In the early days of Pinterest, the company was faced with the same question that faces any system designer: how does one scale a system…
Music generated by AI is taking over! New tools and updated models are being released all the time. In this video, I explore what’s hot…
I was recently reading an article written on Michael Spencer’s Substack, AI Supremacy about the large impact that AI will have on the Biotech industry.…
Sherman Kent worked as a historian and Yale professor who, during World War II, brought the rigorous methods of academia to the intelligence community. Post-war,…
Bare-metal (type 1) hypervisors have a big leg-up on their type 2 counterparts. With the hypervisor installed directly on top of hardware, there are many…
Threat actors love to attack over the holidays. Think about it – during what other time of year are so many defenders distracted, taking time…
I’ve enjoyed running through SIEM challenges recently – there’s something satisfying about sifting through the noise to find the one network event you need. Sometimes…
Recently I’ve been learning to use Kibana as part of the Elasticstack (formerly the ELK stack), frequently used for data visualization and analysis. It’s particularly…
Armitage is an extension written in Java for the free Metasploit command and control (C2) framework. It adds a GUI and the ability the collaborate…
What is YARA? YARA is a program that can detect patterns in binary or text. The name is an acronym – “Yet Another Ridiculous Acronym”,…