Cybersecurity Tower of Babel

Cybersecurity Tower of Babel

Cultures and Languages

If you think there is an easy solution to the complex problems of cybersecurity and cyber defense, you need to think again. There is no easy button for cybersecurity; no quick solution for cyber defense.

One of the reasons that it is so hard is that there are so many different perspectives and viewpoints. And, each of those perspectives can have their own verbiage, terms, and languages. I mean let's face it, if you want to be proficient in a foreign land, you have to learn the culture and language. There is no easy shortcut.

Read More »

Cybersecurity Analysts - Give Credit Where Credit is Due

Cybersecurity Analysts - Give Credit Where Credit is Due

Some cybersecurity analysts amaze me. In fact, in broader terms, experts amaze me. When you see an expert in action they frequently make very difficult things seem so simple. Their experience has honed their skills to the point they can understand very confusing scenarios. In particular, cybersecurity experts can intuitively recognize suspicious actions and network conditions that mere mortals can’t. 

They are so impressive because they have learned in great detail the ins and outs of their enterprise’s network, the enterprise business, and the people of the enterprise. Somehow, they are able to recognize suspicious and malicious things seemingly instinctually. 

Read More »

The Big Picture....Belief Propagation with a Common Object Model

The Big Picture....Belief Propagation with a Common Object Model

Ever heard someone use phrases like “I put two and two together,” or “I started to connect the dots?” What is usually meant is that in the examination of the facts at hand an understanding of a feasible explanation is forming. By considering details, a bigger picture can be formed. 

Belief Propagation Network

A belief propagation network (BPN) is a network where messages are passed through a series of nodes in a graph.

Read More »

Can We Possibly Write Cyber Security Intelligence Software that Thinks?

Can We Possibly Write Cyber Security Intelligence Software that Thinks?

Artificial Intelligence in Cyber Security 

This has been the endeavor of many before me, and probably many after me. My hope is that someone, or some group, cracks the barrier to true  cyber security intelligence in my lifetime. It will be a cool thing to witness.

In the meantime, we will continue to write less than true Artificial Intelligence code in order to approach the goal. The phrase "fake it 'til you make it" comes to mind. We can mimic the cognitive processes until we actually author cognition.

Read More »

Subscribe to Email Updates

Subscribe via RSS to the blog

Recent Posts