United States Senate: #Chairman of the #Senate #Intelligence #Committee, Senator Mark W. . .

Source: https://www.linkedin.com/feed/update/urn%3Ali%3Ashare%3A7009378339165528064

United States Senate: #Chairman of the #Senate #Intelligence #Committee, Senator Mark Warner, discusses the debate over #crypto #regulation and concerns about the use of #TikTok #data and #content [It’s the #Networks that Really Matter!]: https://lnkd.in/gTYNpfJj :

#ControlDoctrine #SocialInfluence #Command-#Control
Think Beyond #Apps, #Data, #Devices to #NetworkCentricComputing:
https://lnkd.in/gkuidttH :

#Beyond #Data: #Networks: #DataInMotion #DataInUse #DataAtRest: #Data-#Integration-#Flow Across #Networks:
https://lnkd.in/gFn4Vm2 : https://lnkd.in/g5mNWUVK

Post-Doc #ZeroTrust #Network & #Computer #Security #Thesis: https://lnkd.in/gyQSx6n: “Everyone is a potential target, potential accessory, or even a potential source of attack, even when they are unwilling or unknowing participants in any given attack or a ‘ #network of #attacks ’.” (p. 16):
#ZeroTrust addresses shortcomings of #perimeter #centric #strategies… there is no default trust for any #entity—including #users, #devices, #applications, and #packets—regardless of what it is and its location on or relative to the corporate #network.”

Unlike other risks, #cyber #risk poses a uniquely different set of #exposures being intertwined with the #medium and the #message in #digital #network #communications… More significant and latent cyber risk is in inherent and potential #vulnerabilities in the enabling #medium such as the underlying operating system or networking software.

From #TrustComputing perspective, every component of #software, #hardware, #firmware, or #networks… is vulnerable and exposed. Once compromised, any such trusted user regardless of the status on the respective hierarchy can become the channel of #contagion that can compromise the complete #network of #trust as well as all other trusted users on those networks.

#JADC2 #Engineering #Networks & #Social #Networks of #Command & #Control #C2: C4I-Cyber.com: #C2 Supremacy – Beyond #AI & #Quantum #Supremacy: https://lnkd.in/g6PqheNw

C4I-Cyber.com: Beyond C2 to Adversarial & Counter-adversarial C2:

#AI #Performance: #Beyond #Data #Hardware #Software #Models: https://lnkd.in/ghnyyME4

#Space #Hacked: #Myths of ‘Un-hackable’ #Quantum #Crypto: ALREADY BROKEN #QKD https://lnkd.in/gdX8x69Z

#SocioTechnical #NetworkCentricComputing R&D Leading Practices:
Where #Telecom #Networks #Engineering Meets #Social #Engineering:
#Command #Control #Influence #Adversarial #Counteradversarial:
#KM #AI #ML #Quant #Cyber #Crypto #Quantum #Risk #Computing:

#Telecom #Networks:
SSRN 99 Top-10 R&D Rankings: Top 1% Authors: https://lnkd.in/ec99Zkd

#SocialNetworks:
Google Scholar: 10,000+ Citations: https://lnkd.in/eErtK5mU

YouTube Presentations:
#AWS #NewYorkState #Pentagon #SiliconValley #WallStreet https://lnkd.in/gMR596dj

Silicon Valley’s Next Big Thing™: CEO-CTO-CFO Know-Build-Monetize™ Networks: Join The CxO Metaverse™

Global Risk Management Network LLC: Silicon Valley-Wall Street-Pentagon Digital CEO-CTO-CFO Networks

Share this post
Avatar photo

Silicon Valley's 'Next Big Thing': "Do Something Epic: Save the World™": "Venture capitalist Roger McNamee recently implored Silicon Valley to embrace human-driven social networks that empower rather than exploit users as the Next Big Thing. Having pioneered such networks, we were invited to guide Silicon Valley three decades or so ago on building Digital enterprises for the Wild Wild Web*. Today, we are ready to again lead Silicon Valley to further advance human-driven technologies in collaboration with the AFRL..." - Dr. Yogesh Malhotra, Founder, AWS-Quantum Valley™: BRINT.com Know-Build-Monetize™ Networks: YM-ABC™: YogeshMalhotra.com: AIMLExchange.com : BRINT.com : C4I-Cyber.com