Advanced: Finding a malicious employee is one of the toughest cyber-security challenges in the industry.
This article builds on our previous analysis to further investigate the use of categorical anomaly detection to identify multi-stage exploit campaigns in AWS CloudTrail logs
The move to the cloud represents new challenges for enterprise security teams.
The distributed nature of modern virtualized software architectures has created added complexity in the networking stack, making it difficult to attribute behavior to any single service.
Since the launch of thatDot’s real-time Novelty Detector for Categorical data in November, we have received numerous feature requests for additional data exploration and data transformation capabilities.
Cloud architectures enable and encourage a new level of integration with 3rd party systems and data sources to deliver the enriched and personalized services our users and customers are looking for.