AI’s Growing Role in Cybersecurity Post date September 19, 2024 Post author By Alex Vakulov Post categories In ai, ai-in-cybersecurity, cyber-security-automation, cybercrime, information-security, neural-networks, phishing-attacks, threat-detection
Integrating SOAR with Existing Security Systems Post date September 13, 2024 Post author By Anastasios Arampatzis Post categories In cybersecurity, cybersecurity-tools, security-automation, security-orchestration, soar, soar-integration, soc, threat-detection
Traffic-Based Anomaly Detection in Log Files Post date August 14, 2024 Post author By Sreejith Post categories In cyber-threats, cybersecurity, high-web-traffic-occurrence, spring-boot, spring-statemachine, spring-webflux, threat-detection, web-development
Error Rate-Based Anomaly Detection in Log Files Post date August 14, 2024 Post author By Sreejith Post categories In cybersecurity, programming, spring-boot, spring-statemachine, spring-webflux, threat-detection, web-development
Leveraging AI LLMs for Real-Time Threat Detection and Response Post date August 12, 2024 Post author By Manasvi Arya Post categories In ai-and-llms, ai-for-cybersecurity, ai-for-threat-detection, ai-llms-for-cybersecurity, chatgpt-for-cybersecurity, chatgpt-for-threat-detection, cybersecurity-threats, threat-detection
Keyword-Based Anomaly Detection in Log Files Post date July 29, 2024 Post author By Sreejith Post categories In anomaly-detection, anomaly-detection-in-log-files, cybersecurity, java, spring-boot, spring-statemachine, spring-webflux, threat-detection
Data Engineering: What’s the Value of API Security in the Generative AI Era? Post date July 26, 2024 Post author By Karthik Rajashekaran Post categories In ai-regulation, api-security, cybersecurity-best-practices, data-engineering, data-privacy, data-security, generative-ai, threat-detection
AI in SecOps: Transforming Cloud Security with Advanced Threat Detection Post date June 18, 2024 Post author By The Sociable Post categories In ai-cloud-security, ai-implementation, ai-in-secops, cloud-environments, secops, secops-tools, security-automation, threat-detection
Developing Cyber Resilience: How To Think Like a Forensic Investigator Post date November 26, 2021 Post author By Zen Chan Post categories In cyber-resilience, cybersecurity, nist, prevention, recovery, security, threat-detection, web-monetization, zero-trust-architecture
What Poses a Challenge to Security in a Multi-Cloud Environment Post date September 22, 2021 Post author By Check Point Software Post categories In checkpoint, cloud-security, cyber-security, good-company, it-security-policy, security, security-in-multi-cloud, threat-detection