Analytics | News, how-tos, features, reviews, and videos

risk assessment gauge


R tip: Keep passwords and tokens secure with the keyring package

Learn how to store credentials in an encrypted, secure keyring within R

iwan 007

7 secrets to predictive analytics success

How to forecast the future with accuracy and confidence.

cyber security lock padlock firewall code breach password

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.


R tip: Sparklines in HTML tables

Learn how to add sparklines to HTML tables in R with the DT and sparkline packages


R tip: Quick Interactive Tables

See how to create an interactive HTML table with one line of code. Plus, plenty of customizations

esquisse thumbnail

R tip: Drag-and-drop ggplot

See how the new graphical user interface for ggplot2 works, thanks to the esquisse R package

1 intro security executive thinking woman face binary

Splunk lays out its cybersecurity vision

At Splunk .Conf 2018, we learned how the company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success.

template c100.00 03 53 06.still002

R tip: Reshape data with tidyr

See how the tidyr R package’s gather and spread functions work. Plus a bonus look at labeling in ggplot2

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

The Options Clearing Corporation taps AI to stay ahead of hackers

OCC uses machine learning and AI to understand and model how attackers could enter and move around the network.

template c100.00 01 47 09.still002

R tip: Schedule R scripts on a Mac

Learn how to run R scripts from the Mac command line. Then, see how to schedule R scripts with cron jobs and the cronR package.

data analytics - statistical analysis - charts, graphs, strategy planning

User behavior analytics is not a silver bullet

The security industry has a knack for spinning up new solutions and repurposing old tools to solve new use cases. While the race to commoditize new solutions helps drive the industry forward, misconceptions about user behavior...

template c100.00 02 07 26.still002

R tip: R Markdown tutorial

In this 10th episode of Do More with R, learn how to create HTML, Word docs, PowerPoint presentations, and more that combine text, graphics, and R code

template c100.00 02 48 09.still001

R tip: Access nested list items with purrr

In this ninth episode of Do More with R, learn how to easily access and modify nested list items with the purrr package’s modify_depth function

template c100.00 00 42 21.still001

R tip: Animations in R

In this eighth episode of Do More with R, learn how to animate data over time with R and the gganimate and ggplot2 packages.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

Corporate pre-crime: The ethics of using AI to identify future insider threats

Remember “Minority Report”? Artificial intelligence can spot employee behavior that suggests a future risk. Here’s how to use that data ethically and effectively.

risk assessment - safety analysis - security audit

How did the TimeHop data breach happen?

Compromise of an employee's credentials, lack of multi-factor authentication, and weak insider threat analysis all played a factor in the recent TimeHop data breach in which 21 million user accounts were compromised.

template c100.00 04 55 16.still001

R tip: Create maps in R

In this seventh episode of Do More with R, learn how to create maps in R—it’s easier than you think, thanks to new and updated packages like sf, tmap, and ggplot2

abstract data statistics

Redefining threat prediction

Security is hard. Some say once we can predict threats all will be better. Should we believe? Maybe. But security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings, and move their...

Load More