Difference between revisions of "Cybersecurity"
| Line 9: | Line 9: | ||
* [[Radial Basis Function Network (RBFN)]] | * [[Radial Basis Function Network (RBFN)]] | ||
| − | |||
<youtube>cjo_u_yT2wQ</youtube> | <youtube>cjo_u_yT2wQ</youtube> | ||
<youtube>YiUN35Ikdfw</youtube> | <youtube>YiUN35Ikdfw</youtube> | ||
| Line 23: | Line 22: | ||
<youtube>t1Swvz2dpUQ</youtube> | <youtube>t1Swvz2dpUQ</youtube> | ||
<youtube>L3200ry4ysw</youtube> | <youtube>L3200ry4ysw</youtube> | ||
| + | <youtube>R9lkyJL2LlQ</youtube> | ||
| + | |||
== Darktrace == | == Darktrace == | ||
Revision as of 17:41, 18 July 2018
- Cybersecurity References
- Defense - Anomaly Detection
- Offense - Adversarial Threats/Attacks
- Government Services
- Capabilities
- Cybersecurity Frameworks, Architectures & Roadmaps
- Radial Basis Function Network (RBFN)
Contents
Darktrace
Watson
National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Federal Risk and Authorization Management Program (FedRAMP) | NIST
- Cybersecurity Framework | NIST
- Using the Cybersecurity Framework | DHS
- Cybersecurity Strategy .pdf | DHS
- Cybersecurity Framework - US-CERT | DHS
- Cybersecurity - Software Engineering Institute | Carnegie Mellon
Selling & Evaluating
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence