Close

Search Results for: analysis

Right and Wrong in AI

Background The DARPA Cyber Grand Challenge (CGC) 2016 competition has captured the imagination of many with its AI challenge. In a nutshell, it is a contest where seven highly capable

Is It GAME OVER?

Targeted attacks take many forms, though there is one common tactic most of them share: Exploitation. To achieve their goal, they need to penetrate different systems on-the-go. The way this

Exploit in the Wild, Caught Red-Handed

Imagine a futuristic security technology that can stop any exploit at the exact moment of exploitation—regardless of the way the exploit was built, its evasion techniques, or any mutation it

Cyber Tech 2015 – It’s a Wrap

It has been a crazy two days at Israel’s Cyber Tech 2015…in a good way! The exhibition hall was split into three sections: the booths of the established companies, the

The Emergence of Polymorphic Cyber Defense

Background Attackers are Stronger Now The cyber-world is witnessing a fast-paced digital arms race between attackers and security defense systems, and 2014 showed everyone that attackers have the upper hand

Machine Operated Web Applications

Software applications have two main perspectives the external perspective where interfaces to the external world are defined and consumed and the internal perspective where an internal structure enables and supports

A Product Roadmap in a Feed

Strategic Board was initially an idea about a new competitive intelligence/market intelligence tool for enterprises in the IT sector. Since then many things have changed including our concept and vision

didn't find what you are looking for?

Search again

Scroll Up