Skip to content
  • UAS
  • Federal Aviation Administration (FAA)
  • Wireless Mesh Networks
  • Our Company
    • About Us
    • Our Founders
    • Blog
  • Contact Us
TELEGRID
TELEGRID
 
  • UAS
  • Federal Aviation Administration (FAA)
  • Wireless Mesh Networks
  • Our Company
    • About Us
    • Our Founders
    • Blog
  • Contact Us
Home Articles posted by Eric Sharret

Author: Eric Sharret

Using AI to Identify the Resistance
Uncategorized

Using AI to Identify the Resistance

By Eric Sharret October 12, 2018 October 12, 2018

Last month the New York Times published a now famous op-ed from someone within President Trump’s administration.  The piece led to a hunt for the “member of the resistance” and denials by major political figures.  …

Read more"Using AI to Identify the Resistance"
Machine Learning Marketing: Ignore Size
Uncategorized

Machine Learning Marketing: Ignore Size

By Eric Sharret June 28, 2018 June 29, 2018

TELEGRID uses Machine Learning in many of its products specifically behavioral biometrics for user authentication.  I personally spend countless hours researching Machine Learning and performing market analysis.  Doing so I have noticed a troubling trend …

Read more"Machine Learning Marketing: Ignore Size"
How to Protect Anonymity in Machine Learning
Uncategorized

How to Protect Anonymity in Machine Learning

By Eric Sharret May 29, 2018 May 29, 2018

The General Data Protection Regulation (GDPR) just went into effect in the European Union.  It is a law that is designed to protect the privacy of individuals by requiring explicit permission for data collection and …

Read more"How to Protect Anonymity in Machine Learning"
Adversarial AI and Mitigation Methods
AI, Cybersecurity, Machine Learning

Adversarial AI and Mitigation Methods

By Eric Sharret April 9, 2018 April 10, 2018

Adversarial Artificial Intelligence or Adversarial AI is the new buzzword on Capitol Hill.  In the past few weeks there have been hearings on Adversarial AI in the House and the Senate, multiple articles written on …

Read more"Adversarial AI and Mitigation Methods"
Forged Passports, CBP and Digital Signatures
Uncategorized

Forged Passports, CBP and Digital Signatures

By Eric Sharret March 1, 2018 April 9, 2018

Last week Senators Ron Wyden and Claire McCaskill released a letter demanding that US Customs and Border Patrol (CBP) close a critical gap in our nation’s border security.  The gap is not related to the …

Read more"Forged Passports, CBP and Digital Signatures"
NIST’s Tougher Approach to Identity Risk
Authentication, identity and access management

NIST’s Tougher Approach to Identity Risk

By Eric Sharret February 16, 2018 February 26, 2018

According to Verizon’s 2017 Data Breach Investigations Report (DBIR), “81% of hacking-related breaches leveraged either stolen and/or weak passwords.” The National Institute of Standards and Technology (NIST) understands this. This is why, I believe, they …

Read more"NIST’s Tougher Approach to Identity Risk"
Hardware’s Burden: Meltdown and Spectre
Cyber Security, Embedded Software

Hardware’s Burden: Meltdown and Spectre

By Eric Sharret January 16, 2018 February 5, 2018

While at a recent industry event I heard a senior military leader note their preference for hardware-based security because “software is hackable”.  The idea of hardware as an uncrackable vault was rocked by this month’s …

Read more"Hardware’s Burden: Meltdown and Spectre"
Authentication Token Cybersecurity and NIST 800-63-3
Authentication, Cyber Security, identity and access management, mobile security

Authentication Token Cybersecurity and NIST 800-63-3

By Eric Sharret December 7, 2017 February 5, 2018

In June 2017, the National Institute of Standards and Technology (NIST) released its updated Digital Identity Guidelines in Special Publication 800-63-3.  The draft of this publication gained a lot of press in 2016 for highlighting …

Read more"Authentication Token Cybersecurity and NIST 800-63-3"
Active Directory Cyber Attacks
Authentication, Cyber Security

Active Directory Cyber Attacks

By Eric Sharret August 30, 2017 February 5, 2018

Active Directory has long been a favorite target for hackers.  As every penetration tester knows, the best way to compromise a network is to gain access to the Active Directory (AD) server and escalate your …

Read more"Active Directory Cyber Attacks"
Ransomware and 3 Rays of Hope
Cyber Security

Ransomware and 3 Rays of Hope

By Eric Sharret June 29, 2017 February 5, 2018

This week we received news of another global ransomware attack that has reportedly affected FedEx, Rosneft, Moller-Maersk, and Merck.  This comes hot on the heels of last month’s WannaCry ransomware attack that affected 300,000 computers …

Read more"Ransomware and 3 Rays of Hope"

Posts navigation

1 2 3 4

CONNECT WITH US!

Facebook
Twitter
YouTube
LinkedIn
Back to Top
Powered by Fluida & WordPress.