Blog


| Posted by , under Uncategorized

Malware/Ransomware is a legitimate code (within context of the CPU instructions) doing illegitimate things.

So Code is legit because CPU understands and executes the code/instructions in this executable file that we call malware/ransomware. However what this code/instructions do is bad stuff for us… What is Malware/Ransomware Problem?

You executing/running this malware/ransomware!

If

| Posted by , under Uncategorized

 

Today the vast majority of cybersecurity world works with: (1) Allow ALL, deny BAD

They try to Deny BAD by trying to detect it by using AI,ML, Heuristic, Behavior Analysis, EDR.  I must say, the results speak for itself! Breach after breach, damage after damage! “The amount of money spent in cybersecurity”

| Posted by , under Uncategorized

Its 10pm night time…..someone knocks on your door…you answer the door….a total stranger……you invite this stranger in…….ask him to sit on your sofa……he is sitting there……it now has been 24 hours….this stranger is still sitting on your sofa… Can you say he is a good guy?

Of course not!

Absence of

| Posted by , under Blog

A Software is made up of instruction set, that we call a piece of “Code”. A programmer writes this code and once compiled and packaged becomes,  Software/Application.

 

When you launch this Application/Software, the code is sent to CPU for those instructions to execute. For example this piece of Code

As a tech incubator and a CEO one of the most important tasks I have is to train, educate and arm people with the ability to continually improve their tasks.

How do I teach this to them? Is there a structure, process or formula for this?

Over the years, I had