Security Visualization. Data Science. Big Data. Insights.
San Francisco, California
Areas of Expertise:
Raffael Marty is one of the world's most recognized authorities on security data analytics and visualization. Raffy is the founder and CEO of pixlcloud, a next generation visual analytics platform. With a track record at companies including IBM Research and ArcSight, he is thoroughly familiar with established practices and emerging trends in big data analytics. He has served as Chief Security Strategist with Splunk and was a co-founder of Loggly, a cloud-based log management solution. Author of Applied Security Visualization and frequent speaker at academic and industry events, Raffy is a leading thinker and advocate of visualization for unlocking data insights. For more than 14 years, Raffy has worked in the security and log management space to help Fortune 500 companies defend themselves against sophisticated adversaries and has trained organizations around the world in the art of data visualization for security. Zen meditation has become an important part of Raffy's life, sometimes leading to insights not in data but in life.
Raffael blogs at:
February 26 2017read more
February 22 2016read more
February 16 2015read more
October 22 2013read more
August 12 2013read more
Raffael Marty blogs at:
I just read an article on virtual reality (VR) in cyber security and how VR can be used in a SOC. Image taken from original post The post basically says that VR helps the SOC be less of an expensive room you have to operate by letting a company take the SOC virtual. Okay. I […]
I have been talking about artificial intelligence (AI) and machine learning (ML) in cyber security quite a bit lately. My latest two essays you can find as guest posts on TowardsDataScience and DarkReading. Following is a summary of the latest AI and ML posts with quick summaries: Machine Learning and AI – What’s the Scoop […]
Previously, I started blogging about individual topics and slides from my keynote at ACSAC 2017. The first topic I elaborated on a little bit was An Incomplete Security Big Data History. In this post I want to focus on the last slide in the presentation, where I posed 5 Challenges for security with big data: […]
You are an enterprise software startup. You are in the security space. Your company is still early, trying to sign its first 10, maybe 40 customers. What should you be doing for marketing? What works? What doesn’t? What approaches yield the biggest return for your investment? These are some questions that I have been pondering […]
Earlier today I was giving the keynote at ACSAC 2017. This year’s theme of the conference is big data for security. As part of my keynote, I talked about the history of big data in security. Following is the slide I put together: This is by no means a complete picture, but I tried to […]
Last week I organized the 4th iteration of the Security Chat – an informal gathering of security people in Zurich. The format are 10-15 minute presentations that anyone can submit for. In good tradition, we had a great line up again: Steve Micallef – OSINT and The New Perimeter – his tool is available for […]
After my latest blog post on “Machine Learning and AI – What’s the Scoop for Security Monitoring?“, there was a quick discussion on twitter and Shomiron made a good point that in my post I solely focused on supervised machine learning. In simple terms, as mentioned in the previous blog post, supervised machine learning is […]
The other day I presented a Webinar on Big Data and SIEM for IANS research. One of the topics I briefly touched upon was machine learning and artificial intelligence, which resulted in a couple of questions after the Webinar was over. I wanted to pass along my answers here: Q: Hi, one of the biggest […]
Visual Analytics Workshop at BlackHat Las Vegas 2017. Sign up today! Once again, at BlackHat Las Vegas, I will be teaching the Visual Analytics for Security Workshop. This is the 5th year in a row that I’ll be teaching this class at BlackHat US. Overall, it’s the 29th! time that I’ll be teaching this workshop. Every […]
Threat intelligence (TI) feeds, the way we know them today, are going to go away. In the future it’s all about fast and sometimes anonymous sharing of IOCs with trusted (and maybe untrusted) peers. TI feeds will probably stay around, but will be used for contextul information around our data. For the past couple of […]
Visual Analytics Workshop at BlackHat Las Vegas 2016. Sign up today! Okay, this post is going to be a bit strange. It’s a quick brain dump from a technical perspective, what it would take to build the perfect security monitoring environment. We’d need data and contextual information to start with: Any data: infrastructure […]
Visual Analytics Workshop at BlackHat Las Vegas 2016. Sign up today! A week ago I was presenting at the Kaspersky Security Analyst Summit. My presentation was titled: “Creating Your Own Threat Intel Through Hunting & Visualization“. Here are a couple of impressions from the talk: Here I am showing some slides where […]
Visual Analytics Workshop at BlackHat Las Vegas 2016. Sign up today! Hunting has been a fairly central topic on this blog. I have written about different aspects of hunting here and here. I just gave a presentation at the Kaspersky Security Analytics Summit where I talked about the concept of internal threat intelligence […]
Visual Analytics Workshop at BlackHat Las Vegas 2016. Sign up today! Recently I have been getting a number of questions about dashboards. I have written about them before (here and here). Given all the questions and a couple of recent consulting gigs where I built dashboards for different companies and purposes, I wanna […]
Hunting is about learning about, and understand your environment. It is used to build a ‘model’ of your network and applications that you then leverage to configure and tune your detection mechanisms. I have been preaching about the need to explore our security data for the past 9 or 10 years. I just went […]
© 2018, O’Reilly Media, Inc.
(707) 827-7019 (800) 889-8969
All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners.