Talking to Your SIEM Using a Large Language Model
Large language models (LLMs) are at the forefront of artificial intelligence applications today. See how an LLM can be used to interact with your SIEM!
AI Cybersecurity for Small Business Best Practices
Small businesses are utilizing AI to improve their workflows and productivity. How should small business owners utilize AI for cybersecurity? Take a look at this post to find out!
Automated Threat Hunting for Network Beacons Using Zeek and Math
Interested in using math for your automated threat hunting? See how basic math can be used to find beacons within network logs!
Overcoming the Top AI Challenges in Cybersecurity
Cybersecurity organizations will face a number of challenges when it comes to safely incorporating AI into businesses and cybersecurity teams. Check out this post to see the biggest challenges and how to overcome them!
Automated Threat Hunting Within Linux Logs Using DBSCAN
Automated threat hunting doesn’t always require advanced neural networks. Let’s see how we can threat hunt a Linux log file using DBSCAN!
How to Enhance Your SIEM with AI
The AI SIEM is the next frontier for cybersecurity. See how SIEMs have evolved as well as how you can implement AI within your SIEM today!
How User Behavior Anomaly Detection Can Protect Your Organization
Interested in learning about user behavior analytics and how it can protect your organization? Check out this post!
Threat Hunting Network Connections Using Zeek and AI
Let’s see how artificial intelligence can be used to threat hunt within Zeek network logs!
Automated Threat Hunting Advantages
See how automated threat hunting can improve the cybersecurity of your organization
Creating an Autoencoder in Tensorflow for Anomaly Detection
We’ve seen how Tensorflow can be used to create a GAN for anomaly detection. How can we use Tensorflow to create an autoencoder for anomaly detection?
Creating a GAN in Tensorflow for Anomaly Detection
We saw in a previous post how Tensorflow can be used to create a GAN for anomaly detection. How can we use it to implement an autoencoder for anomaly detection?
Understanding Autoencoders and GANs for Anomaly Detection
Anomaly detection is critical in finding potential cybersecurity issues. But how exactly is AI used anomaly detection? See how two deep learning methods can be used for anomaly detection!
The Glaring Problems of SIEMs and Current UEBA Solutions
Cybersecurity professionals have huge problems with their SIEMs and current UEBA solutions. How can AI be used to fix these problems?
Predicting Malicious Network Connections Using Splunk and AI
One of the most fundamental responsibilities that blue teams have is being able to detect threats within the environment.
Automated Threat Hunting With Splunk and AI
With the rapid rise of artificial intelligence tools within our daily lives and careers, it’s no surprise that cybersecurity tools are utilizing AI to better secure computing environments.