data analysis
Survey Surfaces Wasted Efforts Collecting Cybersecurity Data
Security teams are wasting time and resources normalizing data to store and analyze it in a separate platform instead of relying on the same data IT teams use to manage operations ...
Security Boulevard
Hacking With Your Nemesis
In the first post in this series, On (Structured) Data, we talked about the gap area of offensive structured data and ended with the question, “If all of our offensive tools produced ...
Acoustic: Solving a CyberDefenders PCAP SIP/RTP Challenge with R, Zeek, tshark (& friends)
hrbrmstr | | Cybersecurity, data analysis, Data Driven Security, data wrangling, Information Security, pcap, R
Hot on the heels of the previous CyberDefenders Challenge Solution comes this noisy installment which solves their Acoustic challenge. You can find the source Rmd on GitHub, but I’m also testing the ...
Packet Maze: Solving a CyberDefenders PCAP Puzzle with R, Zeek, and tshark
hrbrmstr | | Cybersecurity, data analysis, Data Driven Security, data science, data wrangling, dns, Information Security, pcap, R
It was a rainy weekend in southern Maine and I really didn’t feel like doing chores, so I was skimming through RSS feeds and noticed a link to a PacketMaze challenge in ...
NEW Data Analytics Courses
Hannah Brandon | | big data, data analysis, data analytics, IT Training, SBN News, training, Training and Certification, Virtualization
Phoenix TS has added new Data Analytics courses to our public schedule. These five courses will help you increase your knowledge and skills to become a Big Data Expert! What is Data ...
Book Review: The Elements of Data Analytic Style by @jtleek i.e. Jeffrey Leek
In the introduction to the Data Science world, one needs to build the right frame surrounding the topic. This is usually done via a set of straight to the point books that ...