks to Binto George & Michael Umakor, who were co-hosts. Check out the video! You may find the video and slides here:
I was honored to be invited to give a presentation on November 14th in Rockford, IL for the Rock River Valley Section. The turnout was 30+ members and non-members. Click the image above for the PDF.
I think of us in some kind of twilight world as transformative AI looks more likely: things are about to change, and I don’t know if it’s about to get a lot darker or a lot brighter.
Increasingly this makes me wonder how I should be raising my kids differently.Read More
It was a great honor to be asked to keynote Bloomcon this morning! Wish I could have been there in person. Despite the issues we had getting sound to work with Zoom, I ended my presentation on time. I’ll have to go in person next year!Link to my slides: https://johndjohnson.com/…/BloomCon.2022.JJOHNSON…
What is 5G? It is technology that will transform how we work, live and interact with the world around us. 5G is one of the enabling technologies that will give us gigabit Internet speeds and enable the next generation of sensors and IoT devices. Learn more!
FBI Warns of HiatusRAT Malware Targeting Webcams and DVRs
Hackers are exploiting security weaknesses in devices like Hikvision cameras and D-Link devices as many vendors haven’t addressed critical vulnerabilities like CVE-2017-7921 (Hikvision cameras), CVE-2020-25078 (D-Link…
Cyber Storm IX, the ninth iteration of the drills, was the first that the agency had invited the ministry to participate in. The exercises involved 2,200 participants from 11 countries simulating major cyberattacks, testing…
Phishers Spoof Google Calendar Invites in Fast-Spreading, Global Campaign
The campaign, discovered by researchers at Check Point Software, relies on modified "sender" headings to make emails appear as if they were sent via Google Calendar on behalf of a legitimate entity, such…