We have recently witnessed the advent of artificial intelligence, machine and deep learning technologies, which have led to a tremendous amount of interest from almost every other area of science, technology and business. The area of cyber-security is no exception. It is however interesting, that most security vendors and consultants keep a cloak of silence around specific AI-enabled cyber-security use cases and thus specific examples of how AI and machine learning are used in the context of cyber-security are rather scarce.
Read more...
Although a cyber-attack can be devastating, the vast majority of organisations are ill prepared. Even armed with a good prevention plan and a great...
Read more...
Let me share a funny story on how I discovered the key to decrypt Costa Rica's ID card with the help of a 100-year-old lady that was 5,000 kilometers away from me.
Read more...
In recent weeks, we have seen first-hand the importance of having early detection capabilities, the correct implementation of security measures,...
Read more...
Nowadays, for most of us, smartphones have become a vital device, something that we have at hand almost all the time. They come with a phone number...
Read more...
Much has been said recently about the abuse of Docker APIs exposed to the internet. These references all talk about the main Docker API that...
Read more...
In January of this year we found an EoP (Escalation of Privileges) or LPE (Local Privilege Escalation) in the Dropbox Windows application. The bug was...
Read more...
Humans have used features such as face, voice, and gait for thousands of years to recognize each other, but only recently, humans have started using...
Read more...
A network policy is a specification of how groups of pods are allowed to communicate with each other and other network endpoints. The Kubernetes...
Read more...
The previous articles about Docker security have discussed many security features that can be applied at container's runtime. Those features, such as...
Read more...