Featured Blogs
Safer Internet Day 2020
What Can You Do To Make The Internet a Better Place In 2020, you’d be hard-pressed to find an Aussie...
Intelligence in the Enterprise
Intelligence became an integral military discipline centuries ago. More recently, this practice evolved into what is called Intelligence Preparation of the Battlefield,...
Knock, Knock – Who’s There?
A Windows Linux Subsystem Interop Analysis Following our research from Evil Twins and Windows Linux Subsystem, interoperability between different WSL...
How You (and Your Teen) Can Stay Safe While Looking for Love Online
Valentine’s Day is such a double-edged sword. If you’re feeling the love and just can’t get enough of your sweetheart...
Timeless Principles to Help Your Child Develop Social Superpowers
“You can make more friends in two months by becoming interested in other people than you can in two years...
Consumers want a fully connected life – but at what cost?
Convenience has always, and will always be king. That’s why it’s no surprise that the average person is collecting connected...
Introduction and Application of Model Hacking
Catherine Huang, Ph.D., and Shivangee Trivedi contributed to this blog. The term “Adversarial Machine Learning” (AML) is a mouthful! The...
Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles
The last several years have been fascinating for those of us who have been eagerly observing the steady move towards...
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II
In our first article we discussed the growing pattern of targeted ransomware attacks where the first infection stage is often...
