Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
(BluVector)
(CISCO)
Line 47: Line 47:
 
<youtube>WFrj3sdcOIU</youtube>
 
<youtube>WFrj3sdcOIU</youtube>
 
<youtube>0yKHmsCGjlE</youtube>
 
<youtube>0yKHmsCGjlE</youtube>
 +
<youtube>Jb8U1BrJlXo</youtube>
 +
<youtube>aXdlmhCBwfk</youtube>
  
 
== Bricata - Intrusion detection ==
 
== Bricata - Intrusion detection ==

Revision as of 22:08, 31 July 2018

Youtube search...




BluVector - Network security

Youtube search...

CISCO

Youtube search...

Bricata - Intrusion detection

Youtube search...

Darktrace

Youtube search...

Watson

Youtube search...

ExtraHop

Youtube search...


National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)

YouTube search...

Selling & Evaluating

YouTube search...

Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?

  • Outcomes evaluation, not processing
  • Product currently being used, or has been validated in a proof of concept (POC) trial
  • Interaction with human intelligence