Cloud architectures enable a new level of integration with 3rd party systems and data sources to deliver the services our users and customers are looking for.
As crypto currencies go mainstream, better techniques for protecting users from fraud are needed. Enter streaming graph.
Advanced: Finding a malicious employee is one of the toughest cyber-security challenges in the industry.
Building on previous analysis, this blog investigate the use of categorical anomaly detection to identify multi-stage exploit campaigns in AWS CloudTrail logs.
The move to the cloud represents new challenges for enterprise security teams. Use thatDot Novelty Detector to detect the attack quickly.
The distributed nature of modern virtualized software architectures has created added complexity in the networking stack, making it difficult to attribute behavior to any single service.