|Page (1) of 1 - 05/10/17||email article||print page|
(May 10, 2017)
Melbourne, Australia, May 10, 2017 --(PR.com)-- A new industry has developed. "Cyber Marketing Scammers" who want to expedite a 20 year discipline of 6 professions into an instant job are popping up - but Simon Smith of eVestigator knows how to spot them.
They are on the internet, in the newspapers, on the TV, the radio, all promoting their outlandish fictional so-called "Cybersecurity solutions," Mr. Smith Cybersecurity Master with 21 yrs experience stated.
"They are supposed to be fighting an industry of deception, yet their deception is the biggest Cyber-risk of all," says Mr. Smith. "In fact, the very people that write these articles are instantly making themselves known to those who are real experts, as risks to Cybersecurity. Almost all of the above words are either decades old, and have always existed," said Mr. Smith. "The 'Cloud' is the Internet, and remote execution has existed ever since I was interested in programming 26 years ago. Simply via thin client application hosting, Citrix, VMWare and Remote Storage, these were part of the applications we made as avid Software Engineers when I started," he said.
"At 11 years old, and commercially at 18, with now 21 years of combined industry experience, it disturbs me to see the industry falling apart by phrases that are being adopted by not even software companies. The 'Internet of Things' is another abused word, as the internet was always connected to hardware devices I created, and never with 'Cybersecurity problems.' It is a myth and sales bluff dreamt up by charlatans simply looking to cash in on what they 'want to be an emerging innovative rush to market.' The reality is, they are causing the problem, not mitigating it," Mr. Smith said logically.
Some Company's seminars coming up with "best practices," "ideas," and "products" have absolutely no speakers with experience in Cybercrime, Cybersecurity or anything related. "They are destroying the industry. These amateurs are trying to jump up 20 years of stairs and look for a shortcut but it is a discipline of many professions, and they are the biggest Cybersecurity risk with their uneducated advice," Mr. Smith said.
Mr. Smith is a seasoned Software Engineering Master, Cybersecurity Trainer, Frontline Cyber Crisis Defender, Mentor, Expert Witness, Frontline Mitigation Expert, and Cyber Forensics Investigator. He is also a Computer Digital Forensics Expert with real industry experience in the entire sphere of security and software engineering with over 21 years of practicing industry experience, ISO Lead Information Systems Auditor Qualified, has completed 8 Department of Homeland Security (US) recognised courses, holds over 10 Graduate Certificates/Diploma's in Australia and over a hundred Advanced Diploma's and below, in multiple disciplines involving CISO, CCFE, CCP, ITSM, PMP, GCertITSM, GCertITS, MS, MC, Dip.SD,NW,SA, MCSD, PMP, and so much more. A full list is available on his LinkedIn profile. https://www.linkedin/in/simonsmithinvestigator
"In a recent forum I saw somebody write the solution to a skills shortage. It was to 'simply hire lay people'. I responded and said, would you like to have open heart surgery from a Nurse? It seems that the rush to market has already become more important than the traditional SDLC and testing. Companies would rather send a product to the shelves and have teenage 'amateur hackers' with no methodology maybe find something than proven methodology under the SDLC. It is no wonder they are hackable," Mr. Smith said.
"Ideologists jump on Wikipedia and look for the latest 'buzz word' and start marketing. I've seen them quote semi definitions such as 'Cognitive computing technology' from Wikipedia. If they copy and pasted it properly, you would read at line one that 'At present, there is no widely agreed upon definition for cognitive computing in either academia or industry," says Mr. Smith.
"It is all simply Automated Machine Learning to assist in what we can already do and learn now. The only addition to this is the inclusion of algorithms. It is still humanly possible to perform mathematics, and all these so-called 'emerging malware detection' cognitive human replacements (even if they existed and did work) could do is spot a trend that could help a human spot a reality. However, that is still 'Automated Machine Learning,'" stated Mr. Smith - who audits "IT Experts" and whom is also a court Expert Witness.
However, if those were not enough "buzz words," Mr. Smith announced one of the big ones. Mr. Smith stated, "For Artificial Intelligence, we turn to logic, science and definition. Firstly, what you think it means is impossible and documented as AI (Complete). What it does mean is also logically impossible to rely on and manage tasks such as reasoning, i.e. predicting actions of 'prior consciousness' that we humans are born with. In every other sense, it is 'Machine Learning'. It is well documented that AI differs from Machine Learning because it requires 'commonsense knowledge' similar to 'prior consciousness'. By definition, commonsense knowledge is impossible in general unless the machine is familiar with all the same concepts that an ordinary person is familiar with."
Mr. Smith then goes on to say, "Now, Pattern Recognition in its context is defined as a form of Machine Learning as it has to know by a human what constitutes a pattern. The definition of Pattern Recognition is "the assignment of a label to a given input value," said Mr. Smith.
Finally, Mr. Smith covers the new "buzz word" that the new breed of "Cyber Marketing Scammers" are resorting to. This was the topic that caused Mr. Smith to warn the industry it is doomed if it doesn't take a stance. They tend to use the word "Cognitive ability" and now "Neural Networks."
Mr. Smith states, "The public should now know that there has only ever been 'Automated Machine Learning,' but in this case assisted with a Mathematical Algorithm. Some mathematics trends can be predicted, some are impossible. Again, we turn to Wikipedia and it states, 'Like other machine learning methods, neural networks have been used to solve a wide variety of tasks, like computer vision and speech recognition, that are difficult to solve using ordinary rule-based programming.' It is also worth mentioning that all these quotes date back to the 1980-90's. When I say that I am talking about 'IoT', 'Cloud' and all so-called Emerging Innovations."
Mr. Smith reminds readers that cyber-attacks based on software cover only 10% and the average Company knows about it 300 days after it has occurred. "90%," he states is social engineering. "You have to look from the inside," Mr. Smith concludes.
Connect for Insights and Media Requests on LinkedIn:
Subscribe to all media interviews via my YouTube Channel by going here: https://www.youtube.com/c/evestigatorAu/?sub_confirmation=1
eVestigator Simon Smith
Contact via Email
Read the full story here: http://www.pr.com/press-release/715501
Press Release Distributed by PR.com
Related Keywords:Technology, Computer Security
Related Sites: HTN - Health Technology Net
Related Newsletter: Tutorial Finder , Review Seeker , DMN Newswire Newsletter