Subscribe to our Newsletter

3 best practices for cloud security monitoring

As powerful as the cloud may be, it’s not magic. If you have a problem before you transition to the cloud, it won’t… just go away once you make the switch. Cloud... Read more »

How to conduct proper AWS vulnerability scanning in 3 steps

AWS provides a set of security controls to protect its own infrastructure, but it’s important to be aware that… the security of the individual servers is the responsibility of the client —... Read more »

Enhancing agent experience with AI contact centers

Thank you for joining us on “The cloud hub: From cloud chaos to clarity.” Contact centers hold significant value for businesses, but they often have to deal with a disengaged workforce and... Read more »

Crypto is weathering a bitter storm. Some still hold on for dear life.

Algorithmic stablecoins, however, are different. They are a DeFi experiment that aren’t pegged to fiat money and don’t hold collateral assets to stabilize their value. Instead, they are usually supported by a... Read more »

How AI is turning the Iran conflict into theater

The author of that post on X was referring to an online intelligence dashboard following the US-Israel strikes against Iran in real time. Built by two people from the venture capital firm... Read more »

The usability imperative for securing digital asset devices

“As you develop these things, you’re a victim of your own development speed,” says Fadell, who developed Ledger Stax, a signing device for securing digital assets, and is now a board member... Read more »

The Download: murky AI surveillance laws, and the White House cracks down on defiant labs

Surprisingly, the answer is not straightforward. More than a decade after Edward Snowden exposed the NSA’s collection of bulk metadata from the phones of Americans, the US is still navigating a gap... Read more »

Is the Pentagon allowed to surveil Americans with AI?

That’s because until the last several decades, people weren’t generating massive clouds of data that opened up new possibilities for surveillance. The Fourth Amendment, which protects against unreasonable search and seizure, was... Read more »

The Download: 10 things that matter in AI, plus Anthropic’s plan to sue the Pentagon

Coming soon: our 10 Things That Matter in AI Right Now For years, MIT Technology Review’s newsroom has been ahead of the curve, tracking the developments in AI that matter and explaining... Read more »

The Download: an AI agent’s hit piece, and preventing lightning

Online harassment is entering its AI era Scott Shambaugh didn’t think twice when he denied an AI agent’s request to contribute to matplotlib, a software library he helps manage. Then things got... Read more »

How much wildfire prevention is too much?

It’s a wild promise, and one that my colleague James Temple dug into for his most recent story. (You should read the whole thing; there’s a ton of fascinating history and quirky... Read more »

Online harassment is entering its AI era

Regardless of whether or not the agent’s owner told it to write a hit piece on Shambaugh, it still seems to have managed on its own to amass details about Shambaugh’s online... Read more »

Bridging the operational AI gap

To understand how organizations are structuring their AI operations and how they are deploying successful AI projects, MIT Technology Review Insights surveyed 500 senior IT leaders at mid- to large-size companies in... Read more »

The Download: Earth’s rumblings, and AI for strikes on Iran

The must-reads I’ve combed the internet to find you today’s most fun/important/scary/fascinating stories about technology. 1 How Anthropic’s AI tool Claude is being used for US strikes on IranIt’s helping to identify... Read more »