Notes (alphabetical)
Search to quickly find notes, articles, guides, and resources across the site.
Search to quickly find notes, articles, guides, and resources across the site.
What Is FIDO2 Authentication? FIDO2 authentication is a passwordless login method that uses public-key cryptography to securely verify a user’s identity. Developed by the FIDO Alliance and W3C, it offers a safer, more convenient alternative to traditional passwords. The term FIDO in FIDO2 stands for Fast Identity Online. The “2” indicates the second generation of the standard. Types of FIDO2 Authentication: Hardware-Based Authentication: Uses dedicated physical devices to verify identity. Security Keys: External devices that connect via USB, NFC, or Bluetooth. Examples are the YubiKey and the Google Titan security key. ...
The Financial Conduct Authority is a UK financial services regulator, whose aim is to make financial markets work well so that consumers get a fair deal The FCA is one of several UK financial regulators, including the Bank of England and the Prudential Regulation Authority (PRA) Related Bank of England Prudential Regulation Authority
Foundation models are large AI models trained on massive datasets. They’re versatile and powerful because they can be fine-tuned for various tasks. This fine-tuning leverages transfer learning: the model first learns general patterns from a broad dataset, then is adapted with smaller, domain-specific datasets for specific problems like translation or image recognition. This saves time and data, letting organisations use advanced AI without starting from scratch. Further reading What are foundation models? - IBM What Are Foundation Models? - Nvidia What is fine-tuning? - IBM
Foundations of Open Shift Learning Path | 13 resources | 4 hours | Published on June 27, 2023 Learn the foundations of OpenShift through hands-on experience deploying and working with applications, using a no-cost OpenShift cluster through the Developer Sandbox for Red Hat OpenShift. Takeaways OpenShift is a layer of Red Hat components that sit on top of a Kubernetes cluster
Further reading Four-eyes principle (Open Risk Manual)
Fraud prevention means setting up controls to protect yourself and your organisation from fraud, whether as a victim or being unknowingly involved. Further reading 13 Ways to Protect Yourself From Fraud - aarp.org Related pages What is fraud?
Fuse.js is a lightweight JavaScript library for fuzzy search that enables fast and flexible search functionality, making it ideal for static websites (like this one) where it can be used to provide client-side search. Content is indexed when the site is built, and real-time results can then be displayed without requiring a backend.
Further reading Futurism Fallacies - Youtube. Coined by Novella brothers. Related pages Planning fallacy
Game theory provides a framework for analysing strategic decision-making under uncertainty, making it a valuable concept for risk professionals. John von Neumann, along with Oskar Morgenstern, introduced foundational concepts in their book Theory of Games and Economic Behavior, establishing game theory’s central role in economic and strategic analysis. The minimax theorem, developed by von Neumann, became a cornerstone of game theory, defining optimal strategies in competitive scenarios. Game theory models how competitors anticipate each other’s moves, offering tools to analyse strategic interactions — a crucial skill for managing risk in competitive or adversarial environments such as cybersecurity, financial markets, and supply chain management. ...
The General Data Protection Regulation (GDPR) is a European Union regulation on data protection and privacy. Further reading General Data Protection Regulation (GDPR) - GDPR Summary EU General Data Protection Regulation (GDPR) - PCPD Hong Kong
Further reading GitGuardian
Australia Privacy Act 1988 Australia has a number of data protection and privacy laws and regulations. DLA Piper provide a good overview. Privacy Act 1988 (gov.au) Comparing privacy laws: GDPR v. Australian Privacy Act (Data Guidance) (PDF) Australia Data Protection Laws (DLA Piper) China Personal Information Protection Law (PIPL) See related page European Union General Data Protection Legislation (GDPR) See related page Hong Kong Personal Data (Privacy) Ordinance See related page India Digital Personal Data Protection Act (DPDP), 2023 India enacted the Digital Personal Data Protection Act in 2023. ...
What is Go Go is a language developed at Google in 2009, and has since been adopted extensively in diverse use cases, including cloud infrastructure, and high-performance web services. Hugo (the static site generator that this website is built on) is built using the Go programming language and also the Go templating language, which enables flexible and efficient content rendering. Golang and Go template The Go programming language (golang.org) is a general-purpose, statically typed, compiled language designed for efficiency, simplicity, and concurrency. ...
Halford Mackinder (1861-1947) was a British author, academic and politician, who is considered one of the founders of the concept of geopolitics, with the publication of his ‘Heartland Theory’. Understanding Mackinder’s theories helps risk professionals assess geopolitical risks and the strategic significance of different regions. Mackinder stood for parliament in 1910 and was elected as the Member of Parliament for the constituency of Camlachie, a working class area in the east-end of Glasgow. ...
Never ascribe to malice, what can easily be attributed to carelessness, or stupidity. Further reading Hanlon’s razor - Wikipedia