Cybersecurity and Automation
With each dawn, there are new stories relating there has been yet another compromise and a mountain of data had been exfiltrated via an...
Cybersecurity and Machine Learning
Computers are rather adept at a large number of tasks, from the mundane to complex and dangerous. The users may want statistics applied...
Cybersecurity and Printers
A new printer comes with so many fabulous features. It is like a mini-computer into itself. And there lies a problem. Like a...
Cybersecurity and Critical Infrastructure
Critical infrastructure (CI) is one of the underlying backbones of our civilization. This aspect supports virtually all we are actively...
Cybersecurity and Hospitality
The hospitality industry has a single focus on ensuring their guests have the optimal experience relative to their facility. This is the...
Cybersecurity and Automation
With each dawn, there are new stories relating there has been yet another compromise and a mountain of data had been exfiltrated via an...
Cybersecurity and AI
AI research has been growing by leaps and bounds. There are new firms being created, working towards ML and AI applications, and...
Cybersecurity and RATS
Yet another reason to monitor your computer: RadRAT will give you an interesting day Remote access tools (RATs) are an interesting tool...
Cybersecurity and Nuclear Power Plants
Over the years, there has been a significant amount of research with cybersecurity in mind re: industry targets. These include, but have...
Cybersecurity and AI
AI research has been growing by leaps and bounds. There are new firms being created, working towards ML and AI applications, and...