Sign in

Cybersecurity | Artificial Intelligence | Blockchain

Chief Information Security Officers (CISOs) oversee strategic, operational, and financial aspects of data management and protection. These specialists collaborate with colleagues to create policies and procedures for the security of information. To recognize, neutralize and remove potential risks, they oversee and manage security teams.

What Does a Chief Information Security Officer Do?


Internet-connected products are becoming increasingly popular, and while IPv4 addresses couldn’t meet the demand for IoT products, IPv6 gives IoT products a platform to operate on for a very long time.

IPv6 Address Format

ipv6 global unicast address format

Zero-knowledge proof systems that have received a lot of attention since their introduction are those that use a single message, such as proof of the existence of zero-knowledge or proof against a certain type of proof.

What is it?

What are the must-have properties?


The billions of login credentials available on the dark web make it easy for cybercriminals to steal login credentials. It has been widely reported that automated access data — the plug-in attack that has found its way onto the internet — is hitting systems such as credit cards, bank accounts, and credit card numbers.

Source: https://www.cloudflare.com/learning/bots/what-is-credential-stuffing/


As with all emerging technologies, blockchain faces a number of challenges that will lead to its broader implementation. As with any new technology, compliance with existing data standards in terms of security, privacy, and information sharing could prove to be the first hurdle for blockchain in telecommunications. Cryptographically immutable automation systems, whose blockchain technology ensures that participants are protected and trusted, will also address the inherent challenges associated with the abundance of data that suddenly flows abundantly across countless devices. Knowing this information will use blockchain applications as a secure identity system that solves many of the problems of distributed systems such as eSIM.

Source: https://www.kaspersky.com/blog/how-esim-works/25431/


Any time an organization deploys a new app, end-users need to build a new set of credentials to recall. The outcome for staff? Too many passwords to remember. In reality, the average user needs to recall at least ten passwords a day but s/he forgets up to three of them every month.


In computer security, a cold boot attack is a type of side-channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s random access memory by performing a hard reset of the target machine.

F-Secure — Available on https://blog.f-secure.com/cold-boot-attacks/


It is clear that something must be done to help the security community assess, test, and control the level of security of embedded systems. Infected targets consume more power than a cleaned target device because the malware performs additional computing tasks that require additional power to the target device’s processor.


This year, definitely, no one has had a break from cyber-attackers. Even Covid-19 couldn’t stop them. Quite the opposite, during the pandemic, the attacks were increased dramatically. Data breaches, network penetrations, data and identity theft, and ransomware outbreaks have all taken place in 2020.

JANUARY 2020


The overall goal of the dynamical system at any layer is to make the best prediction of the representation in the layer below using the top-down information from the layers above and the temporal information from the previous states.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store