Jeshua BratmaninAbnormal Security Engineering BlogCalibrating Classifiers in RealityThis post also appears on the Abnormal Blog.9 min read·Jan 24, 2022----
Jeshua BratmaninAbnormal Security Engineering BlogAbnormal Engineering Stories — Episode #2: Future of ML PlatformFuture of ML Platform w/ Jeshua Bratman & Nico Koumchatzsky2 min read·Jul 7, 2021----
Jeshua BratmaninAbnormal Security Engineering BlogPodcast: Building Applied ML StartupsIt was a pleasure sitting down with Tim Shi of Cresta and Saam Motamedi of Greylock to discuss building companies around machine learning…1 min read·Jul 2, 2021----
Jeshua BratmaninTowards Data ScienceHow you Should Design ML Engineering ProjectsAnalysis of ML lifecycles, common pitfalls, and a copy-and-paste template you can use to improve your software & experimental design.7 min read·Apr 6, 2021--1--1
Jeshua BratmaninAbnormal Security Engineering BlogRe-Scoring an ML Detection Engine on Past Attacks (part 1)Developing a machine learning product for cybersecurity comes with unique challenges. For a bit of background, Abnormal Security’s…6 min read·Mar 29, 2021--1--1
Jeshua BratmaninAbnormal Security Engineering BlogGraph of Models and FeaturesAt the core of all Abnormal’s detection products sits a sophisticated web of prediction models. For any of these models to function we…4 min read·Feb 1, 2021----
Jeshua BratmaninAbnormal Security Engineering BlogLazily Loading ML Models for Scoring with PySparkAuthors: Jeshua Bratman and Vineet Edupuganti5 min read·Dec 11, 2020--1--1
Jeshua BratmanStopping election interference emails attacks using MLMy favorite part of working at Abnormal Security is seeing the myriad of nefarious attacks we are able to stop. These attacks include…2 min read·Nov 18, 2020----
Jeshua BratmaninAbnormal Security Engineering BlogCombining ML Models to Detect Email AttacksThis article is a follow-up to one I wrote a year ago — Lessons from building AI to Stop Cyberattacks — in which I discussed the overall…9 min read·Nov 18, 2020--1--1
Jeshua BratmaninAbnormal Security Engineering BlogLessons from building AI to Stop CyberattacksIdentifying malicious social engineering cyberattacks with machine learning9 min read·Nov 19, 2019----