API Security 101: Broken User Authentication

API Security 101: Broken User Authentication

How attackers hack API authentication. Are you who you say you are?Photo by Markus Spiske on UnsplashYou’ve probably heard of the OWASP top ten or the top ten vulnerabilities that threaten web applications. OWASP ...
via   the comic delivery system monikered   Randall Munroe   resident at   XKCD  !

XKCD ‘Excel Lambda’

via the comic delivery system monikered Randall Munroe resident at XKCD! Permalink ...
Leonardo Torres y Quevedo’s  fascinating Chess Automata, via  History of Computers

Artificial Intelligence, The True Beginning Occurred In 1912

Leonardo Torres y Quevedo’s fascinating Chess Automata, via History of Computers Well crafted blog entry authored by Professor Herbert Bruderer at the Communication of the ACM blog, detailing the true start of ...
Not Google’s Quantum AI....

Quantum Of Tuesday: Google Quantum AI’s Paper, Whereabouts Known

Not Google’s Quantum AI.... via Bianca Bharti - writing for Canada's National Post, comes news of Google, Inc's (Nasdaq: GOOGL) stunning accomplishment in quantum computation. Described in a paper entitled 'Quantum supremacy ...
ACM Presents 2018 ACM A.M. Turing Award to Deep Learning Pioneers

ACM Presents 2018 ACM A.M. Turing Award to Deep Learning Pioneers

The Association for Computing Machinery has announced the presentation of the 2018 ACM Turing Award to a trio of Deep Learning pioneers Geoffrey Hinton, Yann LeCun & Yoshua Bengio. Congratulations! "ACM named ...

MIT’s Attack Detection via Super Computing

In a not-too-astounding announcement, it seems MIT Academicians have found a new use for super-computational resources: The utilization of super comuting resources targeting so-called 'compressed bundles' with the ostensible outcome of attack ...
cybersecurity, roles, talent, talent gap, talent certifications training

Is Formal Education Critical for a Career in Cybersecurity?

A look at whether the need for more formalized education in the security sector is necessary The role of an ethical hacker is only one of the many career paths available in ...
Security Boulevard

Computer Science and Diversity

Today I saw a tweet quoting Mark Guzdial's blog saying "In last five years, little progress in increasing the fraction of American CS BS degree recipients who are African Americans." It is ...

Offshoring and education gap

I missed the RSA Conference this week for various reasons but I did get to spend the better part of two days out of the office hanging with a group of CTO’s.  ...
Loading...