Data Analysis Part 3: Basic Data Visualization Techniques

This is part 3 of this series on Data Analysis. The focus of this article is all the different types of data visualizations and the reasons you might...

Encrypted communication on Elastic server by setting up TLS and adjusting CORS permissions

In this tutorial, we will provide step-by-step instructions on how to encrypt communication among Elasticsearch, Kibana, and Logstash. After the setup,...

Data Analysis Part 2: What is Data

This is part 2 of this series on Data Analysis. The focus of this article is all the different types of data and how each one can be analyzed. If you...

How to set up the Kibana Plugin Development Environment

In this tutorial, we will provide step-by-step instructions on how to set up the Kibana Plugin Development Environment in the Linux system. We use...

Data Analysis Part 1: An Introduction to Data Analytics

Every day, words like “Artificial Intelligence”, “Big Data”, “Data Analytics”, and “Machine Learning” are thrown around constantly these days, but what...

Data Security - Threats and Challenges in today's world

Abstract In this blog series, we cover topics relevant to folks who are starting a career in cybersecurity. If you are one, you probably have had some...

AI & Cybersecurity - Part 4: AI Assistance for Simplification

Part 4: Applications of Artificial Intelligence and Machine Learning for Task Simplification Welcome back and thanks for tuning in! This is part 4 of...

The Big Data Gold Rush, but where are all the miners?

In 2017, data replaced oil as the most valuable resource on Earth. The more data a company collects, the more it can control. For that reason...

What is Ransomware?

Read on for an intriguing glimpse into the history and evolution of what has in recent years become a top concern for CISO's globally. 

Into the Abyss with Deep Learning

The term Deep Learning(DL) seems quite fascinating and people often get confused between it and Machine Learning, so let me simplify it for you.