While reviewing different types of vulnerability scanning tools and services, it became very clear that testing such tools would require at least some known vulnerable applications to be configured. However, doing so may take up a considerable amount of time and effort. We decided to use a collection of pre-configured Docker containers and a Bash script to speed up this process.
The last month has seen a spate of Wi-Fi vulnerabilities. Those that affect the Wi-Fi traffic are bad, but worse are those that allow attacks against the device itself. This blog provides an overview of the recent bugs, and offers some history on Wi-Fi exploitation.
On 11th September we unveiled our Artificial Intelligence: Hype vs Reality report. The event, took a deep dive into the findings of the report and the learnings that can be applied across enterprise when it comes to scaling AI adoption. For those who were unable to join us, here is a quick recap and we hope to see you at future events.
In partnership with YouGov, we commissioned a short survey of over 1,000 senior decision makers, including owners, partners, chairpersons and non-executive directors, working across the public and private sectors. The focus of the study is to lift the veil on boards’ attitudes towards Artificial Intelligence and understand the reality of adoption and awareness at executive level.