Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Machine Learning

Below you will find reports with the tag of “Machine Learning”

image from The Cato  CTRL SASE Threat Report Q1 : 2024

The Cato CTRL SASE Threat Report Q1 : 2024

This report offers insights onto the threats and suspicious activity across those flows. It also provides strategic, tactical, and operational information on all traffic in all directions utilizing the MITRE ATT&CK framework. In additional, the report highlights the applications, protocols, and tools running on these networks.

(more available)
Added: June 26, 2024
image from DDoS Threat Report 2020 Q2

DDoS Threat Report 2020 Q2

In this report, we’re going to discuss how bit-and-piece attacks have continued to evolve, and are able to successfully evade DDoS mitigation schemes when blended with multiple attack vectors, and the challenges that these advanced attack tactics present to the cybersecurity world.

(more available)
Added: October 11, 2022
image from Sophos 2022 Threat Report

Sophos 2022 Threat Report

Sophos’ annual threat report drawn from incident response engagements with customers.

Added: December 13, 2021
image from Malicious Uses and Abuses of Artificial Intelligence

Malicious Uses and Abuses of Artificial Intelligence

This report looks at the present state of Malicious uses of AI, then makes predictions for the future. It ends with recommendations to prevent malicious use of AI.

(more available)
Added: November 30, 2020
image from The State of Endpoint Security: Past, Present and Future

The State of Endpoint Security: Past, Present and Future

From the report, “With endpoint security products continuing to be at the tip of the spear of cyber defenses for years to come, the question is how to ensure the best possible security posture. No matter which way an endpoint security buyer turns, there is no one magic bullet. It is likely that a layered approach with multiple different technologies working together is required.” Read on to find out why.

(more available)
Added: February 6, 2019
image from The Trust Factor: Cybersecurity's Role in Sustaining Business Momentum

The Trust Factor: Cybersecurity's Role in Sustaining Business Momentum

To provide insights into the complex challenges faced by organizations as they fight to protect their brands, Radware produces an annual Global Application & Network Security Report. This eighth annual version of the report combines Radware’s organic research, real attack data and analyses of developing trends and technologies with the findings from a global industry survey.

(more available)
Added: January 16, 2019
image from Reinventing Cybersecurity Prevention With Deep Learning

Reinventing Cybersecurity Prevention With Deep Learning

In this whitepaper they cover the different defense technologies used over time, how different attacks vectors influenced this evolution, how the industry adopted different approaches over time, and why the prevention approach has returned and why it matters.

(more available)
Added: December 29, 2018
image from Machine Learning: How To Build A Better Threat Detection Model

Machine Learning: How To Build A Better Threat Detection Model

This is a very good guide to building a good threat detection model for machine learning.

Added: October 19, 2018
image from Generations of Machine Learning In Cybersecurity

Generations of Machine Learning In Cybersecurity

In this white paper, they aim to define generations of machine learning and to explain the maturity levels of artificial intelligence (AI) and machine learning (ML) that are being applied to cybersecurity today. In addition, the paper seeks to explain that while a great deal of progress has been made in the evolution of machine learning’s application to cybersecurity challenges, there remains an immense amount of opportunity for innovation and advancement in the field, and they expect the sophistication of applications of machine learning to continue to evolve over time.

(more available)
Added: October 18, 2018
image from "Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

"Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

This report takes a look at some of the problems in AI, and machine based cyber security, and seeks to show how they can be overcome.

(more available)
Added: October 16, 2018
image from An Introduction To Machine Learning For Mobile Security

An Introduction To Machine Learning For Mobile Security

A close inspection of one of the most exciting and promising fields of research in 2017, and how it might be applied to the fast-moving world of mobile security.

(more available)
Added: October 14, 2018
image from The State Of Endpoint Security Today

The State Of Endpoint Security Today

This paper delivers insights into the prevalent cybersecurity issues facing organizations today: from ransomware to exploits and machine learning, it shares the experiences and future plans of IT managers across the globe. It’s an illuminating read, providing insight into where the field stands on these issues.

(more available)
Added: October 14, 2018
© Cyentia Institute 2025
Library updated: June 25, 2025 12:08 UTC (build b1d7be4)