Applied Machine Learning for Identity and Access Management Workshop at Black Hat 2018

Applied Machine Learning for Identity and Access Management Workshop at Black Hat 2018

Identity and Access Management (IAM) is one of the most-important security controls. Now more than ever; especially with the advent of cloud computing and other distributed 'as a service' platforms. IAM systems ...
AI and ML in Cyber Security - And What Does That Have To Do With Visualization?

AI and ML in Cyber Security – And What Does That Have To Do With Visualization?

Adjacent to data visualization are all the different disciplines that help us getting from raw data to visualizations. There are the topics of big data, data mining, and data exploration which come ...
Network Attack Map Collection

Network Attack Map Collection

Found a nice collection of network attack maps ...
Delivering Security Insights with Data Analytics and Visualization

Delivering Security Insights with Data Analytics and Visualization

| | Discussion Entries
In early December, I gave the keynote at the ACSAC 2017 conference in Orlando, Florida. In the presentation I look at a number of topics around using big data for security. I ...
EEVi- Evaluating the Effectiveness of Visualisation in Cyber-Security

EEVi- Evaluating the Effectiveness of Visualisation in Cyber-Security

| | Discussion Entries
Hi all, I am a PhD researcher at University of Southampton and my PhD topic is Visualisation in Cyber Security. I have a questionnaire, for my thesis, aimed at people who have ...
Visual Analytics Workshop

Security Analytics – Visualization – Big Data Workshop Black Hat 2017

| | Discussion Entries
VISUAL ANALYTICS – DELIVERING ACTIONABLE SECURITY INTELLIGENCE BlackHat 2017 - Las VegasBig Data is Getting Bigger - Visualization is Getting Easier - Learn How! Dates: July 22-23 & 24-25 Location: Las Vegas, ...
Secuirty Visualization Case Study

Secuirty Visualization Case Study

We recently posted a case study of how a Fortune 100 company is using Security Visualization as a front end to their various data collection systems. The Security Visualization allows the company's ...
Security Visualization Requirements- Phd Thesis Survey

Security Visualization Requirements- Phd Thesis Survey

Hi, I am a Phd candidate in Informatics Institude at Middle East Technical University. I prepared an online survey as a part of my phd thesis. However, since this subject is relatively ...