Blogs
February 11, 2020 / March 22, 2023 by Query
In this tutorial, we will provide step-by-step instructions on how to set up the Kibana Plugin Development Environment in the Linux system. We use Ubuntu 18.04.2 Desktop as an example. Before we start, make sure you are not using the root user and remember to use <span style="font-size: 18px;"><em>sudo</em></span> for each command. Step 1 — Install prerequisite […]
Read more »
February 6, 2020 / February 16, 2023 by Query
Every day, words like “Artificial Intelligence”, “Big Data”, “Data Analytics”, and “Machine Learning” are thrown around constantly these days, but what do they actually mean? Perhaps more importantly, why should you care? This series is going to dive into the world of data analytics and provide information on these topics to help you understand the […]
January 28, 2020 / September 26, 2024 by Query
Part 4: Applications of Artificial Intelligence and Machine Learning for Task Simplification Welcome back and thanks for tuning in! This is part 4 of this series on AI & Cybersecurity. The focus of this article is the application of Artificial Intelligence and Machine Learning that are making life simpler. If you like this content, follow […]
January 23, 2020 / March 22, 2023 by Query
In 2017, data replaced oil as the most valuable resource on Earth. The more data a company collects, the more it can control. For that reason information has officially become the new “gold” in our modern technological economy. Over 70% of companies’ CIOs agree that ‘big data’ has the potential to revolutionize their way of […]
January 16, 2020 / March 22, 2023 by Query
Read on for an intriguing glimpse into the history and evolution of what has in recent years become a top concern for CISO’s globally. Photo by Markus Spiske on Unsplash What is Ransomware? The threat of another large scale attack is always present for businesses, people, and yes, even governments. Hopefully I can share a […]
January 14, 2020 / March 22, 2023 by Query
The term Deep Learning(DL) seems quite fascinating and people often get confused between it and Machine Learning, so let me simplify it for you. If you have read my previous blog on ML, you would have gathered that AI is really nothing more than the “ability of a machine to perform certain tasks based upon […]
January 10, 2020 / March 22, 2023 by Query
In this tutorial, we will use a third-party certificate called Let’s Encrypt. Let’s Encrypt is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group. Let’s say you are running a Splunk server with a new self-signed certificate. The self-signed certificate is used to encrypt communication to and […]
January 7, 2020 / March 22, 2023 by Query
Adversarial Application of Artificial Intelligence and Machine Learning Welcome back and thanks for tuning in! This is part 3 of this series on AI & Cybersecurity. The focus of this article is the adversarial application of Artificial Intelligence and Machine Learning. If you like this content, follow us on Linkedin and subscribe to updates. What […]
December 26, 2019 / March 22, 2023 by Query
Cross-Site Scripting (XSS) Vulnerability: Definition, and Prevention. Cross-Site Script, otherwise known as XSS, is a code injection attack allowing the injection of malicious code into a website to redirect users to another website where the perpetrator can steal data. In simple words, It’s a method where perpetrators find a way to add a block of […]
December 13, 2019 / March 22, 2023 by Query
Introduction Welcome back and thanks for tuning in! This is part 2 of this series on AI & Cybersecurity. The focus of this article is the use of AI in its applied form for Threat Detection, Prevention, and Remediation. Threat Detection Hackers are designing malware that is more advanced than ever before. They are learning […]