Deep learning has become a favorite buzzword of marketers. If you saw our earlier video blog, you’ll know it's another technique in the machine learning toolkit – and a very powerful one.
How did deep learning get so popular, and where is its use most appropriate? In this video, we discuss this exciting new technology and how it is impacting cybersecurity.
Contact us today to get your Predictive Threat Assessment and see the difference the correct application of machine learning can make in your vulnerability management program.
ATT&CK and Vulnerability Management Part 5: Disrupting Attack Sequences through Vulnerability Management
Docker/Kubernetes Part 6: Common Weakness Enumeration (CWE)
ATT&CK and Vulnerability Management Part 4: Using Intelligence to Generate Attack Sequences
ATT&CK and Vulnerability Management Part 3: Considerations in Aligning CVEs and ATT&CK Techniques