Analytics

Analytics | News, how-tos, features, reviews, and videos

1 intro security executive thinking woman face binary

template c100.00 03 53 06.still002
video

R tip: Reshape data with tidyr

See how the tidyr R package’s gather and spread functions work. Plus a bonus look at labeling in ggplot2

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

The Options Clearing Corporation taps AI to stay ahead of hackers

OCC uses machine learning and AI to understand and model how attackers could enter and move around the network.

template c100.00 01 47 09.still002
video

R tip: Schedule R scripts on a Mac

Learn how to run R scripts from the Mac command line. Then, see how to schedule R scripts with cron jobs and the cronR package.

data analytics - statistical analysis - charts, graphs, strategy planning

User behavior analytics is not a silver bullet

The security industry has a knack for spinning up new solutions and repurposing old tools to solve new use cases. While the race to commoditize new solutions helps drive the industry forward, misconceptions about user behavior...

template c100.00 02 07 26.still002
video

R tip: R Markdown tutorial

In this 10th episode of Do More with R, learn how to create HTML, Word docs, PowerPoint presentations, and more that combine text, graphics, and R code

template c100.00 02 48 09.still001
video

R tip: Access nested list items with purrr

In this ninth episode of Do More with R, learn how to easily access and modify nested list items with the purrr package’s modify_depth function

template c100.00 00 42 21.still001
video

R tip: Animations in R

In this eighth episode of Do More with R, learn how to animate data over time with R and the gganimate and ggplot2 packages.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

Corporate pre-crime: The ethics of using AI to identify future insider threats

Remember “Minority Report”? Artificial intelligence can spot employee behavior that suggests a future risk. Here’s how to use that data ethically and effectively.

risk assessment - safety analysis - security audit

How did the TimeHop data breach happen?

Compromise of an employee's credentials, lack of multi-factor authentication, and weak insider threat analysis all played a factor in the recent TimeHop data breach in which 21 million user accounts were compromised.

template c100.00 04 55 16.still001
video

R tip: Create maps in R

In this seventh episode of Do More with R, learn how to create maps in R—it’s easier than you think, thanks to new and updated packages like sf, tmap, and ggplot2

abstract data statistics

Redefining threat prediction

Security is hard. Some say once we can predict threats all will be better. Should we believe? Maybe. But security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings, and move their...

template c100.00 01 43 18.still001
video

R tip: Iterate with purrr's map_df function

In this sixth episode of Do More with R, learn how to apply a function to a vector of values and return a data frame

template c100.00 02 12 04.still001
video

9 ways to get more value from business intelligence in 2018

Improved customer relations, increased employee productivity, new revenue streams — big benefits await those who breathe new life into their business intelligence strategies.

template c100.00 02 40 15.still001
video

R tip: Save time with RStudio code snippets

In this fifth episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, shows how code snippets work in RStudio—and how you can make your own

11 support boardroom

Security metrics you need for the board

No one wants to show up to an important meeting empty-handed. But with so many analytics right at their fingertips, how can CSOs pick the right numbers to reflect their work? Here are three imperative metrics to have in your...

template c100.00 03 43 00.still001
video

R tip: Easy dashboards with flexdashboard

In this fourth episode of Do More with R, Sharon Machlis, director of Editorial Data & Analytics at IDG Communications, shows how to create dashboards in the R language with the flexdashboard package.

data/statistics being analyzed via laptop

The missing act for user and entity behavior analytics

What’s the real definition of winning? Is it when cyber criminals get inside or when they move sensitive data out? According to Symantec’s SVP of Information Protection, Nico Popp, it’s the latter, making data a vital Indicator of...

abstract data statistics

The time for network behavior analytics has come

Once considered the eminent domain of networking teams, network telemetry data is becoming a requirement to provide security analytics with a more complete view of enterprise threats.

Load More