Virtually Yours..

Iftekhar's blog on Technologies touching lives

Artificial Intelligence and Machine Learning for NextGen Threat Protection

Traditionally detecting and responding to cyber threats always relied on understanding precedence, matching patterns, writing definitions and configuring rules based actions for mitigations. Given the kind of sophistications, polymorphism and expedited rate of change in threat landscape seen nowadays, traditional methods involving human touch at each and every point proving to be inadequate and inefficient…. Read more

The Game of Phishing – How to beat your Opponent

With more than 1.4 Billion clear text user credentials accumulated and up for grabs in the dark web clearly indicates that the hunt for credentials from genuine users/Organizations is the most important phase of the the cyber kill chain. Verizon Data Breach Investigation report 2017 says that 81% of breaches that have occurred involved compromised… Read more