Difference between revisions of "Cybersecurity: Evaluating & Selling"
m |
|||
Line 11: | Line 11: | ||
* [[Cybersecurity Frameworks, Architectures & Roadmaps]] | * [[Cybersecurity Frameworks, Architectures & Roadmaps]] | ||
* [[Cybersecurity Companies/Products]] | * [[Cybersecurity Companies/Products]] | ||
+ | * [[Evaluation#Procuring| Evaluation : Procuring]] | ||
* [[Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)]] | * [[Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)]] | ||
* [[Radial Basis Function Network (RBFN)]] | * [[Radial Basis Function Network (RBFN)]] |
Revision as of 14:39, 6 September 2020
- Case Studies
- Capabilities
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Cybersecurity Frameworks, Architectures & Roadmaps
- Cybersecurity Companies/Products
- Evaluation : Procuring
- Cybersecurity: National Institute of Standards and Technology (NIST) & U.S. Department of Homeland Security (DHS)
- Radial Basis Function Network (RBFN)
- Best security software: How 12 cutting-edge tools tackle today's threats | CSO
Security vendors are inundating CISOs with products purporting to use machine intelligence, much of this messaging is confusing, even misleading. How to determine fact from fiction?
- Outcomes evaluation, not processing
- Product currently being used, or has been validated in a proof of concept (POC) trial
- Interaction with human intelligence