DTonomy Profile Banner
DTonomy Profile
DTonomy

@Peter_DTonomy

445
Followers
846
Following
107
Media
557
Statuses

AI-driven Security Operation Schedule a meeting:

Cambridge,MA
Joined February 2017
Don't wanna be here? Send us removal request.
@Peter_DTonomy
DTonomy
3 years
This is what we know so far. #KaseyaVSA #Ransomware
Tweet media one
0
7
26
@Peter_DTonomy
DTonomy
3 years
How many alerts in your environment? #Phish #SOC #SIEM #Security
Tweet media one
0
0
15
@Peter_DTonomy
DTonomy
9 months
🚀 Exciting News! Introducing DTonomy's Personalized Security CoPilot 🛡️ Fast-Track Investigations, Support Decision-Making, and Reduce Risks Faster with YOUR Data. 🔐 #Security #SecurityCoPilot See it in action 🎥
0
0
8
@Peter_DTonomy
DTonomy
3 years
@anton_chuvakin Noises can be categorized into different groups: 1. Repetitive alerts 2. False positives because of lack of internal context 3. False positives because of lack of external context 4. Not so sure but seen it the first time. 5. Not so sure but seen similar stuff many times.
1
0
9
@Peter_DTonomy
DTonomy
4 years
DTonomy's AI Assistant - Create Your Workflow from plain English! #CISO #AI #CyberSecurity #Automation
1
3
7
@Peter_DTonomy
DTonomy
4 years
When we talk about SOAR, we aren't referring to birds. Learn more about DTonomy's SOAR platform by watching this short video. #SOAR #CyberSecurity #AI
1
1
5
@Peter_DTonomy
DTonomy
2 years
@apbarros Check out
0
1
5
@Peter_DTonomy
DTonomy
2 years
Who was the first person in your org to start talking about Follina? They're the ones paying attention, always learning, and always staying current!
0
0
3
@Peter_DTonomy
DTonomy
4 years
DTonomy recently conducted research to learn how phishing techniques and themes have changed over the years, and how phishing emails are distributed over year, month and day of the week. #Phishing #CyberSecurity Learn more:
0
1
3
@Peter_DTonomy
DTonomy
4 years
0
0
3
@Peter_DTonomy
DTonomy
4 years
@sherrod_im @mitchparkerciso Indeed. Finding issues is great. But it needs solutions to close the loop. Close the loop with automated actions or tasks.
0
0
2
@Peter_DTonomy
DTonomy
4 years
Thanks to all our great speakers from Ivy League/Public Universities for sharing their "Best Practices for Security Automation and Incident Response"! We are honored to work with you!
1
0
3
@Peter_DTonomy
DTonomy
4 years
SOAR + AI = A Game Changer
0
0
2
@Peter_DTonomy
DTonomy
3 years
We are proud to announce that we'll be joining  @MassChallenge ’s 50th cohort as one of the three cyber security #startups from around the world! Learn more ➡️
1
1
3
@Peter_DTonomy
DTonomy
4 years
Recording is available per request.
0
0
3
@Peter_DTonomy
DTonomy
2 years
See you soon! @BSidesDFW
@BSidesDFW
BSidesDFW
2 years
0
12
20
0
0
3
@Peter_DTonomy
DTonomy
4 years
Phish AIR, Free GSuite plugin to assist phishing email investigation and identification. #CISO #Phish #phishing
Tweet media one
Tweet media two
Tweet media three
0
2
3
@Peter_DTonomy
DTonomy
3 years
#DDoS DDoS Incident Response Guide #SOC
0
1
2
@Peter_DTonomy
DTonomy
4 years
We are honored to support @BsidesBos ! Look forward to it!
@BsidesBos
BsidesBoston
4 years
Thank you to new sponsor @DTonomyInc for being a Supporter sponsor of #bsidesbos2020 . 🥰
0
0
2
0
0
3
@Peter_DTonomy
DTonomy
2 years
You are monitoring your #cloud . You have #misconfigurations in the cloud. Right teams and the right people have to be notified for fixing the misconfiguration. You are bored doing a repetitive operation. Streamline your response process.
0
0
2
@Peter_DTonomy
DTonomy
4 years
Transparency and explaniablity is critical to turn AI to powerful assistant for security analyst.
@AISecurityNews
AI Security News
4 years
AI needs transparency: making smart technologies clearer can mitigate misusage and ethical issues. #AI #ML #artificialintelligence #AIsec
0
2
7
0
0
2
@Peter_DTonomy
DTonomy
2 years
If you have 50 alerts per day and each takes about 30 minutes, you will be spending $2,215,669 for three years just for doing that. If we reduce 30 minutes to 5 minutes per alert, you are saving $1,772,535 within three years for your company. #CISO
0
0
3
@Peter_DTonomy
DTonomy
5 years
joke of the day:)
Tweet media one
0
1
3
@Peter_DTonomy
DTonomy
3 years
Reduce security alerts to attack stories #SOC #CISO
Tweet media one
0
0
1
@Peter_DTonomy
DTonomy
3 years
Leveraging automation to triage security alerts? Ever wondered what you can automate, what you shouldn’t automate, and what are the risks of automation? Join our webinar on 10/14 | 3pm EST to learn about the automation journey towards SOC maturity.
0
0
2
@Peter_DTonomy
DTonomy
4 years
"26% of the reported data breaches this year exposed more than 10,000 records, compared to just 9% in the first six months of 2019." It is important for enterprises to remain vigilant as #cybersecurity attack severity increases. #hacking #SOAR #infosec
0
0
2
@Peter_DTonomy
DTonomy
4 years
@MSwannMSFT Yes we did. Found it useful in many security scenarios. It is a good first evaluation without need to thinking about weights of individual types. Along that line, there are bunch of other ideas which was usually used in text mining are useful..
0
0
2
@Peter_DTonomy
DTonomy
4 years
Tweet media one
0
0
2
@Peter_DTonomy
DTonomy
4 years
Unfortunately, Cloudflare recently experienced an outage which impacted one of our customers. But, working with DTonomy, the customer was able to quickly spin up a Cloudflare monitoring service using the DTonomy AIR platform. Learn more:
0
0
2
@Peter_DTonomy
DTonomy
4 years
@JohnLaTwC @jinfantesd Oh! infoinvoice__.xls is the attachment of the email. Interesting to see the investigation starts with a suspicious campaign with similar file names.
0
0
2
@Peter_DTonomy
DTonomy
3 years
Stop wasting time repetitively analyzing false positives, increase coverage of events analyzed by 10X, and speed response to security issues! #SOC #Wazuh #Security ?
0
0
2
@Peter_DTonomy
DTonomy
4 years
@bettersafetynet Agree. UBA/UEBA are primarily advanced stats. For real machine learning, it has three parts: stats + optimization + computation. No deny the stats used in current UBA/UEBA is useful. The missing part is optimization which we call it adaptive intelligence(machine becomes smarter)
0
0
2
@Peter_DTonomy
DTonomy
4 years
Augmented Data Management
@KevinCHanson
Kevin Hanson
4 years
Smarter, faster #AI and #Xanalytics - Gartner unveils top 10 AI trends for 2020 #ML #NLP #cloud #blockchain #Analytics
0
0
1
1
0
2
@Peter_DTonomy
DTonomy
3 years
#CISO was let go because he brought SIEM with all noisy alerts... Seriously? #SOC #Security #SIEM
Tweet media one
0
1
2
@Peter_DTonomy
DTonomy
7 months
Unlocking the potential of ConnectWise with @Peter_DTonomy ! The Power BI integration offers insightful data visualization, empowering businesses to make smarter decisions. Check it out: #ConnectWise #PowerBI #DataVisualization
Tweet media one
0
0
1
@Peter_DTonomy
DTonomy
2 years
You are coordinating teams and allocating tasks. Some can be fully automated. Some have to wait for human responses such as approval. This holds true for #security operations. You need seamless coordination between machines and humans.
Tweet media one
0
0
2
@Peter_DTonomy
DTonomy
5 years
See you on Thursday @New York! @DataConnectors
Tweet media one
0
0
2
@Peter_DTonomy
DTonomy
10 months
🔒 Meet the Future: Security CoPilot 🛡️ For Managers & SecOps Analysts: Tired of jumping between tools? Get unified insights & enhance investigations! 🕵️‍♂️✨ #Cybersecurity #SecOps #SecurityManagers
2
0
2
@Peter_DTonomy
DTonomy
7 months
A cybersecurity firm executive pleading guilty to hacking hospitals is a stark reminder of the critical need for trust and integrity in our industry. This incident underscores the importance of vetting partners and upholding ethical standards.
0
0
1
@Peter_DTonomy
DTonomy
3 years
Working with DTonomy customers and other security experts, we have seen a variety of different patterns across different detection types. Here are 10 common correlations we have seen across customers that may be helpful to know about.
0
0
2
@Peter_DTonomy
DTonomy
3 years
Free webinar you do not want to miss if you care about potential #phishing threat to your company #SOC #Security #Webinar
0
1
2
@Peter_DTonomy
DTonomy
4 years
well applied to security data as well.
0
0
2
@Peter_DTonomy
DTonomy
3 years
Reduce security alerts to meaningful attack stories #CISO #SOC #CyberSecurity
Tweet media one
0
0
1
@Peter_DTonomy
DTonomy
2 years
⚠️New phishing patterns were observed in HigherEd lately. Instead of sending via a traditional phishing email, hackers are now following up with a smishing message to the cell number a week later. #Automation #AI #CISO #Security
0
1
2
@Peter_DTonomy
DTonomy
2 years
Excited to meet you all in Boston!
@securitymeetup
BostonSecurityMeetup
2 years
Meetup for Security Meetup has been announced! We have @Peter_DTonomy talking about #securityautomation .We are still finalizing our second speaker. With one speaker in person! And ice cream to people who attend in person! #appsec #infosec #CyberSecurity
0
1
3
0
0
2
@Peter_DTonomy
DTonomy
3 years
@SerdaFide @4n6lady @th3gr8tv4l3 Depends on how noisy your environment and what dimension you are measuring. For example a user login from unknown locations, a user login from known location at abnormal time, a user login from known location at normal time from abnormal machines...
0
0
2
@Peter_DTonomy
DTonomy
10 months
🔒 Meet the Future: Security CoPilot 📷 For Managers & SecOps Analysts: Tired of jumping between tools? Get unified insights & enhance investigations! 📷📷 #Cybersecurity #SecOps #SecurityCoPilot
1
0
2
@Peter_DTonomy
DTonomy
3 years
@Cyb3rSn0rlax @jhencinski The difference lies in how to come up with this correlated event. In SIEM, you can achieve this by pivoting through a large number of detection signals manually. XDR, if implemented correctly, could come up with this story automatically.
2
0
2
@Peter_DTonomy
DTonomy
4 years
interesting outlook plugin on phishing investigation
Tweet media one
0
1
2
@Peter_DTonomy
DTonomy
4 years
do not send every alert blindly to your customer
0
0
2
@Peter_DTonomy
DTonomy
4 years
We are doing our part in lending help towards the COVID-19 themed cyber attacks by offering free tools & services to companies that need them most. #COVID19
0
0
2
@Peter_DTonomy
DTonomy
4 years
Are you and your team not sure how to respond to endless security detections/threats/alerts? Learn more about DTonomy and how we use guided response to reduce MTTR and ensure well-rounded alert analysis! #CISO #securityoperations #cybersecurity #ai
0
0
2
@Peter_DTonomy
DTonomy
4 years
@apbarros @anton_chuvakin @gdbassett @aabelak and secops teams are only able to do automation once they know what to automate
0
0
2
@Peter_DTonomy
DTonomy
2 years
@ali_alwashali I had the same desire while I was in Soc. So we built this
1
1
2
@Peter_DTonomy
DTonomy
2 years
Log parsing utility #SIEM #Security
Tweet media one
0
1
2
@Peter_DTonomy
DTonomy
3 years
"XDR will go further than existing solutions with new uses of artificial intelligence and machine learning (AI/ML)." Most are rules based, only few can do AI. check out #DTonomy #SOC #SIEM
@joltsik
Jon Oltsik
3 years
In my recent @CSOonline blog, I suggested more industry cooperation and standardization around XDR. I'm reminded that the @xdralliance is focused on exactly this. Early on but promising: #cybersecurity #infosec #xdr #SOAPA
0
1
1
0
0
2
@Peter_DTonomy
DTonomy
3 years
DTonomy leverages patented AI technology to automatically and continuously group related alerts into attack progression stories, empowering security teams to investigate more of the daily flood of detection events with less effort.
0
0
2
@Peter_DTonomy
DTonomy
2 years
7 Free Tools That Assist Your Phishing Investigation #Phishing #Investigation
0
1
2
@Peter_DTonomy
DTonomy
4 years
Why You Need To Consider A Next Generation SOAR?
1
0
2
@Peter_DTonomy
DTonomy
3 years
@m0nster847 @anton_chuvakin agree. Security Analytics is anything that helps find threats and automate the process of decision making around the overwhelming number of security alerts.
1
0
2
@Peter_DTonomy
DTonomy
3 years
Context matters for security investigation! DTonomy automatically adds relevant incoming alerts to your cases so that you will not miss a real incident! #SIEM #SOC #securitybreach #CyberSecurity
Tweet media one
0
1
1
@Peter_DTonomy
DTonomy
5 years
WILL YOUR MACHINE BE HIT BY A MALWARE SOON? Please check out how we use machine learning to help you predict the chances of machines getting infected so that you can take actions ahead! #malware
1
0
1
@Peter_DTonomy
DTonomy
2 years
Companies deploy DLP solutions to prevent data leaking. Unsurprisingly, it generates a significant number of false-positive alerts that the security team must investigate and address. Use automation to ensure its effectiveness! #DLP #security
0
0
1
@Peter_DTonomy
DTonomy
4 years
@markmorow @MarkSimos @bettersafetynet @RavivTamir @oshezaf Adding the feedback loop/labeling increasing the precision of detection, may loose 1) the ability of detecting unknown unknown 2) the explaniablity of current UEBA. To this topic, it is indeed ML(supervised/semi-supervised).
0
0
1
@Peter_DTonomy
DTonomy
3 years
@dspark 😅such a great question!
0
0
1
@Peter_DTonomy
DTonomy
3 years
Part of the reason threats are not prioritized well is the incoming risk scores provided by vendors are not taking analysts' feedback into the risk prioritization, especially for false positives one. Some detections are noisy than others, and risk scores should reflect this. #SOC
@joltsik
Jon Oltsik
3 years
The more assets an organization has, the more they need security observability, prioritization, and validation (SOPV) technology. CISOs know this, have budget, and are now sorting through industry hype. #cybersecurity #infosec #CIS20 #SOPV #ASM #BAS
0
0
2
0
0
1
@Peter_DTonomy
DTonomy
2 years
@hackerxbella The votes so far seem consistent with what we see across our clients.
1
0
1
@Peter_DTonomy
DTonomy
2 years
@ateixei Get well soon!
0
0
1
@Peter_DTonomy
DTonomy
3 years
Big wave of phishing attacks today coming from legitimate survey sites today. Be aware of phishing emails coming from , . These weren't getting blocked since they are legitimate site. #phishing #securitybreach #soc #security
0
0
1
@Peter_DTonomy
DTonomy
7 months
Say goodbye to cyber headaches! DTonomy - your fortress against digital chaos. Lock down your systems, bid adieu to vulnerabilities, and embrace cyber peace of mind! Schedule a FREE demo: #DTonomy #CybersecurityHeroes #SecureTech
0
1
1
@Peter_DTonomy
DTonomy
5 years
Enforce Duo Enrollment for Suspected Compromised User Through DTonomy AIR platform #security #automation
0
0
1
@Peter_DTonomy
DTonomy
4 years
0
0
1
@Peter_DTonomy
DTonomy
5 years
See what are common words used in SMS spam.
Tweet media one
0
0
1
@Peter_DTonomy
DTonomy
5 years
spam detection using machine learning. #spam
1
0
1
@Peter_DTonomy
DTonomy
4 years
Great discussion with security experts organized by @SANSDefense !
@SANSDefense
SANS Cyber Defense 🧢
4 years
We're closing out #CyberDefenseForum with @CCrowMontance and @SecurityMapper and our Forum speakers here taking your questions on all things #CyberDefense .
Tweet media one
0
0
7
0
0
1
@Peter_DTonomy
DTonomy
3 years
Dear Security Analysts, which top reason lead you to resolve security alerts as false positive? #Falsepositive #SOC #SIEM #Security
I do not understand
0
Fired too many times
1
Verified with user
1
No other Indicators
0
0
0
1
@Peter_DTonomy
DTonomy
7 months
Don't let cyber threats crash your party! DTonomy's got your back with cyber superhero capes and tech wizardry to keep those digital baddies at bay. Let's turn cybersecurity into cyberFUNdamentals! #DTonomy #Cybersecurity #AI #StaySecure
0
0
1
@Peter_DTonomy
DTonomy
3 years
What we know about Kaseya Ransomware. #Kaseya #Ransomware
Tweet media one
0
0
1
@Peter_DTonomy
DTonomy
2 years
The atomic alert carries risks but does not mean you are compromised... Things are becoming more clear when the atomic alerts are chained together to tell a story. #Security #SOC
Tweet media one
0
0
1
@Peter_DTonomy
DTonomy
3 years
Which security tool is most noisy? #SOC #Security
EDR (End point D&R)
1
NDR (Network D&R)
1
Firewall
0
UEBA
0
0
0
1
@Peter_DTonomy
DTonomy
4 years
Forrester released their 2020 State of Security Operations Survey and some of the statistics are sobering. Check out our newest blog post to learn about the survey results and why we believe automation and machine learning will revolutionize cybersecurity:
0
1
1
@Peter_DTonomy
DTonomy
2 years
Happy New Year to all the cyber #security colleagues!
Tweet media one
0
0
1
@Peter_DTonomy
DTonomy
2 years
@ali_alwashali Not a SIEM ourselves. With us, it is just one line update.
1
0
1
@Peter_DTonomy
DTonomy
3 years
@m0nster847 @anton_chuvakin Agree, baseline/anomaly would help reduce the amounts of alerts(or assist) but equally important is those rarer detections which are associated with a low and slow attack and can get lost in the anomaly buckets.  Its the old problem of too few or too many detections.
0
0
1
@Peter_DTonomy
DTonomy
3 years
@fsmontenegro @hackerxbella @sherrod_im @forrester @CamlisOrg Yes. You are absolutely right. Instead of a static model, we are talking about auto-ml that continuously learns and updates. Of course, we are not expecting ML to solve all sorts of problems.
0
0
1
@Peter_DTonomy
DTonomy
3 years
How to Investigate DLP Alerts #DLP #Alerts #CyberSecurity
0
1
1
@Peter_DTonomy
DTonomy
3 years
Triaging security alerts is a time sensitive and risky task. False positives are everywhere. Early signals on true attacks are hard to distinguish from false positives. Despite lots of automation, we still miss attacks. What is the gap here? #SOC
0
0
1