close

new & noteworthyInc. 2019 Best Workplaces Award

PUNCH awarded 2019 Inc. Best Workplaces Award for 2nd Straight Year.

Inc Best Workplaces 2018

 

Continue Reading arrow_forward

Cyber Defense at Scale

Real-time detection of threats within or across very large enterprise networks is not simply an issue of scale, but also a challenge due to the variable nature of malicious activities and their presentations. This talk explores how PUNCH working with DARPA is developing automated tools to detect and characterize novel attack vectors, collect the right contextual data, and disseminate protective measures both within and across enterprises.

View Video arrow_forward

new & noteworthyLessons Learned From Data Science Application to Cyber Security Network Logs

The majority of modern operational detection capabilities rely on detection signatures. To help move beyond signatures, data science techniques are actively being explored to detect threats that signatures miss.

Continue Reading arrow_forward

Time Signature Based Matching

The ability to detect automated behavior within cyber relevant log data is a useful tool for the network defender, as malicious activity executed by scripts or bots is likely to leave behind identifiable traces in logs.

View Video arrow_forward

Presentations

DIY OSINT Collection with Scumblr

Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. With OSINT, you can enhance awareness of cyber security threats toward your landscape, and use this understanding to augment security decisions for your organization.

Continue Reading arrow_forward

Operationalizing Indicators

Are you inundated with reports from vendors, notes hurriedly documented in a text file, or a CSV file filled with indicators from the last few years? You’re not alone.

Continue Reading arrow_forward

A First-Timer's RSA Conference Experience: Part 1

This is the first of a two-part blog series about a data scientist's first experience at RSA Conference from guest blogger Lauren Deason, lead data scientist at PUNCH Cyber Analytics.

Continue Reading arrow_forward

Have I Seen You Before?

Using Splunk to Find Previously Unobserved HTTP and Email Traffic On Your Network.

Continue Reading arrow_forward

Time Signature Based Matching for Data Fusion and Coordination Detection in Cyber Relevant Logs

The ability to detect automated behavior within cyber log data is a useful tool for the network defender, as malicious activity executed by scripts or bots is likely to leave behind identifiable traces in logs.

Continue Reading arrow_forward

Hunting GitHub Usernames

gitrax.py is a tool for searching GitHub usernames via the GitHub API; in this article, we walk through an example of hunting and pivoting through this API tracking users in the Gentoo breach.

Continue Reading arrow_forward

Jobs

No Openings at this Time

 

PUNCH Cyber Analytics Group

Phone: 703-594-7266

Email: info@punchcyber.com