Difference between revisions of "Cybersecurity: Evaluating & Selling"

From
Jump to: navigation, search
m
Line 11: Line 11:
 
* [[Cybersecurity Frameworks, Architectures & Roadmaps]]
 
* [[Cybersecurity Frameworks, Architectures & Roadmaps]]
 
* [[Cybersecurity Companies/Products]]
 
* [[Cybersecurity Companies/Products]]
 +
* [[Evaluation#Procuring| Evaluation : Procuring]]
 
* [[Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)]]
 
* [[Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)]]
 
* [[Radial Basis Function Network (RBFN)]]
 
* [[Radial Basis Function Network (RBFN)]]

Revision as of 14:39, 6 September 2020

YouTube search...

Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?

  • Outcomes evaluation, not processing
  • Product currently being used, or has been validated in a proof of concept (POC) trial
  • Interaction with human intelligence