Blog-posts

Why does a 20 year old have access to TS/SCI and what do we do about it?

This is not the first time a young person has had authorized access to substantial amounts oftop secret sensitive compartmented information (TS/SCI) and leaked it. How could thishappen? It’s easy to understand… What do 20-year old people do in the military? Among other things, they are in the field being shot at and shooting, driving …

Why does a 20 year old have access to TS/SCI and what do we do about it? Read More »

Demystifying Degrees of Freedom with Visual Examples: A Beginner’s Guide

The concept of degrees of freedom is essential in statistical analysis, and it is commonly used in various statistical tests. In this blog post, we will explore A) Without any restriction B) With a restriction C) Degrees of freedom in contingency tables D) Bessel’s correction  with examples. This will help you to understand degrees of  …

Demystifying Degrees of Freedom with Visual Examples: A Beginner’s Guide Read More »

A Beginner’s Guide to t-tests: Real-life Applications of t-test: One-Sample, Two Sample and Paired Sample t-test

William Sealy Gosset, an English statistician who was also a beer brewer, developed the t-test. He used this test to ensure the consistency and quality of the beer he produced. Gosset published his work under the pseudonym “Student”, which is why the t-test is also known as the Student’s t-test. There are three types of …

A Beginner’s Guide to t-tests: Real-life Applications of t-test: One-Sample, Two Sample and Paired Sample t-test Read More »

Basics of Blockchain Technology

Blockchain technology has gained popularity in recent times. This article covers some of the fundamental concepts associated with it, including: What is blockchain? Why do we need blockchain? How does blockchain ensure trust? Who invented it? When to use it? When not to use it? So, let’s get started. What is blockchain? How does blockchain …

Basics of Blockchain Technology Read More »

Naïve Bayes Classification Model for Natural Language Processing Problem using Python

Learn how to apply a Naïve Bayes classification model to solve a Natural Language Processing (NLP) problem in Python in this article. Here are the steps we will cover: Download a sample dataset Split the dataset into test and train data Vectorize the data Build and measure the accuracy of the model References Further reference …

Naïve Bayes Classification Model for Natural Language Processing Problem using Python Read More »

So you’re looking for a cyber security board member for your public company

Good luck finding someone qualified… The SEC is apparently about to make it a requirement for public companies to report on “the board of directors’ cybersecurity expertise, if any, and its oversight of cybersecurity risk”.1 Some details: Why would it be hard to find someone like this? But here’s the rub And there are some …

So you’re looking for a cyber security board member for your public company Read More »

The Threat Environment

People who don’t have to do it seem to not understand the nature of the cyber threat. This very short summary is intended for everyone who is responsible for it to hand to everyone else to help start a conversation and gain mutual understanding. The 6 questions people are commonly taught to ask are: who, …

The Threat Environment Read More »

REQUEST DEMO