Back to Main Navigation

PREDICT EXPLOITS

REDUCE COSTS

PREDICTION FOR THE CLOUD

ADVANCED CAPABILITIES

Back to Main Navigation

Resources

Predictive Threat Assessment Sign Up

Watch Now

PR1ORITY Product Demo
Back to Main Navigation

About CYR3CON

Come Join Us

CYR3CON is always looking for top talent to join our team.
View Openings
Back to Main Navigation

Take the next step to be in the know, now.

Complete the form and a member of the CYR3CON team will contact you shortly to discuss your cyber security needs.

Contact Form

Blog

Paulo Shakarian

Recent Posts

Evaluating Machine Learning Performance: Understanding Precision and Recall

Paulo Shakarian on Jan 21, 2021 5:00:00 AM

Precision and recall are two of the widest-used measurements of performance in machine learning and are also very relevant to cybersecurity applications. 

Why the NIST CVSS Score is NOT Machine Learning

Paulo Shakarian on Jan 19, 2021 5:00:00 AM

The NIST CVSS score is widely used to prioritize vulnerabilities in many products and by many security teams.  This video discusses why this scoring method is not machine learning, and why CVSS..

Understanding Deep Learning

Paulo Shakarian on Jan 13, 2021 12:42:47 PM

 

Did you know you’ve already done some machine learning?

Paulo Shakarian on Jan 11, 2021 6:40:53 PM

Did you know you’ve already done some machine learning in your life? 

Most people are surprised to find out that some simple problems from their high school years can be thought of as machine..

3 Common Pitfalls When Applying Machine Learning to Cybersecurity

Paulo Shakarian on Jan 6, 2021 7:04:31 PM

In today’s episode, we discuss three pitfalls commonly seen when applying machine learning to cybersecurity. 

Understanding the SolarWinds Hack:  Echoes of NotPetya

Paulo Shakarian on Dec 21, 2020 9:26:36 AM

Last week we heard of software companies around the world being breached due to a compromised software update process in SolarWinds Orion software.  This tactic, which leverages the trust..

Asset-Based vs. Threat-Based Risk Management

Paulo Shakarian on Dec 16, 2020 5:36:12 PM

Asset-Based vs. Threat-Based Risk Management 

The Vulnerabilities FireEye Hackers will Start to Use

Paulo Shakarian on Dec 11, 2020 9:53:18 AM

Earlier in the week, it was reported that FireEye was breached – likely by Russian hackers.  The hackers supposedly were seeking penetration testing tools used by FireEye’s services to probe..

We Patch Everything...

Paulo Shakarian on Dec 7, 2020 7:10:18 PM

In talking with many Chief Security Officers, we hear consistently that vulnerability prioritization is a difficult issue.  Indeed, a recent study by the Ponemon Institute showed nearly 60% of..

The Difference Between Artificial Intelligence and Machine Learning

Paulo Shakarian on Dec 2, 2020 6:02:43 PM

Have you ever spoken to a salesman who starts the pitch using the term Machine Learning, but later switches to the term “Artificial Intelligence”?  This seems rather imprecise – especially for..