What is Anomaly Detection in Cybersecurity?

Anomaly detection, the “identification of rare occurrences, items, or events of concern due to their differing characteristics from the majority of the processed data,” allows organizations to track “security errors, structural defects and even bank fr… Continue reading What is Anomaly Detection in Cybersecurity?

3 Keys to Defending Active Directory

While perimeter defenses like firewalls and antivirus software remain essential elements of comprehensive network defense, stopping 100% of attacks at the perimeter is an impossibility with today’s ever-evolving attack surface. Eventually, an attacker… Continue reading 3 Keys to Defending Active Directory

What are the security mechanisms deployed by existing Cloud service providers [on hold]

I am doing a masters thesis on anomaly detection in cloud environment. So I came across this question what are the security mechanisms deployed by cloud service providers.

I want to know what should I search or read to und… Continue reading What are the security mechanisms deployed by existing Cloud service providers [on hold]

There is a difference between malware detection using automata and family behavior graph?

Is there a difference between dynamic malware detection using automata and family behavior – graph?

I think that they are both relying on API function calls but I don’t understand if there is any major difference between the… Continue reading There is a difference between malware detection using automata and family behavior graph?