SECURE TARGET: A Critical Lens on Tech, Power, and the People Behind It

  • When Are You Ready For Agentic AI Security?

    When Are You Ready For Agentic AI Security?

    The Excitement Is Premature Everyone wants agentic AI in security. Autonomous actions. Self-healing systems. Machines making decisions… Sounds efficient. Sounds inevitable. But are you ready? Or are you just tired of doing the work yourself? “Automation without understanding is just faster confusion.” The Missing Foundation It may sound strange, but if you have never experienced…

  • What is your background in Computer Security?

    What is your background in Computer Security?

    Can you be a cybersecurity professional just because you are passionate about it or overnight got a certificate? Real quick answer: NO, not at all! That is actually one of the main reasons behind hackers being always ahead of the security community. I hear people in this industry, well, I should say in this commercial…

  • Agentic AI vs. AI agent: why the confusion will cost you

    Agentic AI vs. AI agent: why the confusion will cost you

    You probably think they are the same thing. They are not. And if you are a security practitioner or a strategic thinker, the difference is not academic, it is operational. What most people get wrong An AI agent is a component. It is a model that perceives input and produces output. Think of it as…

  • AI Stuff

    AI Stuff

    …Generations have already lost their Appetite to Learn, to Explore, and to Cherish the Beauty of Science and True Knowledge, let alone Pursuing Wisdom… First of all, I think we excessively use the term “AI” irrelevantly; most of the time, I mean the term “artificial intelligence” is being overly used in a way that is…

  • Essential Algorithms: A Practical Approach to Computer Algorithms Using Python and C#

    Essential Algorithms: A Practical Approach to Computer Algorithms Using Python and C#

    Essential AlgorithmsA Practical Approach to Computer Algorithms Using Python and C#by Stephens, Rod This book resonated deeply with me—especially the chapter on Sorting, which brought back memories of my first real challenge in assembly language programming. I had to sort millions of records using various algorithms to find the fastest one, and that experience shaped…

  • The Art of Machine Learning: A Hands-On Guide to Machine Learning with R

    The Art of Machine Learning: A Hands-On Guide to Machine Learning with R

    The Art of Machine Learning: A Hands-On Guide to Machine Learning with Rby Norman Matloff (Author) I have a strong opinion about this book, and obviously it did not meet my expectations. I am just going to highlights several key areas where I believe the book falls short, including the lack of relevant information, disorganized…

  • Who do you think is going to be the winner, the hacker or the security practitioner?

    Who do you think is going to be the winner, the hacker or the security practitioner?

    Who do you think is going to be the winner, the hacker or the security practitioner? This question is in the same ballpark as: Do we need more cybersecurity professionals who are getting more and more certifications? Then why are we just getting weaker compared to the hacker’s community? For example, is the ability to…

  • Starting the Sequence‑Modeling Experiment

    Starting the Sequence‑Modeling Experiment

    Why I’m Beginning This Project Right now, in October 2024, I’m launching a research project built around a simple but provocative question: Can network behavior be modeled the same way we model language? Not as static events. Not as signatures. But as sequences with structure, grammar, and predictability. Network traffic has patterns. It has transitions.…

  • Who is the biggest spammer?

    Who is the biggest spammer?

    It is certainly nothing new that those labeling their spamming activity as ‘email marketing’ have no idea what real email marketing looks like, but that is not the point of this short article. I have been closely observing that so-called ‘security companies’ are generating most of the junk email traffic. It is ironic that companies…

  • Why Are We Struggling With Cybersecurity?

    Why Are We Struggling With Cybersecurity?

    Why are we struggling with cybersecurity? Why does it feel like hammering water when it comes to securing your assets in the cyber world? It’s a different story if you don’t believe that the majority of the industry is wasting time, thinking they are doing the right things to secure their network. Then how come…