Bro: Security's Swiss Army Knife

Posted by Craig Jorgensen on Jul 14, 2020 8:00:00 AM

A swiss army knife is a plethora of tools wrapped up into one friendly and compact system. When describing anything as a swiss army knife, we mean they have a wide range of uses, whether it be knowledge, applicability, adaptivity, or otherwise.

Bro, the leading platform for network security monitoring, is quite an exciting ecosystem of wire-speed security analyzers and triggers. It takes a unique approach to network security monitoring, meaning it takes a bit of time to get used to it.

Bro was renamed to Zeek in 2018, but many still refer to it as "Bro." For this article, we will refer to it as "Bro." This is a gentle intro to familiarizing yourself with what Bro has to offer, complete with example code.

Read More

Topics: Bro, Zeek

Newfound Appreciation: Noam Chomsky

Posted by Craig Jorgensen on Jun 30, 2020 9:14:36 AM

We have all been there, sitting in class thinking to ourselves, "I will never use this in real life." However, life has a way of proving us wrong.

Enter Noam Chomsky

Read More

Topics: Recursively enumerable, Context-sensitive, Context-free, programming languages, Language

Hacker Tricks

Posted by Alexis Vander Wilt on Jun 30, 2020 8:00:00 AM

Looking for some top hacking techniques? Read about the most common ones below! 

Credit to Finjan.com, for more detail on this content see the original post: https://blog.finjan.com/9-common-hacking-techniques-and-how-to-deal-with-them/

Read More

Topics: Cyber Security, Ransomware, Malware, cybersecurity, Brute Force Attacks, Hacking

Dipping our toes into OpenSSL

Posted by Dhiraj Sharan on Jun 23, 2020 8:00:00 AM

What would life be without OpenSSL, can we even imagine one! 

Read More

Topics: encryption, openssl, decryption

Understanding the Elastic Stack

Posted by Niraj Markandey on Jun 16, 2020 8:00:00 AM

This blog will look into the entire Elastic Stack (Elasticsearch, Logstash, Kibana). 

Read More

Topics: Elastic, Kibana, elasticsearch, Logstash

Checklist for Securing your home-grown IT applications

Posted by Dhiraj Sharan on Jun 9, 2020 8:00:00 AM

A software application is a program or multiple programs that help end-users. Most applications use network resources, database resources, storage, and other cloud resources, to function. This connectedness is vital to keep in mind, not only how your end user may interact with the application, but also how vulnerable the application may be to malicious actors. One may use several different methods to protect the application, but a determined attacker with sufficient resources may access your application. So, how can we secure your home-grown IT applications? 

Read More

Topics: Cyber Security, it applications, security checklist

Big Data and Cybersecurity

Posted by Alexis Vander Wilt on Jun 2, 2020 8:00:00 AM

Big data can provide numerous insights to enterprises and help professionals to make informed decisions. When used in cybersecurity, big data can find trends and correlations, flag anomalies, and recognize the malicious activity. However, malicious hackers are also benefiting.  As AI and machine learning find their way into the world of malicious cyber attacks, cybercriminals are finding new and innovative ways to attack our systems. So, does big data hold the answer to combating cybercriminals?

Read More

Topics: Cyber Security, Big Data, anomalies

How to Choose the Perfect Password

Posted by Alexis Vander Wilt on May 28, 2020 8:00:00 AM

The idea of an unhackable password is beyond the realm of possibility, but there are ways to protect yourself and make your password harder to guess than the average password. Cybersecurity professionals lay strict rules on not reusing passwords, picking long, complex ones, and making sure your passwords are safe because if there is a will, there's a way. The first step to understanding how to pick a password is to understand how password cracking works.

Read More

Topics: math, math in cybersecurity, Passwords, Brute Force Attacks

Creating a Time-Series Analysis Using Python

Posted by Dhiraj Sharan on May 21, 2020 8:00:00 AM

Python is an incredibly powerful programming language. It is not only for small school projects but instead, also used for Google AI in photo recognition and other monumental projects.

Read More

Topics: Python, Data Exploration, time-series, Data Science

Supervised vs Unsupervised Learning

Posted by Ashwin Jain on May 14, 2020 8:00:00 AM

In this blog, we will walk through Supervised and Unsupervised Learning and answer these questions: 

Read More

Topics: Machine Learning, Artificial Intelligence, AI, Unsupervised Learning, Supervised Learning