PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4Mar 4
PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
Prof Bill Buchanan OBE FRSEHardware Security-By-DesignWhich area has the worst track record for its implementation of cybersecurity? PKI/Digital Certificates? Key Management? OAuth? Well, it is…Just nowJust now
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceWAFs Show That End-to-End TLS Encryption Tunnels Can Be BrokenBut it needs the trust of a proxy in-between2h ago2h ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceFortunaThe usage of Pseudo Random Number Generators (PRNG) is fundamental in cybersecurity and is used to create keys and salt values for…21h ago21h ago
Prof Bill Buchanan OBE FRSEThe Real Satoshi?I found an interesting Twitter thread [here]:1d ago21d ago2
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIt’s a Perfect 10!I sometimes show this slide at the start of a presentation which introduces encryption:1d ago1d ago
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceHumans v AI in CybersecurityOr, Can Humans and AI Work Together in Cybersecurity?Sep 291Sep 291
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceJavaScript Is A Trademark!Please excuse me, but this article may be breaching trademarking rules. And, before I begin, I must state that JavaScript has very little…Sep 28Sep 28
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceSalt Is Good in Cybersecurity, But Pepper Is Even BetterWe need to admit that generally, we are not very good at storing user passwords, and there have been many breaches where hashed versions of…Sep 243Sep 243