Hacker Newsnew | past | comments | ask | show | jobs | submit | neduma's commentslogin


Add lot of cache. Kind of slow.


I was listening to story of QualComm in Acquired podcast. This is highly related.


The whole AI paradigm is shifting the tide towards known unknown from unknown unknowns. At least, it feels like it.


The question is how many of those "knowns" are hallucinated


Funny, it also keeps all compliance and standards folks in business.


check out Kali Linux for more ids/ips prepackaged tools.


Nice or Start you own.


easier said than done mon ami


> DHH claims to be an expert on open source, but his toxic personality and inability to scale teams means that although he has invented about half a trillion dollars worth of good ideas, most of the value has been captured by others.

Just wondering about ruby, linux, etc.

Poor Linus.


and why walkie-takie? Must be related to cultural and cost effective measures.


I assume no centralised register and tracking of location, and thus of whoever has the device.


Here are some questions from Llama 3.1-405B

Here are some potential questions and topics to explore during the podcast interview, tailored to cater to a wide range of audiences:

Section 1: Cybercrime and Investigations

Can you share a fascinating case of money laundering through crypto that you investigated? How did you track down the culprits? What are some common tactics used by scammers, and how can individuals and organizations protect themselves? How do you collaborate with law enforcement agencies across different countries to catch cybercriminals?

Section 2: Critical Infrastructure and SCADA Systems

What are some unique challenges in securing SCADA systems, and how do you address them? Can you walk us through a particularly complex SCADA system security project you worked on? What were some key takeaways? How do you see the threat landscape evolving for critical infrastructure, and what can organizations do to stay ahead?

Section 3: Mobile Security and Emerging Threats

What are some emerging threats in Android software security, and how can developers and users mitigate them? You've worked on penetrating the latest Apple devices. What does this involve, and what can users do to protect their Apple devices from potential threats? How do you see the intersection of mobile security and IoT security evolving in the next 5-10 years?

Section 4: Brand Abuse and Online Threats

Can you share an example of how you caught brand abusers by scanning worldwide forums? What tools and techniques do you use? What are some common tactics used by brand abusers, and how can organizations protect their brand reputation online? How do you stay ahead of the evolving threat landscape in online brand abuse?

Section 5: Geopolitics and Cyberwar

How do you see the intersection of geopolitics and cybersecurity evolving in the next 5-10 years? Can you share any experiences or insights on how nation-state actors engage in cyberwarfare, and what implications this has for global security? What role do you think international cooperation and diplomacy play in addressing cyber threats?

Section 6: Career Advice and Industry Trends

What advice would you give to young people starting their careers in cybersecurity? What skills and areas of expertise should they focus on? What are some emerging trends in cybersecurity that professionals, entrepreneurs, and executives should be aware of? How do you see the cybersecurity industry evolving in the next 5-10 years, and what opportunities and challenges will arise?

Section 7: High-Tech Expert Insights

What are some advanced threat vectors that high-tech experts should be aware of, and how can they stay ahead of these threats? Can you share any insights on the latest advancements in cybersecurity research, such as AI-powered security or quantum computing? How do you see the intersection of AI and cybersecurity evolving, and what implications will this have for the industry?

Section 8: Final Thoughts and Recommendations

What's the most critical aspect of cybersecurity that you think is often overlooked, and how can we address this? Are there any books, resources, or conferences that you'd recommend for our audience to stay updated on the latest cybersecurity developments? What's the most important takeaway you'd like our audience to remember from this conversation?

Link: https://meta.ai/s/H5rYSSSgBnvGxWuM/


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: