Using AI to Identify the Resistance
Last month the New York Times published a now famous op-ed from someone within President Trump’s administration. The piece led to a hunt for the “member of the resistance” and denials by major political figures. …
Last month the New York Times published a now famous op-ed from someone within President Trump’s administration. The piece led to a hunt for the “member of the resistance” and denials by major political figures. …
TELEGRID uses Machine Learning in many of its products specifically behavioral biometrics for user authentication. I personally spend countless hours researching Machine Learning and performing market analysis. Doing so I have noticed a troubling trend …
The General Data Protection Regulation (GDPR) just went into effect in the European Union. It is a law that is designed to protect the privacy of individuals by requiring explicit permission for data collection and …
Adversarial Artificial Intelligence or Adversarial AI is the new buzzword on Capitol Hill. In the past few weeks there have been hearings on Adversarial AI in the House and the Senate, multiple articles written on …
Last week Senators Ron Wyden and Claire McCaskill released a letter demanding that US Customs and Border Patrol (CBP) close a critical gap in our nation’s border security. The gap is not related to the …
According to Verizon’s 2017 Data Breach Investigations Report (DBIR), “81% of hacking-related breaches leveraged either stolen and/or weak passwords.” The National Institute of Standards and Technology (NIST) understands this. This is why, I believe, they …
While at a recent industry event I heard a senior military leader note their preference for hardware-based security because “software is hackable”. The idea of hardware as an uncrackable vault was rocked by this month’s …
In June 2017, the National Institute of Standards and Technology (NIST) released its updated Digital Identity Guidelines in Special Publication 800-63-3. The draft of this publication gained a lot of press in 2016 for highlighting …
Active Directory has long been a favorite target for hackers. As every penetration tester knows, the best way to compromise a network is to gain access to the Active Directory (AD) server and escalate your …
This week we received news of another global ransomware attack that has reportedly affected FedEx, Rosneft, Moller-Maersk, and Merck. This comes hot on the heels of last month’s WannaCry ransomware attack that affected 300,000 computers …