PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4Mar 4
PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceSoftware Cybersecurity Risks on Embedded Devices/IoTMITRE has applied its ATT&CK model to enterprise networks, mobile devices and critical infrastructure. However, one area is still weak in…1h ago1h ago
Prof Bill Buchanan OBE FRSEHardware Security-By-DesignWhich area has the worst track record for its implementation of cybersecurity? PKI/Digital Certificates? Key Management? OAuth? Well, it is…1h ago1h ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceWAFs Show That End-to-End TLS Encryption Tunnels Can Be Broken Into Two TunnelsBut it needs the trust of a proxy in-between4h ago4h ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceFortunaThe usage of Pseudo Random Number Generators (PRNG) is fundamental in cybersecurity and is used to create keys and salt values for…22h ago22h ago
Prof Bill Buchanan OBE FRSEThe Real Satoshi?I found an interesting Twitter thread [here]:1d ago21d ago2
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIt’s a Perfect 10!I sometimes show this slide at the start of a presentation which introduces encryption:1d ago1d ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceHumans v AI in CybersecurityOr, Can Humans and AI Work Together in Cybersecurity?Sep 291Sep 291
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceJavaScript Is A Trademark!Please excuse me, but this article may be breaching trademarking rules. And, before I begin, I must state that JavaScript has very little…Sep 28Sep 28