338 Items

A reflection of a man typing on a laptop computer

Matthew Roth/Wikimedia Commons

Analysis & Opinions - Lawfare

Backdoor in XZ Utils That Almost Happened

| Apr. 09, 2024

The xz Utils backdoor incident reveals that the security of the global internet depends on countless obscure pieces of software written and maintained by even more obscure unpaid, distractible, and sometimes vulnerable volunteers. It’s an untenable situation, and one that is being exploited by malicious actors. Yet precious little is being done to remedy it.

Rohit Chopra and Pete Buttigieg

AP Photo/Andrew Harnik, File

Analysis & Opinions - cyberscoop

CFPB’s Proposed Data Rules Would Improve Security, Privacy and Competition

| Jan. 24, 2024

The collection and sale of consumer data is too lucrative for companies to say no to participating in the data broker economy. New rules proposed by the Consumer Financial Protection Bureau may help eliminate the incentive for companies to buy and sell consumer data.

Neural net completion for "artificial intelligence"

Wikimedia Commons

Analysis & Opinions - Georgetown Journal of International Affairs

GPTs, Software Engineering, and a New Age of Hacking

| Aug. 16, 2023

ChatGPT and other natural language models have recently sparked considerable intrigue and unease. Governments and businesses are increasingly acknowledging the role of Generative Pre-trained Transformers (GPTs) in shaping the cybersecurity landscape. This article discusses the implications of using GPTs in software development and the potential impact on cybersecurity in the age of artificial intelligence (AI). While GPTs can improve efficiency and productivity for programmers, they will not replace human programmers due to the complex decision-making processes involved in programming beyond simply writing code. And while they may help in finding shallow bugs to prevent short-lived vulnerabilities, GPTs are unlikely to change the balance of power between offense and defense in cybersecurity.