In this article, we demonstrate and describe how a single intentionally formatted text string inside a densely packed big data file (e.g., malicious payload) containing millions of other valid data points was used to trigger a Remote Code Execution (“RCE”) exploit.
Data Supply Chain Threat Detection
Polluted Data Lakes are becoming an increasingly significant problem resulting in AI Bias and Data & AI Poisoning security vulnerabilities.
It is critical in both your traditional and AI-driven data analytics to take proactive steps to “characterize” your data supply chain.
In an ever-increasingly crowded ecosystem of software applications in every conceivable market, it is no longer viable to compete solely on functional differentiators.
One of the more impactful publications that resonates these past twelve months is Marc Andreessen’s call to action via “It’s Time To Build.” His call to action in the immediate aftermath of the coronavirus garnered much attention. The broader call to action to keep building is still important almost a year later.