Difference between revisions of "Cybersecurity"
(→BluVector) |
|||
| Line 30: | Line 30: | ||
| − | == BluVector == | + | == BluVector - Network security == |
[http://www.youtube.com/results?search_query=BluVector Youtube search...] | [http://www.youtube.com/results?search_query=BluVector Youtube search...] | ||
| Line 38: | Line 38: | ||
<youtube>LqZvvA_RAfE</youtube> | <youtube>LqZvvA_RAfE</youtube> | ||
<youtube>MUfuOT0emfs</youtube> | <youtube>MUfuOT0emfs</youtube> | ||
| + | |||
| + | == CISCO == | ||
| + | [http://www.youtube.com/results?search_query=CISCO+security Youtube search...] | ||
| + | |||
| + | * [http://www.csoonline.com/article/3281454/security/cisco-poised-to-become-a-cybersecurity-force.html Cisco poised to become a cybersecurity force | CSO] | ||
| + | * [http://www.cisco.com/c/en/us/products/security/solution-listing.html CISCO] | ||
| + | |||
| + | <youtube>WFrj3sdcOIU</youtube> | ||
| + | <youtube>0yKHmsCGjlE</youtube> | ||
| + | |||
| + | == Bricata - Intrusion detection == | ||
| + | [http://www.youtube.com/results?search_query=Bricata Youtube search...] | ||
| + | |||
| + | * [http://www.csoonline.com/article/3263728/network-security/review-bricata-adds-threat-hunting-to-traditional-ips-ids.html Review: Bricata adds threat hunting to traditional IPS/IDS | CSO] | ||
| + | * [http://www.bricata.com/ Bricata] | ||
| + | |||
| + | <youtube>SjVpJnfZGLE</youtube> | ||
| + | <youtube>2ClVZNb4mGM</youtube> | ||
== Darktrace == | == Darktrace == | ||
Revision as of 21:59, 31 July 2018
- Cybersecurity References
- Defense
- Offense - Adversarial Threats/Attacks
- Government Services
- Capabilities
- Cybersecurity Frameworks, Architectures & Roadmaps
- Radial Basis Function Network (RBFN)
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
Contents
BluVector - Network security
CISCO
Bricata - Intrusion detection
Darktrace
Watson
ExtraHop
National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Federal Risk and Authorization Management Program (FedRAMP) | NIST
- Cybersecurity Framework | NIST
- Using the Cybersecurity Framework | DHS
- Cybersecurity Strategy .pdf | DHS
- Cybersecurity Framework - US-CERT | DHS
- Cybersecurity - Software Engineering Institute | Carnegie Mellon
Selling & Evaluating
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence