New viridis & colorbrewer palettes for ipv4-heatmap

It’s no seekrit that I :heart: Hilbert curve heatmaps of IPv4 space. Real-world IPv4 maps (i.e. the ones that drop dots on the Earth) have little utility, but with Hilbert curves maps of IPv4 space many different topologies can be superimposed (from ASNs to—if need be—geographic locations). Plus, there’s more opportunity to find patterns by… Continue reading

Visualizing Survey Data : Comparison Between Observations

Cybersecurity is a domain that really likes surveys, or at the very least it has many folks within it that like to conduct and report on surveys. One recent survey on threat intelligence is in it’s second year, so it sets about comparing answers across years. Rather than go into the many technical/statistical issues with… Continue reading

Spending Seized Assets – A State-by-State Per-capita Comparison in R

The Washingon Post did another great story+vis, this time on states [Spending seized assets]( According to their sub-head: >_Since 2008, about 5,400 police agencies have spent $2.5 billion in proceeds from cash and property seized under federal civil forfeiture laws. Police suspected the assets were linked to crime, although in 81 percent of cases no… Continue reading

Using Twitter as a Data Source For Monitoring Password Dumps

I shot a quick post over at the [Data Driven Security blog]( explaining how to separate Twitter data gathering from R code via the Ruby `t` ([github repo]( command. Using `t` frees R code from having to be a Twitter processor and lets the analyst focus on analysis and visualization, plus you can use `t`… Continue reading

One More (Yet-another?) Olympic Medal Live-tracking Shiny App

I’m posting this mostly to show how to: – use the Google spreadsheet data-munging “hack” from the [previous post]( in a Shiny context – include it seamlessly into a web page, and – run it locally without a great deal of wrangling The code for the app is [in this gist]( It is unsurprisingly just… Continue reading

Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords & Reproducible Research

Jay Jacobs (@jayjacobs)—my co-author of the soon-to-be-released book [Data-Driven Security](—& I have been hard at work over at the book’s [sister-blog]( cranking out code to help security domain experts delve into the dark art of data science. We’ve covered quite a bit of ground since January 1st, but I’m using this post to focus more… Continue reading