Category: Controversial

  • AI vs ML and why it is important in cybersecurity

    AI vs ML and why it is important in cybersecurity

    we love buzzwords in cybersecurity. every few months the industry discovers a new shiny acronym, slaps it on the same old product, and suddenly we’re all supposed to believe the world has changed. now the magic word is “AI.” everything is “AI-powered,” “AI-enhanced,” “AI-driven.” but when you look under the hood, most of these so‑called…

  • AI boundaries: you still need to learn how to think

    AI boundaries: you still need to learn how to think

    recently I heard someone confidently say: “you don’t need to learn how to code anymore. nobody needs to. AI will do it for you.” this is exactly the kind of thinking that keeps pushing us further away from understanding the root of anything. if we follow that logic, then we also don’t need to teach…

  • Your Technical Foundation Is Rare

    Your Technical Foundation Is Rare

    If You Were Ahead of the Curve 30 or 40 Years Ago… That means you built a first-principles understanding of computing, networks, and systems. Most people today—even in AI—are building on abstractions. But you? You understand the layers beneath. And remember: that’s not obsolete; it’s leverage. What I’m really saying is, you’re lucky if you…

  • What is research and why is it crucial for elevating your knowledge in computer security?

    What is research and why is it crucial for elevating your knowledge in computer security?

    Doing research in computer security since 1989 has kind of put me in a situation where I could organically learn what research really is and what I expect from it. To start with, perhaps it’s easier to say what is “not” considered research. These days, when people talk about research, they’re simply referring to Googling…

  • What is your background in Computer Security?

    What is your background in Computer Security?

    Can you be a cybersecurity professional just because you are passionate about it or overnight got a certificate? Real quick answer: NO, not at all! That is actually one of the main reasons behind hackers being always ahead of the security community. I hear people in this industry, well, I should say in this commercial…

  • AI Stuff

    AI Stuff

    …Generations have already lost their Appetite to Learn, to Explore, and to Cherish the Beauty of Science and True Knowledge, let alone Pursuing Wisdom… First of all, I think we excessively use the term “AI” irrelevantly; most of the time, I mean the term “artificial intelligence” is being overly used in a way that is…

  • Who do you think is going to be the winner, the hacker or the security practitioner?

    Who do you think is going to be the winner, the hacker or the security practitioner?

    Who do you think is going to be the winner, the hacker or the security practitioner? This question is in the same ballpark as: Do we need more cybersecurity professionals who are getting more and more certifications? Then why are we just getting weaker compared to the hacker’s community? For example, is the ability to…

  • Who is the biggest spammer?

    Who is the biggest spammer?

    It is certainly nothing new that those labeling their spamming activity as ‘email marketing’ have no idea what real email marketing looks like, but that is not the point of this short article. I have been closely observing that so-called ‘security companies’ are generating most of the junk email traffic. It is ironic that companies…

  • Doctoring Data: How to sort out medical advice from medical nonsense

    Doctoring Data: How to sort out medical advice from medical nonsense

    That’s the name of a book: *Doctoring Data* by Dr. Malcolm Kendrick. It teaches you how to spot misleading medical claims and understand the tricks used in health research and media. But you could easily generalize it to all kinds of data. The mindset is there — the idea — and you can definitely see…

  • Audio Fingerprinting: The Sound of Surveillance

    Audio Fingerprinting: The Sound of Surveillance

    The Invisible Signature Every sound you make online, a voice clip, a stream, a meeting, carries a fingerprint. Not the kind you leave on glass, but the kind you leave in frequency. It’s invisible, persistent, and mathematically unique. And once captured, it never forgets you. I believe audio fingerprinting is the quietest form of tracking.…