As the world becomes more focused on, and aware of, the ways social and environmental issues are impacted by the many decisions companies make, the importance of ensuring a reliable and resilient supply chain that is ethical and consistent with consumer and company values has become clear.
Trusted Future is excited to announce that current Deputy Executive Director James Lamond will be the organization’s new Executive Director, following the departure of current Executive Director Ken Gude. The transition will be effective September 1, 2023.
Thank you for the opportunity to comment on addressing the critical issues at the intersection of privacy, equity, and civil rights. We are delighted to be able to respond and provide a perspective based on our research and experience.
The European Commission is moving forward on its implementation of the recently passed Digital Markets Act (DMA). To this end, it is holding a series of
As the European Union and member states move forward with implementing the ambitious Digital Markets Act (DMA), they face some big challenges in terms of
Ken Gude: How Trusted Technology Can Help Better Protect Us Against Modern Digital Threats – Munich Security Conference (MSC)
Trusted Future recently co-hosted a discussion with the Munich Security Conference (MSC) on cyber and digital threats to the transatlantic community. The event followed a high-level roundtable discussion
Trusted Future believes it is critical for the information infrastructure of today, and obtaining the benefitsof the emerging technology of tomorrow, to have a vibrant digital ecosystem that is trusted, responsible, inclusive, and safe — one where you can trust that your privacy will be protected, your data will be secured, your safety can be guaranteed, and that advancements in technology will lead to a more just, equitable and inclusive society.
At a time of increasing global tensions, our national security experts are warning that cybersecurity threats from authoritarian regimes are on the rise. We examine the heightened threat and highlight critical steps that businesses, tech users, and policymakers should take in this new environment.