Using AI to Identify the Resistance
Last month the New York Times published a now famous op-ed from someone within President Trump’s administration. The piece led to a hunt for the “member of the resistance” and denials by major political figures. …
Last month the New York Times published a now famous op-ed from someone within President Trump’s administration. The piece led to a hunt for the “member of the resistance” and denials by major political figures. …
TELEGRID uses Machine Learning in many of its products specifically behavioral biometrics for user authentication. I personally spend countless hours researching Machine Learning and performing market analysis. Doing so I have noticed a troubling trend …
When I first heard of the Robot Operating System (ROS) I thought it was just that – an operating system for robots. Well I was wrong it is not an OS but rather an open-source …
Growing up I had a friend who was into Amateur radio also known as Ham. You could spot his house a mile away with the huge antenna on his roof. Back then kids interested in …
Let’s face it, when it comes to hacks we have become, well, quite complacent. We figure it is out of our control anyway and it’s not like we are going to go off grid. Right? …
The General Data Protection Regulation (GDPR) just went into effect in the European Union. It is a law that is designed to protect the privacy of individuals by requiring explicit permission for data collection and …
Last week Senators Ron Wyden and Claire McCaskill released a letter demanding that US Customs and Border Patrol (CBP) close a critical gap in our nation’s border security. The gap is not related to the …
Forbes Magazine had an interesting article last month about security vulnerabilities in home security products from SimpliSafe, Samsung, Comcast and others. The author highlighted the usual vulnerabilities including default passwords and unencrypted signaling, but, there …
Every once in a while I read an interesting cybersecurity study that I feel deserves its own blog post. It usually describes a successful cyber-attack that exist at the intersection of three things: organizational ambivalence, …
PwC released its Global State of Information Security® Survey 2017 which is based on responses of 10,000 C-level executives from over 133 countries. In the results PwC found that “59% of survey respondents say they …