POPULARITY
LimaCharlie CEO, Max Lamothe-Brassard welcome Cliff Janzen, CISO and VP of Security Services at Arctiq, for a special "Security Potpourri" session!What's on the menu?SOC operations and optimizationSecurity automation strategiesPenetration testing insightsAll through Cliff's expert lens and real-world experience. Join us for an insightful discussion on the current security landscape!Cliff is an experienced Vice President of Security with a demonstrated history of working in the computer and network security industry. Skilled in Security Architecture, Governance, Incident Management, Ethical Hacking, and Intrusion Detection. Currently working as CISO and VP of Security Services at Arctiq.
In this episode of ELI, we speak with Eric Fonseca, Co-Founder of IndoAI, a startup building AI-powered edge cameras and computer vision solutions. Inspired by platforms like iOS, Android, and cloud giants such as Azure and AWS, IndoAI is creating an open ecosystem where third-party developers can innovate and contribute their own AI models and applications. The company aims to revolutionize the way enterprises handle attendance, visitor management, security, and more—right at the edge, ensuring data privacy and real-time responsiveness. Eric shares insights into IndoAI's journey, how the COVID-19 pandemic led them to pivot toward advanced face recognition and AI-driven attendance systems, and how they're scaling up to address various use cases like fire detection, intrusion alerts, and vehicle identification. He also discusses the importance of fostering a developer community, the challenges of changing customer mindsets about AI-based solutions, and the path to building a sustainable AI startup. Timestamps/Chapters: 00:00 Introduction 00:03 Meet Eric Fonseca & Genesis of IndoAI 01:22 Transitioning from Face Recognition to a Full AI Camera Platform 02:10 Early Collaboration with Government & Pandemic Pivot 03:33 Edge AI Cameras Explained: On-Device Processing & Data Privacy 05:31 Emphasis on Real-Time Analytics & On-Premise Data Handling 07:32 Use Cases: Visitor Management, Intrusion Detection & Smart Locks 09:16 Evolving from Attendance Apps to AI-Driven Cameras 10:52 The Concept of “Appization”: AI Model Marketplace for Cameras 12:57 Multiple AI Models: Face Recognition, Intrusion, Fire/Smoke Detection 14:23 Market Strategy: B2G, Societies, Corporates, & Channel Partners 16:56 Building a Developer Ecosystem & Revenue Sharing Model 18:16 Enhancing & Improving Models via Hackathons & Collaborations 19:32 Global Trends: Environmental Monitoring & Gesture Recognition in Pharma 21:43 Future Outlook: Starting in India, Expanding Beyond Borders 22:28 Entrepreneurial Lessons: Overcoming Mindset Barriers & Team Alignment 24:26 Defining Entrepreneurship: Persistence, Consistency & Building Legacy
Network security is undeniably essential for modern cloud-based applications. Given the abundance of available security tools and devices, selecting the most suitable protection for a specific scenario can be a complex task. Take, for example, Azure Firewall and Azure Network Security Groups (NSGs) in the Azure cloud environment; although both are prevalent security measures, they serve distinctly different purposes. What is Azure Firewall? Azure Firewall is a cloud-native, fully-managed firewall service that offers advanced threat protection across OSI layers 3 to 7. It is an intelligent network security tool that extends beyond traditional IP, port, and protocol-based filtering, leveraging threat intelligence and signature-based Intrusion Detection and Prevention Systems (IDPS) to analyze network traffic for potential threats. This comprehensive service is Microsoft's flagship for securing Azure Cloud workloads. View More: Azure Firewall vs. Azure Network Security Groups (NSGs)
Guests: Jules Okafor, BISO and CEO and Founder of RevolutionCyberOn LinkedIn | https://www.linkedin.com/in/julesmgmt/David Meece, SOC Analyst, also known as Cyber Tech Dave on LinkedInOn LinkedIn | https://www.linkedin.com/in/david-meece-cybertech-dave/Jay Jay Davey, Global Security Operations Centre Lead, Marks and SpencerOn LinkedIn | https://www.linkedin.com/in/secopsjay/?originalSubdomain=uk____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesHello to all our listeners out there! Marco and Sean here, and we are thrilled to bring you a special episode today. For the third consecutive year, we've been invited to host a panel for an event that's become a cornerstone for the infosec community. And guess what? We've been involved right from its inception. That's right! We are talking about the SOC Analyst Appreciation Day™, a day designed to shed light on the unsung heroes of the cybersecurity world.Now, for those new to this, let us dive a bit deeper. The life of a SOC analyst isn't always glamorous. They often find themselves caught in the whirlwind of immense workload, sometimes feeling like the weight of the entire digital universe rests on their shoulders. Overworked and, sadly, often underappreciated, these analysts face challenges that can lead to burnout and, ultimately, a high turnover rate.Enter Devo, the brilliant minds behind the establishment of the SOC Analyst Appreciation Day™. Their mission? To offer a hearty shoutout to these hardworking individuals and to prompt organizations globally to step up, recognizing the importance of their analysts' satisfaction and mental well-being.If you've been following the event, you know that this year was jam-packed with on-demand content that was nothing short of enlightening. With presentations from some of the most influential thought leaders in the infosec community, topics ranged from real-life use cases to the intricacies of SOC automation and the critical importance of managing mental well-being in such high-pressure roles.But, listeners, we have a treat for you. Today, we're going to dive deep into one of the event's highlights. We had the privilege of moderating a panel that, trust us, you won't want to miss. So, whether you're a budding SOC analyst, a seasoned pro, or just someone with a keen interest in the world of infosec, sit back, relax, and let's delve into some insightful discussions.This panel will take a look at the ins and outs of SOC life. From the tier one analyst role to leadership positions to everything in between, the day-to-day in each type of SOC can look very different — and this panel will cover all perspectives. Moderated by Sean Martin and Marco Ciappelli from ITSP MagazineJules Okafor, BISO and CEO and Founder of RevolutionCyberDavid Meece, SOC Analyst, also known as Cyber Tech Dave on LinkedInJay Jay Davey, Global Security Operations Centre Lead, Marks and SpencerThanks for tuning in to this special episode. Let's get started!____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guests: Jules Okafor, BISO and CEO and Founder of RevolutionCyberOn LinkedIn | https://www.linkedin.com/in/julesmgmt/David Meece, SOC Analyst, also known as Cyber Tech Dave on LinkedInOn LinkedIn | https://www.linkedin.com/in/david-meece-cybertech-dave/Jay Jay Davey, Global Security Operations Centre Lead, Marks and SpencerOn LinkedIn | https://www.linkedin.com/in/secopsjay/?originalSubdomain=uk____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesHello to all our listeners out there! Marco and Sean here, and we are thrilled to bring you a special episode today. For the third consecutive year, we've been invited to host a panel for an event that's become a cornerstone for the infosec community. And guess what? We've been involved right from its inception. That's right! We are talking about the SOC Analyst Appreciation Day™, a day designed to shed light on the unsung heroes of the cybersecurity world.Now, for those new to this, let us dive a bit deeper. The life of a SOC analyst isn't always glamorous. They often find themselves caught in the whirlwind of immense workload, sometimes feeling like the weight of the entire digital universe rests on their shoulders. Overworked and, sadly, often underappreciated, these analysts face challenges that can lead to burnout and, ultimately, a high turnover rate.Enter Devo, the brilliant minds behind the establishment of the SOC Analyst Appreciation Day™. Their mission? To offer a hearty shoutout to these hardworking individuals and to prompt organizations globally to step up, recognizing the importance of their analysts' satisfaction and mental well-being.If you've been following the event, you know that this year was jam-packed with on-demand content that was nothing short of enlightening. With presentations from some of the most influential thought leaders in the infosec community, topics ranged from real-life use cases to the intricacies of SOC automation and the critical importance of managing mental well-being in such high-pressure roles.But, listeners, we have a treat for you. Today, we're going to dive deep into one of the event's highlights. We had the privilege of moderating a panel that, trust us, you won't want to miss. So, whether you're a budding SOC analyst, a seasoned pro, or just someone with a keen interest in the world of infosec, sit back, relax, and let's delve into some insightful discussions.This panel will take a look at the ins and outs of SOC life. From the tier one analyst role to leadership positions to everything in between, the day-to-day in each type of SOC can look very different — and this panel will cover all perspectives. Moderated by Sean Martin and Marco Ciappelli from ITSP MagazineJules Okafor, BISO and CEO and Founder of RevolutionCyberDavid Meece, SOC Analyst, also known as Cyber Tech Dave on LinkedInJay Jay Davey, Global Security Operations Centre Lead, Marks and SpencerThanks for tuning in to this special episode. Let's get started!____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
The recent report by Mozilla, shedding light on the privacy concerns around modern vehicles, struck a chord. Notably, every car brand reviewed, including behemoths like Ford, Volkswagen, and Toyota, flunked the privacy test. This revelation steered a fascinating conversation with Chris Pierson and Ingrid Gliottone from BlackCloak during a brand story recording for the Redefining Society podcast. Our focus veered towards the lurking privacy and security issues tied to the modern, tech-savvy vehicles we so casually entrust with our data.The modern car is no longer just a mode of transport—it's a smart gadget, a data hub on wheels. But as the wheels spin, so does the reel of our personal information, weaving into the vast web of data, ready for harvest by not just the car makers, but a string of 'they' – the infotainment system providers, app developers, network providers, and possibly cyber rogues. The conversation took a deeper dive as Chris, the CEO of BlackCloak, elucidated the firm's mission—shielding corporate executives and key personnel from personal cyber threats that could ricochet back to the corporations.The Mozilla report is an alarm bell, underscoring the high time to separate the wheat from the chaff in terms of what data is essential for functionality and what merely serves as a gold mine for advertisers or a hunting ground for cyber-attackers. This blend of privacy and security, or the lack thereof, is a cocktail we are forced to sip, as Ingrid pointed out the lack of clarity presented to buyers at the point of sale concerning the privacy policies tied to these vehicles.The promise of tech advancements in vehicles is dazzling—better shocks for off-roaders, safety features to prevent accidents during a sudden snooze, and so on. Yet, as Chris highlighted, there's a dark side. Some policies mentioned collecting data about one's sex life and genetic information— a far cry from the basic expectations of privacy.As the conversation with BlackCloak unrolled, the blend of excitement and concern was palpable. The question now is not about halting the march of technology but steering it towards a path where privacy and security are not the passengers but co-drivers.The findings from the Mozilla report and insights from BlackCloak are not just food for thought, but a call to action. It is crucial to reckon with the reality of the modern-day vehicles doubling as data hubs and to steer the conversation towards a road where transparency, consent, and security are the landmarks. I urge you to dive into BlackCloak's offerings to explore how they are redefining the security landscape, ensuring the privacy and security of your personal digital realm, including that computer on wheels parked in your driveway. Visit BlackCloak to discover what they offer in shielding the modern-day knights from the unseen arrows of the digital world.Guests:Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonIngrid Gliottone, Chief Experience Officer of BlackCloak [@BlackCloakCyber]On LinkedIn | https://www.linkedin.com/in/ingridgliottone/ResourcesLearn more about BlackCloak and their offering: https://itspm.ag/itspbcwebAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
The recent report by Mozilla, shedding light on the privacy concerns around modern vehicles, struck a chord. Notably, every car brand reviewed, including behemoths like Ford, Volkswagen, and Toyota, flunked the privacy test. This revelation steered a fascinating conversation with Chris Pierson and Ingrid Gliottone from BlackCloak during a brand story recording for the Redefining Society podcast. Our focus veered towards the lurking privacy and security issues tied to the modern, tech-savvy vehicles we so casually entrust with our data.The modern car is no longer just a mode of transport—it's a smart gadget, a data hub on wheels. But as the wheels spin, so does the reel of our personal information, weaving into the vast web of data, ready for harvest by not just the car makers, but a string of 'they' – the infotainment system providers, app developers, network providers, and possibly cyber rogues. The conversation took a deeper dive as Chris, the CEO of BlackCloak, elucidated the firm's mission—shielding corporate executives and key personnel from personal cyber threats that could ricochet back to the corporations.The Mozilla report is an alarm bell, underscoring the high time to separate the wheat from the chaff in terms of what data is essential for functionality and what merely serves as a gold mine for advertisers or a hunting ground for cyber-attackers. This blend of privacy and security, or the lack thereof, is a cocktail we are forced to sip, as Ingrid pointed out the lack of clarity presented to buyers at the point of sale concerning the privacy policies tied to these vehicles.The promise of tech advancements in vehicles is dazzling—better shocks for off-roaders, safety features to prevent accidents during a sudden snooze, and so on. Yet, as Chris highlighted, there's a dark side. Some policies mentioned collecting data about one's sex life and genetic information— a far cry from the basic expectations of privacy.As the conversation with BlackCloak unrolled, the blend of excitement and concern was palpable. The question now is not about halting the march of technology but steering it towards a path where privacy and security are not the passengers but co-drivers.The findings from the Mozilla report and insights from BlackCloak are not just food for thought, but a call to action. It is crucial to reckon with the reality of the modern-day vehicles doubling as data hubs and to steer the conversation towards a road where transparency, consent, and security are the landmarks. I urge you to dive into BlackCloak's offerings to explore how they are redefining the security landscape, ensuring the privacy and security of your personal digital realm, including that computer on wheels parked in your driveway. Visit BlackCloak to discover what they offer in shielding the modern-day knights from the unseen arrows of the digital world.Guests:Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonIngrid Gliottone, Chief Experience Officer of BlackCloak [@BlackCloakCyber]On LinkedIn | https://www.linkedin.com/in/ingridgliottone/ResourcesLearn more about BlackCloak and their offering: https://itspm.ag/itspbcwebAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Guest: Dr. Ryan Ko, Professor of Cybersecurity, University of Queensland [@UQ_News]On Twitter | https://twitter.com/ryan_kl_koOn LinkedIn |https://www.linkedin.com/in/ryan-ko-38894824/________________________________Host: Mansi ThakarOn ITSPmagazine
Guests: Matthew Canham, CEO, Beyond Layer Seven, LLCOn Linkedin | https://www.linkedin.com/in/matthew-c-971855100/Website | https://drmatthewcanham.com/Ben Sawyer, Professor, University of Central Florida [@UCF]On Linkedin | https://www.linkedin.com/in/bendsawyer/On Twitter | https://twitter.com/bendsawyerWebsite | https://www.bendsawyer.com/____________________________Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast and Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsIsland.io | https://itspm.ag/island-io-6b5ffd____________________________Episode NotesWelcome to a fascinating new episode where we delve deep into the confluence of cybersecurity, psychology, and philosophy in the realm of artificial intelligence. In anticipation of their insightful presentation at Black Hat Las Vegas 2023, our hosts Marco and Sean had an engaging conversation with Ben and Matthew, shedding light on the astonishingly rapid developments of AI and the accompanying cybersecurity implications.Within the last few months, the GPT-4 and ChatGPT language models have captivated the world. There is a growing perception that the line between AI and sentience is becoming increasingly blurred, nudging us into uncharted territories. However, one must question if this is genuinely the case, or merely what we want or are predisposed to perceive.Ben and Matthew's research outlines the fundamental "cognitive levers" available to manipulate human users, a threat vector that is more nuanced and insidious than we ever imagined.In their upcoming Black Hat talk, they aim to reveal how AI can exploit our cognitive biases and vulnerabilities, reshaping our perceptions and potentially causing harm. From social engineering to perceptual limitations, our digital realities are at a risk we have never seen before.Listen in as Marco and Sean explore a captivating debate around the nature of reality in the context of our interaction with AI. What we think is real, may not be real after all. How does that affect us as we continue to interact with increasingly sophisticated AI? In a world that often feels like a simulation, are we falling prey to AI's exploitation of our human cognitive operating rules?Marco and Sean also introduce us to the masterminds behind this groundbreaking research, Ben Sawyer, with his background in Applied Experimental Psychology and Industrial Engineering, and Matthew Canham, whose work spans cognitive neuroscience and human interface design. Their combined expertise results in a comprehensive exploration of the intersection between humans and machines, particularly in the current digital age where AI's ability to emulate human-like interactions has advanced dramatically.This thought-provoking episode is a must-listen for anyone interested in the philosophical, psychological, and cybersecurity implications of AI's evolution. The hosts challenge you to think about the consequences of human cognition manipulation by AI, encouraging you to contemplate this deep topic beyond the immediate conversation.Don't miss out on this thrilling journey into the unexplored depths of human-AI interaction.Subscribe to our podcast, share it with your network, and join us in pondering the questions this conversation raises. Be part of the ongoing dialogue around this pressing issue, and we invite you to stay tuned for further discussions in the future.Stay tuned for all of our Black Hat USA 2023 coverage: https://www.itspmagazine.com/bhusa____ResourcesMe and My Evil Digital Twin: The Psychology of Human Exploitation by AI Assistants: https://www.blackhat.com/us-23/briefings/schedule/index.html#me-and-my-evil-digital-twin-the-psychology-of-human-exploitation-by-ai-assistants-32661For more Black Hat USA 2023 Event information, coverage, and podcast and video episodes, visit: https://www.itspmagazine.com/black-hat-usa-2023-cybersecurity-event-coverage-in-las-vegasAre you interested in telling your story in connection with our Black Hat coverage? Book a briefing here:
Guests: Matthew Canham, CEO, Beyond Layer Seven, LLCOn Linkedin | https://www.linkedin.com/in/matthew-c-971855100/Website | https://drmatthewcanham.com/Ben Sawyer, Professor, University of Central Florida [@UCF]On Linkedin | https://www.linkedin.com/in/bendsawyer/On Twitter | https://twitter.com/bendsawyerWebsite | https://www.bendsawyer.com/____________________________Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast and Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsIsland.io | https://itspm.ag/island-io-6b5ffd____________________________Episode NotesWelcome to a fascinating new episode where we delve deep into the confluence of cybersecurity, psychology, and philosophy in the realm of artificial intelligence. In anticipation of their insightful presentation at Black Hat Las Vegas 2023, our hosts Marco and Sean had an engaging conversation with Ben and Matthew, shedding light on the astonishingly rapid developments of AI and the accompanying cybersecurity implications.Within the last few months, the GPT-4 and ChatGPT language models have captivated the world. There is a growing perception that the line between AI and sentience is becoming increasingly blurred, nudging us into uncharted territories. However, one must question if this is genuinely the case, or merely what we want or are predisposed to perceive.Ben and Matthew's research outlines the fundamental "cognitive levers" available to manipulate human users, a threat vector that is more nuanced and insidious than we ever imagined.In their upcoming Black Hat talk, they aim to reveal how AI can exploit our cognitive biases and vulnerabilities, reshaping our perceptions and potentially causing harm. From social engineering to perceptual limitations, our digital realities are at a risk we have never seen before.Listen in as Marco and Sean explore a captivating debate around the nature of reality in the context of our interaction with AI. What we think is real, may not be real after all. How does that affect us as we continue to interact with increasingly sophisticated AI? In a world that often feels like a simulation, are we falling prey to AI's exploitation of our human cognitive operating rules?Marco and Sean also introduce us to the masterminds behind this groundbreaking research, Ben Sawyer, with his background in Applied Experimental Psychology and Industrial Engineering, and Matthew Canham, whose work spans cognitive neuroscience and human interface design. Their combined expertise results in a comprehensive exploration of the intersection between humans and machines, particularly in the current digital age where AI's ability to emulate human-like interactions has advanced dramatically.This thought-provoking episode is a must-listen for anyone interested in the philosophical, psychological, and cybersecurity implications of AI's evolution. The hosts challenge you to think about the consequences of human cognition manipulation by AI, encouraging you to contemplate this deep topic beyond the immediate conversation.Don't miss out on this thrilling journey into the unexplored depths of human-AI interaction.Subscribe to our podcast, share it with your network, and join us in pondering the questions this conversation raises. Be part of the ongoing dialogue around this pressing issue, and we invite you to stay tuned for further discussions in the future.Stay tuned for all of our Black Hat USA 2023 coverage: https://www.itspmagazine.com/bhusa____ResourcesMe and My Evil Digital Twin: The Psychology of Human Exploitation by AI Assistants: https://www.blackhat.com/us-23/briefings/schedule/index.html#me-and-my-evil-digital-twin-the-psychology-of-human-exploitation-by-ai-assistants-32661For more Black Hat USA 2023 Event information, coverage, and podcast and video episodes, visit: https://www.itspmagazine.com/black-hat-usa-2023-cybersecurity-event-coverage-in-las-vegasAre you interested in telling your story in connection with our Black Hat coverage? Book a briefing here:
Dopo aver parlato di Antimalware ed EDR è il momento di approfondire la tematica network defence parlando di Intrusion Detection System (IDS)L'episodio sarà fruibile a tutti, e spiegherà la differenza tra i vari tipi di IDS come il signature o anomaly based system.Immancabilmente, anche in questo episodio scopriremo assieme come eludere questo particolare sistema di sicurezza!Seguitemi su Spotify, Itunes, Linkedin ed instagram "@nick.soc" per restare aggiornati sulle nuove pubblicazioni!
Enterprises are building and delivering containers and Kubernetes-based applications to their customers. With a distributed architecture, microservices are communicating with each other and 3rd party APIs to enable information exchange and present it to the customers. Such communication via the internet makes these applications vulnerable to external network-based attacks. In this podcast, we will discuss how traditional runtime threat defense solutions fall short of preventing attacks, and a new approach is required that provides: Workload-based Intrusion Detection and Prevention Systems (IDS/IPS)Deep Packet Inspection (DPI) and application-level visibility for containerized workloadsContainer runtime security with malware protection and zero-day attack protection
A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-detection-system Audio reference link: “Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1,” Professor Messer, uploaded 16 November, 2017
A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-detection-system Audio reference link: “Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1,” Professor Messer, uploaded 16 November, 2017
On The Cloud Pod this week, the team discusses Jonathan's penance for his failures. Plus: Microsoft makes moves on non-competes, NDAs, salary disclosures, and a civil rights audit; AWS modernizes mainframe applications for cloud deployment; and AWS CEO Adam Selipsky chooses to be intentionally paranoid. A big thanks to this week's sponsor, Foghorn Consulting, which provides full-stack cloud solutions with a focus on strategy, planning and execution for enterprises seeking to take advantage of the transformative capabilities of AWS, Google Cloud and Azure. This week's highlights
What began as a supposed accounting error landed Cliff Stoll in the midst of database intrusions, government organizations, and the beginnings of a newer threat—cyber-espionage. This led the eclectic astronomer-cum-systems administrator to create what we know today as intrusion detection. And it all began at a time when people didn't understand the importance of cybersecurity. This is a story that many in the infosec community have already heard, but the lessons from Stoll's journey are still relevant. Katie Hafner gives us the background on this unbelievable story. Richard Bejtlich outlines the “honey pot” that finally cracked open the international case. And Don Cavender discusses the impact of Stoll's work, and how it has inspired generations of security professionals.If you want to read up on some of our research on ransomware, you can check out all our bonus material over at redhat.com/commandlineheroes. Follow along with the episode transcript.
Maybe you know the joke about the guy who sells smart home security systems: if nobody's home, he leaves the brochure on the kitchen table! That sounds creepy, right? Call Welch Security LLC (352-209-6011) or check it out at https://www.welchsecurity.com (https://www.welchsecurity.com)
Network Security with KevTechify on the Cisco Certified Network Associate (CCNA)
In this episode we are going to look at Intrusion Detection Systems (IDS) and Intrusion Prevention System (IPS) Characteristics.We will be discussing Zero-Day Attacks, Monitor for Attacks, Intrusion Prevention and Detection Devices, and finally Advantages and Disadvantages of IDS and IPS.Thank you so much for listening to this episode of my series on Network Security.Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Network Security v1Episode 11 - IPS TechnologiesPart A - IDS and IPS CharacteristicsPodcast Number: 43-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
Paul Rivera, Founder of Def-Logix, was interviewed by Adam Torres on Mission Matters Business Podcast. Paul Rivera says he believes cybersecurity must be updated to meet the ever-advancing threat of cyber-attacks. The Def-Logix founder has two decades of experience in cyber security; specializing in computer and network security. He began his career creating network and host-based Intrusion Detection and Prevention Systems (IDS/IPS). Now his company focuses on building red and blue team technologies and has also partnered with Cyber Ops Training Academy with a mission to upskill the cyber security workforce.Follow Adam on Instagram at https://www.instagram.com/askadamtorres/ for up to date information on book releases and tour schedule.Apply to be interviewed by Adam on our podcast:https://missionmatters.lpages.co/podcastguest/Visit our website:https://missionmatters.com/
Paul Rivera, Founder of Def-Logix, was interviewed by Adam Torres on Mission Matters Innovation Podcast. Paul Rivera says he believes cybersecurity must be updated to meet the ever-advancing threat of cyber-attacks. The Def-Logix founder has two decades of experience in cyber security; specializing in computer and network security. He began his career creating network and host-based Intrusion Detection and Prevention Systems (IDS/IPS). Now his company focuses on building red and blue team technologies and has also partnered with Cyber Ops Training Academy with a mission to upskill the cyber security workforce.Follow Adam on Instagram at https://www.instagram.com/askadamtorres/ for up to date information on book releases and tour schedule.Apply to be interviewed by Adam on our podcast:https://missionmatters.lpages.co/podcastguest/Visit our website:https://missionmatters.com/
It's easy to get sucked into the world of technology, often forgetting that there are humans behind the keyboards creating the technology. There's a program out of Texas changing this reality by using a book on deception and honeypots to study cyber attacker behavior.When I saw this post (https://twitter.com/Dr_Cybercrime/status/1462506991012786190/), I knew immediately I wanted to learn more about how a practitioner's book could be used to change how we teach the next generation of cybersecurity practitioners - blue teams, red teams, and purple teams alike.During this conversation we get to hear from a practitioner/author, a professor, and a student. We look back to ancient Egyptian tomb-protection practices and work our way to a future where we keep a close eye on the humans with technology. Yes, even though we continue to throw all sorts of technology at the problems we face (yep, the same ones we humans have created), the human is still at the center of these scenarios.As with most things, there's no single easy answer to a problem. This remains true here in this conversation as we ended up talking about the ethical lines drawn around how and where we can study the how/when/why people (bad actors) act when presented with a a variety of opportunities to take advantage of a situation. Is it OK to track bad actors and their behavior? How far can that be taken? Can we do like the ancient Egyptians and lock someone in our cyber tomb if we catch them in a place they shouldn't be?Regardless of your position on this matter, we bring this episode to you "em hotep."____________________________GuestsC. Jordan HowellOn LinkedIn | https://www.linkedin.com/in/c-jordan-howell-39ba4718b/On Twitter | https://twitter.com/Dr_CybercrimeChris SandersOn LinkedIn | https://www.linkedin.com/in/chrissanders88/On Twitter | https://twitter.com/chrissanders88William PalafoxOn LinkedIn | https://www.linkedin.com/in/williamjpalafox/On Twitter | https://twitter.com/wpalafox91____________________________This Episode's SponsorsHITRUST: https://itspm.ag/itsphitwebImperva: https://itspm.ag/rsaarchweb____________________________ResourcesBook | Intrusion Detection Honeypots: Detection through Deception: https://www.amazon.com/dp/1735188301/____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-securityAre you interested in sponsoring an ITSPmagazine Channel?
Matthias Fey is the creator of the Pytorch Geometric library and a postdoctoral researcher in deep learning at TU Dortmund Germany. He is a core contributor to the Open Graph Benchmark dataset initiative in collaboration with Stanford University Professor Jure Leskovec. 00:00 Intro 00:50 Pytorch Geometric Inception 02:57 Graph NNs vs CNNs, Transformers, RNNs 05:00 Implementation of GNNs as an extension of other ANNs 08:15 Image Synthesis from Textual Inputs as GNNs 10:48 Image classification Implementations on augmented Data in GNNs 13:40 Multimodal Data implementation in GNNs 16:25 Computational complexity of GNN Models 18:55 GNNAuto Scale Paper, Big Data Scalability 24:39 Open Graph Benchmark Dataset Initiative with Stanford, Jure Leskovec and Large Networks 30:14 PyG in production, Biology, Chemistry and Fraud Detection 33:10 Solving Cold Start Problem in Recommender Systems using GNNs 38:21 German Football League, Bundesliga & Playing in Best team of Worst League 41:54 Pytorch Geometric in ICLR and NeurIPS and rise in GNN-based papers 43:27 Intrusion Detection, Anomaly Detection, and Social Network Monitoring as GNN implementation 46:10 Raw data conversion to Graph format as Input in PyG 50:00 Boilerplate templates for PyG for Citizen Data Scientists 53:37 GUI for beginners and Get Started Wizards 56:43 AutoML for PyG and timeline for Tensorflow Version 01:02:40 Explainability concerns in PyG and GNNs in general 01:04:40 CSV files in PyG and Structured Data Explainability 01:06:32 Playing Bass, Octoberfest & 99 Red Balloons 01:09:50 Collaboration with Stanford, OGB & Core Team 01:15:25 Leaderboards on Benchmark Datasets at OGB Website, Arvix Dataset 01:17:11 Datasets from outside Stanford, Harvard, Facebook etc 01:19:00 Kaggle vs Self-owned Competition Platform 01:20:00 Deploying Arvix Model for Recommendation of Papers 01:22:40 Future Directions of Research 01:26:00 Collaborations, Jurgen Schmidthuber & Combined Research 01:27:30 Sharing Office with a Dog, 2 Rabbits and How to train Cats
Anthony Eisenman is a blackbelt salesperson. Overcoming adversity as a child, Anthony knew that he wasn't going to live life by society's expectations. While initially struggling with how to make it in the world and create opportunities for himself, Anthony was able to generate significant income by following a path that he created for himself. He is at the top of the game and his field. He is a National Account Manager for NAVCO where he specializes in IP Video, Cloud Access, and Intrusion Detection as well as a top 1% salesperson, generating over $300,000,000 in revenue for several Fortune 500 companies. He is additionally a coach for up-and-coming salespeople as well as the host of his own podcast The Anthony Eisenman Show. We speak with Anthony about the value and versatility of sales skills and experience, and the many different options of fields in which salespeople can work. We speak about the different industries that exist as well as the importance of finding a company that works for your specific interests and values. We additionally discuss the importance of self-reflection, as well as the true value of setting goals and expectations for yourself as a way of honing your craft and being your best possible self. Anthony goes into depth into techniques for entering the salesforce and how to succeed in any field that you enter. What You Will Learn How to become a blackbelt salesperson Techniques for overcoming negative thought patterns How to learn more about the salesforce Different paths within the sales industry Importance of goal setting Value of honing your craft
What is a Smart Contract and NFTs? Crypto Assets Explained Part 7 Welcome to the CEO of Destiny PodcastPart 7 of our interview with our guest Mr. Jake Ryan where he shares about:What is a Smart Contract?What you need to know about NFTs?Non Fungible Tokens (NFTs) are:-Unique items-Show ownership or guarantee of an item-Works really well with digital assetsBlockchains can be used to eliminate fraudWhat is Web 3.0?About Jake Ryan:He is the founder and CIO of Tradecraft Capital, which runs a macro/thesis driven crypto fund. He brings 20 years of expertise in software development to the world of crypto asset investing. Jake is also an advisor to several venture-backed startups, a mentor at Mucker Capital, an advisor at Hypothesis Ventures and a strategic advisor at Diversis Capital, a private equity firm.Jake earned a BS in computer science from the University of Texas at Austin. He is a 1st author of published work in the field of applying artificial intelligence to network security, “Intrusion Detection with Neural Networks”, which has over 700 Google Scholar Citations.Jake's book, Crypto Asset Investing in the Age of Autonomy, is published by Wiley. He lives in Austin with his wife and young son.Connect with Jake:Twitter: @tradecraftjakeInstagram: @tradecraftjakeLinkedIn: jakeryanBook: https://ageofautonomy.com/Crypto Firm: https://www.tradecraft.capital/Thanks for listening!Let me know your thoughts and leave a note on the comment section below.Don't forget to subscribe to iTunes!Leave a review on iTunes. Your rate and review will be a great help and I read each one. SUBSCRIBE to my YouTube Channel! What is a Smart contract and NFTs? FREE download: 11 Secret's about your Destiny Connect with me: @ceoofdestiny
How to Invest in Crypto Assets I Crypto Assets ExplainedPart 6 Welcome to the CEO of Destiny Podcast with our guest Mr. Jake Ryan.This exciting episode where he shares about:-Sound Money as Investment-Autonomous protocols and platforms (Ethereum & Solana)-Governance Tokens ex. Compound-Technology-Wallets and ExchangesAbout Jake Ryan:He is the founder and CIO of Tradecraft Capital, which runs a macro/thesis driven crypto fund. He brings 20 years of expertise in software development to the world of crypto asset investing. Jake is also an advisor to several venture-backed startups, a mentor at Mucker Capital, an advisor at Hypothesis Ventures and a strategic advisor at Diversis Capital, a private equity firm.Jake earned a BS in computer science from the University of Texas at Austin. He is a 1st author of published work in the field of applying artificial intelligence to network security, “Intrusion Detection with Neural Networks”, which has over 700 Google Scholar Citations.Jake's book, Crypto Asset Investing in the Age of Autonomy, is published by Wiley. He lives in Austin with his wife and young son.Connect with Jake:Twitter: @tradecraftjakeInstagram: @tradecraftjakeLinkedIn: jakeryanBook: https://ageofautonomy.com/Crypto Firm: https://www.tradecraft.capital/Thanks for listening!Let me know your thoughts and leave a note on the comment section below.Don't forget to subscribe to iTunes!Leave a review on iTunes. Your rate and review will be a great help and I read each one. SUBSCRIBE to my YouTube Channel! INVESTING IN CRYPTO ASSETS FREE download: 11 Secret's about your Destiny Connect with me: @ceoofdestiny
“The Best Crypto Resources” Crypto Assets ExplainedPart 5 This exciting episode where our guest Mr. Jake Ryan shares the best resources on crypto such as:BOOKS:- Crypto Assets- Age of Cryptocurrency- The Bitcoin Standard- Technological Revolution on Financial CapitalPODCASTS:- The Quiet Master of Cryptocurrency- Unconfirmed & Unchained Podcast- Blockchain and Cryptocurrency OTHER RESOURCES:- Telegraph- RedditAbout Jake Ryan:He is the founder and CIO of Tradecraft Capital, which runs a macro/thesis driven crypto fund. He brings 20 years of expertise in software development to the world of crypto asset investing. Jake is also an advisor to several venture-backed startups, a mentor at Mucker Capital, an advisor at Hypothesis Ventures and a strategic advisor at Diversis Capital, a private equity firm.Jake earned a BS in computer science from the University of Texas at Austin. He is a 1st author of published work in the field of applying artificial intelligence to network security, “Intrusion Detection with Neural Networks”, which has over 700 Google Scholar Citations.Jake's book, Crypto Asset Investing in the Age of Autonomy, is published by Wiley. He lives in Austin with his wife and young son.Connect with Jake:Twitter: @tradecraftjakeInstagram: @tradecraftjakeLinkedIn: jakeryanBook: https://ageofautonomy.com/Crypto Firm: https://www.tradecraft.capital/Thanks for listening!Let me know your thoughts and leave a note on the comment section below.Don't forget to subscribe to iTunes!Leave a review on iTunes. Your rate and review will be a great help and I read each one. SUBSCRIBE to my YouTube Channel! THE BEST CRYPTO RESOURCES FREE download: 11 Secret's about your Destiny Connect with me: @ceoofdestiny
“Long-Wave Economic Cycles” Crypto Assets ExplainedPart 4 This episode is Part 4 of the CEO of Destiny Podcast where we interview our guest Mr. Jake Ryan and he talks about Long-Wave Economic Cycles. You'll learn:- What is Long Wave Economic Cycles - Crypto Assets Explained? - What is Unfunded liability? - How they can select investments? - What is the difference of just working a job and just putting your money in the bank? - What is the importance of evaluating investment class? - What is blockchain?About Jake Ryan:He is the founder and CIO of Tradecraft Capital, which runs a macro/thesis driven crypto fund. He brings 20 years of expertise in software development to the world of crypto asset investing. Jake is also an advisor to several venture-backed startups, a mentor at Mucker Capital, an advisor at Hypothesis Ventures and a strategic advisor at Diversis Capital, a private equity firm.Jake earned a BS in computer science from the University of Texas at Austin. He is a 1st author of published work in the field of applying artificial intelligence to network security, “Intrusion Detection with Neural Networks”, which has over 700 Google Scholar Citations.Jake's book, Crypto Asset Investing in the Age of Autonomy, is published by Wiley. He lives in Austin with his wife and young son.Connect with Jake:Twitter: @tradecraftjakeInstagram: @tradecraftjakeLinkedIn: jakeryanBook: https://ageofautonomy.com/Crypto Firm: https://www.tradecraft.capital/Thanks for listening!Let me know your thoughts and leave a note on the comment section below.Don't forget to subscribe to iTunes!Leave a review on iTunes. Your rate and review will be a great help and I read each one. SUBSCRIBE to my YouTube Channel! LONG-WAVE ECONOMIC CYCLES FREE download: 11 Secret's about your Destiny Connect with me: @ceoofdestiny
Part 3 of this exciting episode with our guest Jake Ryan where he shares: Knowledge Doubling Curve Learning and Unlearning Why saving is the most unsafe and risky thing to do? Why it's too big to pay back debt? About Jake Ryan: He is the founder and CIO of Tradecraft Capital, which runs a macro/thesis driven crypto fund. He brings 20 years of expertise in software development to the world of crypto asset investing. Jake is also an advisor to several venture-backed startups, a mentor at Mucker Capital, an advisor at Hypothesis Ventures and a strategic advisor at Diversis Capital, a private equity firm. Jake earned a BS in computer science from the University of Texas at Austin. He is a 1st author of published work in the field of applying artificial intelligence to network security, “Intrusion Detection with Neural Networks”, which has over 700 Google Scholar Citations. Jake's book, Crypto Asset Investing in the Age of Autonomy, is published by Wiley. He lives in Austin with his wife and young son.
“What is a Double Coincidence of Wants?” Crypto Assets ExplainedPart 2 Part 2 of this exciting episode with our guest Jake Ryan where he shares:What is a Double Coincidence of Wants?What is money?Function of Money? How money is created ?About Jake Ryan:He is the founder and CIO of Tradecraft Capital, which runs a macro/thesis driven crypto fund. He brings 20 years of expertise in software development to the world of crypto asset investing. Jake is also an advisor to several venture-backed startups, a mentor at Mucker Capital, an advisor at Hypothesis Ventures and a strategic advisor at Diversis Capital, a private equity firm.Jake earned a BS in computer science from the University of Texas at Austin. He is a 1st author of published work in the field of applying artificial intelligence to network security, “Intrusion Detection with Neural Networks”, which has over 700 Google Scholar Citations.Jake's book, Crypto Asset Investing in the Age of Autonomy, is published by Wiley. He lives in Austin with his wife and young son.Connect with Jake:Twitter: @tradecraftjakeInstagram: @tradecraftjakeLinkedIn: https://www.linkedin.com/in/jakeryanBook: https://ageofautonomy.com/Crypto Firm: https://www.tradecraft.capital/Thanks for listening!Let me know your thoughts and leave a note on the comment section below.Don't forget to subscribe to iTunes!Leave a review on iTunes. Your rate and review will be a great help and I read each one. SUBSCRIBE to my YouTube Channel! What is a Double Coincidence of Wants? FREE download: 11 Secret's about your Destiny Connect with me: @ceoofdestiny
What is a hedge fund? In this episode we get a little of Jake's origin story in investing as well as define what is a hedge fund? About Jake Ryan: He is the founder and CIO of Tradecraft Capital, which runs a macro/thesis driven crypto fund. He brings 20 years of expertise in software development to the world of crypto asset investing. Jake is also an advisor to several venture-backed startups, a mentor at Mucker Capital, an advisor at Hypothesis Ventures and a strategic advisor at Diversis Capital, a private equity firm. Jake earned a BS in computer science from the University of Texas at Austin. He is a 1st author of published work in the field of applying artificial intelligence to network security, “Intrusion Detection with Neural Networks”, which has over 700 Google Scholar Citations. Jake's book, Crypto Asset Investing in the Age of Autonomy, is published by Wiley. He lives in Austin with his wife and young son.
Learn the skills that employers are looking for in a growing industry with RITx. More details here https://tidd.ly/3mq2V3e (https://tidd.ly/3mq2V3e)
In this interview we speak with Tim Jones, Managing Director and Stefan Prandl, Chief Technology Officer of Hyprfire. Hyprfire is an Australian cybersecurity start-up which has innovated the application of Power Law Statistical Distributions and Behavioural Analytics to achieve effective, real-time network anomaly detection. Get a copy of the Firebug Whitepaper here www.hyprfire.com/whitepaper #cybersecurity #networkdetection #IDS To view the MySec.TV interview - visit https://youtu.be/JEg8z0ndtWI
hello everyone my name is vijay kumar Devireddy and i am glad to have you back on my episode 14 today we are discussing about What is an IDS?Well, an IDS stands for the Intrusion Detection System.This is a device or a piece of software that's installed on a system or a network,and it will analyze all of the data that passes through it.It does this so that it can try to identify any incidents or attacks.Intrusion Detection Systems come in two different varieties,the host-based Intrusion Detection System and the network-based Intrusion Detection System.The first one we're going to talk about is a host-based Intrusion Detection System,also called an H-I-D-S.This usually takes the form as a piece of software that's installed on your computer or on a server and it will protect it.Now, the host-based Intrusion Detection System will sit there and log everything that it thinks is suspicious.We'll talk about what might be suspicious in just a moment.The second type is what's known as a network-based Intrusion Detection System,or a NIDS, N-I-D-S.This is a piece of hardware that's installed on your network.And all the traffic goes through that switch,and then it will get a copy of that sent down to the Network Intrusion Detection System.If it's suspicious, it'll log it and it'll alert on it.Now, how do we know what these systems will alert on?Well, they're going to use one of three different methods.They're either going to use signature-based,policy-based, or anomaly-based detection.Signature-based detection is where the system is looking for a specific string of bytes that'll trigger the alert.This works like any other signature-based product.This computer is going to continually search over and over for a known specific key.And any time it sees that combination of letters or bytes,it knows that it's malicious.It'll flag it and it will alert on it.The next type is what's known as policy-based detection.This is going to rely on a specific declaration of the security policy.For example, if your company has a policy that no one is allowed to use Telnet,any time this system sees somebody trying to connect on port 23, which is the port for Telnet,it's going to flag it,log it, and alert on it The third type is statistical anomaly-based detection. Often, this is referred to as just anomaly-based detection or statistical-based detection.This is going to analyze all of the current traffic patterns against an established baseline,and anytime it sees something that goes outside the statistical norm,it's going to alert on it.So if I've been watching your network for a while and I know what normal looks like,and everybody always works from nine in the morning until five in the afternoon,and now I start seeing somebody downloading large amounts of data around two o'clock in the morning,that's outside our normal baseline and we would flag that and alert on that.Now, speaking of alerts,let's talk about what these alerts me There are four different types of alerts.They're either true positive, true negative,false positive, or false negative.Now, a true positive means something bad happened and the system flagged it and alerted on it.That's good because it means our system is tuned properly.A true negative means something good or normal happened and the system didn't flag it.Again, that's good,because our system's working like it should.But when we get into something like false positives,this is where some legitimate activity is being as identified as an attack.For example, if you log on the computer and you start up Microsoft Word, that's authorized.But if the system thought that was malicious and flagged it and alerted on it,that's considered a false positive.Now, next we have what's called a false negative.This is when something bad happens but it's identified as legitimate activity.In other words, it isn't flagged and it wasn't alerted on.
SHOW: Season 1, Show 4OVERVIEW: From the creators of the Internet's #1 Cloud Computing podcast, The Cloudcast, Aaron Delp (@aarondelp) and Brian Gracely (@bgracely) introduce this new podcast, Cloudcast Basics. What does security mean in the cloud? Data Protection (Encryption), Key Management, Firewalls, Intrusion Detection, IAM (Authentication, SSO, etc.), Monitoring/Threat-DetectionHow is security allocated? “Defense-in-Depth”, many layers of protecting the network, protecting data, protecting APIs, preventing service denials, managing users/accountsHow was security allocated before cloud computing? What does the cloud computing provider do with a security offering (responsibilities vs. customer responsibilities? Lots of variety, depending on the serviceWhy are there so many variations of security? (the entire stack needs to be secured, from infrastructure to applications to user interactions)Does it matter where the security is located? How do clouds organize the security (availability zones, regions, etc.)?How much does security cost in the cloud? What are the various ways you can buy security? Native services vs. 3rd-party services.Examples:AWS - https://aws.amazon.com/products/security/Azure - https://azure.microsoft.com/en-us/product-categories/security/Google Cloud - https://cloud.google.com/securityOracle Cloud - https://www.oracle.com/security/IBM Cloud - https://www.ibm.com/cloud/securitySUBSCRIBE: Please subscribe anywhere you get podcasts (Apple Podcasts, Google Podcasts, Spotify, Stitcher, Amazon Music, Pandora, etc.).CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotwLEARNING CLOUD COMPUTING:Here are some great places to begin your cloud journey, if you're interested in getting hands-on experience with the technology, or you'd like to build your skills towards a certification. CBT Nuggets - Training and CertificationsA Cloud Guru - Training and CertificationsCloud Academy - Training and CertificationsKatakoda - Self-Paced, Interactive LearningGitHub - Code Samples and CollaborationFEEDBACK?Web: Cloudcast Basics Email: show at cloudcastbasics dot netTwitter: @cloudcastbasics
Using semi-supervised learning, I propose an anomaly-based network intrusion detection system (NIDS) to detect and classify anomalous and/or malicious traffic. With this proposed machine learning approach, we detect botnet traffic and distinguish it from the normal and background traffic in the IPv4 flow datasets. I evaluate the prediction performance results for the flow-based NIDS algorithms. I show an improvement in detection accuracy and reduction in error rates, when compared with signature-based NIDS and previous studies. About the speaker: Dr. Nandi Leslie is an Engineering Fellow at Raytheon Technologies, serving as an Applied Mathematician and Principal Investigator at the U.S. Combat Capabilities Development Command/Army Research Laboratory (ARL)customer, since 2015. She supports the Raytheon Intelligence and Space business area and ARL on research and development projects related to machine learning, and cyber and electromagnetic activities. Dr. Leslie has published over 40papers in journal, conference proceedings, magazines, and government technical reports on machine learning,cybersecurity, network resilience, submarine security, and mathematical biology with over 375 citations. She has given over 30 research talks at national and international conferences in both unclassified and classified settingsBefore joining Raytheon, Dr. Leslie led and contributed to multi-target tracking projects at Systems Planning and Analysis, Inc. from 2007 to 2015. In this role, she served as Program Manager and Senior Operations Research Analyst, and she developed modeling approaches for the U.S. Navy Submarine Security Program, Office of the Secretary of Defense (OSD), and Joint Program Offices, using stochastic processes, to understand various tactical problems in different domains; such as submarine search and detection in oceanographic and atmospheric environmental conditions for the Navy, and damage assessments and remediation of cyber attacks to the Defense Industrial Base for OSD. In addition, she spent two years as a Lecturer and Postdoctoral Researcher at the University of Maryland, College Park in Department of Mathematics from 2005 to 2007. She earned her Ph.D. in Applied and Computational Mathematics from Princeton University in 2005, where her research focused on developing and analyzingspatially-explicit stochastic models of deforestation in forest ecosystems of the Neotropics.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Ransomware As a Service https://isc.sans.edu/forums/diary/Ransomware+as+a+Service/23277/ libcurl Vulnerability http://seclists.org/oss-sec/2018/q1/94 Hide 'N Seek IoT Botnet https://labs.bitdefender.com/2018/01/new-hide-n-seek-iot-botnet-using-custom-built-peer-to-peer-communication-spotted-in-the-wild/ Container Intrusions: Assessing the Efficacy of Intrusion Detection and Analysis Methods for Linux Container Environments https://www.sans.org/reading-room/whitepapers/detection/container-intrusions-assessing-efficacy-intrusion-detection-analysis-methods-linux-container-environments-38245
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
vSphere Data Protection Known SSH Key http://www.vmware.com/security/advisories/VMSA-2016-0024.html nmap Update https://nmap.org/download.html SCCM Software Metering https://www.fireeye.com/blog/threat-research/2016/12/do_you_see_what_icc.html CryptXXX Version 3 Decryptor Available https://noransom.kaspersky.com Airline Inflight Entertainment System Hack http://blog.ioactive.com/2016/12/in-flight-hacking-system.html SEC503, Intrusion Detection in Depth: Brussles January 16th-21st 2017 https://www.sans.org/event/brussels-winter-2017/course/intrusion-detection-in-depth