CYBER 101

  • Alerts
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Documents
  • Domains
  • Entertainment
  • FAQ
  • Incidents
  • Quotes
  • Tools
  • Tutorials

Join our newsletter

FOLLOW US

Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
Search

More...

Generic filters
Content from
Content to
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
Get Help
CyberMaterial
No Result
View All Result

”With threat hunting, you are using information…”

James Antonakos

2 min read
in Quotes

”With threat hunting, you are using information you’re getting, but you’re allowing a human to decide what to look for next or react to what they’re seeing. Researchers are now putting artificial intelligence in the extrapolation of data from databases that contain all of the events that happened in the organization…This allows you to see those really drawn-out, slow attacks that a human wouldn’t be able to correlate.” James Antonakos – Senior Malware Analyst at Lansing Dynamics

Source: Trust Wave

About James Antonakos

James L. Antonakos is a Distinguished Professor of Computer Science at Broome Community College in Binghamton, New York, where he has been teaching since 1984. Professor Antonakos teaches both in the classroom and online, in classes covering electricity and electronics, computer networking, computer security and forensics, information management, and computer graphics and simulation. He is the designer and director of the new 2-year AAS Degree in Computer Security and Forensics at Broome Community College.
Professor Antonakos is also an online instructor and faculty advisor for Excelsior College and an online instructor for Sullivan University. He has extensive industrial work experience as well in electronic manufacturing for both commercial and military products and consults with many local companies in the area of computer networking and information security. He is the author or co-author of over forty works on computers, networking, electronics, and technology. He is also A+, Network+, and Security+ certified by CompTIA and ACE certified by AccessData.

Related

Tags: CybersecurityJames AntonakosQuotequotesThreat HuntingThreat Hunting Quotes
10
VIEWS
ADVERTISEMENT

Related Posts

“App stores are filled with applications that…”

“App stores are filled with applications that…”

July 22, 2022
“Cybersecurity threats are evolving as…”

“Cybersecurity threats are evolving as…”

July 18, 2022
“Cybersecurity threats are evolving as…”

“Cybersecurity threats are evolving as I speak…”

July 18, 2022
“Startups are incredibly vulnerable to…”

“Startups are incredibly vulnerable to…”

July 18, 2022

More Articles

The Cyber Insurance Imperative

June 6, 2022
Alerts

Rockwell Automation security advisory

July 7, 2022
Alerts

CVE-2020-16898 | Windows TCP/IP Remote Code Execution Vulnerability

October 14, 2020
Book

Payment Card Domain Knowledge: Card terminology, processing & security in PCI

May 17, 2022
Document

Why Encryption is Essential in Healthcare Cybersecurity Strategies

April 5, 2022

Consensus Mechanism Proof of Authority (PoA)

November 28, 2020
Book

Mobile Single Sign-On A Clear and Concise Reference

January 21, 2022
Cyber101

Operational Intelligence

June 28, 2022
Load More

World’s number one cybersecurity repository. Find everything you need about cybersecurity.

Cybersecurity Domains

  • Application Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • Governance
  • IAM
  • Physical Security
  • More...

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • AR/VR
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • IoT
  • Quantum Computing
  • More...

Frameworks

  • CIS Controls
  • CISA TSS
  • FISMA
  • GDPR
  • ISO 2701/02
  • MITRE ATT&CK
  • NIST
  • NYS-DFS
  • More...

Industries

  • Automation
  • E-Commerce
  • Education
  • Fake News
  • Financial
  • Government
  • Health Care
  • Military
  • More...

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering
  • Vulnerabilities
  • More...

© 2022 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Cyber101
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Attackers
    • Incidents
    • Threats
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Quotes

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.