Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources
  • Support

AI Auditing Framework Call for Input: final considerations and next steps

1st November 20191st November 2019 peterglock

As the initial Call for Input into the development of the ICO AI Auditing Framework comes to an end, Simon McDougall, Executive Director for Technology and Innovation, reflects on some of the overarching themes that have emerged in the first phase of our work.

Original article here

Uncategorised Cyberlaw, Glock Takes Stock, ICO permalink

Post navigation

← Data Protection Impact Assessments and AI
Trump’s cyber-security adviser wiped his iPhone after 10 failed logins →

Recent Posts

  • Ambit, Inc. Announces the Release of AmbitVPN’s Post-Quantum Native Windows Application
  • Zero trust: The good, the bad and the ugly
  • New Cring ransomware hits unpatched Fortinet VPN devices
  • Gigaset Android phones infected by malware via hacked update server
  • SAP warns of malicious activity targeting unpatched systems

Get in touch

Email: [email protected]


View Glock Enterprises Ltd profile on Ariba Discovery

Data Protection Register

Registered with the ICO: ZA494319

About

Glock Enterprises Ltd. Registered in England & Wales No. 11183883

VAT No: GB 361 2795 89

Glock Enterprises (Europe) OÜ
Registered in Estonia
No. 16149069

VAT No: EE102351110

All content (c) Glock Enterprises Ltd 2021

Pages

  • Blog
  • Privacy Policy
  • Resources
    • Free Trial – Private Threat Intelligence
    • White Paper: Building a Business Case for Cybersecurity Asset Management
    • White Paper: Cyber Deception – Migrating to an alternative platform
    • White Paper: Hunting for Threats in Operational Technology
    • White Paper: Internet Connected Storage
    • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
    • Whitepaper: Coping with a flood of Data Subject Access Requests
  • Services
  • Support
  • Welcome

The Latest from Facebook

Glock Enterprises Ltd

3 days ago

Glock Enterprises Ltd
buff.ly/3uySeQkZero trust: The good, the bad and the uglyWe saw a lot of “Cloud Washing” when timeshare morphed via ASP to Cloud. I’ve seen disk drives marketed as “My Cloud” which kind of misses the point...:[...] The bad side of zero trust concerns the misunderstandings that are currently being propagated. "Among the misconceptions Kindervag is eager to dispel is that zero trust makes a system 'trusted,' and that it is just about identity and multi-factor authentication (MFA)," mentioned Zorz. "Zero trust eliminates trust from digital systems, because trust is a vulnerability that can be exploited."If Zero Trust was equal to MFA (as many vendors claim), then neither the Snowden nor Manning breaches would have been able to happen," explained Kindervag. "They had very robust MFA and identity solutions, but no one looked at their packets post-authentication."Something else that Kindervag finds disconcerting is that vendors are redefining the meaning of zero trust so that it coincides with what their products are capable of doing. According to Kindervag, there are no "zero trust products." He told Zorz, "There are products that work well in zero trust environments, but if a vendor comes in to sell you their 'zero trust' product, that's a pretty good indication that they don't understand the concept."[...]Original article ... See MoreSee Less

Photo

View on Facebook
· Share

Share on Facebook Share on Twitter Share on Linked In Share by Email

Proudly powered by WordPress | Theme: Moesia by aThemes