Black Hat Europe 2016 S:  How Artificial Intelligence Will Liberate Security

T. Kuhn’s The Structure of Scientific Revolution outlined an episodic model in which periods of “normal science” were interrupted by periods of “revolutionary science.” It challenges us as a society to consider new paradigms, to change the rules of the game, our standards and our best practices. The advent of applied Artificial Intelligence (AI), also…

Software updates are critical, so automate them

Why do we need to update our software, anyway? Well, the first thing to understand is that there are different kinds of updates. Some of them add new features or improve existing ones. Others make your software compatible with other programs, different protocols, new or updated operating systems, and so forth. With greater compatibility you’ll…

How To Become A Cybersecurity Entrepreneur In A Crowded Market

If you want to build the next great cybersecurity startup, use your expertise, then follow these three simple suggestions. Declines in venture funding often paralyze the technology community. Talk of bubbles, dying unicorns, and austerity can surge for weeks following a negative report. In response, many entrepreneurs hit pause on their dreams, believing they should…

Critical cybersecurity priorities for the next US president

While the US presidential campaign has occasionally focused on cyber security, the topic demands more urgent attention from the individual elected as the 45th President of the United States. ISACA recommends that cyber security be a significant component of the next president’s 100-day agenda, especially given its overlap with geopolitical and economic issues. Bolstering the…