Technical Blog

Deep dives into machine learning, security analytics, AI, and cybersecurity.

SuriCon 2024 - Supercharging Security with RAG

Presenting BNY Mellon's flagship innovation using Retrieval-Augmented Generation (RAG) to accelerate security rule development, redundancy detection, and threat intelligence automation.

RAGLLMAISecurity AnalyticsBNY MellonConference

Building an Operational Machine Learning Organization from Zero

Comprehensive guide to building ML capabilities at BlockFi from scratch, covering team structure, executive buy-in, blockchain analytics, and operational ML for crypto security.

Machine LearningMLOpsDatabricksCryptocurrencyBlockchainConferenceBlockFi

How BlockFi Is Using Machine Learning To Take Crypto Safety to the Moon!

Showcasing BlockFi's use of Splunk and machine learning for cryptocurrency security, including anomaly detection, fraud identification, and graph analytics for blockchain analysis.

Machine LearningSecurityCryptocurrencyBlockchainGraph AnalyticsBlockFiConference

Creating Custom Containers for the Deep Learning Toolkit

Step-by-step guide to building custom Docker containers for Splunk DLTK, including creating a Nvidia Rapids container for GPU-accelerated machine learning.

Machine LearningDeep LearningDockerSplunkGPUMLOps

BSides Brisbane - Beyond The Hype: Machine Learning for Security

Overview of ML & AI concepts for security analysts, with practical walkthroughs of ransomware and botnet detection using machine learning.

Machine LearningSecurityData ScienceRansomwareBotnetBSides

Configure Jupyter Notebook to Interact with Splunk Enterprise

Complete guide to integrating Jupyter Notebook with Splunk Enterprise using Docker, enabling data science workflows directly with Splunk data and the ML Toolkit.

JupyterPythonDockerSplunkMachine LearningDevOps

Using Docker and Splunk to Operationalize the Machine Learning Toolkit

Complete guide to setting up Splunk ML Toolkit development environments using Docker, including automated app installation and configuration.

Machine LearningSplunkDockerMLOpsDevOps

SuriCon 2018 - Beyond Operational Intelligence: Splunk Advanced Analytics

Exploring the journey from reactive to prescriptive analytics in security operations, covering the advanced analytics maturity model and ML-driven incident response automation.

Machine LearningSecurityData ScienceSplunkSuricataConference

.Conf18 - Turning Security Use Cases into SPL

Deep dive on SPL patterns for security use cases, covering tstats command optimization, data model acceleration, and tried-and-tested query patterns for threat detection.

SplunkSPLSecurityConferenceThreat Detection

Dark Reading - How to Use AI and Machine Learning to Improve Enterprise Security

Webinar defining AI and machine learning in cybersecurity context, with practical applications for speeding incident response and optimizing security staff resources.

Machine LearningSecurityAIWebinarIncident Response

SuriCon 2017 - Hunting BotNets: Suricata Advanced Security Analytics

Practical machine learning techniques for botnet detection using Suricata data, covering data exfiltration, traffic analysis, and advanced threat detection workflows.

Machine LearningSecuritySuricataBotnetConference

.Conf17 - Everyone Can Build A Security App

Hands-on workshop teaching security practitioners how to build operational Splunk apps, covering methodology, data enrichment, visualization, and machine learning techniques.

Machine LearningSecurityData ScienceSplunkConferenceWorkshop

Enhancing Splunk Visualizations with Mapbox

Step-by-step guide to integrating Mapbox API with Splunk for enhanced geographical visualizations, including custom tiles and the Missile Map visualization.

SplunkVisualizationMapboxGeoVizSecurity

Analyzing Shadowbrokers Implants

Security analysis of the Shadow Brokers NSA tool leak and its impact on enterprise security, with Splunk-based detection strategies.

ShadowBrokersSplunkSecurityThreat Intelligence

Enhancing Enterprise Security for Ransomware

Step-by-step guide to integrating abuse.ch's ransomware intelligence feed into Splunk Enterprise Security for enhanced threat detection and response.

RansomwareSplunkSecurityThreat IntelligenceEnterprise Security

Analyzing BotNets with Suricata & Machine Learning

Using Splunk's Machine Learning Toolkit and Suricata data to analyze and predict Mirai botnet activity through K-means clustering and Random Forest classification.

Machine LearningSuricataMiraiSecurityAnalyticsSplunk

SuriCon 2016 - Applying Data Science to Suricata

Keynote presentation on applying machine learning toolkits to Suricata data for threat detection, covering data exfiltration, port analysis, and advanced threat use cases.

Machine LearningSecurityData ScienceSplunkSuricataConference

.Conf16 - Anomaly Hunting with Splunk Software

Conference presentation on machine learning toolkits in Splunk for security practitioners, covering anomaly detection, data exfiltration, and advanced threat use cases.

Machine LearningSecurityData ScienceSplunkConferenceAnomaly Detection