Project Blackfin: Automated Breach Detection Using Intelligent Agents

December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Spotlight

XTREMEFORENSICS

The roots of XtremeForensics can be traced back to 1994 when the first version of what is now ILooK was being distributed to the intelligence community of MI-5 and MI-6 in the UK. Over the next few years ILooK was only available to a subscribed user base of Law Enforcement, Intelligence Services and the Military. By 2002 ILooK was being used in 67 countries and its development was being funded by various agencies in the US that included the FBI, the US Department of Defence and the Treasury Department. During the 9/11 trials all digital forensic evidence introduced into Federal Court was processed using ILooK. This year also saw the creation of Perlustro to manage a 6-year contract with the US Internal Revenue Service.

OTHER WHITEPAPERS
news image

VIRSEC ® SECURITY PLATFORM

whitePaper | December 10, 2019

Advanced application attacks that weaponize at runtime (WRT) are increasingly putting businesses at risk. These attacks challenge application security by leveraging fileless malware, memory corruption and uncommon vulnerabilities to evade traditional security solutions. WRTs manipulate legitimate processes and enable stealthy execution of malicious code, resulting in data breaches, damaged infrastructure, and financial losses.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

IoT Application Provisioning for Security Using FDO and TPM

whitePaper | December 29, 2022

The Internet of Things (IoT) offers the appealing possibility of harnessing millions of devices that measure or modify real world things and allows processes to be optimized. There are many opportunities: thermostats optimized for tomorrow’s weather, shipping containers optimized for packing before their contents arrive, assembly lines that reconfigure automatically for each item, street lighting adjusted to make streets safer, and so on.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

Cyber Security in the AC500 PLC family

whitePaper | February 7, 2023

ABB offers a comprehensive range of scalable PLCs and robust HMI control panels. Since its launch in 2006, the AC500 PLC platform has achieved significant industry recognition for delivering high performance, quality and reliability. Cyber Security has become of key importance for ABB customers and ABB alike. In order to help protect ABB customers as well as our brand, cyber security must be an important aspect in our products, systems, projects and service deliveries.

Read More
news image

Best Practices for Common Cybersecurity Threats

whitePaper | November 28, 2022

The threat of Criminal cyber activity continues to grow for organizations around the world, targeting everyone from select individuals to leading corporations and federal governments.

Read More

Spotlight

XTREMEFORENSICS

The roots of XtremeForensics can be traced back to 1994 when the first version of what is now ILooK was being distributed to the intelligence community of MI-5 and MI-6 in the UK. Over the next few years ILooK was only available to a subscribed user base of Law Enforcement, Intelligence Services and the Military. By 2002 ILooK was being used in 67 countries and its development was being funded by various agencies in the US that included the FBI, the US Department of Defence and the Treasury Department. During the 9/11 trials all digital forensic evidence introduced into Federal Court was processed using ILooK. This year also saw the creation of Perlustro to manage a 6-year contract with the US Internal Revenue Service.

Events