AI, ML & Data Science 08/September/2023 Detecting Anomalies using Machine Learning on Splunk The identification of cyberattacks is crucial to safeguard networks and systems, but signature detection has its limitations. Therefore, the discovery of anomalies through machine learning is a promising approach
Software Security 05/August/2022 Compromise Indicators in incident detection and false positive reduction in practice Given the complexity and advance of threats to computing environments, such as the spread of ransomware attacks that have been growing in recent years (KENNEALLY, 2021), analyzing threats thoroughly and intelligently is crucial
Detection Engineering 20/July/2022 MISP Broker Tempest's team of researchers develop and share a tool to assist in activities carried out by defensive security analysts
AI, ML & Data Science 08/September/2023 Detecting Anomalies using Machine Learning on Splunk The identification of cyberattacks is crucial to safeguard networks and systems, but signature detection has its limitations. Therefore, the discovery of anomalies through machine learning is a promising approach
Software Security 05/August/2022 Compromise Indicators in incident detection and false positive reduction in practice Given the complexity and advance of threats to computing environments, such as the spread of ransomware attacks that have been growing in recent years (KENNEALLY, 2021), analyzing threats thoroughly and intelligently is crucial
Detection Engineering 20/July/2022 MISP Broker Tempest's team of researchers develop and share a tool to assist in activities carried out by defensive security analysts