new & noteworthyInc. 2019 Best Workplaces Award
PUNCH awarded 2019 Inc. Best Workplaces Award for 2nd Straight Year.
Continue Reading arrow_forward
Cyber Defense at Scale
Real-time detection of threats within or across very large enterprise networks is not simply an issue of scale, but also a challenge due to the variable nature of malicious activities and their presentations. This talk explores how PUNCH working with DARPA is developing automated tools to detect and characterize novel attack vectors, collect the right contextual data, and disseminate protective measures both within and across enterprises.
View Video arrow_forwardnew & noteworthyLessons Learned From Data Science Application to Cyber Security Network Logs
The majority of modern operational detection capabilities rely on detection signatures. To help move beyond signatures, data science techniques are actively being explored to detect threats that signatures miss.
Continue Reading arrow_forwardTime Signature Based Matching
The ability to detect automated behavior within cyber relevant log data is a useful tool for the network defender, as malicious activity executed by scripts or bots is likely to leave behind identifiable traces in logs.
View Video arrow_forward