Why Vulnerability Management Needs Machine Learning
The concept of vulnerability management has been around for quite some time now – dating back to the late 1990’s when NIST started cataloging vulnerabilities and tools like Nessus first became..
Machine Learning: Business Economics
Today we discuss the economics involved in a machine learning business – and different approaches taken in productizing machine learning.
Conducting a Proof-of-Concept for a Cybersecurity Machine Learning Solution
Machine Learning has much promise for cybersecurity and this has led to excitement and a desire to move forward with a proof-of-concept (POC) with vendors of a machine learning driven security..
New Resource on Cybersecurity and Machine Learning
The Evolution of the Application of ML to Threat Prediction
The founding team at CYR3CON didn’t suddenly consider the application of machine learning to cybersecurity overnight. The ideas evolved from a series of efforts that spanned over a decade.
The Machine Learning Technique You Unknowingly Use Every Day
Did you know you're using a type of machine learning – called unsupervised machine learning – almost every day?
Get Ready For AI’s Impact on Security
This week we’re presenting at the Ai4 Cybersecurity virtual conference – an event we are quite excited about. The theme of the conference is exactly as one would expect by its name: guide the..
Evaluating Machine Learning Performance: Understanding Precision and Recall
Precision and recall are two of the widest-used measurements of performance in machine learning and are also very relevant to cybersecurity applications.
Why the NIST CVSS Score is NOT Machine Learning
The NIST CVSS score is widely used to prioritize vulnerabilities in many products and by many security teams. This video discusses why this scoring method is not machine learning, and why CVSS..