Access and Feeds

Blog Archives

How to Secure Data When Computing with PAC Privacy

By Dick Weisinger

Data privacy is a major concern for many applications of machine learning, especially when sensitive information such as medical records or personal images is involved. How can we share useful models without revealing the data they were trained on? A

Security: Shifting Left for Better Security and Product Quality

By Dick Weisinger

Application security has evolved. Traditionally, applications were created and deployed. Then the IT and security team would erect a firewall and build security around the application to protect it from unauthorized entry. Security was something very remote from the development

Digital Transformation: Security Cracks with New Innovation

By Dick Weisinger

Digital transformation has become a critical component of many business plans to differentiate themselves in the market, or increasingly more frequently, to just stay competitive. Digital transformation brings with it benefits that include increased agility, data-based insights, improved customer satisfaction,

Low-Code: Quicker Development but Potentially a Security Risk

By Dick Weisinger

Low-code/No-code has been hailed as the tool that will empower non-developers in an organization with the ability to define and change the processes and configurations of enterprise software applications. The benefits of low code are that it requires no coding

Security: Ethical Hackers Shine the Light on Vulnerabilities

By Dick Weisinger

Ethical hacking is a pre-emptive way to identify and resolve security vulnerabilities before a hacker attacks. Ethical hacking adopts standard hacking tools and techniques to non-maliciously gain unauthorized access to a computer system in order to identify weaknesses and vulnerabilities.