Machine learning in cybersecurity: How to evaluate offerings