Penetration testing August 24, 2018 David Balaban Machine Learning in Offensive Security Contrary to popular belief, machine learning is not an invention of the 21st century. Over the last twenty years, however, several productive hardware platforms...
Blockchain security August 7, 2018 David Balaban Blockchain Vulnerabilities: Imperfections of the Perfect System The whole cryptocurrency and blockchain craze has attracted both fans and critics of the new tech, but the flip side is that it has lured cybercrooks, too....
General security August 7, 2018 David Balaban The Main Concerns with Biometric Authentication Part of my job is to coordinate technical specifications for mobile app development projects with the customers. In the process, I often hear the same question:...
Hacking June 21, 2018 David Balaban Getting Paid for Breaking Things: The Fundamentals of Bug Bounty According to the latest Software Fail Watch report released by Tricentis, companies all over the world lost $1,7 trillion last year over software failures and...
(ISC)² CISSP June 15, 2018 David Balaban Identity Governance and Administration (IGA) in IT Infrastructure of Today This article is part of our CISSP certification prep series. For more CISSP-related resources, see our CISSP certification hub. Identity Governance and...
General security June 15, 2018 David Balaban Top threats to online voting from a cybersecurity perspective Last year, NASA set up an online voting campaign to pick a name for an astronomical object, a small ice-covered asteroid roving through a remote part of the...
General security June 15, 2018 David Balaban And Again, About Storing Passwords When the question of storing passwords arise, the first idea is to simply keep them in clear text in the corresponding table in the database. However, in 2018...
General security June 14, 2018 David Balaban What Is an IdM and how to discover if you need one IdM is an abbreviation for "Identity Management," i.e., management of user accounts. Let's turn to Wikipedia: "IdM is the security discipline that enables...
IoT Security May 30, 2018 David Balaban 10 Tips to Increase IoT Cameras Protection From various security reports on IoT botnets, we know that most digital video surveillance systems used by small and medium-sized businesses contain vulnerabilities...
General security May 30, 2018 David Balaban User and Entity Behavioral Analytics (UEBA) Overview The human factor is one of the key issues of information security. On the one hand, humans are common sources of various threats to information security, and...