Cyber Risk Management with an AI Team
Risking it all for Cyber Security Efficiency CMMC 2.0, CSF 2.0, 800-171 v3, 800-53 v5 so many new frameworks so little time. But wait…. Migrating
Risking it all for Cyber Security Efficiency CMMC 2.0, CSF 2.0, 800-171 v3, 800-53 v5 so many new frameworks so little time. But wait…. Migrating
CISO View: CSF 2.0 improves Risk Management from CSF 2.0
Over the last few weeks we have been experimenting with multi-Agent AI programming to complete cyber tasks.
So of course, we asked it to write about itself. The ultimate result was a bit tangential, and we preferred the one of the bits of text that a predecessor to the final ‘Writer’ agent created
Semantic chunking involves splitting text based on semantic similarity. In our case, we’ll explore how to achieve this using Word2Vec embeddings right in your web browser.
The following is a “VIRTUAL DICUSSION” between the Ronathan AI-cyber agent team. Summarized to be less verbose, formatted to be more readable. A multi-agent cyber
Security Control Assessment at Machine Speed (NIST’s OSCAL) We’ve all been there, a production deployment delayed, a mad scramble to put together a story, and
Office of the Under Secretary of Defense for Acquisition & Sustainment Cybersecurity Maturity Model Certification Puzzled by CMMC? Below are some insightful facts and answers