Difference between revisions of "Cybersecurity: Evaluating & Selling"
m (Text replacement - "http:" to "https:") |
m |
||
| Line 4: | Line 4: | ||
** [[Risk, Compliance and Regulation]] | ** [[Risk, Compliance and Regulation]] | ||
*** [[Cybersecurity]] | *** [[Cybersecurity]] | ||
| − | + | * [[Government Services]] | |
| + | ** [[National Institute of Standards and Technology (NIST)]] | ||
| + | ** [[U.S. Department of Homeland Security (DHS)]] | ||
** [[Defense]] | ** [[Defense]] | ||
* [[Capabilities]] | * [[Capabilities]] | ||
| Line 12: | Line 14: | ||
* [[Cybersecurity Companies/Products]] | * [[Cybersecurity Companies/Products]] | ||
* [[Evaluation#Procuring| Evaluation : Procuring]] | * [[Evaluation#Procuring| Evaluation : Procuring]] | ||
| − | |||
* [[Radial Basis Function Network (RBFN)]] | * [[Radial Basis Function Network (RBFN)]] | ||
* [https://www.csoonline.com/article/3206685/security/best-security-software-how-cutting-edge-tools-tackle-todays-threats.amp.html Best security software: How 12 cutting-edge tools tackle today's threats | CSO] | * [https://www.csoonline.com/article/3206685/security/best-security-software-how-cutting-edge-tools-tackle-todays-threats.amp.html Best security software: How 12 cutting-edge tools tackle today's threats | CSO] | ||
Revision as of 07:39, 5 May 2023
- Case Studies
- Government Services
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Evaluation : Procuring
- Radial Basis Function Network (RBFN)
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence
|
|
|
|