Telling the Security Story

Data analytics and machine learning can be very empowering for security, but don’t lose sight of your true goal when using them. In work as an IT auditor, a security investigator, or threat analyst,…


Threat Hunting with your hands tied - This is Big Data Part I

The Stage: When walking into a Fine China shop, you can look, but Do Not Touch! This concept applies in a customer Proof of Concept; you can't influence the infrastructure or applications, you can't…