In this article, we demonstrate and describe how a single intentionally formatted text string inside a densely packed big data file (e.g., malicious payload) containing millions of other valid data points was used to trigger a Remote Code Execution (“RCE”) exploit.
Data Supply Chain Threat Detection
Your Data Lake is Polluted, Now What?
Polluted Data Lakes are becoming an increasingly significant problem resulting in AI Bias and Data & AI Poisoning security vulnerabilities.
Don’t Underestimate The Importance of Characterizing Your Data Supply Chain
It is critical in both your traditional and AI-driven data analytics to take proactive steps to “characterize” your data supply chain.
Cloud-Native Speed and Performance Matters
In an ever-increasingly crowded ecosystem of software applications in every conceivable market, it is no longer viable to compete solely on functional differentiators.
It’s Time to Build Redux
One of the more impactful publications that resonates these past twelve months is Marc Andreessen’s call to action via “It’s Time To Build.” His call to action in the immediate aftermath of the coronavirus garnered much attention. The broader call to action to keep building is still important almost a year later.