412
Machine Learning: The High-Interest Credit Card of Technical Debt
Machine learning offers a fantastically powerful toolkit for building complex systems
quickly. This paper argues that it is dangerous to think of these quick wins
as coming for free. Using the framework of technical debt, we note that it is remarkably
easy to incur massive ongoing maintenance costs at the system level
when applying machine learning. The goal of this paper is highlight several machine
learning specific risk factors and design patterns to be avoided or refactored
where possible. These include boundary erosion, entanglement, hidden feedback
loops, undeclared consumers, data dependencies, changes in the external world,
and a variety of system-level anti-patterns.
1807  dev  wrk 
6 weeks ago
W Polsce brakuje start-upów z zakresu cyberbezpieczeństwa - Bankier.pl
Nadreprezentacja inicjatyw biotechnologicznych oraz inżynieryjnych. Niedostatek zaawansowanych technologii i rozwiązań z zakresu cyberbezpieczeństwa - tak polski krajobraz start-upowy opisuje partner zarządzający funduszem TDJ Pitango Ventures Wojciech Fedorowicz.
1806  wrk  sec 
9 weeks ago
Rozwiązywanie problemów z usługą Windows Update
Windows Update good problem solving microsoft page
1805  dev  windows 
may 2018
Appcanary shuts down its vulnerability scanning service as the team joins GitHub | TechCrunch
Come June 1st, Appcanary’s services will all shut down and the founders are directing users to services like Spacewalk, Landscape, CoreOS Clair, Nessus Agents and ThreatStack for their vulnerability scanning needs
1803  sec 
march 2018
infosec.mozilla.org
Guidelines
* Key Management Find out which algorithms are recommended, when to expire keys, etc.
* Kubernetes A high level guide of basic security needs for Kubernetes
* OpenSSH How to configure and use OpenSSH server and client securely
* Web Security What headers, setup, etc. should you follow for your web site?

Risk assessment
* Assessing Security Risk An open framework to assess security risk from an operational perspective
* Likelihood Indicators A model for determining how security controls affect risk
*Rapid Risk Assessment (RRA) A rapid methodology to perform risk analysis and create a lightweight threat model.
* Scoring and other levels Standardized scoring and other levels that aren't directly representing risk levels.
* Standard Levels Standardized levels for security risk, effort and other measurements.

IAM
* OpenID Connect How to use OpenID Connect securely and make user’s session experience better
* SAML How to use SAML securely and make user’s session experience better

Fundamentals
* Rationales Explains and justifies the use of specific controls, principles
* Security Principles Most important security principles to follow - the baseline
sec  1802 
march 2018
« earlier      

Copy this bookmark:



description:


tags: