Espionage and cyberwar activities are increasingly conducted remotely, via phishing, spyware, software supply chain attacks, malware attacks on electric grids and nuclear plants, and drones. But in the future, we can expect to see threat actors turn ...
Read More
There’s a tussle over the future of AI regulation.
One camp insists that “x-risk,” or existential risk, warrants the preponderance of regulatory focus. Another camp demands that privacy be the primary concern. A third cohort want...
Read More