Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
(Evaluating Security Offerings)
Line 13: Line 13:
  
 
== Evaluating Security Offerings ==
 
== Evaluating Security Offerings ==
 +
[http://www.youtube.com/results?search_query=~Evaluating+cyber+~Security+~products+artifical+intelligence+ai+ YouTube search...]
 +
 +
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
 +
 +
* Outcomes evaluation, not processing
 +
* Product currently being used, or has been validated in a proof of concept (POC) trial
 +
* Interaction with human intelligence
 +
 
<youtube>xoBWBNsjWoM</youtube>
 
<youtube>xoBWBNsjWoM</youtube>

Revision as of 10:30, 11 June 2018

Youtube search...

Evaluating Security Offerings

YouTube search...

Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?

  • Outcomes evaluation, not processing
  • Product currently being used, or has been validated in a proof of concept (POC) trial
  • Interaction with human intelligence