{"id":101,"date":"2020-08-16T14:01:53","date_gmt":"2020-08-16T14:01:53","guid":{"rendered":"http:\/\/cybernetics.partners\/?p=101"},"modified":"2020-09-27T19:47:45","modified_gmt":"2020-09-27T19:47:45","slug":"early-interactions-with-machines-learning-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/cybernetics.partners\/?p=101","title":{"rendered":"Early Interactions with Machines Learning in CyberSecurity"},"content":{"rendered":"\n<figure class=\"wp-block-video aligncenter\"><video height=\"720\" style=\"aspect-ratio: 1280 \/ 720;\" width=\"1280\" controls src=\"http:\/\/cybernetics.partners\/wp-content\/uploads\/2020\/08\/My-First-Interaction-with-Machine-Learning-in-Cyber-Defense.mp4\" playsinline><\/video><figcaption><em>Please share your reactions and comments at the <a rel=\"noreferrer noopener\" href=\"https:\/\/www.linkedin.com\/posts\/cybernetics-partners_machinelearning-cybersecurity-activity-6699243824981528576-ZsSz\" target=\"_blank\">Linkedin Cybernetics Partners page Post<\/a><\/em><\/figcaption><\/figure>\n\n\n\n<p>The use of&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=machinelearning&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6699243824981528576\">#machinelearning<\/a>&nbsp;(ML) in&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=cybersecurity&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A6699243824981528576\">#cybersecurity<\/a>&nbsp;is not new. In this 2 mins video&nbsp;<a href=\"https:\/\/www.linkedin.com\/in\/ACoAAAOFIJsBvS3Kwyy8GQgYwO86qPcilZW0avU?lipi=urn%3Ali%3Apage%3Ad_flagship3_company_admin%3BYTzunMerS1m%2B%2BNCyEVh1qg%3D%3D\">Rabih Itani<\/a>&nbsp;talks about his first interaction with ML in Cyber defense 10-12 years back.<\/p>\n\n\n\n<ul class=\"wp-block-social-links alignright is-layout-flex wp-block-social-links-is-layout-flex\">\n\n\n\n\n\n<li class=\"wp-social-link wp-social-link-linkedin  wp-block-social-link\"><a href=\"https:\/\/www.linkedin.com\/company\/cybernetics-partners\/\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The use of&nbsp;#machinelearning&nbsp;(ML) in&nbsp;#cybersecurity&nbsp;is not new. In this 2 mins video&nbsp;Rabih Itani&nbsp;talks about his first interaction with ML in Cyber defense 10-12 years back.<\/p>\n","protected":false},"author":1,"featured_media":140,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[15,21,22],"class_list":["post-101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-video","tag-cybersecurity","tag-machine-learning","tag-spam"],"_links":{"self":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=101"}],"version-history":[{"count":7,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/101\/revisions"}],"predecessor-version":[{"id":222,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/posts\/101\/revisions\/222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=\/wp\/v2\/media\/140"}],"wp:attachment":[{"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybernetics.partners\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}