Analytics

Analytics | News, how-tos, features, reviews, and videos

mobile security threat detection

ifcr 025 thumb
video

How to customize ggplot with bbplot

Overwhelmed by all the ways you can customize a ggplot2 data visualization? With add-on packages like the BBC’s bbplot, you can use themes created by design professionals – or tweak them to make them your own.

security command center monitors control center getty goro denkoff

OpenC2 can accelerate security operations, automation, and orchestration

OpenC2, a standards effort from OASIS, has the potential to accelerate and automate risk mitigation and incident response. Users and vendors should jump onboard.

thumb
video

How to use tidy eval in R

Do you want to use ggplot2, dplyr, or other tidyverse functions in your own functions? This easy example shows how

thumb 2
video

How to write your own R package

When you hear “R package,” you may think something to share with other people. But an R package can also be a good way to organize your own work

RSA conference 2017

What to expect at the RSA Conference 2019

The RSA Conference will feature cloud-scale security analytics, endpoint security suites, API security, advanced security services, and a traffic jam of people.

ifcr 021 thumb3
video

Run Python in R code

While R is a useful language, Python is also great for data science and general-purpose computing. See how to run Python code within an R script and pass data between Python and R

6 handling email phishing

Phishing has become the root of most cyber-evil

Phishing has become the top cause of data breaches. But with employee education and the right tools, such breaches can be prevented.

thumb
video

R tip: Write your own RStudio addins

This RStudio Addins tutorial shows step by step how to create an addin for the RStudio IDE

thumn
video

R tip: Creating color-coded calendars

See how well you’re achieving daily goals with a color-coded calendar made in R

ladder to clouds

2019 will be the year of cloud-based cybersecurity analytics/operations

Demand- and supply-side changes will move security information and event management (SIEM) from on premises to the public cloud.

intro where to look for threat intel binoculars binary code cybersecurity

Security operations activities to watch in 2019

Open-source software and industry initiatives, such as MITRE ATT&CK framework and Apache Kafka, will contribute to security operations in 2019.

thumbnail
video

R tip: Addins and keyboard shortcuts

Discover an easy way to use key-value pairs in R

thumbnail
video

R tip: Quick lookup tables with named vectors

Learn an easy method to use key-value pairs in R

risk assessment gauge

It's time for a new cyber risk management model

An overwhelming attack surface, voluminous vulnerabilities, sophisticated threats, and new business requirements demand a new cyber risk management model.

thumbnail
video

R tip: Keep passwords and tokens secure with the keyring package

Learn how to store credentials in an encrypted, secure keyring within R

iwan 007
video

7 secrets to predictive analytics success

How to forecast the future with accuracy and confidence.

cyber security lock padlock firewall code breach password

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.

thumnail
video

R tip: Sparklines in HTML tables

Learn how to add sparklines to HTML tables in R with the DT and sparkline packages

Load More
You Might Also Like