When starting a new development project, there exists many choices that can be made. These...
Posts by Ola Bini
Artificial Intelligence and Copyright
November 11, 2024
First a disclaimer: In this article I will use “artificial intelligence” and “AI” to refer...
Should Ecuador use bug bounties?
December 5, 2023
Over the last ten years, bug bounty programs have become progressively more common in many...
In CAD, we believe that autonomy is an important characteristic to have in your digital...
Recommendations for times of protests
June 22, 2022
The world is going through complicated times. Several countries are currently seeing dramatic upheaval, where...
CoyIM v0.4 released!
February 17, 2022
Over the last few years, we at CAD have worked really hard on a new...
Fundamental security recommendations for critical infrastructure
February 11, 2022
The last years have seen a number of high profile attacks on computer systems either...
What is security research and security engineering?
October 5, 2021
Every single time a computer attack of some kind happens, the media and commentators throw...
What is Ransomware?
July 21, 2021
Over the last few years we have seen more and more attacks of ransomware, in...
Analysis of the Novaestrat Leak
September 28, 2019
On September 16, ZDNet in collaboration with vpnMentor published an article showing that 20.8 million...
How can your organization protect against data leaks?
August 18, 2019
The last few years, many people have said that data is the new oil.