How is Cross-Site Scripting Different From Other Related Attacks?
Cross-site scripting attacks are one of the most common attacks, making it rank seventh in “The OWASP Top 10” — the industry-recognized list for spreading awareness about the most common web security vulnerabilities. And then too, there are many less-known vulnerabilities that are often confused with... Read more
Building a Holistic Risk Profile: Near Real-Time Approach to Insider Threat Detection
Each year, organizations and research firms output yearly Cybersecurity Threat and Breach predictions. Due to the Covid-19 pandemic, a global shift has occurred, forcing organizations to adapt to a “new normal” that includes a more distributed remote workforce. In turn, this has greatly affected data theft.... Read more
5 Crucial Cybersecurity Guidelines to Incorporate for Your Remote Team
Ever since the COVID-19 pandemic forced organizations to shift their base to remote working, it has skyrocketed the cost of a data breach by $137,000 on average. Remote workers are going to be a target for cybercriminals in the future as well. And to make matters... Read more
Applications of AI in Cybersecurity
Editor’s Note: See Dustin’s talk “Applications of AI in Cybersecurity” at ODSC West 2019. Security has historically lagged behind the implementation of new technology. With AI/ML transforming how industries and government agencies do business and serve citizens, it is critical that developers build security into our... Read more
A Technical Look at How Criminals Use AI
Machine learning is one of the most exciting new features used in technology today. However, it is undoubtedly controversial too. At the moment, this controversy does not really come from the prospect of ultra-intelligent robots dramatically taking over the human race; instead, it’s because powerful technology... Read more