Ransomware Rising – Understanding, Preventing and Surviving Cyber Extortion

Ransomware Rising – Understanding, Preventing and Surviving Cyber Extortion

Over the past 6 months I have been researching ransomware, and not even from the technical angle (which would very tempting and no doubt, enlightening in it’s own right), but from a strategic perspective. This approach resonated with many, and I was invited to after speak with the International Conference ... Read More
AI-Generated Personas: Trust and Deception

AI-Generated Personas: Trust and Deception

And the Ethical Dilemma of Using AI to Create Fake Online Personalities In recent years, advancements in artificial intelligence (AI) have given rise to powerful tools like StyleGAN and sophisticated language models such as ChatGPT. These technologies can create hyper-realistic images and conversations, blurring the line between authentic human presence ... Read More
100 Million: How Data Breaches Empower Malicious AI

How Data Breaches Empower Malicious AI: The AT&T Case Study

Once a model is trained on a data set, if you delete that data set, the model still retains the knowledge derived from that data. The impact of the breach lives on, potentially forever ... Read More
The Ticketmaster Breach – A Never Ending Saga

The Ticketmaster Breach – A Never Ending Saga

The Ticketmaster Saga continues, with over 500 Million users personal and financial details compromised. When will we stop playing whack-a-mole and start taking Personal Data Privacy seriously? ... Read More

OpenSSH regreSSHion Vulnerability

…and…How AI Can Revolutionize Code and Regression Testing Introduction Artificial Intelligence (AI) is transforming numerous industries, and software development is no exception. One of the critical areas where AI can make a significant impact is in code regression testing. This article explores how AI can streamline these processes, using a ... Read More
Cybernetic Vulnerability: The API Connection

The Ever Expanding Attack Surface

Everything, these days, is connected. The fridge, the oven, your fitness tracker, your thermostat, the locks on your front door… It’s the same for businesses as well as at home. Everything is connected. Convenient right? Yes, but this can also be a security nightmare. Like a chain being only as ... Read More

The Data Privacy Revolution

In an era where data breaches, ransomware, and other cyber threats are becoming increasingly sophisticated, traditional methods of protecting data, PII, and other sensitive details are proving inadequate. Decades ago, neither HTTP nor email were encrypted, yet we would never dream of sending any form of communication today without security ... Read More
Are We All Ready To Embrace AI?

Are We All Ready To Embrace AI?

As artificial intelligence (AI) continues to advance and integrate into various aspect of day to day life, ensuring its safe and secure operation becomes paramount. Imagine for a moment, if you will, a malicious actor/hacker posing as a candidate for employment where the interview is conducted by AI. Improperly trained ... Read More
Tracking CVEs in real time

Tracking CVEs in real time

Following up on the direction of my last post cves-the-double-edged-sword, where I explored digging for CVEs by vendor, I want to go a step further and stay current with any and all CVEs as they are published. My rationale is simple. In any environment there are multiple vendors, and it’s ... Read More

CVEs – The double edged sword

Up until the late 1990’s, vulnerability scanners shared no common point of reference. Two different scanners could detect the same vulnerability, and it would be very difficult for security professionals to tell if it was the same vulnerability, or two different ones. Enter the MITRE corporation and a proposed “Common ... Read More