Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
(General Cybersecurity)
(Selling & Evaluating)
Line 39: Line 39:
 
<youtube>xoBWBNsjWoM</youtube>
 
<youtube>xoBWBNsjWoM</youtube>
 
<youtube>-5dr1DCh_CU</youtube>
 
<youtube>-5dr1DCh_CU</youtube>
 +
<youtube>LB6Yk2wh81E</youtube>
 
<youtube>rcG_QL9GWaA</youtube>
 
<youtube>rcG_QL9GWaA</youtube>
  

Revision as of 14:17, 11 June 2018

Youtube search...

Darktrace

Youtube search...

Watson

Youtube search...

Selling & Evaluating

YouTube search...

Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?

  • Outcomes evaluation, not processing
  • Product currently being used, or has been validated in a proof of concept (POC) trial
  • Interaction with human intelligence

General Cybersecurity

YouTube search...

The Cybersecurity Framework - NIST

YouTube search...