Security expert and app developer Rex M. Lee gives his thoughts on how governments can weaponize ChatGPT to eliminate human rights, launch cybersecurity attacks on networks, and spread disinformation/misinformation.


Security expert and app developer Rex M. Lee gives his thoughts on how governments can weaponize ChatGPT to eliminate human rights, launch cybersecurity attacks on networks, and spread disinformation/misinformation.
While AI-based tools could deliver a major boost in productivity and efficiency, there's a dark side to them, as well.
Generative AI continues to take the world by storm, but there are growing concerns this technology could, if not aggressively managed and regulated, do a great deal of harm. In addition to fears about the technology making decisions and doing things autonomously against our interests, other concerning aspects involve the related training sets.
Rob Enderle for COMPUTERWORLD
By Rob Enderle May 5, 2023
Last week, Cisco had an interesting session about the significant amount of AI development that is going into its networking gear. Cisco is moving aggressively from security solutions that are reactive to security solutions that take initiative to protect the data from where it originates until it arrives at its destination.
By Rex M. Lee
With the recent advancements and proliferation of AI ChatGPT, it may be time for individuals, companies and governments to consider exiting the centralized internet due to massive security, privacy, and safety threats exposed by artificial intelligence pioneers and industry experts who have recently come forward such as Elon Musk (OpenAI Founder) and Alphabet's (Google) Geoffery Hinton known as the "Godfather of AI".
In this essay, Rex M. Lee, security advisor/tech journalists, highlights the threats posed by remaining on centralized internet and presents best practices on the decoupling from the centralized internet, AI, and surveillance capitalism.
By Daniel W. Rasmus, Serious Insights
In this article, Dan W. Rasmus explores how business all over the world will use the new hot tool–generative AI– over the next year. Explore how organizations, large and small, will be getting ahead of the curve by harnessing this ‘new’ innovation.
In 2023, creating a list of the Ten Things Businesses Need to Get Right About IT may seem dated to some. But for many organizations, IT still plays a supporting role, much more than it should. All organizations need to recognize these ten realities or suffer the consequences of being unattractive to talent, maintaining inefficient processes, watching their value proposition erode, and finding themselves ill-prepared to implement innovations even when they come up with them. Ten Things Businesses Need to Get Right About IT is essential reading for business leaders who have not yet embraced IT as a strategic part of their organization.
– Daniel W. Rasmus, Serious Insights
The debate over the relationship between data, information, knowledge and wisdom continues to evolve as new forms of representation emerge. My personal perspective runs contrary to IT and philosophical definitions. I find for knowledge management, and many IT applications, my definitions provide a clarity that doesn’t exist in conflated definitions of data and information, knowledge and wisdom. This discussion will restrict itself to technology though extensions to include biology will become increasingly important.
– Daniel W. Rasmus, Serious Insights
In a February report on the cyber threats in Ukraine, Alphabet Inc.’s Google said that cyber campaigns by Sandworm, which it calls FrozenBarents, “seem designed to advance Russian strategic objectives and respond to changes in Russian intelligence requirements throughout the conflict.”
Written by TGDBuzz, read more at TGDaily, updated Mar. 16, 2023
By Rob Enderle/ March 17, 2023
IBM’s mainframes aren’t the least expensive solutions in the market unless you take into account the risks they mitigate. Banks tend to be very frugal, yet they overwhelmingly favor IBM’s mainframe solution (at least the large banks do). This is because of a number of things: they are more secure and reliable, and when it comes to transactions, there is nothing that can handle the kind of load and financial risk that a financial institution has.
Particularly considering the recent Silicon Valley Bank failure, financial institutions also have huge compliance requirements, and IBM’s compliance capability is unmatched.
Let’s talk about why financial institutions and other firms that don’t want the excitement of a breach or outage favor IBM’s zSystem.
By Rex M. Lee
According to a new report from Secureworks, business email compromise (BEC) attacks are on the rise. BEC attacks, initial access vector (IAV), are considered insider attacks due to employee error according to IBM’s Breach Report. The FBI reported in 2022 that BEC attacks created a $43 billion dollar industry.
Social engineering (low skill) attacks, such as BEC, require nothing more than an effort to send phishing emails to mass numbers of email recipients. By mass email blasts, bad actors rely on a low percentage of recipients who will simply click on a nefarious link and/or an attachment enabling the malware to infect the recipient’s computer while spreading to other clients on the infected network.