-
Silas Adams wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 4 months ago
Executive Summary:
agrofresh-executive-summary
PowerPoint:
reconnaissance-analysis-agrofresh-holdings-berhad
WebEx Presentation:
-
Silas Adams wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 5 months ago
I found this article rather interesting for a few reasons. Putin makes a comment that brings up a valid point, and he said something to the effect of; it doesn’t really matter who hacked the emails, what matters […]
-
Silas Adams wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 5 months ago
This isn’t an article (its a scholarly paper) but I thought it would be interesting to revisit last week’s post after I had done some research. As a refresher, last week I posted an article around machine […]
-
Silas Adams commented on the post, How Machine Learning is Making for Better IT Security, on the site 8 years, 5 months ago
Thanks everyone, today 9/7 I went to the team that is designing the algo positing the same notions as each one of you! It forced me to go back and research more heavily into the algo and into the ability of a machine learning algorithm (which seemingly is more than just a tool). In addition to next weeks article I will post an additional article…[Read more]
-
Silas Adams commented on the post, How Machine Learning is Making for Better IT Security, on the site 8 years, 5 months ago
Didn’t think of it from that perspective. So, to confirm my understanding, using machine learning tools will create a demand for more staff to help analyze it’s outputs and thus increase the cost of attracting and retaining talent alongside the costs associated with high turnover rates. Interesting, thanks for the input. With this considered,…[Read more]
-
Silas Adams commented on the post, Article: “Car hacking is the future – and sooner or later you'll be hit”, on the site 8 years, 5 months ago
This is definitely an interesting article. Our technology has scaled such that risk management was left behind. Innovation is great but also leaves the users exposed in some form or fashion. I applaud you on finding this article! The ‘internet-of-things’ isn’t just automobiles either. Some technologies, for example artificial hearts relay…[Read more]
-
Silas Adams wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 5 months ago
I found the article below more interesting than the others I happened to read primarily for reasons dealing with competitive advantage and the fact that it is discussing a proactive and cheaper solution to IT […]
-
Just my opinion, but machine learning isn’t likely to replace the need for human analysts any time soon. From what I have experienced, the more automation you throw at the problem, the more things you find to investigate. End result is you need more staff. Additionally, the staff is hard to keep. Good people have lots of external opportunities and are often “stuck” in their analyst role as they are deemed to valuable to allow them to transfer. This makes it even more likely they will leave.
-
Didn’t think of it from that perspective. So, to confirm my understanding, using machine learning tools will create a demand for more staff to help analyze it’s outputs and thus increase the cost of attracting and retaining talent alongside the costs associated with high turnover rates. Interesting, thanks for the input. With this considered, this tool may actually be more expensive. I’ll try to research successful applications of Machine Learning within the Cyber Security field.
-
-
Great article Silas. The company I work for brought in a speaker to talk machine learning for cyber. The idea behind it is to automate tasks that a human might do. For instance, in the case of incident response where there was a network breach. Instead of having a human do the analysis on what and how something was stolen, and patching the system, have the machine learning system do it instead. I doubt machine learning will ever replace humans, but it will be a great tool to use.
Here is another article for reference: http://www.cybersecurity-review.com/industry-perspective/applying-machine-learning-to-advance-cyber-security-analytics
-
Interesting article Silas. I think that machine learning and the IT staff need to work in tandem. As you mentioned, a computer’s abilities to run logic and algorithms is infinitely superior to a humans. Naturally, we should leverage machine learning to act upon its strengths. As professor Mackley mentioned, the computer will greatly increase detection of issues. As a result, less data analysis professionals will be needed. Conversely, with more issues needing to be addressed, more technical personnel will be required to manage the threats.
Still, the significance of the opportunities machine learning creates for detection and maintenance of security threats is undeniable.
-
Thanks everyone, today 9/7 I went to the team that is designing the algo positing the same notions as each one of you! It forced me to go back and research more heavily into the algo and into the ability of a machine learning algorithm (which seemingly is more than just a tool). In addition to next weeks article I will post an additional article and scholarly references for using statistical ensembles, statistical mechanics and congruent partition functions written into algorithms that predict intrusions; the possible business implications of such innovations are exciting to think about. These are becoming increasingly known as Distributed Intrusion Forecasting System and intelligent systems as opposed to simply a tool. I’ll post next week for all interested.
-
-
Kenneth W Garland and
Silas Adams are now friends 8 years, 5 months ago
-
Deepali Kochhar and
Silas Adams are now friends 8 years, 5 months ago
-
Silas Adams's profile was updated 8 years, 5 months ago
-
Silas Adams changed their profile picture 10 years, 10 months ago
Nice work. I liked how you addressed right up front your shift in focus. One area to watch yourself is in shifting between plural and singular. At certain points in the presentation you reference “we” found something. Later you used “I”. Just want to be consistent. Nice findings and analysis.