Automated Threat Hunting Within Linux Logs Using DBSCAN
Automated threat hunting doesn’t always require advanced neural networks. Let’s see how we can threat hunt a Linux log file using DBSCAN!
How to Enhance Your SIEM with AI
The AI SIEM is the next frontier for cybersecurity. See how SIEMs have evolved as well as how you can implement AI within your SIEM today!
How User Behavior Anomaly Detection Can Protect Your Organization
Interested in learning about user behavior analytics and how it can protect your organization? Check out this post!
Threat Hunting Network Connections Using Zeek and AI
Let’s see how artificial intelligence can be used to threat hunt within Zeek network logs!
Automated Threat Hunting Advantages
See how automated threat hunting can improve the cybersecurity of your organization
Creating an Autoencoder in Tensorflow for Anomaly Detection
We’ve seen how Tensorflow can be used to create a GAN for anomaly detection. How can we use Tensorflow to create an autoencoder for anomaly detection?
Creating a GAN in Tensorflow for Anomaly Detection
We saw in a previous post how Tensorflow can be used to create a GAN for anomaly detection. How can we use it to implement an autoencoder for anomaly detection?
Understanding Autoencoders and GANs for Anomaly Detection
Anomaly detection is critical in finding potential cybersecurity issues. But how exactly is AI used anomaly detection? See how two deep learning methods can be used for anomaly detection!
The Glaring Problems of SIEMs and Current UEBA Solutions
Cybersecurity professionals have huge problems with their SIEMs and current UEBA solutions. How can AI be used to fix these problems?
Predicting Malicious Network Connections Using Splunk and AI
One of the most fundamental responsibilities that blue teams have is being able to detect threats within the environment.
Splunk and AI, Part 2 – Threat Hunting on Domain Controllers Using Deep Learning
This post assumes that the domain controllers are already logging to Splunk. In order to create an AI to perform automated threat hunting on domain controllers, we will follow five steps:
Splunk and AI, Part 1- Automating Threat Hunting With Artificial Intelligence
With the rapid rise of artificial intelligence tools within our daily lives and careers, it’s no surprise that cybersecurity tools are utilizing AI to better secure computing environments.