The Evolution of the Application of ML to Threat Prediction
The founding team at CYR3CON didn’t suddenly consider the application of machine learning to cybersecurity overnight. The ideas evolved from a series of efforts that spanned over a decade.
The Difference Between Artificial Intelligence and Machine Learning
Have you ever spoken to a salesman who starts the pitch using the term Machine Learning, but later switches to the term “Artificial Intelligence”? This seems rather imprecise – especially for..
Predicting Vulnerabilities Used by State-Sponsored Hackers
How Vulnerability Management Teams Can Do More With Less
Exposed Vulnerabilities on a DoD Server: Why Intelligence Should Have Driven Early Mitigation
Last week it was reported that two RCE vulnerabilities were found to be exposed on a DoD server. These were apparently exposed for about a year.
Identify and Mitigate Systemic Cyber Threat
For CISO’s responsible for a portfolio of companies – whether at a private equity firm, holding company, or even just a large firm with multiple business units, understanding cyber threats that..
Interview with Ed Amoroso of TAG Cyber
Last year, I had the good fortune to sit down and talk with Ed Amoroso, CEO of TAG Cyber, a top-notch cybersecurity research firm.
ML for Cybersecurity
Ever since we started CYR3CON, we are continually surprised at the hype cycle surrounding the application of machine learning.
Cybersecurity Crisis Management (CCM) Considerations - A 7-Step Strategy
Does your organization have a stated cybersecurity crisis management (CCM) strategy? If you said “no,” then by implication your actual strategy is to rely on your team’s experiential-based gut..