Difference between revisions of "Cybersecurity"
m |
m |
||
| Line 92: | Line 92: | ||
<b>AI gets smart about cybersecurity | <b>AI gets smart about cybersecurity | ||
</b><br>Read the CNET cybersecurity article here - http://cnet.co/2gxtOGn Cyberattacks have become more sophisticated and more dangerous. Here's how Las Vegas stays safe. Subscribe to CNET: http://cnet.co/2heRhep Check out our playlists: http://cnet.co/2g8kcf4 Like us on Facebook: http://www.facebook.com/cnet | </b><br>Read the CNET cybersecurity article here - http://cnet.co/2gxtOGn Cyberattacks have become more sophisticated and more dangerous. Here's how Las Vegas stays safe. Subscribe to CNET: http://cnet.co/2heRhep Check out our playlists: http://cnet.co/2g8kcf4 Like us on Facebook: http://www.facebook.com/cnet | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
|} | |} | ||
|}<!-- B --> | |}<!-- B --> | ||
| Line 116: | Line 99: | ||
|| | || | ||
<youtube>ca-C3voZwpM</youtube> | <youtube>ca-C3voZwpM</youtube> | ||
| − | <b> | + | <b>How Israel Rules The World Of Cyber Security | VICE on HBO |
| − | </b><br> | + | </b><br>U.S. intelligence agencies accuse Russia of hacking the 2016 presidential election, a Ben Ferguson travels to Tel Aviv to find out how Israel is on its way to becoming the world's top cyber superpower. Subscribe to VICE News here: http://bit.ly/Subscribe-to-VICE-News Check out VICE News for more: http://vicenews.com Follow VICE News here: Facebook: https://www.facebook.com/vicenews |
|} | |} | ||
|<!-- M --> | |<!-- M --> | ||
| Line 124: | Line 107: | ||
|| | || | ||
<youtube>7RQH8oECSyg</youtube> | <youtube>7RQH8oECSyg</youtube> | ||
| − | <b> | + | <b>Machine Learning Techniques for Cyber Security |
| − | </b><br> | + | </b><br>An introduction to machine learning and its applications in cyber-security. Presented by Vahid Behzadan for the OWASP Nettacker team. |
|} | |} | ||
|}<!-- B --> | |}<!-- B --> | ||
| Line 133: | Line 116: | ||
|| | || | ||
<youtube>SdEPqFCC13U</youtube> | <youtube>SdEPqFCC13U</youtube> | ||
| − | <b> | + | <b>Semi Supervised Learning In An Adversarial Environment |
| − | </b><br> | + | </b><br>DataWorks Summit |
|} | |} | ||
|<!-- M --> | |<!-- M --> | ||
| Line 141: | Line 124: | ||
|| | || | ||
<youtube>t1Swvz2dpUQ</youtube> | <youtube>t1Swvz2dpUQ</youtube> | ||
| − | <b> | + | <b>"Security: Computing in an Adversarial Environment," Carrie Gates |
| − | </b><br> | + | </b><br>Apr. 12, 2012: "Security: Computing in an Adversarial Environment," presented by Carrie Gates, CA Labs; moderated by Christopher W. Clifton, Purdue University. Security is inherently different from other aspects of computing due to the presence of an adversary. As a result, identifying and addressing security vulnerabilities requires a different mindset from traditional engineering. Proper security engineering—or the lack of it!—affects everything from website scripts to supply chain management to electronic health records to social networks to mobile phones...and the list goes on. Security is further complicated by the translation of social notions—such as identity and trust— into an online world. Worse, security itself is often viewed by both developers and users as the adversary! This learning webinar will introduce the fundamentals of security, describe the security mindset, and highlight why achieving security is difficult. What you'll learn: * The security mindset -- what it is, why it's needed * The social side of security -- usability, adoption, identity, trust |
| + | * A deeper dive on insider threat as a case study -- what it is, how to detect it, how to prevent it Presenter: Carrie Gates, Senior Vice President and Director of Research, CA Labs Dr. Gates has opened new avenues for collaboration in the field of cyber security for CA Technologies by leveraging government programs that further research between CA Labs and academia. She has given over 20 invited talks internationally, authored more than 40 peer-reviewed publications related to information security, and co-authored an amendment on cloud security research for the America Competes Act that was signed into law in December 2010. In October 2010, Dr. Gates was recognized for her work with a Women of Influence award from CSO magazine. Moderator: | ||
| + | Christopher W. Clifton, Associate Professor of Computer Science, Purdue University Dr. Clifton works on data privacy, particularly with respect to analysis of private data. | ||
|} | |} | ||
|}<!-- B --> | |}<!-- B --> | ||
Revision as of 19:19, 5 October 2020
Youtube search... ...Google search
- Case Studies
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Defense: Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT)
- Cybersecurity: Evaluating & Selling
- (Artificial) Immune System
- 5G Security
- Useful Models ...find outliers:
- Detecting Malicious Requests with Keras & TensorFlow | Adam Kusey - Medium
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
- graphistry.com
- Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov
- TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov predict whether AI systems have been corrupted through so-called “Trojan attacks.”
- Adversarial Attacks on Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning
- Breaking Down the Tencent 2018 Cybersecurity Report
- Chronicle combines all the best parts of Google and X culture
- Fraud and Anomaly Detection | Chris Nicholson - A.I. Wiki pathmind
- The Cyber Security Evaluation Tool (CSET®) | National Cybersecurity and Communications Integration Center ...provides a systematic, disciplined, and repeatable approach for evaluating an organization’s security posture
- Watch me Build a Cybersecurity Startup | Siraj Raval
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Fraud Detection
- Introduction to Fraud Detection Systems | Miguel Gonzalez-Fierro, Microsoft
- AI for Health Insurance Fraud Detection – Current Applications | Niccolo Mejia
|
|
|
|
Data Center Security
|
|
|
|
|
|