Penetration testing August 24, 2018 David Balaban Machine Learning in Offensive Security Contrary to popular belief, machine learning is not an invention of the 21st century. Over the last twenty years, however, several productive hardware platforms...
Blockchain security August 7, 2018 David Balaban Blockchain Vulnerabilities: Imperfections of the Perfect System The whole cryptocurrency and blockchain craze has attracted both fans and critics of the new tech, but the flip side is that it has lured cybercrooks, too....
General security August 7, 2018 David Balaban The Main Concerns with Biometric Authentication Part of my job is to coordinate technical specifications for mobile app development projects with the customers. In the process, I often hear the same question:...
Hacking June 21, 2018 David Balaban Getting Paid for Breaking Things: The Fundamentals of Bug Bounty According to the latest Software Fail Watch report released by Tricentis, companies all over the world lost $1,7 trillion last year over software failures and...
(ISC)² CISSP June 15, 2018 David Balaban Identity Governance and Administration (IGA) in IT Infrastructure of Today This article is part of our CISSP certification prep series. For more CISSP-related resources, see our CISSP certification hub. Identity Governance and...
General security June 15, 2018 David Balaban Top threats to online voting from a cybersecurity perspective Last year, NASA set up an online voting campaign to pick a name for an astronomical object, a small ice-covered asteroid roving through a remote part of the...
General security June 15, 2018 David Balaban And Again, About Storing Passwords When the question of storing passwords arise, the first idea is to simply keep them in clear text in the corresponding table in the database. However, in 2018...
Blockchain security June 15, 2018 David Balaban Personally Identifiable Information and Distributed Ledgers PII (personally identifiable information) is a valuable component of every individual's life. Governments and organizations take significant efforts to protect...
General security June 14, 2018 David Balaban What Is an IdM and how to discover if you need one IdM is an abbreviation for "Identity Management," i.e., management of user accounts. Let's turn to Wikipedia: "IdM is the security discipline that enables...
IoT Security May 30, 2018 David Balaban 10 Tips to Increase IoT Cameras Protection From various security reports on IoT botnets, we know that most digital video surveillance systems used by small and medium-sized businesses contain vulnerabilities...