Sean OeschWhat is the path forward for cybersecurity?In light of all of the recent failures in cybersecurity, it is natural to ask the question, “What is the path forward now?” There is a lot…Mar 8, 2021Mar 8, 2021
Sean OeschEspionage via Microsoft Exchange Server Could Eclipse SolarWinds IntrusionIt’s been reported that over 30K organizations were compromised by an “unusually aggressive Chinese cyber espionage unit that’s focused on…Mar 5, 2021Mar 5, 2021
Sean OeschAnonymous Code Reviews — A Trial at GoogleGoogle ran a study with 300 software engineers and 5217 code reviews to see if anonymous code reviews could work. The paper is linked…Mar 3, 2021Mar 3, 2021
Sean OeschNVIDIA DoS Own GPU to Prevent CryptominingWhat do you do when the price of your Graphical Processing Units (GPUs) is being artificially inflated by cryptominers? You…Feb 22, 2021Feb 22, 2021
Sean OeschUnderstanding The Security Dilemma — How a Focus on Security can Lead to ConflictThe security dilemma explains why countries with fundamentally compatible goals still end up in tension with one another. I have linked…Feb 7, 2021Feb 7, 2021
Sean OeschHow COVID Broke AIOk, not exactly. But COVID did significantly impact some AI based applications. For example, models used to detect fraud in air travel…Jan 30, 2021Jan 30, 2021
Sean OeschSimple Script to Pay Bonuses in Bulk on Amazon Mechanical TurkI recently needed to pay a bonus to a large number of workers on Amazon Mechanical Turk (MTurk). Unfortunately, they do not support this…Jan 30, 2021Jan 30, 2021
Sean OeschSocial Engineering Campaign Targets Security ResearchersHumans are the weakest link in security. Security researchers know this — yet they also are human. And a new attack, attributed to…Jan 26, 2021Jan 26, 2021