{"version":"1.0","provider_name":"Inprosec","provider_url":"https:\/\/www.inprosec.com\/en\/","author_name":"Fernando Mosquera","author_url":"https:\/\/www.inprosec.com\/en\/author\/fernando-mosquera\/","title":"Detection of cyber security threats using AI","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"3gxrHJVzKQ\"><a href=\"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/\">Detection of cyber security threats using AI<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.inprosec.com\/en\/detection-of-cyber-security-threats-using-ai\/embed\/#?secret=3gxrHJVzKQ\" width=\"600\" height=\"338\" title=\"&#8220;Detection of cyber security threats using AI&#8221; &#8212; Inprosec\" data-secret=\"3gxrHJVzKQ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.inprosec.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2021\/10\/646-scaled-1.jpg","thumbnail_width":2560,"thumbnail_height":1707,"description":"In today&#8217;s entry \u201dNetwork Traffic Analyzing and Modeling for Cybersecurity Threat Detection using AI&#8221;, a new article by Saber Mhiri, CRO (Chief Research Officer) of InprOTech, explains how AI can be used to analyze strange behavior in OT networks, since the large amount of data and its nature, make the control of communications very complex...."}