-
Silas Adams wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Executive Summary:
agrofresh-executive-summary
PowerPoint:
reconnaissance-analysis-agrofresh-holdings-berhad
WebEx Presentation:
-
Silas Adams wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
I found this article rather interesting for a few reasons. Putin makes a comment that brings up a valid point, and he said something to the effect of; it doesn’t really matter who hacked the emails, what matters […]
-
Silas Adams wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
This isn’t an article (its a scholarly paper) but I thought it would be interesting to revisit last week’s post after I had done some research. As a refresher, last week I posted an article around machine […]
-
Silas Adams wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
I found the article below more interesting than the others I happened to read primarily for reasons dealing with competitive advantage and the fact that it is discussing a proactive and cheaper solution to IT […]
-
Just my opinion, but machine learning isn’t likely to replace the need for human analysts any time soon. From what I have experienced, the more automation you throw at the problem, the more things you find to investigate. End result is you need more staff. Additionally, the staff is hard to keep. Good people have lots of external opportunities and are often “stuck” in their analyst role as they are deemed to valuable to allow them to transfer. This makes it even more likely they will leave.
-
Didn’t think of it from that perspective. So, to confirm my understanding, using machine learning tools will create a demand for more staff to help analyze it’s outputs and thus increase the cost of attracting and retaining talent alongside the costs associated with high turnover rates. Interesting, thanks for the input. With this considered, this tool may actually be more expensive. I’ll try to research successful applications of Machine Learning within the Cyber Security field.
-
-
Great article Silas. The company I work for brought in a speaker to talk machine learning for cyber. The idea behind it is to automate tasks that a human might do. For instance, in the case of incident response where there was a network breach. Instead of having a human do the analysis on what and how something was stolen, and patching the system, have the machine learning system do it instead. I doubt machine learning will ever replace humans, but it will be a great tool to use.
Here is another article for reference: http://www.cybersecurity-review.com/industry-perspective/applying-machine-learning-to-advance-cyber-security-analytics
-
Interesting article Silas. I think that machine learning and the IT staff need to work in tandem. As you mentioned, a computer’s abilities to run logic and algorithms is infinitely superior to a humans. Naturally, we should leverage machine learning to act upon its strengths. As professor Mackley mentioned, the computer will greatly increase detection of issues. As a result, less data analysis professionals will be needed. Conversely, with more issues needing to be addressed, more technical personnel will be required to manage the threats.
Still, the significance of the opportunities machine learning creates for detection and maintenance of security threats is undeniable.
-
Thanks everyone, today 9/7 I went to the team that is designing the algo positing the same notions as each one of you! It forced me to go back and research more heavily into the algo and into the ability of a machine learning algorithm (which seemingly is more than just a tool). In addition to next weeks article I will post an additional article and scholarly references for using statistical ensembles, statistical mechanics and congruent partition functions written into algorithms that predict intrusions; the possible business implications of such innovations are exciting to think about. These are becoming increasingly known as Distributed Intrusion Forecasting System and intelligent systems as opposed to simply a tool. I’ll post next week for all interested.
-
-
Silas Adams's profile was updated 8 years, 2 months ago
-
Jere Lee Ritchie and Kenneth W Garland are now friends 9 years, 11 months ago
-
Jere Lee Ritchie's profile was updated 9 years, 11 months ago
-
Jere Lee Ritchie and are now friends 9 years, 11 months ago
-
Jere Lee Ritchie changed their profile picture 9 years, 11 months ago
-
Jere Lee Ritchie's profile was updated 9 years, 11 months ago
-
Silas Adams changed their profile picture 10 years, 6 months ago
Nice work. I liked how you addressed right up front your shift in focus. One area to watch yourself is in shifting between plural and singular. At certain points in the presentation you reference “we” found something. Later you used “I”. Just want to be consistent. Nice findings and analysis.