Blog-posts

Mastering Central Limit Theorem (CLT) with Intuitive Examples

Let’s explore the Central Limit Theorem (CLT) with an example of rolling two dice multiple times (let’s say 30 times). We will calculate the mean of the two dice values and plot its distribution to understand the CLT intuitively. Round 1: We roll the dice and get 2 and 5. The sample mean of 2 …

Why does a 20 year old have access to TS/SCI and what do we do about it?

This is not the first time a young person has had authorized access to substantial amounts oftop secret sensitive compartmented information (TS/SCI) and leaked it. How could thishappen? It’s easy to understand… What do 20-year old people do in the military? Among other things, they are in the field being shot at and shooting, driving …

Demystifying Degrees of Freedom with Visual Examples: A Beginner’s Guide

The concept of degrees of freedom is essential in statistical analysis, and it is commonly used in various statistical tests. In this blog post, we will explore A) Without any restriction B) With a restriction C) Degrees of freedom in contingency tables D) Bessel’s correction  with examples. This will help you to understand degrees of  …

A Beginner’s Guide to t-tests: Real-life Applications of t-test: One-Sample, Two Sample and Paired Sample t-test

William Sealy Gosset, an English statistician who was also a beer brewer, developed the t-test. He used this test to ensure the consistency and quality of the beer he produced. Gosset published his work under the pseudonym “Student”, which is why the t-test is also known as the Student’s t-test. There are three types of …

Basics of Blockchain Technology

Blockchain technology has gained popularity in recent times. This article covers some of the fundamental concepts associated with it, including: What is blockchain? Why do we need blockchain? How does blockchain ensure trust? Who invented it? When to use it? When not to use it? So, let’s get started. What is blockchain? How does blockchain …

Naïve Bayes Classification Model for Natural Language Processing Problem using Python

Learn how to apply a Naïve Bayes classification model to solve a Natural Language Processing (NLP) problem in Python in this article. Here are the steps we will cover: Download a sample dataset Split the dataset into test and train data Vectorize the data Build and measure the accuracy of the model References Further reference …

So you’re looking for a cyber security board member for your public company

Good luck finding someone qualified… The SEC is apparently about to make it a requirement for public companies to report on “the board of directors’ cybersecurity expertise, if any, and its oversight of cybersecurity risk”.1 Some details: Why would it be hard to find someone like this? But here’s the rub And there are some …

The Threat Environment

People who don’t have to do it seem to not understand the nature of the cyber threat. This very short summary is intended for everyone who is responsible for it to hand to everyone else to help start a conversation and gain mutual understanding. The 6 questions people are commonly taught to ask are: who, …