Published inAbnormal Security Engineering BlogCalibrating Classifiers in RealityThis post also appears on the Abnormal Blog.Jan 24, 2022Jan 24, 2022
Published inAbnormal Security Engineering BlogAbnormal Engineering Stories — Episode #2: Future of ML PlatformFuture of ML Platform w/ Jeshua Bratman & Nico KoumchatzskyJul 7, 2021Jul 7, 2021
Published inAbnormal Security Engineering BlogPodcast: Building Applied ML StartupsIt was a pleasure sitting down with Tim Shi of Cresta and Saam Motamedi of Greylock to discuss building companies around machine learning…Jul 2, 2021Jul 2, 2021
Published inTowards Data ScienceHow you Should Design ML Engineering ProjectsAnalysis of ML lifecycles, common pitfalls, and a copy-and-paste template you can use to improve your software & experimental design.Apr 6, 20211Apr 6, 20211
Published inAbnormal Security Engineering BlogRe-Scoring an ML Detection Engine on Past Attacks (part 1)Developing a machine learning product for cybersecurity comes with unique challenges. For a bit of background, Abnormal Security’s…Mar 29, 20211Mar 29, 20211
Published inAbnormal Security Engineering BlogGraph of Models and FeaturesAt the core of all Abnormal’s detection products sits a sophisticated web of prediction models. For any of these models to function we…Feb 1, 2021Feb 1, 2021
Published inAbnormal Security Engineering BlogLazily Loading ML Models for Scoring with PySparkAuthors: Jeshua Bratman and Vineet EdupugantiDec 11, 20201Dec 11, 20201
Stopping election interference emails attacks using MLMy favorite part of working at Abnormal Security is seeing the myriad of nefarious attacks we are able to stop. These attacks include…Nov 18, 2020Nov 18, 2020
Published inAbnormal Security Engineering BlogCombining ML Models to Detect Email AttacksThis article is a follow-up to one I wrote a year ago — Lessons from building AI to Stop Cyberattacks — in which I discussed the overall…Nov 18, 20201Nov 18, 20201
Published inAbnormal Security Engineering BlogLessons from building AI to Stop CyberattacksIdentifying malicious social engineering cyberattacks with machine learningNov 19, 2019Nov 19, 2019