- Harnessing AI in Cybersecurity – Annex SlidesThese additional slides were created as part of one of our classes to complement the class slides I’ll cover the story below a little bit in class. The Rise and Rapid Fall of Microsoft’s Tay In the early months of 2016, the digital corridors of Twitter were abuzz with conversations spanning every conceivable topic. Sensing an opportunity to both tap… Read more: Harnessing AI in Cybersecurity – Annex Slides
- Balancing Caution and Creativity: Applying Six Thinking Hats to New IdeasI picked up Edward De Bono’s book Six Thinking Hats a few years ago. His book presents the idea of categorizing thinking into six categories or Hats. Categorizing Thinking: The Six Thinking Hats Approach Black Hat: Focuses on identifying potential problems, risks, and cautious aspects of an idea or solution. White Hat: Gathering data, information, and facts to understand a situation or… Read more: Balancing Caution and Creativity: Applying Six Thinking Hats to New Ideas
- HONEYTOKENS, using deception tactics to improve continuous security monitoring efforts – Enterprise Information SecurityIntroduction Over the years, as information security teams, we have always been on the defense, forever waiting for the next security event before we can act. Although part of our strategy is to anticipate the adversary, we have not truly started to learn from the trends of the adversary to be prepared for the next attack. Below is a proposal… Read more: HONEYTOKENS, using deception tactics to improve continuous security monitoring efforts – Enterprise Information Security