“The light is on in their window. They must be home.” This is a classic example of a side information channel. They didn’t TELL you they were home. But the side effect of them being home in the evening is the light in the window — which is how you’re pretty sure they are home even though this information wasn’t communicated to you. Another example that is a bit closer to cryptography concerns why cyphers with one-to-one…
Right before Christmas, we have invited several security professionals to a roundtable event where we discussed how AI is affecting cybersecurity landscape. While we had them on as panelists, we have asked Richard Seiersen, Bill Chen and Sean Todd to share their views on the biggest security industry challenges of 2017 and what they think is coming down the pike. Here is what they had to say: Challenges of 2017: Seeing more and more regulations coming…
The Journey to the New and Improved Ten Most Critical Web Application Security Risks It was not too long ago that protecting your web server infrastructure consisted of simply placing the server(s) in their own zone behind the firewall and just opening a couple of ports. Outside of endpoint protection, that was pretty much the formula. That, however, was in a static HTML world. Today, thanks to the fruition of the web application and how it…
New Whitepaper On How Wallarm AI Works “Any sufficiently advanced technology is indistinguishable from magic,” Arthur C. Clarke Ever wanted to look under the covers of deep learning/artificial intelligence engine? While deep learning algorithms are generally based on neurons combined into a neural network and interacting with each other, just like in a human brain, to get good results with neural networks, it is critical to pick the right network topology, which has always been a…
We are thrilled to announce that Wallarm has joined the NVIDIA Inception program, which is designed to nurture startups revolutionizing industries with advancements in AI and data sciences. NVIDIA’s Inception program is a virtual accelerator that helps startups during critical stages of product development, prototyping and deployment. Wallarm uses NVIDIA technology to run reinforcement learning algorithms powering Wallarm web application and API security platform. Wallarm has used NVIDIA technology to run Reinforcement Learning algorithms, because…
by bo0om, Wallarm Research I’ve previously published an article about using Safari to compromise a computer file system. Unfortunately, there are more issues with Safari as we are now finding out. In this post, we will take a look at the possibility of a XSS exploit and a cookie compromise stemming from “unusual” Safari behavior. Normal browsers and their DNS requests. What does a browser do to open a web page? First, it sends a…
