Trends in 2019 for cybersecurity according to the show floor at the RSA Security ConferenceMar 12, 2019
Adiel Lizama 6 days agoData Broker and Privacy DataWhen surfing the Internet, everything we do generates information, from the videos we like, the songs we listen to, the pages we visit,...
A. KinghtOct 9, 2018Dear password, it's not me, it's you."Dear password, we've been together for over 28 years now. As a matter of fact, you were my first authentication mode. You made sense at...
A. KinghtOct 2, 2018AI Rising: Artificial Intelligence and Machine Learning in CybersecurityThe 21st century is ushering in a new litany of startups democratizing Artificial Intelligence (AI) and machine learning (ML) in this...
A. KinghtSep 4, 2018Threat Modeling of Connected Cars using STRIDE"Even discourse, even a poetic or oracular sentence, carries with it a system of rules for producing analogous things and thus an outline...
A. KinghtAug 21, 2018Seeking Alpha: Why you should seek out making new mistakesJohn Wooden once said, if you're not making mistakes, then you're not doing anything. I'm positive that a doer makes mistakes." Over the...
A. KinghtAug 10, 2018Why Women on Your Executive Committee MattersWhile women enjoy the equality they didn’t have at the beginning of the fight for women suffrage in 1852, they still don’t have equity in...
A. KinghtJul 31, 2018Female Hacker Rising: The Changing Paradigm of the Hacker Subculture"If you can't handle her fire, let someone else enjoy the flames." -Anonymous In 1903, the first known circumvention of security controls...