Life in the Swimlane with Principal Data Scientist, Dima Skorokhodov

Here we will feature interviews with Swimlaners to learn more about their experience.
This series will give you a preview of Swimlane, our culture, and the people who keep us going.
I have lived in London for 6 years now, but I was born and grew up in Dnipro, Ukraine.
Math became my passion from the age of 14, mainly thanks to my Math teacher, Vadim Kirman.
During university years I participated in several National and International mathematical competitions.
In 2010, I defended PhD thesis in math, the Approximation Theory, to be precise.
I've been with Swimlane for almost a year now driving AI & ML features and innovations at Swimlane.
This includes exploration and research of the ways to solve complex business problems, implementation of the found approaches in the product, and monitoring their performance in production.
I enjoy solving the wide spectrum of problems in my line of work.
I like the culture and professionalism that all Swimlane folks bring to the table.
On the weekends, I like hiking in the countryside with my wife.
I also enjoy doing some mathematical research and solving problems from recent mathematical olympiads.
You may think of the later as just a bad habit that persisted from school years.
I regularly help with preparation of problems for regional mathematical olympiads for students.
I soon dropped this idea after fainting during a visit to the anatomical museum.
I would like Swimlane to build an outstanding suite of AI features that would be extensively used and loved by our customers.
Life in the Swimlane Swimlane is a rapidly growing, innovative startup in the Denver metro area with a passionate team focused on improving the lives of security practitioners through security automation and orchestration.
We're always looking for dedicated, ambitious problem solvers who thrive in a fast-paced work environment to join our team.


This Cyber News was published on securityboulevard.com. Publication date: Tue, 09 Jan 2024 01:13:05 +0000


Cyber News related to Life in the Swimlane with Principal Data Scientist, Dima Skorokhodov

Life in the Swimlane with Principal Data Scientist, Dima Skorokhodov - Here we will feature interviews with Swimlaners to learn more about their experience. This series will give you a preview of Swimlane, our culture, and the people who keep us going. I have lived in London for 6 years now, but I was born and grew up ...
10 months ago Securityboulevard.com
Why RV Connex Chose Swimlane As "The Powerhouse" Of Their SOC - RV Connex is a Thailand-based company that specializes in national defense and space manufacturing. Since RV Connex has implemented security automation they have achieved significant progress. Tanajak Watanakij, Vice President of Cybersecurity and ...
11 months ago Securityboulevard.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
2 months ago Aws.amazon.com
Life in the Swimlane with Kevin Mata, Director of Cloud Operations and Automation - Here we will feature interviews with Swimlaners to learn more about their experience. This series will give you a preview of Swimlane, our culture, and the people who keep us going. I was born and raised in San Diego and still currently live here. I ...
11 months ago Securityboulevard.com
Clear Spring Life and Annuity Company Announces Data Breach Following Ransomware Attack - On November 21, 2023, Clear Spring Life and Annuity Company filed a notice of data breach with the Attorney General of California after discovering a February 2023 ransomware attack. In this notice, Clear Spring explains that the incident resulted in ...
1 year ago Jdsupra.com
Microsoft Breach - How Can I See This In BloodHound? - On January 25, 2024, Microsoft announced Russia's foreign intelligence service breached their corporate EntraID environment. We reviewed the information Microsoft's team provided in their post which contained details significant enough to explain ...
10 months ago Securityboulevard.com
From the SOC to Everyday Success: Data-Driven Life Lessons from a Security Analyst - Many of you have likely noticed that I enjoy looking for life lessons in the real-world that we can apply to the challenges we face in the security domain. I'd like to try and take the lessons I learned during my time as a security analyst working in ...
5 months ago Securityweek.com
Building a Sustainable Data Ecosystem - Finally, I outline future research and policy refinement directions, advocating for a collaborative and responsible approach to building a sustainable data ecosystem in generative AI. In recent years, generative AI has emerged as a transformative ...
8 months ago Feeds.dzone.com
CVE-2022-0866 - This is a concurrency issue that can result in the wrong caller principal being returned from the session context of an EJB that is configured with a RunAs principal. In particular, the org.jboss.as.ejb3.component.EJBComponent class has an ...
2 years ago
Decoding the data dilemma: Strategies for effective data deletion in the age of AI - Businesses today have a tremendous opportunity to use data in new ways, but they must also look at what data they keep and how they use it to avoid potential legal issues. Forrester predicts a doubling of unstructured data in 2024, driven in part by ...
8 months ago Venturebeat.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
11 months ago Helpnetsecurity.com
When a Data Mesh Doesn't Make Sense - The data mesh is a thoughtful decentralized approach that facilitates the creation of domain-driven, self-service data products. Data mesh-including data mesh governance-requires the right mix of process, tooling, and internal resources to be ...
8 months ago Feeds.dzone.com
Data Classification: Your 5 Minute Guide - Data classification has become a vital component of data security governance. With the rise of virtual data networks, organizations must take necessary measures to protect and secure confidential information. Data classification is the process of ...
1 year ago Tripwire.com
Data Classification Software Features to Look Out For - For organizations looking to improve their data protection and data compliance strategies, technology is essential. Implementation of the right software can help you gain visibility into your company's data, improving your ability to protect customer ...
11 months ago Securityboulevard.com
Data Protection in Educational Institutions - This article delves into the significance of data protection in educational institutions, emphasizing three key areas: the types of educational data, data privacy regulations, and data protection measures. Lastly, robust data protection measures are ...
11 months ago Securityzap.com
Claroty Team82: 63% of Known Exploited Vulnerabilities Tracked by CISA Are on Healthcare Organization Networks - PRESS RELEASE. NEW YORK and ORLANDO, Fla., March 12, 2024/PRNewswire/ -Claroty, the cyber-physical systems protection company, released today at the annual HIMSS24 conference a new report that uncovered concerning data about the security of medical ...
8 months ago Darkreading.com
New Microsoft Purview features use AI to help secure and govern all your data - More than 90% of organizations use multiple cloud infrastructures, platforms, and services to run their business, adding complexity to securing all data.1Microsoft Purview can help you secure and govern your entire data estate in this complex and ...
11 months ago Microsoft.com
Developing Software Applications Under the Guidance of Data-Driven Decision-Making Principles - To architect and cultivate an application that yields precise outputs in alignment with business requirements, paramount emphasis must be given to the foundational data and the pertinent data scenarios shaping the application. Software application ...
9 months ago Feeds.dzone.com
Three security data predictions for 2024 - New and updated regulations, along with increased scrutiny from the SEC, put a strain on governance, risk and compliance teams to manage an organization's security, risk and compliance posture. At the end of the day, security teams' jobs are to ...
11 months ago Helpnetsecurity.com
Municipalities Face a Constant Battle as Ransomware Snowballs - Municipalities in the United States, and globally, are experiencing a fresh wave of ransomware attacks, with even big cities like Dallas falling to the gangs' activities. In a prime example of the trend, on Nov. 7, the Play ransomware gang posted ...
11 months ago Darkreading.com
What the Future Holds for Data Security - Data security refers to protective measures used to prevent unauthorized access to sensitive personal and business data. Data security is not just about keeping hackers at bay. It also covers practices like data encryption, data masking, data loss ...
11 months ago Securityboulevard.com
Data Governance: MDM and RDM - Data governance is a framework that is developed through the collaboration of individuals with various roles and responsibilities. These goals may include providing reliable data for business operations, developing accurate analytics to assess ...
11 months ago Feeds.dzone.com
'Sex life data' stolen from UK government among record number of ransomware attacks - Data on the sex lives of up to 10,000 people was stolen from a British government department in one of the record number of ransomware attacks to have hit Westminster in the first half of this year. It is not known which department the information ...
1 year ago Therecord.media
Data Privacy and Security - Organizations are gradually becoming concerned regarding data security in several instances, such as collecting and retaining sensitive information and processing personal information in external environments, which include information sharing and ...
11 months ago Feeds.dzone.com
How To Implement Data Management Into Your AI Strategy - While an AI strategy has different components, including infrastructure, technology stack, organizational changes, and more, the most important is the data strategy. A well-defined data strategy is the foundation for successful AI implementation. AI ...
11 months ago Feeds.dzone.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)