Logo of Acalvio, a leading company in cyber deception technology
Using Deep Learning for Information Security – Part 1

Using Deep Learning for Information Security – Part 1

Authors: Balamurali A R and Satnam Singh   Post Web 2.0, data generated on the internet has increased manifold. This has led to the use of data driven approaches to solve many traditional problems across different industry verticals. Among them, deep...
A Game Between Adversary and Defender

A Game Between Adversary and Defender

The motivation for this blog is a question that has been circling in my head for a long time, and I have asked this question to many security analysts: Have they played a game with an adversary? or in other words – Have they engaged with an adversary? I got...
Ransomware Command and Control Detection using Machine Learning

Ransomware Command and Control Detection using Machine Learning

Authors: Deepak Gujraniya, Mohammad Waseem, Balamurali AR, and Satnam Singh Since the first attack in 1989 [1], ransomware attacks have gained popularity. Especially in 2017, it has created havoc in every possible industry, including the government offices,...
Beyond the Hype: AI in Information Security

Beyond the Hype: AI in Information Security

In the next few years, Artificial Intelligence (AI) will transform and expand as a decision engine across every enterprise business layer from product development to operations to finance to sales. While, internet biggies like Google, Facebook, Microsoft and Saleforce...
Loading...