Artificial Reality | The PatternEx Blog

Collections of the thoughts and the people behind the PatternEx Virtual Analyst Platform powered by AI2.

Detecting Lateral Movement with Data Science Sugar

Detecting Lateral Movement Webinar - a review of key use cases, data science sugar, and other interesting things we discussed in our latest webinar series.

AI SOC: All About the People

AI Enabled SOCs will change how people, process, and technology perform together more efficiently.

Data Exfil: AI Based Detection

Cloud based services like Gmail, Twitter and Facebook have emerged as another vector for data exfiltration and command and control (C2) attacks, and attacks through these channels are harder to detect and block. Here's how an AI solution can help.

AI Not Optional for the SOC

With the recent flood of cyber breaches, everyone is looking for answers to stop this seemingly unending cycle of attacks. The current model of multi-tier SOC analysts, SIEM, and basic ML alone is not our future. AI is no longer an option, but a requirement to keep up with threat volume and sophistication. Read more from our guest author, VP IT Security at a leading hospitality company.

Can MDR's save the enterprise from security threats?

MDRs path to a smarter SOC to help enterprises solve security issues more cost effectively.

An Overview of AI for Security Pros: Lessons Learned from our Webinar

Get an overview of our recent webinar, "An Overview of AI for Security Pros," where we covered two of the critical elements of data science/AI applied to infosec -- labeling and data variety.

Is Trust Breaking Out?

There has been an infosec mantra for years in the US about the need for a public - private partnership. However, private sector organizations have long complained about the one-way flow of security data and information. A key ingredient has often been missing -- trust. Is that starting to change?

Changing Business Considerations for MSSPs: Saying Goodbye to Soda Straw Views

As the threat landscape has evolved (e.g., increased number and size of DDoS attacks), MSSPs are being forced by the market to evolve their service offerings. It simply is no longer acceptable for an MSSP to manage perimeter firewalls, a couple of Internet-facing applications, and perhaps a couple of important internal systems (e.g., Active Directory domain controllers). Why not? Because such (effectively) stand alone ‘soda straw’ views do not provide the MSSP (nor the customer) with the context needed to be able to detect today’s sophisticated attacks.

Finding Cryptocurrency Mining Malware

2017 was the year of ransomware. 2018 is already shaping up to be the year of cryptocurrency mining malware. Are you prepared for this threat? How well can you detect this new threat?

Complementing Your Current SIEM Implementation

Machine learning's modeled behaviors can compliment your existing SIEM implementation by allowing your SOC to detect unknown unknowns, while your SIEM's correlations effectively detect known unknowns.
Load More

Subscribe Now