From Big Data to Beautiful Data: Bridging the gap from Threat Hunter to C-Suite graphs with Zeppelin notebooks and D3

In my previous posts we worked through a number of Threat Hunting queries and data mining ideas. In the end we left off with how to demonstrate and translate value to the C-Suite. This has lead me…


Gigamon brings deep packet inspection to Amazon cloud

Gigamon Inc. is bringing on-premise-like network visibility to the Amazon Web Services cloud with a data-in-motion visibility platform that enables information technology organizations to conduct…


Why We Picked Tensorflow for Cybersecurity

When I started in security analytics several years ago, the choice of tool and platform was typically dictated for you, usually based on earlier investments the company had already made. These…


Can Hackers Be Stopped? The State of Defense in the Private Sector

One week before the recent massive hack attack shut off access to Twitter, PayPal, Airbnb and dozens of other major websites, I was at an off-the-record conference with leaders of some of the…


Threat Hunting with your hands tied - This is Big Data Part II

  Threat hunting isn’t only about finding compromised assets, it’s also performing the predictive function of finding the holes a malicious attacker might take advantage of. As I mentioned last…