Cybersecurity
-
Extending Spark for improved performance in handling multiple search terms
9 min read -
Utilizing Sigma rules for anomaly detection in cybersecurity logs: A study on performance optimization
13 min read -
A Practical guide to optimizing non-equi joins in Spark
8 min read -
Unleashing the Power of SQL Analytical Window Functions: A Deep Dive into Fusing IPv4 Blocks
AnalyticsHow to summarize a geolocation table by merging contiguous network IPv4 blocks
7 min read -
Containerisation is now the de facto means of deploying many applications, with Docker being the…
9 min read -
-
Easily deploy Sigma rules in Spark streaming pipelines: a future-proof solution supporting the upcoming Sigma…
14 min read -
This article discusses a mindset on building production-ready machine learning solutions when applied to cyber-security…
14 min read -
Evaluation of Transformer Neural Network Modeling Methodologies applied to Behavior Malware Traces.
13 min read