Analytics

Analytics | News, how-tos, features, reviews, and videos

RSA conference 2017

ifcr 021 thumb3
video

Run Python in R code

While R is a useful language, Python is also great for data science and general-purpose computing. See how to run Python code within an R script and pass data between Python and R

6 handling email phishing

Phishing has become the root of most cyber-evil

Phishing has become the top cause of data breaches. But with employee education and the right tools, such breaches can be prevented.

thumb
video

R tip: Write your own RStudio addins

This RStudio Addins tutorial shows step by step how to create an addin for the RStudio IDE

thumn
video

R tip: Creating color-coded calendars

See how well you’re achieving daily goals with a color-coded calendar made in R

ladder to clouds

2019 will be the year of cloud-based cybersecurity analytics/operations

Demand- and supply-side changes will move security information and event management (SIEM) from on premises to the public cloud.

intro where to look for threat intel binoculars binary code cybersecurity

Security operations activities to watch in 2019

Open-source software and industry initiatives, such as MITRE ATT&CK framework and Apache Kafka, will contribute to security operations in 2019.

thumbnail
video

R tip: Addins and keyboard shortcuts

Discover an easy way to use key-value pairs in R

thumbnail
video

R tip: Quick lookup tables with named vectors

Learn an easy method to use key-value pairs in R

risk assessment gauge

It's time for a new cyber risk management model

An overwhelming attack surface, voluminous vulnerabilities, sophisticated threats, and new business requirements demand a new cyber risk management model.

thumbnail
video

R tip: Keep passwords and tokens secure with the keyring package

Learn how to store credentials in an encrypted, secure keyring within R

iwan 007
video

7 secrets to predictive analytics success

How to forecast the future with accuracy and confidence.

cyber security lock padlock firewall code breach password

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.

thumnail
video

R tip: Sparklines in HTML tables

Learn how to add sparklines to HTML tables in R with the DT and sparkline packages

thumbnail
video

R tip: Quick Interactive Tables

See how to create an interactive HTML table with one line of code. Plus, plenty of customizations

esquisse thumbnail
video

R tip: Drag-and-drop ggplot

See how the new graphical user interface for ggplot2 works, thanks to the esquisse R package

1 intro security executive thinking woman face binary

Splunk lays out its cybersecurity vision

At Splunk .Conf 2018, we learned how the company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success.

template c100.00 03 53 06.still002
video

R tip: Reshape data with tidyr

See how the tidyr R package’s gather and spread functions work. Plus a bonus look at labeling in ggplot2

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

The Options Clearing Corporation taps AI to stay ahead of hackers

OCC uses machine learning and AI to understand and model how attackers could enter and move around the network.

Load More