Applied Machine Learning in Security Part 1: The Introduction for Skeptics

Why Machine Learning (in Security)? We often think of the day-to-day for human analysts in computer security as being like finding a needle in a haystack or connecting the dots. But how do we find…


Keeping the “Science” in “Data Science”: Calibrating Algorithms for Threat Detection

As attack payloads and methods have become more easily adaptable and customizable to individual campaigns and targets (e.g. polymorphic malware, customized payloads, credential theft, etc.), threat…


Cueing Threat Hunters with Change Detection

  Artificial Intelligence (AI) and various component tools such as machine learning (ML) are not intended to fully-automate threat mitigation and response, at least not in the current generation…


Auto-Discovery of Communities from Network Data

Prologue The Data Science team at JASK got its start well before I had even heard of JASK; Joseph Zadeh (Director of Data Science) and I met in San Francisco when we worked together on papers for a…