Blogs
August 12, 2020 / May 24, 2023 by Query
Zeek the new Bro Zeek is the new name for Bro that has been in existence since 1994. In this article, we will review what makes Zeek a powerful tool for network analysis and security monitoring. Need a little more familiarity with Zeek? Check out our previous blog: Bro: Security’s Swiss Army Knife. A language […]
Read more »
July 28, 2020 / March 22, 2023 by Query
In our previous blogs on Artificial Intelligence and Everyday Life, we learned the basics of how our computers can be trained to think like humans and work like them. Now let’s move on to some actual application of what we learned and understand about one of the most versatile neural network models – The Autoencoder. […]
July 21, 2020 / February 16, 2023 by Query
Bag of WordsThe bag-of-words model is a simplifying representation technique wherein a text (such as a sentence or a document) is represented as the bag (multiset) of its words, disregarding grammar and even word order but keeping multiplicity. Bottom-up parserThe bottom-up parser has a parsing technique that starts bottom-up by grouping words into phrases, and […]
July 14, 2020 / February 16, 2023 by Query
A swiss army knife is a plethora of tools wrapped up into one friendly and compact system. When describing anything as a swiss army knife, we mean they have a wide range of uses, whether it be knowledge, applicability, adaptivity, or otherwise. Bro, the leading platform for network security monitoring, is quite an exciting ecosystem […]
June 30, 2020 / April 23, 2024 by Query
Looking for some top hacking techniques? Read about the most common ones below! Credit to Finjan.com, for more detail on this content see the original post: https://blog.finjan.com/9-common-hacking-techniques-and-how-to-deal-with-them/ While we just explored Anomaly Detection as one of the uses of this model, look for its other applications such as Dimensionality Reduction, Information Retrieval, and Machine Translation, […]
June 30, 2020 / March 22, 2023 by Query
We have all been there, sitting in class thinking to ourselves, “I will never use this in real life.” However, life has a way of proving us wrong. Enter Noam Chomsky As a computer science graduate, I took quite a bit of math and computing classes. One name that I heard over and over was […]
June 16, 2020 / March 22, 2023 by Query
This blog will look into the entire Elastic Stack (Elasticsearch, Logstash, Kibana). What is Kibana? Kibana is the visualization layer of Elastic stack. With Kibana, you can create different types of charts, tables, histograms, and maps to understand and analyze your data better. You can also use Kibana to secure, monitor, and manage your elastic […]
June 2, 2020 / March 22, 2023 by Query
Big data can provide numerous insights to enterprises and help professionals to make informed decisions. When used in cybersecurity, big data can find trends and correlations, flag anomalies, and recognize the malicious activity. However, malicious hackers are also benefiting. As AI and machine learning find their way into the world of malicious cyber attacks, cybercriminals […]
May 28, 2020 / February 16, 2023 by Query
The idea of an unhackable password is beyond the realm of possibility, but there are ways to protect yourself and make your password harder to guess than the average password. Cybersecurity professionals lay strict rules on not reusing passwords, picking long, complex ones, and making sure your passwords are safe because if there is a […]
Newsroom
May 27, 2020 / December 24, 2022 by Query