How to Use Netcat for Cybersecurity

Posted by Dhiraj Sharan on Aug 5, 2020 8:00:00 AM

To start a career as a security analyst, one must have a good understanding of the network and knowledge of networking tools. Let's begin with netcat.

Read More

Topics: Cyber Security, cybersecurity, netcat, Linux

Hacker Tricks

Posted by Alexis Vander Wilt on Jun 30, 2020 8:00:00 AM

Looking for some top hacking techniques? Read about the most common ones below! 

Credit to Finjan.com, for more detail on this content see the original post: https://blog.finjan.com/9-common-hacking-techniques-and-how-to-deal-with-them/

Read More

Topics: Cyber Security, Ransomware, Malware, cybersecurity, Brute Force Attacks, Hacking

Checklist for Securing your home-grown IT applications

Posted by Dhiraj Sharan on Jun 9, 2020 8:00:00 AM

A software application is a program or multiple programs that help end-users. Most applications use network resources, database resources, storage, and other cloud resources, to function. This connectedness is vital to keep in mind, not only how your end user may interact with the application, but also how vulnerable the application may be to malicious actors. One may use several different methods to protect the application, but a determined attacker with sufficient resources may access your application. So, how can we secure your home-grown IT applications? 

Read More

Topics: Cyber Security, it applications, security checklist

Big Data and Cybersecurity

Posted by Alexis Vander Wilt on Jun 2, 2020 8:00:00 AM

Big data can provide numerous insights to enterprises and help professionals to make informed decisions. When used in cybersecurity, big data can find trends and correlations, flag anomalies, and recognize the malicious activity. However, malicious hackers are also benefiting.  As AI and machine learning find their way into the world of malicious cyber attacks, cybercriminals are finding new and innovative ways to attack our systems. So, does big data hold the answer to combating cybercriminals?

Read More

Topics: Cyber Security, Big Data, anomalies

Crazy Math in Cyber Security

Posted by Alexis Vander Wilt on Apr 30, 2020 8:00:00 AM

“We all use math every day;

Read More

Topics: Cyber Security, cybersecurity, math, cryptography, Discrete Mathematics, math in cybersecurity

Data Security - Threats and Challenges in today's world

Posted by Dhiraj Sharan on Feb 4, 2020 11:59:45 AM

Abstract

In this blog series, we cover topics relevant to folks who are starting a career in cybersecurity. If you are one, you probably have had some exposure to cybersecurity best-practices in your personal life from a consumer perspective. Starting a cybersecurity career then challenges you to bridge your existing knowledge to your work life, and then expand it further to be an effective cybersecurity professional. In this first blog, we talk about some of the threats and challenges in today’s world that intertwine our personal and professional lives.

Read More

Topics: Threat Detection, Cyber Security, Digital Footprint, Internet of Things, Iot

AI & Cybersecurity - Part 4: AI Assistance for Simplification

Posted by Alexis Vander Wilt on Jan 28, 2020 3:55:04 PM

Part 4: Applications of Artificial Intelligence and Machine Learning for Task Simplification

Welcome back and thanks for tuning in! This is part 4 of this series on AI & Cybersecurity. The focus of this article is the application of Artificial Intelligence and Machine Learning that are making life simpler.

Read More

Topics: AI for Security, Machine Learning, Artificial Intelligence, Cyber Security, Natural Language Processing, NLP

What is Ransomware?

Posted by Ferdinand Ramos on Jan 16, 2020 3:05:43 PM

Read on for an intriguing glimpse into the history and evolution of what has in recent years become a top concern for CISO's globally. 

Read More

Topics: Cyber Security, Ransomware, Malware

How to set up SSL for Splunk Server using Let's Encrypt

Posted by Minxuan Sun on Jan 10, 2020 12:29:18 PM

In this tutorial, we will use a third-party certificate called Let’s Encrypt. Let’s Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group.

Read More

Topics: Cyber Security, Splunk

AI & Cybersecurity - Part 3: Adversarial AI

Posted by Alexis Vander Wilt on Jan 7, 2020 1:40:02 PM

Adversarial Application of Artificial Intelligence and Machine Learning

Welcome back and thanks for tuning in! This is part 3 of this series on AI & Cybersecurity. The focus of this article is the adversarial application of Artificial Intelligence and Machine Learning.

Read More

Topics: AI for Security, Machine Learning, Artificial Intelligence, Cyber Security