This essay explains how linear algebra and probability distributions form the mathematical foundation of machine learning models. It explores how vectors, matrices, tensors, and probabilistic reasoning enable learning, prediction, and uncertainty handling in modern ML systems.
Category: Training
Reducing Human Errors That Influence Data Breaches
95% of data breaches involve human error. My paper details the cognitive and organizational factors that lead to these errors and outlines technical and non-technical strategies to build a Human Firewall. Full ODU analysis here!
Determinism within Cybersecurity & Computer Hacking
An exploration of determinism in cybersecurity, examining how predictable system behavior influences hacking methods, defensive strategies, automation, and ethical considerations.
Security Polices from a CISO’s Perspective
Explores security policies from a CISO’s perspective, highlighting their role in governance, risk management, strategic decision-making, and building organizational security.
Malicious Code and Activity – Mitigation Methods
Overview of malicious code threats and mitigation methods, including detection, containment, system hardening, user awareness, and modern cybersecurity defenses.
Ransomware Mitigation Strategies for Windows Systems: Securing Servers and Endpoints
Explores ransomware mitigation strategies for Windows systems, including backups, hardening, access controls, monitoring, and endpoint protection for servers and endpoints.
Network & Cyber Security: Tools, Costs, and Efficiency
Overview of network cybersecurity tools, comparing costs, efficiency, and how organizations evaluate firewalls, SIEMs, IDS/IPS, and other defensive technologies.
Cyber Threats vs. Cyber Attacks
Explains the difference between cyber threats and cyber attacks, how each affects risk, defense strategies, and organizational security planning.