Why I’m Not So Alarmed About AI And Jobs
With the advances in large language models (e.g. ChatGPT), referred to as AI, concerns are rising about a sweeping loss of jobs because of the new tools. Some claim jobsContinue reading
With the advances in large language models (e.g. ChatGPT), referred to as AI, concerns are rising about a sweeping loss of jobs because of the new tools. Some claim jobsContinue reading
Yesterday I gave a talk on a local BSides conference in Bulgaria titled “Nothing is secure”. The point is simple: security is very hard, there are many details, many tools,Continue reading
Honeypots are great security tools – you install a “decoy”, which attracts malicious traffic. They have certain ports open and they work with certain protocols, mimicking regular interactions, e.g. SSH,Continue reading
Having your phone lying around when your kids are playing with everything they find is a great security test. They immediately discover new features and ways to go beyond theContinue reading
Active Directory is dominant in the enterprise world (as well as the public sector). From my observation, the majority of organization rely on Active Directory for their user accounts. WhileContinue reading
When “public infrastructure” is mentioned, typically people think of roads, bridges, rails, dams, power plants, city lights. These are all enablers, publicly funded/owned/managed (not necessarily all of these), which allowContinue reading
This week I was invited to be a panelist, together with other digital ministers, on a side-event organized by Ukraine in Davos, during the World Economic Forum. The topic wasContinue reading
Microsoft Exchange has a bug that practically stops email. (The public sector is primarily using Exchange, so many of the institutions I’m responsible for as a minister, have their emailContinue reading
Last week the Bulgarian National assembly appointed the new government. I am one of the appointed ministers – a minister for electronic governance. The portfolio includes digitizing registers and processesContinue reading
You build a system. User authentication is the component that is always there, regardless of the functionality of the system. And by now it should be simple to implement itContinue reading