A Data-Driven Blueprint to Scaling Cloud Operations Security (Part 1 of 2)

Digital Forensics and Incident Response Using OSQuery

Adobe @ LocoMocoSec 2019

machine learning

Connect with us

Using Machine Learning to Detect Command Line Anomalies

Click here to read this article.

Ongoing Research

OWASP, IR, ML, and Internal Bug Bounties

A few weeks ago, I traveled to the OWASP Summit located just outside of London. The OWASP Summit is not a conference. It is a remote of...