data science
Auguria Streamlines Management of Security Log Data
Auguria today at the Black Hat Europe conference, in addition to providing five additional integrations with other platforms, revealed it has added an explainability graph capability that makes it simple to understand ...
Security Boulevard
The Security Imperative in Artificial Intelligence
Gunter Ollmann | | Adversarial AI, Artificial Intelligence, Cyber Security, Data Classification, data science, Explainability, machine learning, mlops
Artificial Intelligence (AI) is transforming industries and everyday life, driving innovations once relegated to the realm of science fiction into modern reality. As AI technologies grow more integral to complex systems like ...
What is a Behavioral Risk Indicator? Demystifying Insider Risk Indicators
Kellie Roessler | | data science, dtex i3, DTEX i3 Team, employee behavior, Indicators, Insider Risk Management
Insiders – the people with legitimate access to an organization’s data and systems – are the root cause of most cybersecurity incidents. As humans, insider risks are complex. Their behaviors and intentions ...
Shadow Wizard Registry Gang: Structured Registry Querying
Why Do We Need New Tooling for Registry Collection?The Windows registry, an intricate database storing settings for both the operating system and the applications that run on it, is a treasure trove ...
How to Detect Attacks Using Coarse-Grained Features
Konstantina Kontoudi, PhD, Lead Data Scientist | | bot detection, bot management, data science, Fraud Detection, learning center, machine learning, Threat Research
Coarse-grained features help us detect distributed attacks that go unnoticed when looking at fine-grained features like session or IP traffic ...
How to Identify Suspect Temporal Patterns in Traffic Data
Antoine de Daran, Cybersecurity Data Scientist | | Artificial Intelligence, bot management, data science, Engineering, learning center, machine learning, open source, Threat Research
Cybersecurity Data Scientist Antoine de Daran reveals how DataDome uses suspect temporal patterns (time-based data) to identify bot traffic ...
New Report Finds Insider Threats on the Rise, Growing Cloud Use, and Lack of Defensive Capabilities Are Causing Concern
Of all the security professionals surveyed for the newly-released 2023 Insider Threat Report from Cybersecurity... The post New Report Finds Insider Threats on the Rise, Growing Cloud Use, and Lack of Defensive ...
How to Monitor ML Models Without Labels
Konstantina Kontoudi, PhD, Lead Data Scientist | | bot detection, bot management, data science, Engineering, Label Engineering, learning center, machine learning, Threat Research
Learn how we monitor ML models without labels to keep the DataDome bot detection engine running smoothly, no matter how bots change and improve over time ...
Stopping Bots With Sliceline Machine Learning
Antoine de Daran, Cybersecurity Data Scientist | | Artificial Intelligence, data science, Engineering, learning center, machine learning, open source, Threat Research
Cybersecurity Data Scientist Antoine de Daran reveals how the sliceline open-source ML package helps DataDome stop bots ...
Cybersecurity is a Successfully Failure
Cybersecurity is a Successfully FailureNext-generation firewalls are well, XDRing, IPS in prevention mode, and we had 100% attainment of our security awareness weekly training podcast. Yes, we even have email encryption of ...