Report: Cybersecurity in Q4 2017

The 21st century is undoubtedly the age of technology. Computers, laptops, smartphones, tablets, IoT devices, cars and also people and companies are connected to the network. It is estimated that their number will exceed 50 billion by 2020. Such a solution facilitates work and everyday life, but at the same time raises threats on a previously unknown scale. Modern cybersecurity is facing many…

Read more

Cyberattacks are a very serious hazard for companies, institutions and even private persons. Every year there are more sophisticated methods of attacks. The majority of attacks conducted in the first half of 2017 was multi-vector attacks on a large scale. Verisign reports analysis: “Distributed denial of service trends report” and Neustar: “Worldwide DDoS attacks cyber insights research…

This article is part of a series. Part I can be found here . The full code of this tutorial was posted on Github . In the previous article we walked through the process of creating a simple predictive model for detection of malicious HTTP requests. We learned how to: load and explore our datasplit the data into training, development and test setuse scikit-learn's CountVectorizer and…

This series of articles is for anyone who would like to explore the idea of using a web application firewall that is not dependent on a set of manually defined rules. We will show you how to train a machine learning model to automatically detect malicious web traffic. In the first part of this series we will describe how to explore our dataset, create the simplest predictive model and properly…

Data science is a field which currently is more frequently applied in problems which have recently been very difficult to solve. Without the correct exploration of data and algorithms of machine learning it would be hard to imagine tasks such as recognising images, speech, handwriting or gestures. Apart from these flagship standards, the work of data scientists is also used more frequently to…

Git - a version control system. It has plenty of functions which can be used for unethical purposes as well. History edition History edition is a very useful function in terms of cybersecurity. Let us imagine the following situation – the Internet website was extended by one person; a repository was kept in a git. Although it is regarded as a negative practice, passwords were kept in…

×

For media

Provide us with contact details.

Thank you