DC2.5: U.S. CyberRisk Indicator

About

Future of cybersecurity: cybersecurity challenges in connected (IoT) networks

Solution: deploy DC2.5 cyber sensors in the IoT networks to PAMD cyber attacks

DeepCyber's IoT use case (in addition to government and enterprise networks): "Every View window has an IP address and controllable through the Internet. Everything is at your fingertips and then it can tie a number of other things together. The windows can now talk to the lighting and HVAC system, and on a more global level it could connect to the future smart city and smart grid." How to PAMD cyber attacks to the IoT networks of smart windows (see $150M View, inc.)?

(DeepCyber's IoT cyber sensors - size of a credit card)

Predict cyber risk by deep learning AI algos

A predictive AI chart for the UCI production data is available upon request. You may also request a proof of concept with your cyber dataset or REST API endpoint for DC's AI cloud engine. This shall produce AI predictive charts on the cyber metrics (e.g., CVSS) of your choice. Send email request to info AT yeswici.com.

Figure 2 - Visualize network clusters by unsupervised learning algos (for clustering enterprise/IoT networks)

About DeepCyber and DC2.5

DeepCyber is a cyber analytics cloud company powered by automated prediction and deep learning algos. Our research breakthroughs in automated prediction and deep learning algos (v.s. the traditional modeling approach) give rise to a paradigm-shift opportunity from past to future-oriented enterprise cyber defense and national security. Let's make a difference together!

DeepCyber designs, develops and distributes a portfolio of (Predictive | Prescriptive | Quantitative | Content | Decision) Analytics offerings for federal agencies and investment, cybersecurity and health care enterprises. With (population | unstructured | algorithmic | high-performing | linear-scaling) Big Data and Cloud technology, the advanced analytics portfolio may be customized as enterprise, IoT and mobile solutions of future generations. DeepCyber is a woman-owned small business of less than 500 employees with offices in Delaware, Maryland, Georgia and New York.

DC2.5 is a state-of-the-art COTS cyber analytics cloud defense system that PAMDs (predict | attenuate | monitor | detect) cyber attacks to enterprise networks and data centers. DC2.5 captures attackers' data by cyber sensors, inclusive of the DISP (DeepCyber IoT Sensor and Penetration-test) platform; a small IoT cybersecurity device that strengthens cyber defense of enterprise networks through better situational awareness and rigorous PenTest.

DC2.5, a cyber analytics SaaS, is engineered on a hybrid IaaS/PaaS cloud with multiple cloud service providers inclusive of Amazon Web Services (public cloud) and DeepCyber's Open-stack powered private cloud - MCPS (Mobile Cloud on Pangu Servers) designed by DARPA specs. DC2.5 is developed in the D language on an API/SOA architecture that seamlessly integrates more than 5 standard programming/scripting languages.

Capabilities: Artificial Neural Networks | Prediction | Deep Learning | Clouds | Big Data | Investment | Cyber | IoT | Health IT

Call or text DeepCyber at (410) 560-0516 or email pnn@yeswici.com to schedule DC2.5 discussion.

U.S. CyberRisk Indicator: Live Demo

Measuring Cyber Health and Performance of U.S. Network Defense

(Similar to Stock Market Indicators: S&P500 or VIX)

Future-oriented cyber defense is the strategy of national security and enterprise security. How to shift the present paradigm to future-oriented cyber defense? Similar and complementary to EINSTEIN, DC2.5 PAMDs (predict | attenuate | monitor | detect) cyber attacks to enterprise/IoT networks and data centers. According to Bloomberg and Yahoo news, the EINSTEIN program is funded about $350 million each year. DC2.5 is a cutting-edge (AI algos being patented), powerful (cyber sensors) and affordable COTS cyber defense SaaS system powered by our R&D breakthroughs in deep learning AI algorithms and automated prediction. DC2.5 enables a paradigm shift from past-oriented to future-oriented enterprise cyber defense and national security.

The UCI chart visualizes the live data of hundreds of attackers captured by the U.S. cyber sensors on a daily basis.

Notable PAMD Use Cases
  1. Predicting | 07-15-2015: sample cyber sensor data for optimizing AI predictive models; download
  2. Monitoring | Japan topped the list of attackers to U.S. cyber sensors on 2015 Memorial Day
  3. Monitoring | 07-08-2015: UCI spiked (35% to 84%); NYSE-United-WSJ crashed (computer glitch?)
  4. Monitoring | 07-08-2015: the top attacker used the elastic IP of a RackSpace cloud server