Good Day! This is my weekly newsletter, with a dose of insights into the future. The topic of this newsletter is the exponential times we live in, hence the title of f(x) = e^x, which is the (natural) exponential function.

Recently, I launched my new concept The Digital Speaker and you can now book me as an avatar or hologram. Also, my tech trend prediction for 2021 is out, read it here!


Data Security: The Importance of End-to-End Quantum-Resistant Encryption

My latest article:

In a world that increasingly revolves around data, security is key. Unfortunately, too often organisations do not take security seriously. Big tech giants like Facebook allow firms such as Cambridge Analytica to syphon away 50 million user profiles, while the average Internet of Things device is so easy to hack that a kid can do it.

With the advent of quantum computing, security will only increase in importance. Despite offering enormous opportunities to solve some of the world’s biggest problems, quantum computing also is one of the biggest security risks by making existing encryption useless. Therefore, organisations should focus on end-to-end encryption that is resistant to quantum computing to protect their data and comply with regulations such as GDPR.


Three Useful Nuggets of Information

My weekly tips from around the web to get you thinking.

1. Autonomous robot bees are coming our way.

With the honeybee population dying, Walmart, yes the retail giant, is developing small pollination drones. These autonomous robot bees should take over when the real bees disappear and could pollinate as effectively as real bees. (WEF)

2. Future ICOs will need to follow the rules.

The Wild West of ICOs is finally over. The SEC has warned organisations doing an ICO to comply with regulation and receive SEC clearance as otherwise, they are breaking the law. (MIT)

3. Monero: a private cryptocurrency, or maybe not.

Monero has been built as an untraceable cryptocurrency and, hence, it is attractive to criminals. However, researchers have discovered flaws that allow for extraction of individual transactions. (Wired)