Abnormal PowerShell Command Execution

Stop Fileless Malware with “Abnormal PowerShell Command Execution”

Gurucul’s #MachineLearningMadness blog series continues to deliver details on our most popular machine leaning models. Next up is a critical model for Windows environments. Gurucul ...

Clustering and K-Means

Identify Outlier Access with “Clustering and K-Means”

It’s the gift that keeps on giving! Gurucul’s #MachineLearningMadness sessions at Black Hat USA 2018. We continue to roll out the details of the Machine ...

How Do You Establish Credibility?

How Do You Establish Credibility?

Earlier this month, we met with our Executive Advisory Board. These are seasoned Chief Information Security Officers commanding enterprise security teams in various industries. In ...

Workflow Classification Regression Tree

Dynamic Provisioning: “Workflow Classification Regression Tree”

Gurucul Machine Learning Model: Workflow with Classification Regression Tree How does the Workflow with Classification Regression Tree machine learning model work, what does it do?  ...

man running down dark road

Pinpoint Departing Users with “Predictive Flight Risk”

At Black Hat USA this year, Gurucul shared details of our most popular Machine Learning Models. Read on to learn about the second model we ...

Security Analytics through cyber space

Security Analytics is not a SIEM

A lot of analysts in our space are saying that security analytics products are second generation SIEMs. We disagree. A Security Analytics product can do ...

man working on computer

Detect Insider Threats with “Email Fuzzy Logic”

At Black Hat USA this year, Gurucul shared details of our most popular Machine Learning Models. Every hour at Black Hat we revealed a new ...