What is research and why is it crucial for elevating your knowledge in computer security?

Doing research in computer security since 1989 has kind of put me in a situation where I could organically learn what research really is and what I expect from it. To start with, perhaps it’s easier to say what is “not” considered research. These days, when people talk about research, they’re simply referring to Googling… Continue reading What is research and why is it crucial for elevating your knowledge in computer security?

What is your background in Computer Security?

Can you be a cybersecurity professional just because you are passionate about it or overnight got a certificate? Real quick answer: NO, not at all! That is actually one of the main reasons behind hackers being always ahead of the security community. I hear people in this industry, well, I should say in this commercial… Continue reading What is your background in Computer Security?

AI Stuff

…Generations have already lost their Appetite to Learn, to Explore, and to Cherish the Beauty of Science and True Knowledge, let alone Pursuing Wisdom… First of all, I think we excessively use the term “AI” irrelevantly; most of the time, I mean the term “artificial intelligence” is being overly used in a way that is… Continue reading AI Stuff

Essential Algorithms: A Practical Approach to Computer Algorithms Using Python and C#

Essential AlgorithmsA Practical Approach to Computer Algorithms Using Python and C#by Stephens, Rod This book resonated deeply with me—especially the chapter on Sorting, which brought back memories of my first real challenge in assembly language programming. I had to sort millions of records using various algorithms to find the fastest one, and that experience shaped… Continue reading Essential Algorithms: A Practical Approach to Computer Algorithms Using Python and C#

The Art of Machine Learning: A Hands-On Guide to Machine Learning with R

The Art of Machine Learning: A Hands-On Guide to Machine Learning with Rby Norman Matloff (Author) I have a strong opinion about this book, and obviously it did not meet my expectations. I am just going to highlights several key areas where I believe the book falls short, including the lack of relevant information, disorganized… Continue reading The Art of Machine Learning: A Hands-On Guide to Machine Learning with R

Who do you think is going to be the winner, the hacker or the security practitioner?

Who do you think is going to be the winner, the hacker or the security practitioner? This question is in the same ballpark as: Do we need more cybersecurity professionals who are getting more and more certifications? Then why are we just getting weaker compared to the hacker’s community? For example, is the ability to… Continue reading Who do you think is going to be the winner, the hacker or the security practitioner?

Who is the biggest spammer?

Who is truly the biggest spammer: the bad actors or those who don’t appear to be bad actors?

It is certainly nothing new that those labeling their spamming activity as ‘email marketing’ have no idea what real email marketing looks like, but that is not the point of this short article. I have been closely observing that so-called ‘security companies’ are generating most of the junk email traffic. It is ironic that companies… Continue reading Who is the biggest spammer?

I am not the technical person but I must sell you something I have no clue about!

well, I actually changed the second part sarcastically, this is the original version: I am not the technical person but I really must sell you something today, can I connect you to another person in my company, an engineer perhaps? you know, we have a very great product but I am just lacking understanding what… Continue reading I am not the technical person but I must sell you something I have no clue about!

Security solution which acts like traditional painkiller

most security solutions are like traditional painkillers, we certainly feel better after talking them, but the root cause of pain remains intact and unresolved! as long as we do not address root cause of security incidents and vulnerabilities, we will be feeling better from short-term pain relief of “Security Solutions” and then suffering again soon… Continue reading Security solution which acts like traditional painkiller