Follow Us

March 3, 2017

Yesterday the AWS team released a summary of why their S3 services in the Northern Virginia (US-EAST1) region were disrupted and some of the steps they’re taking to ensure it doesn’t happen again – in that service region or others.

For an outage that affected more than...

January 25, 2017

Many organizations are struggling to overcome key conceptual differences between today’s AI powered threat detection systems and legacy signature detection systems. A key friction area - in perception and delivery capability - lies with the inertia of Indicator of Comp...

January 24, 2017

In this part we’ll discuss why an organization needs to launch a bug bounty program, and what limits the value they will likely extract from such an investment.

January 17, 2017

The AI revolution is still relatively young in the InfoSec world. Despite endless floors of vendor booths displaying the latest security device or technology, we're still in the v1.0 realm.

In many cases, while the marketing literature references machine learning, must...