Analytics

Analytics | News, how-tos, features, reviews, and videos

ladder to clouds

intro where to look for threat intel binoculars binary code cybersecurity

Security operations activities to watch in 2019

Open-source software and industry initiatives, such as MITRE ATT&CK framework and Apache Kafka, will contribute to security operations in 2019.

thumbnail
video

R tip: Addins and keyboard shortcuts

Discover an easy way to use key-value pairs in R

thumbnail
video

R tip: Quick lookup tables with named vectors

Learn an easy method to use key-value pairs in R

risk assessment gauge

It's time for a new cyber risk management model

An overwhelming attack surface, voluminous vulnerabilities, sophisticated threats, and new business requirements demand a new cyber risk management model.

thumbnail
video

R tip: Keep passwords and tokens secure with the keyring package

Learn how to store credentials in an encrypted, secure keyring within R

iwan 007
video

7 secrets to predictive analytics success

How to forecast the future with accuracy and confidence.

cyber security lock padlock firewall code breach password

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.

thumnail
video

R tip: Sparklines in HTML tables

Learn how to add sparklines to HTML tables in R with the DT and sparkline packages

thumbnail
video

R tip: Quick Interactive Tables

See how to create an interactive HTML table with one line of code. Plus, plenty of customizations

esquisse thumbnail
video

R tip: Drag-and-drop ggplot

See how the new graphical user interface for ggplot2 works, thanks to the esquisse R package

1 intro security executive thinking woman face binary

Splunk lays out its cybersecurity vision

At Splunk .Conf 2018, we learned how the company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success.

template c100.00 03 53 06.still002
video

R tip: Reshape data with tidyr

See how the tidyr R package’s gather and spread functions work. Plus a bonus look at labeling in ggplot2

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

The Options Clearing Corporation taps AI to stay ahead of hackers

OCC uses machine learning and AI to understand and model how attackers could enter and move around the network.

template c100.00 01 47 09.still002
video

R tip: Schedule R scripts on a Mac

Learn how to run R scripts from the Mac command line. Then, see how to schedule R scripts with cron jobs and the cronR package.

data analytics - statistical analysis - charts, graphs, strategy planning

User behavior analytics is not a silver bullet

The security industry has a knack for spinning up new solutions and repurposing old tools to solve new use cases. While the race to commoditize new solutions helps drive the industry forward, misconceptions about user behavior...

template c100.00 02 07 26.still002
video

R tip: R Markdown tutorial

In this 10th episode of Do More with R, learn how to create HTML, Word docs, PowerPoint presentations, and more that combine text, graphics, and R code

template c100.00 02 48 09.still001
video

R tip: Access nested list items with purrr

In this ninth episode of Do More with R, learn how to easily access and modify nested list items with the purrr package’s modify_depth function

template c100.00 00 42 21.still001
video

R tip: Animations in R

In this eighth episode of Do More with R, learn how to animate data over time with R and the gganimate and ggplot2 packages.

Load More