Blogs
August 26, 2020 / March 22, 2023 by Query
If your organization is running a web application, you are likely to use EC2. Further, there is a high likelihood your instances are all Linux. Linux systems are robust and a suitable first choice for server applications like a MEAN stack express.js web server, an application built using open source LAMP stack, commercial proprietary software, […]
Read more »
August 19, 2020 / March 22, 2023 by Query
In our previous blog, Supervised vs Unsupervised Learning, we learned that Machine Learning consists of algorithms that learn to solve a problem without expressly being provided step by step instructions by a human agent. Then we differentiated between two major categories of algorithms – Supervised Learning & Unsupervised Learning. In supervised learning, the training data […]
August 12, 2020 / May 24, 2023 by Query
Zeek the new Bro Zeek is the new name for Bro that has been in existence since 1994. In this article, we will review what makes Zeek a powerful tool for network analysis and security monitoring. Need a little more familiarity with Zeek? Check out our previous blog: Bro: Security’s Swiss Army Knife. A language […]
July 28, 2020 / March 22, 2023 by Query
In our previous blogs on Artificial Intelligence and Everyday Life, we learned the basics of how our computers can be trained to think like humans and work like them. Now let’s move on to some actual application of what we learned and understand about one of the most versatile neural network models – The Autoencoder. […]
July 21, 2020 / February 16, 2023 by Query
Bag of WordsThe bag-of-words model is a simplifying representation technique wherein a text (such as a sentence or a document) is represented as the bag (multiset) of its words, disregarding grammar and even word order but keeping multiplicity. Bottom-up parserThe bottom-up parser has a parsing technique that starts bottom-up by grouping words into phrases, and […]
July 14, 2020 / February 16, 2023 by Query
A swiss army knife is a plethora of tools wrapped up into one friendly and compact system. When describing anything as a swiss army knife, we mean they have a wide range of uses, whether it be knowledge, applicability, adaptivity, or otherwise. Bro, the leading platform for network security monitoring, is quite an exciting ecosystem […]
June 30, 2020 / April 23, 2024 by Query
Looking for some top hacking techniques? Read about the most common ones below! Credit to Finjan.com, for more detail on this content see the original post: https://blog.finjan.com/9-common-hacking-techniques-and-how-to-deal-with-them/ While we just explored Anomaly Detection as one of the uses of this model, look for its other applications such as Dimensionality Reduction, Information Retrieval, and Machine Translation, […]
June 30, 2020 / March 22, 2023 by Query
We have all been there, sitting in class thinking to ourselves, “I will never use this in real life.” However, life has a way of proving us wrong. Enter Noam Chomsky As a computer science graduate, I took quite a bit of math and computing classes. One name that I heard over and over was […]
June 16, 2020 / March 22, 2023 by Query
This blog will look into the entire Elastic Stack (Elasticsearch, Logstash, Kibana). What is Kibana? Kibana is the visualization layer of Elastic stack. With Kibana, you can create different types of charts, tables, histograms, and maps to understand and analyze your data better. You can also use Kibana to secure, monitor, and manage your elastic […]
June 2, 2020 / March 22, 2023 by Query
Big data can provide numerous insights to enterprises and help professionals to make informed decisions. When used in cybersecurity, big data can find trends and correlations, flag anomalies, and recognize the malicious activity. However, malicious hackers are also benefiting. As AI and machine learning find their way into the world of malicious cyber attacks, cybercriminals […]