Posts

Showing posts from May, 2021

Embedded Hardware Authentication

Image
As per IFF (Incognito Forensic Foundation), there are top 5 latest cybersecurity technologies or trends out there, that I think would make great sense if I go with one of those for this blog, so I decided to go with Embedded Hardware Authentication (A. 2019, November 8). What is Embedded Hardware Authentication? As the term states, it’s a hardware-based authentication that’s embedded into the hardware itself to add an extra layer of security. Normally, users log in to a machine using their PIN and/or Password, which can easily be compromised, but in embedded authentication, it verifies the user’s identity before it’ll let them access the device. Most of us are aware of two-factor authentication but in this latest trend, an organization can implement two, three, or even four different methods of authentication in a row to enhance security. Under Embedded Hardware Authentication, things are slightly different than we’re used to.   For example, users don’t necessarily receive a PIN ...

Artificial Intelligence

Image
As per IFF (Incognito Forensic Foundation), there are top 5 latest cybersecurity technologies or trends out there, that I think would make great sense if I go with one of those for this blog, so I decided to go with Artificial Intelligence or AI (A. 2019, November 8). One of the reasons I decided to go with this trend was because of some of the videos that I saw on YouTube a while ago along with a documentary that was all about AI. Before we begin, I would like to request if we can watch this quick 2-minute video using the below link before we move forward: Robot is Being Trained For War & Robot is Fighting Back// Risks of AI https://www.youtube.com/watch?v=ka0fIAPVjaU So what is AI? AI or Artificial Intelligence is a smart machine or robot that’s capable of performing tasks that typically require human intelligence. Many of these artificial intelligence systems are powered by machine learning, some of them are powered by deep learning. As we saw in the above video, shootin...

Blockchain Technology

Image
Let’s begin with a little brief history of Blockchain to understand this topic better. Blockchain may sound new to many as most of us may not have heard about it before but it’s not something new. Blockchain or chain of blocks that are cryptographically secured was first described by Stuart Haber and W Scott Stornetta back in 1991. Then Nick Szabo who was a computer scientist, decentralized digital currency back in 1998. In 2000, Stefan Konst published his theory on cryptographically secured chains including his ideas for implementation where most of the work began. Then in 2008, the model for a blockchain was established by some developers, and then in 2009, Dorian Nakamoto (Satoshi), a Japanese-American citizen implements the first blockchain as the public ledger for transactions made using bitcoin, see Mr. Nakamoto picture below (History of blockchain. n.d.): Blockchain sounds like a complicated topic but in reality, it’s quite simple especially for IT professionals because we work ...