Blog

Giving incident responders deeper context about what happened

Posted by Cognito on Jun 4, 2018 9:54:43 AM

If you’re joining me for the first time, I want to introduce myself. I am Cognito, the AI cybersecurity platform from Vectra. My passion is hunting-down cyberattackers – whether they’re hiding in data centers and cloud workloads or user and IoT devices.

Cybersecurity analysts are overwhelmed with security events that need to be triaged, analyzed, correlated and prioritized. If you’re an analyst, you probably have some incredible skills but are being held back by tedious, manual work.

Read More »

Topics: AI, cybersecurity, Cyberattacks, Threat Detection, Data Center, cloud, network security, IoT, Malware Attacks


How algorithms learn and adapt

Posted by Sohrob Kazerounian on May 24, 2018 12:59:06 PM

There are numerous techniques for creating algorithms that are capable of learning and adapting over time. Broadly speaking, we can organize these algorithms into one of three categories – supervised, unsupervised, and reinforcement learning.

Supervised learning refers to situations in which each instance of input data is accompanied by a desired or target value for that input. When the target values are a set of finite discrete categories, the learning task is often known as a classification problem. When the targets are one or more continuous variables, the task is called regression.

Read More »

Topics: AI, machine learning


AI vs. machine learning

Posted by Sohrob Kazerounian on Apr 26, 2018 2:54:47 PM

“The original question ‘Can machines think?’ I believe to be too meaningless to deserve discussion. Nevertheless, I believe that at the end of the century, the use of words and general educated opinion will have altered so much that one will be able to speak of machines thinking without expecting to be contradicted.” – Alan Turing

Read More »

Topics: AI, machine learning


The rise of machine intelligence

Posted by Sohrob Kazerounian on Apr 10, 2018 8:35:27 AM

Can machines think?

The question itself is deceptively simple in so far as the human ability to introspect has made each of us intimately aware of what it means to think.

Read More »

Topics: AI, machine learning, alan turing


The alarming surge in cryptocurrency mining on college campuses

Posted by Chris Morales on Mar 29, 2018 12:01:00 AM

While ransomware attacks like NotPetya and WannaCry were making headlines (and money) in 2017, cryptocurrency mining was quietly gaining strength as the heir apparent when it comes to opportunistic behaviors for monetary gain.

Read More »

Topics: cryptojacking, cryptocurrency, bitcoin, Cyberattacks, cybersecurity


Alan Turing and the birth of machine intelligence

Posted by Sohrob Kazerounian on Mar 15, 2018 10:32:29 AM

“We may compare a man in the process of computing a real number to a machine which is only capable of a finite number of conditions…” – Alan Turing

 

It is difficult to tell the history of AI without first describing the formalization of computation and what it means for something to compute. The primary impetus towards formalization came down to a question posed by the mathematician David Hilbert in 1928.

Read More »

Topics: AI, machine learning, alan turing


Attackers can use your admin tools to spy, spread, and steal

Posted by Cognito on Jan 26, 2018 10:32:23 AM

In my last blog, I spoke about a financial customer performing pen testing and how I helped the blue team detect the red team as it carried-out an attack. I’m back again today with another story from the trenches.

This time, I’ve been working with a customer in the manufacturing sector who recently deployed me. As before, this customer prefers to remain anonymous to keep cybercriminals in the dark about their newly developed security capabilities. To stay on top of their game, they routinely run red team exercises.

Read More »

Topics: AI, cybersecurity, Cyberattacks, Threat Detection, Data Center, red team, blue team, cloud, network security, IoT, attacker behavior


Vectra is positioned as the sole visionary in the 2018 Gartner Magic Quadrant for IDPS

Posted by Chris Morales on Jan 12, 2018 9:11:39 AM

Vectra® was recently positioned as the sole Visionary in the Gartner 2018 Magic Quadrant for Intrusion Detection and Prevention Systems (IDPS). I’m pretty ecstatic about that.                                                                                                 

Over the years, intrusion detection systems (IDS) have converged with intrusion prevention systems (IPS) and the two are now known collectively as IDPS. This convergence occurred as the security industry focused more on preventing external threat actors.

Read More »

Topics: network traffic, cybersecurity, IDPS, Intrusion detection prevention systems, gartner, AI, security operations centers


BGP hijackers: “This traffic is going to Russia!”

Posted by Chris Morales on Dec 14, 2017 2:11:27 PM

Traffic sent to and from major internet sites was briefly rerouted to an ISP in Russia by an unknown party. The likely precursor of an attack, researchers describe the Dec. 13 event as suspicious and intentional.

According to BGPMON, which detected the event, starting at 04:43 (UTC) 80 prefixes normally announced by several organizations were detected in the global BGP routing tables with an Origin AS of 39523 (DV-LINK-AS), out of Russia.

Read More »

Topics: russia, HTTPS, network traffic, internet traffic, cybersecurity, espionage, Encryption, BGP, ssl, tls, BGP hijack


A sinuous journey through ``tensor_forest``

Posted by Sophia Lu on Dec 11, 2017 11:45:30 AM

Random forest, an ensemble method

The random forest (RF) model, first proposed by Tin Kam Ho in 1995, is a subclass of ensemble learning methods that is applied to classification and regression. An ensemble method constructs a set of classifiers – a group of decision trees, in the case of RF – and determines the label for each data instance by taking the weighted average of each classifier’s output.

The learning algorithm utilizes the divide-and-conquer approach and reduces the inherent variance of a single instance of the model through bootstrapping. Therefore, “ensembling” a group of weaker classifiers boosts the performance and the resulting aggregated classifier is a stronger model.

Read More »

Topics: machine learning, tensor forest, AI, Data Science, tensorflow


Subscribe to the Vectra Blog



Recent Posts

Posts by Topic

Follow us