top of page
Search


What Can Cognitive Security Learn From The B-17 Flying Fortress?
When are people the most vulnerable to a social engineering attack? When are they most likely to make a mistake? If we pause to contemplate these two questions, we will likely come to a very similar list of conclusions; when they are tired, distracted, or they confuse one thing for another. In the first few years of World War II, the U.S. Army Air Corps lost over 400 aircraft in less than two years, not from enemy engagements, but due to “pilot error”. Pilot error included
CSI
Nov 183 min read


Darwin Monkey: Next Generation Neuromorphic Computing and Competition for Cognitive Capability and Control
Elise Annett James Giordano The Darwin Monkey System: A Paradigm Shift from AI to Synthetic Cognition Fully integrated neuromorphic computing represents an important – and provocative – developmental iteration of artificial intelligence (AI). To date, most AI system operations have been based upon symbolic reasoning and/or statistical inference derived from large data sets. However, Darwin Monkey , a large-scale neuromorphic computing system newly developed by Chinese rese
Deft9 Solutions
Nov 116 min read


NIST Special Publication: Minding the Gaps in Human-Centered Cybersecurity
In August 2024, the National Institute of Standards and Technology (NIST) co-sponsored ConnectCon , an interactive workshop that...
CSI
Apr 11 min read


Neurosecurity: Human Brain Electro-Optical Signals as MASINT
Advances in neuroimaging and data analysis are making it increasingly possible to probe and gather intelligence from individual minds...
CSI
Mar 1, 20201 min read


The Enduring Mystery of the Repeat Clickers
Repeat Clickers—individuals within an organization who consistently fall for phishing emails—pose a significant security risk. This...
CSI
Jul 31, 20191 min read
bottom of page


