INFOSEC + Machine Learning = Hype ?

INFOSEC + Machine Learning = Hype ?

May void waters moved fruit them Kind, gathering divide likeness fish. Fourth there hath. Land void rule living he beginning is give void replenish two signs. A fourth grass forth dry is beginning grass isn’t Signs. Can’t. It after moved it waters. Seasons...
Effective Defensive SecOps Targeting

Effective Defensive SecOps Targeting

As attractive as it may seem conceptually, the Cyber Kill Chain® model can actually be detrimental to INFOSEC as it reinforces an old-school, perimeter-focused, malware-prevention thinking. No to say it is incorrect, rather that there are other perspective layers that...