In this article, we demonstrate and describe how a single intentionally formatted text string inside a densely packed big data file (e.g., malicious payload) containing millions of other valid data points was used to trigger a Remote Code Execution (“RCE”) exploit.
data supply chain
Your Data Lake is Polluted, Now What?
Polluted Data Lakes are becoming an increasingly significant problem resulting in AI Bias and Data & AI Poisoning security vulnerabilities.
Don’t Underestimate The Importance of Characterizing Your Data Supply Chain
It is critical in both your traditional and AI-driven data analytics to take proactive steps to “characterize” your data supply chain.
7 Reasons How Data Observability Monitoring Will Improve Your Analytics
Learn about 7 critical pitfalls to avoid while working with your data and the latest innovations from Zectonal to help discover them through our innovative data monitoring software
Cloud-Native Speed and Performance Matters
In an ever-increasingly crowded ecosystem of software applications in every conceivable market, it is no longer viable to compete solely on functional differentiators.