Analytics
Analytics | News, how-tos, features, reviews, and videos
5 threat detection and response technologies are coming together
Organizations use too many disparate point tools to detect and respond to cyber threats in a timely manner. As a result, CISOs want tight integration and interoperability across five cybersecurity technologies.
OpenC2 can accelerate security operations, automation, and orchestration
OpenC2, a standards effort from OASIS, has the potential to accelerate and automate risk mitigation and incident response. Users and vendors should jump onboard.
What to expect at the RSA Conference 2019
The RSA Conference will feature cloud-scale security analytics, endpoint security suites, API security, advanced security services, and a traffic jam of people.
video
Run Python in R code
While R is a useful language, Python is also great for data science and general-purpose computing. See how to run Python code within an R script and pass data between Python and R
Phishing has become the root of most cyber-evil
Phishing has become the top cause of data breaches. But with employee education and the right tools, such breaches can be prevented.
video
R tip: Write your own RStudio addins
This RStudio Addins tutorial shows step by step how to create an addin for the RStudio IDE
video
R tip: Creating color-coded calendars
See how well you’re achieving daily goals with a color-coded calendar made in R
Big data: too valuable and too challenging to be overlooked
The positive potential of big data is enormous, spanning virtually all industries and impacting both the public and private sectors. However, we must also be mindful of safeguarding big data as much as collecting and utilizing it.
2019 will be the year of cloud-based cybersecurity analytics/operations
Demand- and supply-side changes will move security information and event management (SIEM) from on premises to the public cloud.
Security operations activities to watch in 2019
Open-source software and industry initiatives, such as MITRE ATT&CK framework and Apache Kafka, will contribute to security operations in 2019.
video
R tip: Quick lookup tables with named vectors
Learn an easy method to use key-value pairs in R
It's time for a new cyber risk management model
An overwhelming attack surface, voluminous vulnerabilities, sophisticated threats, and new business requirements demand a new cyber risk management model.
video
R tip: Keep passwords and tokens secure with the keyring package
Learn how to store credentials in an encrypted, secure keyring within R
video
7 secrets to predictive analytics success
How to forecast the future with accuracy and confidence.
8 features a cybersecurity technology platform must have
Cybersecurity professionals ranked the most important attributes of a cybersecurity technology platform according to strict definitions that meet their requirements.
video
R tip: Sparklines in HTML tables
Learn how to add sparklines to HTML tables in R with the DT and sparkline packages
video
R tip: Quick Interactive Tables
See how to create an interactive HTML table with one line of code. Plus, plenty of customizations
video
R tip: Drag-and-drop ggplot
See how the new graphical user interface for ggplot2 works, thanks to the esquisse R package
Splunk lays out its cybersecurity vision
At Splunk .Conf 2018, we learned how the company continues to expand its cybersecurity footprint, work with industry partners, and commit to customer success.