Artificial Intelligence and CopyrightNovember 11, 2024First a disclaimer: In this article I will use “artificial intelligence” and “AI” to refer...
Should Ecuador use bug bounties?December 5, 2023Over the last ten years, bug bounty programs have become progressively more common in many...
Sovereign Technology - What technology your country really should manage itselfOctober 3, 2023In CAD, we believe that autonomy is an important characteristic to have in your digital...
Recommendations for times of protestsJune 22, 2022The world is going through complicated times. Several countries are currently seeing dramatic upheaval, where...
CoyIM v0.4 released!February 17, 2022Over the last few years, we at CAD have worked really hard on a new...
Fundamental security recommendations for critical infrastructureFebruary 11, 2022The last years have seen a number of high profile attacks on computer systems either...
What is security research and security engineering?October 5, 2021Every single time a computer attack of some kind happens, the media and commentators throw...
What is Ransomware?July 21, 2021Over the last few years we have seen more and more attacks of ransomware, in...
Analysis of the Novaestrat LeakSeptember 28, 2019On September 16, ZDNet in collaboration with vpnMentor published an article showing that 20.8 million...
How can your organization protect against data leaks?August 18, 2019The last few years, many people have said that data is the new oil.