Difference between revisions of "Cybersecurity"
(→Insight Engines) |
|||
| Line 98: | Line 98: | ||
* [http://www.csoonline.com/article/3253244/network-security/ask-me-anything-insight-engines-lets-you-talk-your-network-into-revealing-threats.html Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO] | * [http://www.csoonline.com/article/3253244/network-security/ask-me-anything-insight-engines-lets-you-talk-your-network-into-revealing-threats.html Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO] | ||
* [http://insightengines.com/ Insight Engines] | * [http://insightengines.com/ Insight Engines] | ||
| + | * [[AI-Powered Search]] | ||
<youtube>aJkzK_e5x78</youtube> | <youtube>aJkzK_e5x78</youtube> | ||
| − | <youtube> | + | <youtube>Imdeaw2Vo9E</youtube> |
== National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS) == | == National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS) == | ||
Revision as of 20:37, 1 August 2018
- Cybersecurity References
- Defense
- Offense - Adversarial Threats/Attacks
- Government Services
- Capabilities
- Cybersecurity Frameworks, Architectures & Roadmaps
- Radial Basis Function Network (RBFN)
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
Contents
Splunk
- Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO
- Insight Engines
BluVector
- Review: BluVector enables machines to protect themselves | CSO
- Comparing BluVector, Darktrace | Gertner
- Comparing BluVector, NSFOCUS | Gertner
- BluVector Cortex
CISCO
Bricata
Darktrace
ExtraHop
Watson
Insight Engines
- Ask me anything: Insight Engines lets you talk your network into revealing threats | CSO
- Insight Engines
- AI-Powered Search
National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Federal Risk and Authorization Management Program (FedRAMP) | NIST
- Cybersecurity Framework | NIST
- Using the Cybersecurity Framework | DHS
- Cybersecurity Strategy .pdf | DHS
- Cybersecurity Framework - US-CERT | DHS
- Cybersecurity - Software Engineering Institute | Carnegie Mellon
Selling & Evaluating
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence