Artificial Reality | The PatternEx Blog

Uday Veeramachaneni

Uday Veeramachaneni

Recent Posts by Uday Veeramachaneni:

Introducing the PatternEx Virtual Analyst Platform

Humans and computers need to work together to identify evolving cyberattack patterns buried in our data.

How machine learning creates virtual analysts

The security industry has done a great job of creating a lot of noise around the rise of “machine learning” or “artificial intelligence.” The industry says that rules are the problem—too many missed attacks and false alarms—and that machine learning is the answer.

Topics: Artificial Intelligence machine learning

PatternEx Named One of  SINET's 16 “Most Innovative Cybersecurity Companies”

We value research and analysis at PatternEx, and we respect when cybersecurity experts weigh in on research or emerging technology. So it is with great honor that we announce that the Security Innovation Network (SINET) has named PatternEx as one of its 16 most innovative companies of 2017.

Topics: PatternEx News SINET16

The Revolution of Learning Systems

Like living things, technologies evolve to better suit the needs of their environment—in this case, the security intelligence space. Others have made this point but there is an evolution from rules based approaches to analytic approaches (e.g. SIEM to UEBA).

Technology solutions require the work of experts like product managers, engineers and data scientists to evolve. What they don’t do is improve automatically from the user feedback. The real trick in Security Intelligence is to get the supervised learning models to update automatically, without the need for a data scientist. Pull this off, and you have built a system that evolves on its own—a system that learns

Topics: machine learning

Three Key Questions for Your UEBA Vendor

Security teams in organizations on a calendar fiscal year are already in the throes of discussing next year's budget. Are there tools that have reached obsolescence? Are there tools we haven’t used in the last two quarters? Which of our tools have helped us spot an actual attack before data exfiltration?

Topics: UEBA

Moving from Tools Collection to Knowledge Collection with Human-Assisted AI

Recently a CISO of a Fortune 500 company lamented that their infosec team had active licenses for over 80 different security tools. Most were point solutions, built for a specific task such as a firewall or WAF, and all generated log data. There were a few SIEM’s that aggregated and normalized data, and made it searchable. Some were tools that tried to analyze that data.

Topics: Industry Insights Knowledge Collection

The True InfoSec Talent Gap

We don't need more InfoSec analysts to write rules and investigate rules. We need more InfoSec analysts to train Artificial Infrastructures to detect attacks.

Topics: Artificial Intelligence Virtual Analysts

The Goal of PatternEx

Our goal, when founding PatternEx, was to develop a system that mimics a human InfoSec Analyst’s intuition and expertise in real time and at scale.

Topics: AI^2 Virtual Analysts

InfoSec: Cut Your False Positives to Zero?

Reducing False Positives

A question we’re often asked is whether PatternEx can reduce false positives, and if so, by how much?

It’s an interesting question. My flip answer is: Sure, we can reduce false positives to zero. We just won’t show anything. But, then you’ll of course miss everything. So here’s the more serious answer:

Topics: Industry Insights Artificial Intelligence False Positives

Artificial Intelligence for InfoSec: The PatternEx Foundation

Uday Veeramachaneni is Founder and CEO of PatternEx

Ever wonder why, with all the talent, technology and financial resources being dedicated to protecting enterprise data, the volume and sophistication of intrusions and frauds continue to escalate?  

Back in September 2013, fresh from the WAF world, my co-founder Vamsi Korrapati and I struggled with this question. It was a relevant question then, and, as today’s headlines evidence, it has become even more important today. As we dug deeper, we spoke with a number of InfoSec leaders and engineers and we evaluated every security technology they use. Through this, we gained an interesting insight into the way security organizations work today.

Topics: Artificial Intelligence CyberSecurity