Analytics

Analytics | News, how-tos, features, reviews, and videos

mobile security threat detection

5 threat detection and response technologies are coming together

Organizations use too many disparate point tools to detect and respond to cyber threats in a timely manner. As a result, CISOs want tight integration and interoperability across five cybersecurity technologies.

security command center monitors control center getty goro denkoff

OpenC2 can accelerate security operations, automation, and orchestration

OpenC2, a standards effort from OASIS, has the potential to accelerate and automate risk mitigation and incident response. Users and vendors should jump onboard.

RSA conference 2017

What to expect at the RSA Conference 2019

The RSA Conference will feature cloud-scale security analytics, endpoint security suites, API security, advanced security services, and a traffic jam of people.

ifcr 021 thumb3
video

Run Python in R code

While R is a useful language, Python is also great for data science and general-purpose computing. See how to run Python code within an R script and pass data between Python and R

6 handling email phishing

Phishing has become the root of most cyber-evil

Phishing has become the top cause of data breaches. But with employee education and the right tools, such breaches can be prevented.

thumb
video

R tip: Write your own RStudio addins

This RStudio Addins tutorial shows step by step how to create an addin for the RStudio IDE

thumn
video

R tip: Creating color-coded calendars

See how well you’re achieving daily goals with a color-coded calendar made in R

big data messaging system / information architecture / mosaic infrastructure

Big data: too valuable and too challenging to be overlooked

The positive potential of big data is enormous, spanning virtually all industries and impacting both the public and private sectors. However, we must also be mindful of safeguarding big data as much as collecting and utilizing it.

ladder to clouds

2019 will be the year of cloud-based cybersecurity analytics/operations

Demand- and supply-side changes will move security information and event management (SIEM) from on premises to the public cloud.

intro where to look for threat intel binoculars binary code cybersecurity

Security operations activities to watch in 2019

Open-source software and industry initiatives, such as MITRE ATT&CK framework and Apache Kafka, will contribute to security operations in 2019.

thumbnail
video

R tip: Addins and keyboard shortcuts

Discover an easy way to use key-value pairs in R

thumbnail
video

R tip: Quick lookup tables with named vectors

Learn an easy method to use key-value pairs in R

risk assessment gauge

It's time for a new cyber risk management model

An overwhelming attack surface, voluminous vulnerabilities, sophisticated threats, and new business requirements demand a new cyber risk management model.

thumbnail
video

R tip: Keep passwords and tokens secure with the keyring package

Learn how to store credentials in an encrypted, secure keyring within R

iwan 007
video

7 secrets to predictive analytics success

How to forecast the future with accuracy and confidence.

cyber security lock padlock firewall code breach password

8 features a cybersecurity technology platform must have

Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.

thumnail
video

R tip: Sparklines in HTML tables

Learn how to add sparklines to HTML tables in R with the DT and sparkline packages

thumbnail
video

R tip: Quick Interactive Tables

See how to create an interactive HTML table with one line of code. Plus, plenty of customizations

esquisse thumbnail
video

R tip: Drag-and-drop ggplot

See how the new graphical user interface for ggplot2 works, thanks to the esquisse R package

1 intro security executive thinking woman face binary

Splunk lays out its cybersecurity vision

At Splunk .Conf 2018, we learned how the company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success.

You Might Also Like