The Big Data Gold Rush, but where are all the miners?

In 2017, data replaced oil as the most valuable resource on Earth. The more data a company collects, the more it can control. For that reason...

What is Ransomware?

Read on for an intriguing glimpse into the history and evolution of what has in recent years become a top concern for CISO's globally. 

Into the Abyss with Deep Learning

The term Deep Learning(DL) seems quite fascinating and people often get confused between it and Machine Learning, so let me simplify it for you.

How to set up SSL for Splunk Server using Let's Encrypt

In this tutorial, we will use a third-party certificate called Let’s Encrypt. Let’s Encrypt is a free, automated, and open certificate authority...

AI & Cybersecurity - Part 3: Adversarial AI

Adversarial Application of Artificial Intelligence and Machine Learning Welcome back and thanks for tuning in! This is part 3 of this series on AI &...

Alexa + Watson + Tableau + Slack

What does this have to do with my IT & Cybersecurity log analysis Introduction Cyber threats are accelerating by leaps and bounds in frequency and...

Your Simplified Guide to Cross-Site Scripting (XSS) Attacks — Part 1

Cross-Site Scripting (XSS) Vulnerability: Definition, and Prevention.

AI & Cybersecurity - Part 2: Threat Detection, Prevention, and Remediation

If you're new to this thread I suggest you start here with the introductory blog, AI & Cybersecurity If you like this content, follow us on Linkedin...

Basics of Applied Natural Language Processing (NLP)

Introduction This article serves as a gentle introduction to natural language processing and how it makes life better.

AI for Cyber Security

What this technology revolution may mean for you