Why Vulnerability Management Needs Machine Learning
The concept of vulnerability management has been around for quite some time now – dating back to the late 1990’s when NIST started cataloging vulnerabilities and tools like Nessus first became..
Machine Learning: Business Economics
Today we discuss the economics involved in a machine learning business – and different approaches taken in productizing machine learning.
Conducting a Proof-of-Concept for a Cybersecurity Machine Learning Solution
Machine Learning has much promise for cybersecurity and this has led to excitement and a desire to move forward with a proof-of-concept (POC) with vendors of a machine learning driven security..
New Resource on Cybersecurity and Machine Learning
The Evolution of the Application of ML to Threat Prediction
The founding team at CYR3CON didn’t suddenly consider the application of machine learning to cybersecurity overnight. The ideas evolved from a series of efforts that spanned over a decade.
Q&A: The Oldsmar Cyber Attack
The Machine Learning Technique You Unknowingly Use Every Day
Did you know you're using a type of machine learning – called unsupervised machine learning – almost every day?
Get Ready For AI’s Impact on Security
This week we’re presenting at the Ai4 Cybersecurity virtual conference – an event we are quite excited about. The theme of the conference is exactly as one would expect by its name: guide the..
3 Strategies to Take Vulnerability Management to the Next Level
As vulnerability management evolves – both in terms of the amount of attack surface covered as well as in its direct connection to risk - CISOs are finding that a vulnerability management team..
Evaluating Machine Learning Performance: Understanding Precision and Recall
Precision and recall are two of the widest-used measurements of performance in machine learning and are also very relevant to cybersecurity applications.