From passport to password
Identity is the source of all conflict. So what happens when we enter a mirror, digital dimension? And what would happen if that dimension devoured us?
by Edoardo Maggio
The quest for digital sovereignty
We can't read through all the legal notices that we are asked to agree, but we have to find a way to control our data.
by Lucia Conti
Are you a hacker?
Hackers have always been sitting between these two extremes: brilliant saviours of the world or heinous criminals of cyberspace.
by Riccardo Coluccini
Computer and biological viruses behave similarly: they hit where it hurts the most.
by Philip Di Salvo
Prepare for the unexpected
Although the Covid-19 situation was definitely unexpected, it has given us a lot to think about.
by Menny Barzilay
From Satoshi to nakamo.to
We sat down with the company that's "picking up where Satoshi left off", taking Distributed Ledger Technology to the next level.
Tech PerspectivesSelf management
Join the chain gang
Several business owners and decisions makers are to leverage blockchain for their companies, operations, and products.
by Robert Kuefner
Tech PerspectivesOrganizational monster
Built on trust: Distributed Ledger Technology
DLT is poised to disrupt industries that have long held sway over society— but few know what's behind this technology.
by Robert Kuefner
Blockchain’s infinite applications
From content creation to climate change, this technology can reshape the way we will work and live in the near future.
by Mark van Rijmenam
What is BIoT?
Blockchain Internet of Things is a viable answer to the ongoing security concerns faced by IoT.
Predicting crime with technology
We've always longed for a society without crime, and more and more technologies that help us predict criminal acts are being developed. Director of JVP Venture Capital discusses the ever-growing power of "Predictive Policing" and how technology is surpassing our own human predictive capabilities.
by Nimrod Kozlovski
Tech PerspectivesTech food
The “Cryptoboom” is the new gold rush
Today, we can choose among 1400 cryptocurrencies, those virtual currencies that use cryptography to secure and verify transactions.
by Epi Ludvik
What is Blockchain?
Blockchains are tamper-resistant means of keeping records, linked and secured through the use of cryptography.
Blockchain, Burning Man and the future of governance
The world is at a critical junction: we're experiencing the failure of many institutions of industrial democracy, and the rise of a more decentralized system. Theorist and entrepreneur, John Clippinger, discusses open sector phenomena and how it presents new opportunities and threats for traditional organizations, as well as for transforming governance.
by Robert C. Wolcott
What is an ICO?
An Initial Coin Offering (ICO) is a crowdsourcing mechanism that is now at the heart of the blockchain discussion.
Battle stations: Businesses, governments and cyberwarfare
If you're a hacker, you only have to succeed one time. If you're security, you have to succeed every time. Menny Barzilay, Founder and CEO of FortyTwo, sits down and lays out the impending dangers that billions of affordable, mass-produced IoT devices will bring to the world of security, and how it is impossible for countries today to continue with the idea that physical borders can protect them from the warfare of the modern world.
by Menny Barzilay
What is Ransomware?
Ransomware is a type of malicious software that infects computers and restricts their access to files, often threatening permanent data destruction unless a ransom is paid.