Nov 18, 2021
75 Views
0 0

Decoding the Data Ocean: Security Threat Context & Natural Language Processing

Written by

Newsletter
Join thousands of people who receive the latest breaking cybersecurity news every day.
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Webinar
Live Event
REGISTER TODAY! Join security researchers Erick Galinkin of Rapid7 and Izzy Lazerson of IntSights, as they discuss how non-experts can supercharge threat intelligence efforts with natural language processing.
GoToWebinar
Start Date:December 14, 2021 at 11:00 AM ET
Share:
There’s a sea of unstructured data on the internet relating to the latest security threats:  Threat intelligence reports, tweets, vendor advisories, news sources and many, many other sources. Imagine if you could parse this constant deluge of new information in real time, to discover and add new context to specific cybersecurity threats that impact your business?
That’s possible with natural language processing, or NLP.
Unlike rules-based systems, which work well for specific tasks on structured data within your perimeter, NLP can process and analyze large amounts of data at once — which is a feature that’s already proved its mettle in a variety of settings from translation to chatbots. NLP can also can be of enormous value for cybersecurity applications, and recent advancements have made it accessible to use for those who aren’t professional data analysts.
In this LIVE, interactive Threatpost Town Hall, sponsored by Rapid 7, attendees will learn key concepts of NLP and how to use it to effectively navigate the data ocean and add context to cybersecurity threats.
Join security researchers Erick Galinkin of Rapid7, Izzy Lazerson of IntSights, and Threatpost journalist and webinar host Becky Bracken, as they discuss:
Register today to get the lowdown on this emerging technology from our security-threat experts, and learn how to supercharge your threat intelligence efforts in ways that were never before possible!
(Interested in learning more about how your company can get involved with Threatpost webinars? Contact advertise@threatpost.com to learn more about Sponsored and Underwriting opportunities.)
Share:
Brought to you in partnership with:
Loading…
WATCH ON-DEMAND: Join Darren James, Technical Lead at Specops Software, and Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, for a conversation about password management, security and best practices.
WATCH ON DEMAND: Discover the fundamentals of open-source OSquery. Then dive into CloudQuery, a tool for security, IT, and DevOps teams to leverage the power of SQL-based analytics to better protect against cloud attacks.
WATCH ON-DEMAND: Join Uptycs’ Ben Montour and Threatpost’s Becky Bracken for a conversation about the importance of laying a firm foundation for an effective security program for your Linux environment.
WATCH ON-DEMAND: Join Threatpost and Cybersixgill’s panel of experts for a tour of the dark web and learn how to track threat actors before their next attack.
Get the latest breaking news delivered daily to your inbox.
The First Stop For Security News
Infosec Insider content is written by a trusted community of Threatpost cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
Sponsored Content is paid for by an advertiser. Sponsored content is written and edited by members of our sponsor community. This content creates an opportunity for a sponsor to provide insight and commentary from their point-of-view directly to the Threatpost audience. The Threatpost editorial team does not participate in the writing or editing of Sponsored Content.

source

Article Categories:
Cloud Security

Comments are closed.