Difference between revisions of "Cybersecurity"
| Line 6: | Line 6: | ||
<youtube>zGBJ7iH0xOw</youtube> | <youtube>zGBJ7iH0xOw</youtube> | ||
| − | |||
<youtube>ojTz7bOjT6o</youtube> | <youtube>ojTz7bOjT6o</youtube> | ||
<youtube>WFrj3sdcOIU</youtube> | <youtube>WFrj3sdcOIU</youtube> | ||
| Line 14: | Line 13: | ||
<youtube>t1Swvz2dpUQ</youtube> | <youtube>t1Swvz2dpUQ</youtube> | ||
<youtube>L3200ry4ysw</youtube> | <youtube>L3200ry4ysw</youtube> | ||
| + | |||
| + | == Darktrace == | ||
| + | <youtube>E5StCBRk6qo</youtube> | ||
| + | <youtube>nc32nUDyxaI</youtube> | ||
| + | |||
| + | == Watson == | ||
<youtube>MYZOIdK4o1M</youtube> | <youtube>MYZOIdK4o1M</youtube> | ||
| + | <youtube>VGEz1mKqtaQ</youtube> | ||
| + | <youtube>ShxYctvwYQw</youtube> | ||
| + | <youtube>xG9jazUpEus</youtube> | ||
== Selling & Evaluating == | == Selling & Evaluating == | ||
Revision as of 13:39, 11 June 2018
Darktrace
Watson
Selling & Evaluating
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence
General Cybersecurity
- Cybersecurity Systems Security | MIT
- 11 Steps Attackers Took to Crack Target - stolen credentials of an HVAC vendor | CIO