Eavesdropping On Computers From Afar
When I teach Learning Tree’s Cyber Security introduction, participants are often amazed at the ways bad actors can eavesdrop on computers. Most of them are aware of software that can be planted by bad actors that can capture keystrokes, for instance, but few are aware that noises from keystrokes, the vibration of a notebook, and […]
How can Artificial Intelligence support your Big Data architecture?
Getting a big data project in place is a tough challenge. But making it deliver results is even harder. That’s where artificial intelligence comes in. By integrating artificial intelligence into your big data architecture, you’ll be able to better manage, and analyze data in a way that provide a substantial impact on your organization. With big data getting even […]
Practical Steps Toward Compliance With OpenSCAP
In this blog I described some of the logical problems with vulnerability scanners. False positive and false negative errors. Additionally, the worry that problems exist but our tool hasn’t even tried looking for them. Let’s try to make this practical! I’m working on a consulting job as a sub-sub-contractor on a U.S. Department of Defense […]
Does Intel Python Deliver?
Intel’s distribution of Python, created in collaboration with Anaconda, is billed by the hardware giant as a distribution created for performance. Specifcally, the numerical performance demanded by scientific research and machine learning. Claims are bandied about referring to Python that executes at machine-language speeds, but does Intel Python really deliver? I won’t use the word […]
What Is a GAN And Is It Dangerous?
I enjoy being deceived sometimes. The magicians Penn and Teller do a great job of deceiving audiences. The website https://www.thispersondoesnotexist.com/ demonstrates a different kind of deception: computer-generated images that look incredibly realistic. This is different than the deepfake videos where one person’s face is attached to another’s body. The method the site uses is called […]