11/02/2021
The angel is an algorythm
References
- AI & ML in cybersecurity top 5 use cases & examples. (2020, June 5). USM. https://usmsystems.com/ai-ml-in-cybersecurity-use-cases-examples/
- AI for surveillance and security – mindsync.ai. (2019, March 6). Medium. https://medium.com/mindsync-ai/ai-for-surveillance-and-security-60fd67a8e570
- Al-Kurdi, S. (2021, June 26). The 10 biggest cyber attacks in history. Al Bawaba. https://www.albawaba.com/business/10-biggest-cyber-attacks-history
- Are your passwords in the green? (n.d.). Hive Systems. https://www.hivesystems.io/blog/are-your-passwords-in-the-green
- Artificial Intelligence and cybersecurity. (2021, April 21). CEPS. https://www.ceps.eu/artificial-intelligence-and-cybersecurity/
- Artificial Intelligence as security solution and weaponization by hackers. (2019, December 9). CISO MAG | Cyber Security Magazine. https://cisomag.eccouncil.org/hackers-using-ai/
- AWS. (2020). AWS Shield threat landscape report – Q1 2020. https://aws-shield-tlr.s3.amazonaws.com/2020-Q1_AWS_Shield_TLR.pdf
- Balsa, E., Beato, F., & Gürses, S. (2014). Why can’t online social networks encrypt? https://www.w3.org/2014/privacyws/pp/BalsaBeatoGurses.pdf
- Bernard, B. (2020, December 21). What is CIA (in Cybersecurity)? Deepwatch. https://www.deepwatch.com/blog/cia-in-cybersecurity/
- Best, J. (2021, February 23). Smart pills and the future of medicine: Insights from your insides. ZDNet. https://www.zdnet.com/article/smart-pills-and-the-future-of-medicine-insights-from-your-insides/
- Coin Academy | Découvrez l’univers crypto en profondeur. (n.d.). Coin Academy. https://coinacademy.fr/
- Columbus, L. (2020, June 21). Why AI is the future of remote security monitoring. Forbes. https://www.forbes.com/sites/louiscolumbus/2020/06/21/why-ai-is-the-future-of-remote-security-monitoring/?sh=12f43c51436a
- Cybersecurity Statistics for 2021. (n.d.). Packetlabs. https://www.packetlabs.net/cybersecurity-statistics-2021/
- Daffu, P., & Kaur, A. (2017, July 27). Mitigation of DDoS attacks in cloud computing. IEEE Conference Publication | IEEE Xplore. https://ieeexplore.ieee.org/document/7993478
- Dahlqvist, F., Patel, M., Rajko, A., & Shulman, J. (2020, July 22). Growing opportunities in the Internet of Things. McKinsey & Company. https://www.mckinsey.com/industries/private-equity-and-principal-investors/our-insights/growing-opportunities-in-the-internet-of-things
- Goddard, W. (2021, June 11). What is the Future of Cybersecurity? ITChronicles. https://itchronicles.com/information-security/what-is-the-future-of-cybersecurity/
- Grauer, Y. (2015, August 26). A peek inside Mr. Robot’s toolbox. Wired. https://www.wired.com/2015/08/peek-inside-mr-robots-toolbox/
- How artificial intelligence will affect cybersecurity? (2021, April 22). Geekflare. https://geekflare.com/ai-affects-cybersecurity/
- Kondru, K. K. (2020, June 12). A review of distributed supercomputing platforms using blockchain. SpringerLink. https://link.springer.com/chapter/10.1007/978-981-15-4218-3_13
- La Blockchain IRL – Episode 2 : Permettre la décentralisation du monde. (2021, July 6). Coin Academy. https://coinacademy.fr/blockchain/la-blockchain-irl-episode-2-permettre-la-decentralisation-du-monde/
- Leprince-Ringuet, D. (2020, November 2). Quantum computers are coming. Get ready for them to change everything. ZDNet. https://www.zdnet.com/article/quantum-computers-are-coming-get-ready-for-them-to-change-everything/
- Mēris botnet, climbing to the record. (2021, September 9). Qrator Lab. https://blog.qrator.net/en/meris-botnet-climbing-to-the-record_142/
- Moss, S. (2021, July 15). Understanding Chia, the cryptocurrency straining storage markets. DCD. https://www.datacenterdynamics.com/en/analysis/understanding-chia-the-cryptocurrency-straining-storage-markets/
- Orange Cyberdefense. (n.d.). Orange Cyberdefense. https://sensepost.com/
- PurpleSec. (2021). 2021 cyber security statistics: The ultimate list of stats, data & trends. https://purplesec.us/resources/cyber-security-statistics/
- Raderman, L. (2008). PGP/GPG vs. PKI. Gemini Security Solutions. http://geminisecurity.com/wp-content/uploads/tools/hope2008-pgp-vs-pki.pdf
- Schroer, A. (2019, July 12). 30 companies merging AI and cybersecurity to keep us safe and sound. Built In. https://builtin.com/artificial-intelligence/artificial-intelligence-cybersecurity
- Segal, E. (n.d.). The Impact of AI on Cybersecurity. IEEE Computer Society. https://www.computer.org/publications/tech-news/trends/the-impact-of-ai-on-cybersecurity/
- Shahare, R. (2019, March 2). Blockchain, for Threat Intelligence maybe? CPO Magazine. https://www.cpomagazine.com/cyber-security/blockchain-for-threat-intelligence-maybe/?fbclid=IwAR2CkTlyRruWl8kKkLq19xqf4ZZH9XNWsdY3cd21V2MwFgU2CE_WewDzzMQ
- Singh, S. (2021, July 16). Cybercrime is the greatest threat to enterprises and blockchain technology could go a long way in fighting it. Here’s how. IT Business Edge. https://www.itbusinessedge.com/security/potential-use-cases-of-blockchain-technology-for-cybersecurity/
- Using AI in cyber security. (n.d.). Cyber Security Intelligence. https://www.cybersecurityintelligence.com/blog/using-ai-in-cyber-security-5038.html
- Vonnegut, S. (2016, July 20). 5 ‘Mr. Robot’ hacks that could happen in real life. Dark Reading. https://www.darkreading.com/careers-and-people/5-mr-robot-hacks-that-could-happen-in-real-life
- What is a DDoS attack? (n.d.). Cloudflare. https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
- What is IP spoofing? (n.d.). Cloudflare. https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/
- Whatsapp. (2021, September). Security of End-To-End encrypted backups. https://scontent.whatsapp.net/v/t39.8562-34/241394876_546674233234181_8907137889500301879_n.pdf/WhatsApp_Security_Encrypted_Backups_Whitepaper.pdf?ccb=1-5&_nc_sid=2fbf2a&_nc_ohc=tv3CdR5kcgUAX8EVT2N&_nc_ht=scontent.whatsapp.net&oh=6bddbf45968ae739210d0fc92e680733&oe=61B5043C
- Wikipedia contributors. (2021a, November 27). InterPlanetary File System. Wikipedia. https://en.wikipedia.org/wiki/InterPlanetary_File_System
- Wikipedia contributors. (2021b, December 2). Pretty Good Privacy. Wikipedia. https://fr.wikipedia.org/wiki/Pretty_Good_Privacy
- Wikipedia contributors. (2021c, December 5). Denial-of-service attack. Wikipedia. https://en.wikipedia.org/wiki/Denial-of-service_attack
- Wikipedia contributors. (2021d, December 5). Proof of stake. Wikipedia. https://en.wikipedia.org/wiki/Proof_of_stake
- World–Leading AI for cyber security. (n.d.). Darktrace. https://www.darktrace.com/en/
Our recent blog posts
See all blogs- How is AI’s synthetic data enhancing User Experience Research? Technology
- Web3.AI Rising : How new technology can add value to your business
- How generative AI helped us create an e-commerce app – with personalised content – in just 2 weeks Technology
- Can you build a foodie app in 3 days using Generative AI? (Spoiler alert: yes!)