Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
Line 6: Line 6:
  
 
<youtube>zGBJ7iH0xOw</youtube>
 
<youtube>zGBJ7iH0xOw</youtube>
<youtube>E5StCBRk6qo</youtube>
 
 
<youtube>ojTz7bOjT6o</youtube>
 
<youtube>ojTz7bOjT6o</youtube>
 
<youtube>WFrj3sdcOIU</youtube>
 
<youtube>WFrj3sdcOIU</youtube>
Line 14: Line 13:
 
<youtube>t1Swvz2dpUQ</youtube>
 
<youtube>t1Swvz2dpUQ</youtube>
 
<youtube>L3200ry4ysw</youtube>
 
<youtube>L3200ry4ysw</youtube>
 +
 +
== Darktrace ==
 +
<youtube>E5StCBRk6qo</youtube>
 +
<youtube>nc32nUDyxaI</youtube>
 +
 +
== Watson ==
 
<youtube>MYZOIdK4o1M</youtube>
 
<youtube>MYZOIdK4o1M</youtube>
 +
<youtube>VGEz1mKqtaQ</youtube>
 +
<youtube>ShxYctvwYQw</youtube>
 +
<youtube>xG9jazUpEus</youtube>
  
 
== Selling & Evaluating ==
 
== Selling & Evaluating ==

Revision as of 13:39, 11 June 2018

Youtube search...

Darktrace

Watson

Selling & Evaluating

YouTube search...

Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?

  • Outcomes evaluation, not processing
  • Product currently being used, or has been validated in a proof of concept (POC) trial
  • Interaction with human intelligence

General Cybersecurity

YouTube search...