A Look at the WiFi Kraken

A Look at the WiFi Kraken

In this video from Kak5, Mike Spicer shows off his WiFi Kraken which captures and records all WiFi traffic. Note how important analytics are to... Details
WPA3 Passwords Still Vulnerable and Capital One Hack Breakdown

WPA3 Passwords Still Vulnerable and Capital One Hack Breakdown

Hak5, a great YouTube channel focused on IT security issues, has an insightful look at the Capital One hack. Details
GermanWiper isn’t ransomware. It’s worse than that

What Makes GermanWiper Worse Than Ransomware?

Recently, the tech press is full of stories about “a new ransomware strain” called GermanWiper, that has hit German businesses hard in the last week.... Details
Improve Security with Azure Sentinel

Improve Security with Azure Sentinel

Sarah Young joins Scott Hanselman to discuss Azure Sentinel, which is a scalable, cloud-native, security information event management (SIEM) and security orchestration automated response (SOAR)... Details
Deep Dive: Confidential Computing in IoT using Open Enclave SDK

Deep Dive: Confidential Computing in IoT using Open Enclave SDK

Confidential computing is difficult and Microsoft, together with partners, has embarked on simplifying confidential computing in IoT using enclaves on Open Enclave SDK. From the... Details
How Quantum Computers Break Encryption

How Quantum Computers Break Encryption

Here’s a great explanation of Shor's Algorithm and how quantum computing could alter encryption forever. Details
How malevolent machine learning could derail AI

How Malevolent Machine Learning Could Derail AI

The worlds of CyberSecurity and AI are colliding. That's the good news. The bad news is that the world of Cybersecurity and AI are colliding.... Details
What is AI fuzzing? And why it may be the next big cybersecurity threat

What is AI Fuzzing? And Is It the Next Big Cybersecurity Threat?

In case you were wondering when the worlds of CyberSecurity and AI would collide and create new threats, it's happening. AI fuzzing definition AI fuzzing... Details
Top 5 barriers to AI security adoption

Top 5 Barriers to AI Security Adoption

Here's an enlightening look at the state of applying AI to security applications. From this article in TechRepublic: Artificial intelligence (AI) holds a great deal... Details
Can Your Car Be Hacked?

Can Your Car Be Hacked?

This episode of BBC Click explores how some popular third-party alarms have made cars easier to steal. Also in this episode covers how tech can... Details