Oliver Rochford’s Post

View profile for Oliver Rochford, graphic

Evangelist @ Auguria | Technologist | Cyberfuturist | Startup Advisor | Former Gartner Analyst

Detecting and hunting evasive threats requires both fuzziness and precision. That's why SIEMs have not lived up to threat hunters' expectations, and why lean-forward teams adopt security data lakes and data science tools like python and Jupyter notebooks. But times move on, technology advances and the status quo of today becomes the legacy of tomorrow. Over the years, I've published a series of articles intended to demystify data science for security practitioners. I've written about graph analysis for visualizing cyber-attacks (https://lnkd.in/dn7BBFj), and more generally about AI in SecOps (https://lnkd.in/e6junCs5). The most powerful tool in a cyber defender's toolbox is knowledge, as you cannot use something you do not understand. That's why I am very excited about a series of articles for security folks I am writing with Auguria, Inc. in which together we will delve into the workings of vector databases and explain why we believe the next generation of SIEM-like solutions will be natively vector-based. 👉 https://lnkd.in/ekFKkGTt Stay tuned for Part II, where you can see how terrible I am at drawing. #aiincybersecurity #securityanalytics #siem #secops

  • No alternative text description for this image
Harlan Carvey

Staff Threat Intel Analyst, Adversary Tactics

4mo

"Detecting and hunting evasive threats requires both fuzziness and precision. That's why SIEMs have not lived up to threat hunters' expectations,..." I'm sorry, but I'm probably missing the connection between those two statements. Why, exactly, have SIEMs not lived up to hunter's expectations?

Evan Powell

Many time founder & 5 exits - lots of open source - now working to reimagine cyber security with deep learning

4mo

Thank you for this. Very important subject.

Tyler L.

Optimization fan.

4mo

What changes (for the better) with vector embeddings 🚫 Strict data normalization requirements 🕰️ massively inefficient searches ⬇️ time-to-value for threat research BUT! 🧮 I dare say we will still be tallying up things for many use cases, even if it’s just counts from the index in the vector db :)

George Ryder

I connect technology leaders with experienced pen testers and attack surface management solutions

4mo

oh man this is too much lmao

Yusuf Mohammed

Threat & APT Hunter | Incident Responder | Digital Forensics Examiner | Malware Analyst | Reverse Engineer | I like mind challenges and puzzles to solve | Views are my own | Share != Agreement

4mo

Looking forward for the series

Frank S.

CISO | Executive | Dipl. Ing. (FH) | CISM | CISSP | ISSAP | NSA-IAM | NSA-IEM | Six Sigma Greenbelt

4mo

Red team? :-)

Dan Spiner

GM | Business Adviser | Experienced Coach | Board Member | Investor; Helping business professionals tactfully navigate their fields.

4mo

Great to dive into this new area

Ian Tibble

Security Architect, Author, Devops, Python

3mo

SIEM is fine for this purpose

Like
Reply
Alex Hurtado

Detection Engineering Dispatch | x-IBM QRadar

4mo

Never a dull meme moment on Oliver’s page

See more comments

To view or add a comment, sign in

Explore topics