_BLOG
-
Command History
Suppressing Command History in Different Shells Introduction In the world of Linux and Unix-like systems, the command-line interface (CLI) is an essential tool for users and administrators. One of the features of the CLI is the ability to keep a history of executed commands. However, there are instances where you might want to suppress certain… …
-
RISC-V
RISC-V: The New Battleground in U.S.-China Semiconductor Tensions The semiconductor industry is witnessing a new era of innovation and competition, with RISC-V technology at its core. Originally developed in a California university lab, RISC-V has evolved into a foundational element for a wide array of chips, powering devices from smartphones to Wi-Fi routers. Its open-source… …
-
Revolutionizing Battery Technology
AI and Supercomputing’s Latest Breakthrough In an extraordinary leap for battery technology, researchers at Microsoft and the Pacific Northwest National Laboratory (PNNL) have harnessed the power of artificial intelligence (AI) and supercomputing to make a groundbreaking discovery. Their collaborative efforts have led to the identification of a new material, potentially reducing lithium usage in batteries… …
-
Digital ID in Developed and Developing Countries
In the age of digital transformation, identity verification has undergone a seismic shift from traditional paper-based systems to digital identification (ID) schemes. However, the adoption and implementation of digital IDs vary widely between developed and developing countries. This article explores the key differences, challenges, and opportunities inherent in these contrasting landscapes. 1. Technology Infrastructure Developed… …
-
A Historical Overview of a Cybersecurity Landmark
In the world of industrial cybersecurity, the Purdue Enterprise Reference Architecture (PERA) or Purdue Model stands as a testament to visionary thinking and innovation. It has become a foundational model for understanding and securing Industrial Control Systems (ICS). Let’s take a look at its history, development, and enduring impact. Birth of the Purdue Model The… …
-
Assessing Risk in a Connected Industrial World
In today’s rapidly evolving digital landscape, the interconnectedness of systems has become a double-edged sword. While it offers unprecedented efficiency and accessibility, it simultaneously exposes critical infrastructures to potential risks. The industrial automation sector is no exception to this trend, where the fusion of operational and industrial automation networks with the global internet has reshaped… …
-
Exposing the Invisible (The Kit)
The Exposing the Invisible (ETI) web site provides a toolkit (called The Kit) to support security investigations, among other things, and is a project of Tactical Tech, a non-profit outfit based in Berlin, Germany. The Kit is a solid starting point for those who believe in the power of information as evidence but who recognise… …
-
Top Ten Cyber Security Blogs
If you work in the cybersecurity industry or are interested in pursuing a career in this vitally important field, it’s important to stay up to date on the latest trends and advancements. 1. Daniel Miessler @DanielMiessler An experienced cybersecurity expert, consultant and writer, Miessler takes a personal approach on his blog — greeting visitors with… …