Strategic Countermeasures to combat Software Vulnerabilities effectively in AI/ML enabled applications

Looking back, Application Security has evolved significantly in the last couple of decades. In the early 2000s, SQL injection and Cross Site Scripting (XSS) attacks were a nightmare for cybersecurity teams as attackers easily bypassed network firewalls through attacks at the application layer. Since traditional network firewalls at that time were not application-aware, these attacks proved a blind spot allowing attackers to compromise web applications easily. Hence, the computer industry developed countermeasures which included and not limited to web application firewalls (WAF), source code security reviews, and DevSecOps, who automate these checks within CI/CD pipelines to and allow security

TikTok Takedown Order: National Security recommendations to prevent actionable surveillance of American Citizens by a Hostile Foreign Power (China)

(Uploaded 8/25/20) TikTok is a very popular app with over 1 Billion downloads, which translates to almost 1/7th of World Population. This app is very popular among youngsters here in the USA, just as it has taken the world by storm. TikTok like all other “free” social media platforms, treats its users as their product, their personal data as its currency, and their Business Model is predicated on trading one’s personal information to use these “free” services. The app’s privacy policy says TikTok “may share your information with a parent, subsidiary, or other affiliate of our corporate group” while

Personal Privacy – A Mirage in today’s Tech World? Call to action to protect us!

Are we giving up our privacy for convenience without thinking about the consequences? It seems that we all desire data privacy, but our actions often seem to indicate otherwise! We have always been calling for users to be careful of what they post online. My kids are familiar with my saying to them all the time “think before posting / texting / tweeting anything online… because once you do, it will stay there forever!”. It is our view that people do not fully appreciate how pervasive our online digital footprint is and the amount of information (related every aspect

Race to 5G Implementation: Our National Security Considerations need to be paramount

Published Dec 24, 2018 Based on what we see and read in the media, “5G” stands for fifth generation of internet connectivity. This next-generation technology promises unprecedented speeds and coverage with more stability than existing telecommunication networks. This 5G network is expected to facilitate revolutionary technologies such as “autonomous vehicles” and “smart electricity grids” and provide a quantum leap in capabilities with connected (IoT) devices just as 4G enabled us to have applications like Uber. Among various benefits being reported is the promise of 5G to support building of “smart cities” with an advanced network that connects an array

Cybersecurity tips to help keep you safe(r) from “Phishermen” during this Holiday Season

Published Dec 7, 2018 We are now entering the holiday season where we expect to give Thanks for our blessing and spend more time with friends and family. This is also the season of giving and we are all busy shopping, travelling, and doing other fun things like online shopping which will require significantly more cyber activity. Hence we have prepared these cybersecurity tips to help keep you safer from the most insidious of cyber-threats during this holiday season – Phishing. When you look in your email inbox, you probably expect to see messages from family, relatives, colleagues, customers,