Register Now Button

Combat Phishing Attacks Using Modern Machine Learning Algorithms

We’ve all seen phishing attacks. Or have we? We’ve actually not seen a large fraction... The post Combat Phishing Attacks Using Modern Machine Learning Algorithms appeared first on Gurucul ...

What are AI and machine learning adding to threat intelligence – brains, brawn or both?

Too much information and not enough time. This, and the cost of labor, is why machines have been at the forefront of cyber defense for almost 50 years. It is also why ...
Grammatical Tree of Words

ABCs of UEBA: Q is for Qualitative Analysis

The most difficult task of a machine learning based User and Entity Behavior Analytics (UEBA)... The post ABCs of UEBA: Q is for Qualitative Analysis appeared first on Gurucul ...

Why Training Matters – And How Adversarial AI Takes Advantage of It

The following is an excerpt from our recently published whitepaper, “Self-Supervised Learning – AI for Complex Network Security.” The author, Dr. Peter Stephenson, is a cybersecurity and digital forensics expert having practiced ...

The COVID-19 Pandemic Dominates the Cybersecurity World

Cybersecurity is not a static world. You can say that it is a social system, it affects and is affected by its surrounding environment. For example, back in 2018, it was the ...
ML firewalls

Palo Alto Networks Embeds ML Models in Firewalls

Palo Alto Networks (PAN) today unveiled a series of next-generation firewalls (NGFW) that rely on machine learning (ML) models running inline rather than signatures to thwart cybersecurity threats in real-time. Anand Oswal, ...
Security Boulevard

The Changing Face of Insider Threats

The traditional insider threat is evolving. Digital transformation, the chaos of our world stage and modern business environments are forcing a new view of this complex threat vector. In Part I of ...

Machine Learning, Deep Learning and Neural Networks, Oh My!

Deep learning makes decisions based upon the data it sees and the data that it doesn’t see but infers from what it does see. This became useful in the AV industry when ...
Register Now Button

Acknowledging 5 Common Gaps in Existing Security Infrastructure

The last couple of months under a global pandemic have forced everyone to look at... The post Acknowledging 5 Common Gaps in Existing Security Infrastructure appeared first on Gurucul ...

ABCs of UEBA: O is for OUTLIER

The goal of User and Entity Behavior Analytics (UEBA) is to detect and stop known... The post ABCs of UEBA: O is for OUTLIER appeared first on Gurucul ...