Blog

Encrypted is not Secured, and https is even worse

People who think they know believe the messaging from browser providers who say things like “Site Not Secured” when accessing a site that runs hypertext transfer protocol (http) instead of http ‘secure’ (https). Let’s stop this myth today. What is https supposed to do? Let’s assume it actually does that…

READ MORE

Getting Around Authentication

One of the key components of authorized access, which we seek to facilitate, is determining whether the access is in fact authorized, and doing so quickly and efficiently without interfering with ease of use or slowing the smooth flow of commerce. This process is supported by authentication, the demonstration that

READ MORE
how-to-secure-your-data

How secure is your data center and how can you tell?

Data centers are a prime target for compromise because (to misquote Willie Horton) “that’s where the data is”. The people running data centers know this, and when you hear terms like “advanced persistent threat”, the data centers are in most cases the ultimate target. But the data centers have to

READ MORE
Security Inventory

Security Inventory

Some years ago, a Verizon study showed that most leaks of confidential information from cyber attack involved content or systems not in the security inventory. Of course it is stupidly obvious that if you don’t know you have it you are unlikely to properly control it. But on the other

READ MORE
Cyber Security Intelligence

Cyber Security Intelligence

For a long time, the intelligence and counterintelligence aspects of cybersecurity have been considered a lesser element among many in the field. When people I know bring up things like perception management and counter-influence they are often told that’s not part of cybersecurity. My view of this is pretty simple.

READ MORE

Outliers

Handling Outliers in Python How to detect outliers Histogram Histogram also displays these outliers clearly. Scatter Plot If there are more than one variable and scatter plot is also useful in detecting outliers visually. Handling Outliers If we can’t rectify the outliers, then we may think of some the following

READ MORE
Best online learning platforms for elementary students, e-learning courses with certificate, Online employability skills training

Feature Selection: Filter method, Wrapper method and Embedded method

In this post, let us explore: What is feature selection? Why we need to perform feature selection? Methods What is Feature Selection? Feature selection means selecting and retaining only the most important features in the model. Feature selection is different from feature extraction. In feature selection, we subset the features

READ MORE

Principal Component Analysis

Principal Component Analysis (PCA) explained with examples In this post, let us understand   What is Principal Component Analysis (PCA) When to use it and what are the advantages How to perform PCA in Python with an example What is Principal Component Analysis (PCA)? Principal Component Analysis is an unsupervised

READ MORE

Random Forest

In this post, let us explore: Random Forest When to use Advantages Disadvantages Hyperparameters Examples Random Forest When to use Random forest can be used for both classification and regression tasks. If the single decision tree is over-fitting the data, then random forest will help in reducing the over-fit and

READ MORE
Security Inventory

Security Inventory

Some years ago, a Verizon study showed that most leaks of confidential information from cyber attack involved content or systems not in the security inventory.

READ MORE
Cyber Security Intelligence

Cyber Security Intelligence

For a long time, the intelligence and counterintelligence aspects of cybersecurity have been considered a lesser element among many in the field. When people I

READ MORE

Outliers

Handling Outliers in Python How to detect outliers Histogram Histogram also displays these outliers clearly. Scatter Plot If there are more than one variable and

READ MORE

Principal Component Analysis

Principal Component Analysis (PCA) explained with examples In this post, let us understand   What is Principal Component Analysis (PCA) When to use it and

READ MORE

Random Forest

In this post, let us explore: Random Forest When to use Advantages Disadvantages Hyperparameters Examples Random Forest When to use Random forest can be used

READ MORE

REQUEST DEMO