Using Deep Learning for Information Security – Part 2

Using Deep Learning for Information Security – Part 2

Authors: Santosh Kosgi, Mohammad Waseem, Arunabha Choudhury, and Satnam Singh Deep Learning-based methods have been successfully applied to various computer vision and NLP based problems recently [1]. AI researchers have achieved statistically significant improvements...
Using Deception to Detect and Profile Hidden Threats

Using Deception to Detect and Profile Hidden Threats

Author: Satnam Singh, Chief Data Scientist at Acalvio Technologies How do we detect and profile the adversaries who have already infiltrated and are hiding in the network? To answer this question, we need an approach that can improve the detection and provide more...
Using Deep Learning for Information Security – Part 1

Using Deep Learning for Information Security – Part 1

Authors: Balamurali A R and Satnam Singh Post Web 2.0, data generated on the internet has increased manifold. This has led to the use of data driven approaches to solve many traditional problems across different industry verticals. Among them, deep learning-based (DL)...
A Game Between Adversary and Defender

A Game Between Adversary and Defender

The motivation for this blog is a question that has been circling in my head for a long time, and I have asked this question to many security analysts: Have they played a game with an adversary? or in other words – Have they engaged with an adversary? I got...