Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
Line 5: Line 5:
 
* [[Offense - Adversarial Threats/Attacks]]
 
* [[Offense - Adversarial Threats/Attacks]]
 
* [[Capabilities]]  
 
* [[Capabilities]]  
 +
* [[Radial Basis Function Network (RBFN)]]
 
* [http://www.youtube.com/watch?v=GqmQg-cszw4&list=PLUl4u3cNGP62K2DjQLRxDNRi0z2IRWnNh&index=1 Cybersecurity Systems Security | MIT]
 
* [http://www.youtube.com/watch?v=GqmQg-cszw4&list=PLUl4u3cNGP62K2DjQLRxDNRi0z2IRWnNh&index=1 Cybersecurity Systems Security | MIT]
 
* [http://www.cio.com/article/2600345/security0/11-steps-attackers-took-to-crack-target.html 11 Steps Attackers Took to Crack Target - stolen credentials of an HVAC vendor  | CIO]
 
* [http://www.cio.com/article/2600345/security0/11-steps-attackers-took-to-crack-target.html 11 Steps Attackers Took to Crack Target - stolen credentials of an HVAC vendor  | CIO]

Revision as of 16:16, 28 June 2018

Youtube search...

Darktrace

Youtube search...

Watson

Youtube search...


National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)

YouTube search...

Selling & Evaluating

YouTube search...

Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?

  • Outcomes evaluation, not processing
  • Product currently being used, or has been validated in a proof of concept (POC) trial
  • Interaction with human intelligence