Homepage
Open in app
Sign in
Get started
security analytics
Musings of a security data scientist
Follow
Cyber Analytics Use Case: Streaming Beacon Detection with Spark
Cyber Analytics Use Case: Streaming Beacon Detection with Spark
I hope to convey two messages with this post: 1) A use case for cyber analytics that isn’t DGA or phishing, and 2) A few tricks that you…
Jonathan Ticknor
Apr 1, 2021
Quantifying the MITRE ATT&CK Round 2 Evaluation
Quantifying the MITRE ATT&CK Round 2 Evaluation
MITRE released the results for Round 2 of their EDR evaluation scenario, this time emulating APT29. As you might have seen, nearly every…
Jonathan Ticknor
Apr 23, 2020
ElasticPhish: Using CertStream and the Elastic Stack for Phishing Intelligence
ElasticPhish: Using CertStream and the Elastic Stack for Phishing Intelligence
In my previous post, A Phishing Guide: Lessons Learned on the Journey to Detecting Phishing Domains, I laid out my experience building…
Jonathan Ticknor
Apr 30, 2019
Cyber and AI: Separating Fact from Fiction at Peak Hype
Cyber and AI: Separating Fact from Fiction at Peak Hype
By now, we have all seen an article claiming artificial intelligence (AI) is the solution to all of our detection problems or an…
Jonathan Ticknor
Feb 1, 2019
A Phishing Guide: Lessons Learned on the Journey to Detecting Phishing Domains
A Phishing Guide: Lessons Learned on the Journey to Detecting Phishing Domains
This is the first in what I hope to be a series of posts about my experiences building detection capabilities for the largest…
Jonathan Ticknor
Jan 24, 2019
About security analytics
Latest Stories
Archive
About Medium
Terms
Privacy
Teams