Vincenzo De Florio

Vincenzo De Florio

10/1/2019 · 3 min read · ~10 · 1
Anomaly detection as detection of identity drifting

Anomaly detection as detection of identity drifting

Suppose you want to detect man-in-the-middle attacks – a typical case of cybercrime in which the legit user of a system is taken over by a malicious attacker (either human or computer-based). Which machine learning would best match said...

Vincenzo De Florio

Vincenzo De Florio

Dear friend Ali 🐝 Anani, Brand Ambassador @beBee I'm so happy to hear from you ^_^ Thank you very much for your kind message and appreciation! Wishing you all the best.

16h ago
Ali 🐝 Anani, Brand Ambassador @beBee

Ali 🐝 Anani, Brand Ambassador @beBee

Dear Vincenzo De Florio= it is so great to read a buzz by you again. You highlight a great issue on how to detect noisy signals or rare signals of cybercrime or whatever the case is. I am not a programmer, but I could follow your reasoning with the help of your nice diagrams.

10/1/2019
paul wayne

paul wayne

16/5/2017 · 1 min read · ~10 · 1
To Cybersecurity and 2 more
Almost 1 Billion Added to Cyber Defense Budget

Almost 1 Billion Added to Cyber Defense Budget

The $6.7 Billion for cyberspace operations is an increase of $992 million from fiscal year 2016 to be provided to the Army, Navy, Marine Corps, Air Force, and the defense agencies to continue to:• Organize, train, and equip Cyber Mission Forces to...

Robert Straus

Robert Straus

Cyber posture increases most effectively when legislation is put into place, especially when our Defense industry is advocating this level of resilience.

21/11/2017
Robert Straus

Robert Straus

8/9/2017 · 1 min read · ~100
To Business and 2 more
The Top Four Industries Experiencing Cyber Attacks from Malicious Cyber Criminals

The Top Four Industries Experiencing Cyber Attacks from Malicious Cyber Criminals

Top four industries hackedAugust 15, 2017 by Secure360 and UMSAMany of us log onto our computers everyday unaware of the risks we face in regard to cybersecurity. Studies have shown hackers attack every 39 seconds. I don’t know about you, but that...

Carol Evenson

Carol Evenson

20/9/2016 · 2 min read · +100
To Cybercrime and 2 more
How Big Data Possess Possible Security Threats for Businesses

How Big Data Possess Possible Security Threats for Businesses

For the past decade, Youtube has ruled the online video world with the exception of a couple of smaller competitors. As it's popularity has grown, the data that it generates has begun to be measured in exabytes. Each exabyte contains a quintillion...

Members

  • Mike Tonks

    Mike Tonks

    Human Resources Professionals

    Hampshire, United Kingdom

  • Nathan Brooker

    Nathan Brooker

    Sales

    State of New South Wales, Australia

Hives