Blog-posts

Getting Around Authentication

One of the key components of authorized access, which we seek to facilitate, is determining whether the access is in fact authorized, and doing so quickly and efficiently without interfering with ease of use or slowing the smooth flow of commerce. This process is supported by authentication, the demonstration that a request is authentic (typically …

Getting Around Authentication Read More »

Security Inventory

Security Inventory

Some years ago, a Verizon study showed that most leaks of confidential information from cyber attack involved content or systems not in the security inventory. Of course it is stupidly obvious that if you don’t know you have it you are unlikely to properly control it. But on the other hand, how many of us …

Security Inventory Read More »

Cyber Security Intelligence

Cyber Security Intelligence

For a long time, the intelligence and counterintelligence aspects of cybersecurity have been considered a lesser element among many in the field. When people I know bring up things like perception management and counter-influence they are often told that’s not part of cybersecurity. My view of this is pretty simple. If people are using something …

Cyber Security Intelligence Read More »

Outliers

Handling Outliers in Python How to detect outliers Histogram Histogram also displays these outliers clearly. Scatter Plot If there are more than one variable and scatter plot is also useful in detecting outliers visually. Handling Outliers If we can’t rectify the outliers, then we may think of some the following methods to handle outliers. Doing …

Outliers Read More »

Best online learning platforms for elementary students, e-learning courses with certificate, Online employability skills training

Feature Selection: Filter method, Wrapper method and Embedded method

In this post, let us explore: What is feature selection? Why we need to perform feature selection? Methods What is Feature Selection? Feature selection means selecting and retaining only the most important features in the model. Feature selection is different from feature extraction. In feature selection, we subset the features whereas in feature extraction, we …

Feature Selection: Filter method, Wrapper method and Embedded method Read More »

Principal Component Analysis

Principal Component Analysis (PCA) explained with examples In this post, let us understand   What is Principal Component Analysis (PCA) When to use it and what are the advantages How to perform PCA in Python with an example What is Principal Component Analysis (PCA)? Principal Component Analysis is an unsupervised data analysis technique. It is …

Principal Component Analysis Read More »

Random Forest

In this post, let us explore: Random Forest When to use Advantages Disadvantages Hyperparameters Examples Random Forest When to use Random forest can be used for both classification and regression tasks. If the single decision tree is over-fitting the data, then random forest will help in reducing the over-fit and in improving the accuracy. Advantages …

Random Forest Read More »

REQUEST DEMO