it does but only if it is originated from a intelligent programmer. AI is as smart as the people who did its modeling. an artificial intelligence cannot be more intelligent than its origination. presuming AI will be helping us securing cyberspace is like presuming we will have a accurate Accounting system or flawless GL just… Continue reading Does AI help us in security operations?
Category: Software Development
Relying on SAST/DAST
Relying on DAST/SAST is like investing in a restaurant where chef needs to be reminded of how to safely handle knife. no surprise that software developers have been dragging computer end-users to current situation when software products are no longer reliable, or they are packed with vulnerabilities. I have mentioned before that I believe the… Continue reading Relying on SAST/DAST
Software is the root cause of all insecurities
Software is the core of any computerized system and it is the most effective way of introducing insecurities to cyberspace with all its entities. eliminate fancy tools like synthesizer if you want your child be a musician. root cause of all security vulnerabilities (mainly) resides with the software, the foundation of all computer systems, where… Continue reading Software is the root cause of all insecurities
Does Cloud Guarantees Security?
There is a wrong perception of Cloud security among consumers of the Cloud solutions and platforms. Actually, classic Clouds are more insecure than traditional computing even though it is set on stone for most people even many “IT professionals” that Cloud computing is natively more secure, or by default it is at least more secure… Continue reading Does Cloud Guarantees Security?
Penetration Testing vs. Secure Code Review
What is the best way to make sure a software product is secure? The easiest way is to roll out to the market and see what is going to happen and hope everything does well…no kidding, that is what most software developers do! Let’s forget about what majority of software community do and see what… Continue reading Penetration Testing vs. Secure Code Review
Coding Skills and Security Administration
Know how to code and take your computer security effectiveness to next level
Commitment: The Sole Reason Behind Hackers Supremacy
Would you put more complex firewall rules when internal nodes are vulnerable due to initial default insecure setup, or setup numerous security tools while setting up more and more insecure nodes at the same time?!
Does JavaScript Pose A Security Risk?
Javascript is a silent threat! I no longer am able to imagine the current structure of the web without JavaScript. This is about online applications in form of traditional websites, otherwise traditional web interfaces won’t be able to handle the applications and web would collapse without JS! That does not mean I am a fan… Continue reading Does JavaScript Pose A Security Risk?