Concentric

Concentric Applies Deep Learning Algorithms to Data Security

Fresh off raising an additional $7 million in funding, Concentric has launched a tool that employs deep learning algorithms to enable cybersecurity teams to identify documents and repositories where sensitive data has ...
Security Boulevard

Artificial Personas and Public Discourse

Presidential campaign season is officially, officially, upon us now, which means it's time to confront the weird and insidious ways in which technology is warping politics. One of the biggest threats on ...

Manipulating Machine Learning Systems by Manipulating Training Data

Interesting research: "TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents": Abstract:: Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time ...
quantum computing

Survey Says Quantum Computing a Cybersecurity Threat

Now that quantum computers are moving from theory into the realm of experimental, many cybersecurity professionals are starting to appreciate a simple fact: Computers capable of cracking the most sophisticated encryption algorithms ...
Security Boulevard

More Cryptanalysis of Solitaire

In 1999, I invented the Solitaire encryption algorithm, designed to manually encrypt data using a deck of cards. It was written into the plot of Neal Stephenson's novel Cryptonomicon, and I even ...

Data, Surveillance, and the AI Arms Race

According to foreign policy experts and the defense establishment, the United States is caught in an artificial intelligence arms race with China -- one with serious implications for national security. The conventional ...
How Imperva’s New Attack Crowdsourcing Secures Your Business’s Applications

How Imperva’s New Attack Crowdsourcing Secures Your Business’s Applications

Attacks on applications can be divided into two types: targeted attacks and “spray and pray” attacks. Targeted attacks require planning and usually include a reconnaissance phase, where attackers learn all they can ...
Time for Passwords Came … and Went

The Time for Passwords Came … and Went

After struggling with every combination of your name and your birth year for the perfect username, you’re probably used to this welcoming you on every website you join: Password must contain: One ...
Security Boulevard

Evidence for the Security of PKCS #1 Digital Signatures

This is interesting research: "On the Security of the PKCS#1 v1.5 Signature Scheme": Abstract: The RSA PKCS#1 v1.5 signature algorithm is the most widely used digital signature scheme in practice. Its two ...
defense in depth

Quantum Research Puts Expiration Date on Modern Cryptography Methods

What would you say if someone told you that the foundational technology upon which most of your security protections are built will be completely nullified in 10 to 15 years? Sounds like ...
Security Boulevard