BLOG

New Russian Attacks: CYR3CON Analysis on Five Vulnerabilities Reportedly Used by the SVR

On Thursday, the NSA reported that Russian intelligence is exploiting 5 particular...

Go from Good to Great in Machine Learning Cyber Applications

Enterprises around the globe are creating “data science” teams to apply machine learning to...

Beware of Black Boxes in your Machine Learning Solution

A black box is a system that produces a result – and does not provide details on how it arrived...

Tracking the Exploitation of the F5 Vulnerability

Security researchers recently reported that F5 vulnerability CVE-2021-22986 was exploited. We...

MS Exchange Attack: Staying on Top of the Intelligence for the Latest Exploits

Earlier this month Microsoft announced four zero-day vulnerabilities for Microsoft Exchange that...

DHS Warns of New Big-IP Vulnerabilities

DHS Warns of New Big-IP Vulnerabilities; NIST has not yet Provided Full Details

When 50% is NOT a Coin Flip

When is 50% not a coin flip?  It occurs when the base rate of occurrence (often referred to as a...

The Importance of Peer-Review in Machine Learning

We’ve heard a lot in the news about FDA trials for COVID-19 vaccines.  This is an important step...