A Brief Overview of the Role of Artificial Intelligence in Cybersecurity
Editor’s Note: Dr. Sagar Samtani is a speaker for ODSC East 2022 this April 19th-21st. Be sure to check out his talk, An Overview of AI for Cybersecurity: An Overview of the Field and Promising Future Directions, there to learn more about the role of artificial... Read more
You Too Can Be a Cybersecurity Data Scientist!
Editor’s Note: John is a speaker for ODSC East 2022! Be sure to check out his talk, “You Too Can Be a Cybersecurity Data Scientist!” there! I accidentally became a cybersecurity data scientist. I was in a PhD program, nearing graduation, and I realized that my... Read more
What is Protective DNS?
Protective DNS (often referred to as PDNS) is an umbrella term for security solutions that examine DNS queries and implement safeguards to prevent systems and people from accessing internet resources that contain malicious (e.g. C2 botnets, malware, ransomware, phishing), or other undesirable content. Why now? The... Read more
Protect Your Company with the ML for Cybersecurity Track at ODSC West
The threat posed to both organizations and individuals by ransomware, malware, and trojan horses, among others, isn’t going away anytime soon. Fortunately, machine learning is helping us develop new tools and techniques for cybersecurity, from automation to threat detection, and more, to help us more effectively... Read more
8 Ways Machine Learning Can be Used in Cybersecurity
Cybersecurity has been a concern for businesses since the dawn of the internet, as hackers saw an opportunity arise instantly. Machine learning has been around for years as well. The two go hand-in-hand, as cybersecurity benefits from the automation of data collection and defense, thus making... Read more
2021 Top Trending Machine Learning Topics
Thanks to insights from our ODSC West researchers, attendees, and instructors we’ve pulled together some of the trending machine learning topics of 2021. We’re excited to host some of the leading experts and top contributors in each of these topics. Here are a few of our... Read more
How is Cross-Site Scripting Different From Other Related Attacks?
Cross-site scripting attacks are one of the most common attacks, making it rank seventh in “The OWASP Top 10” — the industry-recognized list for spreading awareness about the most common web security vulnerabilities. And then too, there are many less-known vulnerabilities that are often confused with... Read more
Building a Holistic Risk Profile: Near Real-Time Approach to Insider Threat Detection
Each year, organizations and research firms output yearly Cybersecurity Threat and Breach predictions. Due to the Covid-19 pandemic, a global shift has occurred, forcing organizations to adapt to a “new normal” that includes a more distributed remote workforce. In turn, this has greatly affected data theft.... Read more
5 Crucial Cybersecurity Guidelines to Incorporate for Your Remote Team
Ever since the COVID-19 pandemic forced organizations to shift their base to remote working, it has skyrocketed the cost of a data breach by 17,700 is lost every minute. It is thus vital to know how to spot a phishing attack before it takes place. Phishing... Read more
Applications of AI in Cybersecurity
Editor’s Note: See Dustin’s talk “Applications of AI in Cybersecurity” at ODSC West 2019. Security has historically lagged behind the implementation of new technology. With AI/ML transforming how industries and government agencies do business and serve citizens, it is critical that developers build security into our... Read more