by Shlom | Jun 12, 2017 | Uncategorized
Many of the statistical techniques are useful for both prediction and explanation in the world of advanced analytics. However, certain techniques are necessarily more suited for one than the other. For example, techniques such as Mixed Linear Models are primarily used...
by Shlom | Jun 12, 2017 | Uncategorized
More and more businesses realize the value of data visualizations and there are now many predictions for the future of the meteoric rise of the information dashboard. The past couple of years have seen huge movement in the industry, and with more and more businesses...
by Shlom | Jun 12, 2017 | Uncategorized
Since 2014, massive data breaches have become a common feature of the news. The huge amount of money at stake – Sony’s was $100 million, Target’s about $110 million – means that more and more companies are taking their information security seriously. This...
by Shlom | Jun 12, 2017 | Uncategorized
Introduction In the past, developing a cybersecurity policy and strategy for an organization involved digesting multiple standards, regulations and assessments. This usually meant deciding on competing priorities with the resulting strategy being compliance based....
by Shlom | Jun 12, 2017 | Uncategorized
Introduction Fear drives the cybersecurity initiatives deployed by most organizations, but that means spending lots of money and resources trying to achieve something where failure is the only outcome. It is simply not possible to completely prevent hackers getting...
by Shlom | Jun 12, 2017 | Uncategorized
Introduction Most organizations have an attack surface that is constantly expanding. Those that have a security policy aimed only at preventing intruders at the perimeter are doomed to failure. The highest levels of security should be applied only to the most valuable...