• Boot camps & training
  • Awareness & anti-phishing
  • Community
Infosec Resources Home
  • Topics
    • Hacking
      Penetration testing
      Cyber ranges
      Capture the flag (CTF)
      Malware analysis
    • Professional development
      General security
      News
      Security awareness
      Phishing
    • Management, compliance & auditing
      Digital forensics
      Threat Intelligence
      DoD 8570
      + View All
  • Certification prep
    • CISSP
      CCSP
      CGEIT
      CEH
      CCNA
    • CISA
      CISM
      CRISC
      A+
      Network+
    • Security+
      CASP+
      PMP
      CySA+
    • CMMC
      CSIH
      Microsoft Azure
      Other
      + View All
  • Career guidance
    • IT auditor
      Cybersecurity architect
      Cybercrime investigator
      Penetration tester
    • Cybersecurity consultant
      Cybersecurity analyst
      Cybersecurity engineer
      Cybersecurity manager
    • Incident responder
      Information security auditor
      Information security manager
      + View All
  • Events
  • Cyber Work
    • Cyber Work Podcast
    • Cyber Work Applied
    • Cyber Work Live
  • About
    • Contributors
  • Search
  • Main Menu

Emmanuel Tsukerman

How artificial intelligence is changing social engineering
Social engineers are using artificial intelligence (AI) to further exploit human psychology and gain access to systems and data....
AI for intrusion detection: Conquering the unknown unknowns
An anomaly detection component, which allows detection of previously unknown behavior, is an essential and forward-looking solution to intrusion detection....
How to catch malware with artificial intelligence
There are many variations on the machine learning and data science techniques being utilized, and these account for much of the AV’s effectiveness in dealing with new samples....
Professional development December 16, 2019 Emmanuel Tsukerman
How deep learning is changing cybersecurity
The lesson here is clear. The use of machine learning for cybercrime is no longer a future threat. It is present threat, and an important part of cybersecurity. ...
Infosec Resources Home

Join our newsletter

Get the latest news, updates & offers straight to your inbox.
  • This field is for validation purposes and should be left unchanged.
© 2021 Infosec Resources
  • Privacy Policy
Topics
  • Hacking
  • Penetration testing
  • Cyber ranges
  • Capture the flag (CTF)
  • Malware analysis
  • Professional development
  • General security
  • News
  • Security awareness
  • Phishing
  • Management, compliance & auditing
  • Digital forensics
  • Threat Intelligence
  • DoD 8570
  • + See All Topics
Certifications
  • CISSP
  • CCSP
  • CGEIT
  • CEH
  • CCNA
  • CISA
  • CISM
  • CRISC
  • A+
  • Network+
  • Security+
  • CASP+
  • PMP
  • CySA+
  • CMMC
  • CSIH
  • Microsoft Azure
  • Other
  • + See All Certifications
CyberSecurity Careers
  • IT auditor
  • Cybersecurity architect
  • Cybercrime investigator
  • Penetration tester
  • Cybersecurity consultant
  • Cybersecurity analyst
  • Cybersecurity engineer
  • Cybersecurity manager
  • Incident responder
  • Information security auditor
  • Information security manager
  • + See All Careers