In the current post I want to do a fast analysis of ISO/IEC 22989:2022 – “Artificial intelligence concepts and terminology”. In the global race for Artificial Intelligence dominance, most organizations are sprinting toward implementation while tripping over a fundamental hurdle: the lack of a shared language. We see it in every boardroom and technical meeting: “Trustworthiness” is treated as a subjective feeling, “Transparency” remains a vague promise, and the very definition of an “AI System” varies depending on who you ask. This “Babel Syndrome” isn’t just a communication issue but a significant risk to compliance, security, and strategic alignment. To lead in the AI era,Read More →

During 2017 we will suffer ‘old’ threats like ransomware, cyber espionage and ‘hacktivist’ exposing privacy issues but in addition to known them, our threats list will upgrade so much adding new concepts like machine learning accelerates social engineering attacks or cloud computing providers infection. The list is a very long, so a big effort (time, money, people) is needed to mitigate all these risks. After reading more than 10 different reports about Cyber Security Threats 2017 published in Internet I did my own version. I hope you like it. You can see my presentation here: Cyber security threats for 2017 from Ramiro Cid  Read More →

Every year, the challenge of protecting our IT assets from growing threats and cyber attacks is growing. Once some malicious application is in our network and later can quickly move with traffic and produce a big impact in our the network. These attacks can be devastating. I created a presentation where I explain in details this topic, you can see my presentation here (in Spanish): ¿Cuáles son los peligros a los que se enfrenta su sistema informático? from Ramiro CidRead More →

Nowadays the payment fraud landscape is changing quite fast. Changing from classic schemes as bank cheque fraud, faked manual payment orders to organized crime with corporate as targets. Understanding fraud also occurs when dishonest acts are committed without personal gain but are intended to create a loss or risk of loss for another person or entity. This includes the intentional misrepresentation of financial condition. I created a presentation where I explain in details this topic, you can see my presentation here: Payment fraud from Ramiro CidRead More →

The use of unmanned aerial vehicles (drones) is increasing for both leisure and commercial purposes, so it is more and more an extended practice. The different uses are many and the list continue growing, thus some issues started to appear which need regulations and best practices to try to control the use in a correct way. I created a presentation where I explain the best practices about the use of drones in Critical Infrastructure, you can see my presentation here: Drones and their use on critical infrastructure from Ramiro CidRead More →

Until now, when people talk about cloud computing, it’s usually understood that the cloud is a metaphor for groups of remote, networked servers. Now “space computing” means it literally: physical servers operating in outer space. We can think “Cloud computing” evolution is “Cloud in the space” or simple “Space Computing”. To put servers in space have so many advantages but some clear disadvantages to solve before to put in practice. Advantages: Save energy problems, data centers use up 10% of the world’s electricity No need to freeze the servers Fast processing because the space environment A very good cost-effective to launch a server into space Disadvantages: ThereRead More →