While artificial intelligence is changing our world for the better, if put in the wrong hands, cybercriminals can figure out how to use the technology in a negative way. To stay ahead of the curve, IBM Research has announced it has been studying the evolution of this technology in order to predict new potential threats … continue reading
Your teams have taken a lot of time to ensure your super secret systems are super secret, right? Thanks to Black Hat 2015, all that work to prove a system is secure and reliable is going to have to be redone. Christopher Domas, security researcher at the Battelle Memorial Institute, metaphorically dropped the mic and … continue reading
It’s that time of year again: Black Hat and Defcon are upon us! That means your systems are all in danger, and your applications should be afraid. Not only will there be (and has already been) an endless stream of new exploits dropped at the shows, but the weekend of Defcon is, effectively, open season … continue reading
In last week’s episode, “Adult Content,” we saw the Pied Piper team trying to reclaim what was rightfully theirs: their algorithm that End Frame stole (even though Richard basically handed it to them.) “You are stealing it all wrong,” an upset Richard declares. Russ Hanneman struggles with the fact that he is no longer a … continue reading