READ MORE ON: algorithms
BEWARE OF THE WILD GEESE
You’ve been there. A sales person contacts you, offering you THE newfangled-big-data-cyber-security-advanced-persistent-threat detection tool that (he swears) will save your day! He shows you a great demo, and you’re hooked. Being an optimist, you decide to give it a try.