An Analysis of Generative AI: How to Be Confidently Wrong
7 min read
An Analysis of Generative AI: How to Be Confidently Wrong
By Marcello Delcaro on April 11, 2023

The recent release of the National Cybersecurity Strategy document by the White House prompted me to test Microsoft's new Bing chat feature, which is powered by OpenAI's language model,...

Continue Reading
S4x23 SBOM Challenge — Part 3: VEX Document Ingestion
7 min read
S4x23 SBOM Challenge — Part 3: VEX Document Ingestion
By Derek Kruszewski on March 16, 2023

Three weeks ago I reported on the first part of the S4x23 SBOM Challenge run by Idaho National Laboratory (INL), which focused on SBOM Creation. Last week I reported on the second part:...

Continue Reading
S4x23 SBOM Challenge — Part 2: SBOM Ingestion
7 min read
S4x23 SBOM Challenge — Part 2: SBOM Ingestion
By Derek Kruszewski on March 8, 2023

Two weeks ago I reported on the first part of the SBOM Challenge at the S4x23 cybersecurity conference in Miami, Florida. The Day 1 goal was for each team to create an accurate SBOM for...

Continue Reading
Three Quick Takeaways from Biden’s National Cybersecurity Strategy
2 min read
Three Quick Takeaways from Biden’s National Cybersecurity Strategy
By Eric Byres on March 2, 2023

NOTE: We were going to publish our second blog of the S4x23 SBOM Challenge today. However, the new National Cybersecurity Strategy was released this morning, and we thought that...

Continue Reading
S4x23 SBOM Challenge — Part 1
10 min read
S4x23 SBOM Challenge — Part 1
By Derek Kruszewski on February 24, 2023

The aDolus Team has just returned from participating in the SBOM Challenge at the S4x23 cybersecurity conference in Miami, Florida. This blog is the first of a series reporting on what we...

Continue Reading
A Flurry of Regulatory Action and the Need for SBOMs
5 min read
A Flurry of Regulatory Action and the Need for SBOMs
By Eric Byres on October 12, 2022

Executive Order 14028 on Improving the Nation's Cybersecurity was issued in May of 2021 and provided a roadmap for a series of regulatory initiatives that government agencies (and anyone...

Continue Reading
A Deeper Dive into VEX Documents
5 min read
A Deeper Dive into VEX Documents
By Derek Kruszewski on April 15, 2022

At the end of last summer, I wrote a blog post explaining the merits of Vulnerability Exploitability eXchange (VEX) documents. Almost 8 months later, I stand by the importance of these...

Continue Reading
How Russia Might Come After the West
2 min read
How Russia Might Come After the West
By Eric Byres on February 25, 2022

The DDoS attack surge that began last week against Ukrainian government agencies and banks was a bad sign. I was actually preparing a post and wondering if it was appropriate to call out...

Continue Reading
Log4j: Panic or Lesson? | How to Protect Deployed Assets
4 min read
Log4j: Panic or Lesson? | How to Protect Deployed Assets
By Ron Brash on December 21, 2021

Cleaning up the Mess will Take a Methodical Approach Nearly every week the cybersecurity community buzzes around a newly discovered vulnerability or a breach. December’s alert for the ...

Continue Reading
Sorry Blackberry: You Are Part of the Supply Chain
2 min read
Sorry Blackberry: You Are Part of the Supply Chain
By Eric Byres on November 2, 2021

Today, reporters Betsy Woodruff Swan and Eric Geller at Politico published a story: “BlackBerry resisted announcing major flaw in software powering cars, hospital equipment.” They outline...

Continue Reading
Loading more posts
No more posts to load
1 2 3 4

Stay up to date