Machine learning – hype or hope with 1 part snake oil
Read More: Machine learning – hype or hope with 1 part snake oilMachine learning – hype or hope with 1 part snake oil, adding the snake oil makes all things including Machine Learning more capable than it may seem when peeking beneath the covers, or more slippery, but we will get into the slipperiness soon. The following article is something that I have wanted to write for…
kicksec.IO
Categories
- ACSC
- ACSC essential 8
- Advanced Managed Detect Response
- AI
- Airlock Digital
- AMDR
- Application Control
- Articles
- Artificial Intelligence
- As Secure As Practical
- ASAP
- ASD
- ASD 8
- ASD essential 8
- Attack surface reduction
- Australian cyber security centre
- Azure Active Directory
- Azure Application Proxy
- Bombs
- Breach
- Business Email Compromise
- CASB
- CIS 18
- CISA
- CISA Scuba
- Client Access Security Broker
- Cyber risk
- Cyber Security Framework
- Data Loss Prevention
- Data Protection
- Defender for O365
- DLP
- DMARC
- Do something
- Endpoint Detection Response
- EndPoint Protection
- EPP
- Exam prep
- Extended detection and response
- Extended Detection Response
- Funny
- GDAP
- Hiring
- Identity Access Management
- Incident response
- Industry
- Information Protection
- JGES
- Just good enough security
- Least privilege
- M365
- Machine Learning
- Malware
- Managed Detection Response
- MDR
- MFA
- Microsoft
- Microsoft Autopatch
- Microsoft Azure Active Directory
- Microsoft certification
- Microsoft Defender
- Microsoft Defender Application Guard
- Microsoft Defender for Cloud
- Microsoft Defender for Endpoint
- Microsoft Defender for Endpoint Server
- Microsoft Defender for Identity
- Microsoft Defender Vulnerability Management
- Microsoft Endpoint Manager
- Microsoft Intune
- Microsoft licensing
- Microsoft purview
- Microsoft Sentinel
- Mitre Att&ck
- ML
- MSP
- Multi factor Authentication
- multifactor authentication
- MVCS
- Network detection and response
- NIST CSF
- Open source
- Operating System Hardening
- Opinion
- PAM
- people
- Phishing
- Planning
- Privileged Access Management
- Process
- Protection
- Purview Information Protection
- Ransomeware
- Ransomware
- Sandbox
- SASE
- SCUBA
- Secure Access Service Edge
- Security Assessment
- Security information event management
- Security posture
- SIEM
- Single Sign On
- Software Industry
- SSO
- Supplier Breach
- Threat and vulnerability management
- Threat Hunting
- Windows 10
- Windows Autopilot
- Windows Sandbox
- WTH
- XDR
- Zero day
- Zero Trust Network Architecture
- ZTNA
Recent Posts
- Targeted Business Email Compromise through weaponising your own tenant!
- Occams razor – When an attack is unknown?
- Splunk, assassinated by Cisco – RIP
- A picture is not always worth a thousand words
- Security Controls
Recent Comments
Tags
#acsc #asd8 #kicksecio 101 ACSC Airlock digital Application Control Artificial Intelligence ASD 8 Breach Broadcom Business Email Compromise Cyber Security Data leakage Data leakage prevention Data Loss Prevention Data Protection DLP Endpoint Detection response Extended Detection Response Hiring Kicksecio Managed Detection Response Managed Service Provider MDR MFA Microsoft Microsoft Defender for cloud Microsoft Defender for endpoints Microsoft Defender Vulnerability Management microsoft licensing Microsoft Sentinel Multi factor authentication Office macros okta PAM Privileged Access Management Security Posture Sentinel SIEM Single Sign On Software SSO Symantec Vmware