top of page
Search


Developing a Neurosecurity Framework to Defend Against the Coming Neurowar
Matthew Canham The capture of Nicolás Maduro by US special operations forces without enduring the loss of a single operator marks one of the most overwhelmingly successful operations in the (acknowledged) history of special operations. A recent account by one of the Venezuelan security guards loyal to Maduro suggests that some advanced weaponry may have been involved. Their account describes hearing a loud and intense sound which caused the guards to experience extreme pain
mcanham
Jan 127 min read


Coupons as Cognitive Malware: Attacking Interconnected Systems
Dr. Matthew Canham Imagine that you receive an email from your electricity provider offering a 50% discount on electricity for using power during certain times of the day. The message explains that rising demand for electricity costs caused by increased data center usage is stressing the power grid and the electricity provider is exploring ways to encourage users to increase usage during prescribed times to reduce straining the power grid. The message appears legitimate and t
mcanham
Dec 9, 20259 min read


What Can Cognitive Security Learn From The B-17 Flying Fortress?
When are people the most vulnerable to a social engineering attack? When are they most likely to make a mistake? If we pause to contemplate these two questions, we will likely come to a very similar list of conclusions; when they are tired, distracted, or they confuse one thing for another. In the first few years of World War II, the U.S. Army Air Corps lost over 400 aircraft in less than two years, not from enemy engagements, but due to “pilot error”. Pilot error included
CSI
Nov 18, 20253 min read


Darwin Monkey: Next Generation Neuromorphic Computing and Competition for Cognitive Capability and Control
Elise Annett James Giordano The Darwin Monkey System: A Paradigm Shift from AI to Synthetic Cognition Fully integrated neuromorphic computing represents an important – and provocative – developmental iteration of artificial intelligence (AI). To date, most AI system operations have been based upon symbolic reasoning and/or statistical inference derived from large data sets. However, Darwin Monkey , a large-scale neuromorphic computing system newly developed by Chinese rese
Deft9 Solutions
Nov 11, 20256 min read


NIST Special Publication: Minding the Gaps in Human-Centered Cybersecurity
In August 2024, the National Institute of Standards and Technology (NIST) co-sponsored ConnectCon , an interactive workshop that...
CSI
Apr 1, 20251 min read
bottom of page


