From BLOG@CACM
Speaking of the existential threat of AI is science fiction, and bad science fiction for that matter because it is not based
…
Walid S. Saba| May 23, 2023
The tool characteristics and parameters you need to pay attention to, and the product types currently available on the market.
Alex Vakulov From BLOG@CACM | October 27, 2022 at 01:18 PM
A look at the typical tasks solved by DCAP systems, and how they differ from those solved by DLP systems.
Alex Vakulov From BLOG@CACM | October 18, 2022 at 12:58 PM
Conflicts and disputes can arise between these adjacent teams; it is impossible to avoid them in the process of launching new products. And they certainly require...Alex Vakulov From BLOG@CACM | August 29, 2022 at 11:09 AM
A classic brute-force attack boils down to guessing credentials. In my scenario, though, the perpetrators acted somewhat differently.
Alex Vakulov From BLOG@CACM | August 10, 2022 at 01:24 PM
Big data analytics systems identify signs of unauthorized activity in vast arrays of structured and unstructured data.
Alex Vakulov From BLOG@CACM | October 28, 2021 at 09:44 AM