Cybersecurity
Contents
Darktrace
Watson
Selling & Evaluating
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence
General Cybersecurity
- Cybersecurity Systems Security | MIT
- 11 Steps Attackers Took to Crack Target - stolen credentials of an HVAC vendor | CIO
NIST & U.S. DEPARTMENT OF HOMELAND SECURITY (DHS)
- FedRAMP publications | NIST
- Cybersecurity Framework | NIST
- Using the Cybersecurity Framework | DHS
- Cybersecurity Strategy .pdf | DHS
- Cybersecurity Framework - US-CERT | DHS
- Cybersecurity - Software Engineering Institute | Carnegie Mellon