Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Paul Tamburello, Peter Guerra
Modernizing Cybersecurity Operations with Machine Intelligence
1. Introduction
2. The Benefits of Applying Machine Intelligence to Cybersecurity
Machine Intelligence Defined
The Current Threat Landscape
Common Challenges
Why Machine Intelligence Offers a Better Solution than Current Approaches
3. The Capabilities of Machine Intelligence Today
Current Capabilities of Machine Intelligence
Automating Human Processes
Detecting Cyber Threats
Capturing Attacker Tradecraft
Current Limitations of Machine Intelligence
Recommendations for Successful Machine Intelligence Implementations
4. Real-World Security Applications for Machine Intelligence
Hunting for Advanced Threats
Why Threat Hunting Poses a Challenge for Cyber Operations
How Machine Intelligence Applies to Threat Hunting
How to Build a Machine Intelligence Capability to Support Threat Hunting
Utilizing This Machine Intelligence Technique in the Real World
Tips and Best Practices
Detecting and Classifying Malware
Why Malware Detection Poses a Challenge for Cyber Operations
How Machine Intelligence Applies to Malware Detection
How to Build a Machine Intelligence Capability to Support Malware Detection
Utilizing this Machine Intelligence Technique in the Real World
Tips and Best Practices
Scoring Risk in a Network
How Risk Scoring Poses a Challenge for Cyber Operations
How Machine Intelligence Applies to Risk Scoring
How to Build a Machine Intelligence Capability to Support Risk Scoring
Utilizing This Machine Intelligence Technique in the Real World
Tips and Best Practices
5. Addressing Readiness and Maturity for Machine Intelligence in an Organization
First Steps to Applying Machine Intelligence to Security
Overcoming Common Challenges
6. Conclusion
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Modernizing Cybersecurity Operations with Machine Intelligence
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset