

{"id":11825,"date":"2019-01-29T09:50:29","date_gmt":"2019-01-29T14:50:29","guid":{"rendered":"https:\/\/rud.is\/b\/?p=11825"},"modified":"2019-01-29T09:50:29","modified_gmt":"2019-01-29T14:50:29","slug":"acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/","title":{"rendered":"Acquisitions and Supply Chains: The Achilles&#8217; heel of Product\/Organizational Security"},"content":{"rendered":"<p><em>(A reminder to folks expecting &#8220;R&#8221;\/&#8221;data science&#8221; content: the feed for that is at <a href=\"https:\/\/rud.is\/b\/category\/r\/feed\/\">https:\/\/rud.is\/b\/category\/r\/feed\/<\/a> if you don&#8217;t want to see the occasional non-R\/datasci posts.)<\/em><\/p>\n<hr \/>\n<p>Over at the <a href=\"https:\/\/blog.rapid7.com\/2019\/01\/29\/cisco-r-rv320-rv325-router-unauthenticated-configuration-export-vulnerability-cve-2019-1653-what-you-need-to-know\/\">$WORK blog<\/a> we posted some research into the fairly horrible Cisco RV320\/RV325 router vulnerability. The work blog is the work blog and this blog is my blog (i.e. opinions are my own, yada, yada, yada) and I felt compelled to post a cautionary take to vendors and organizations in general on how security issues can creep into your environment as a result of acquisitions and supply chains.<\/p>\n<p>Looking purely at the evidence gathered from internet scans \u2014 which include SSL certificate info \u2014 and following the trail in the historical web archive one can make an informed, speculative claim that the weakness described in <a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20190123-rv-info\">CVE-2019-1653<\/a> existed well before the final company logo ended up on the product.<\/p>\n<p>It appears that <a href=\"http:\/\/www.netklass.com\/www\/\">NetKlass<\/a> was <em>at least<\/em> producing the boards for this class of SMB VPN router and ultimately ended up <a href=\"https:\/\/www.importgenius.com\/importers\/cisco-system-linksys\">supplying them<\/a> to Linksys. A certain giant organization bought that company (and subsequently sold it off again) and it&#8217;s very likely this vulnerability ended up in said behemoth&#8217;s lap due to both poor supply chain management \u2014 in that Linksys seems to have done no security testing on the sourced parts \u2014 and, due to the acquisition, which caused those security issues to end up in a major brand&#8217;s product inventory.<\/p>\n<p>This can happen to any organization involved in sourcing hardware\/software from a third party and\/or involved in acquiring another company. Receiving compliance-driven checkbox forms on the efficacy of the target security programs (or sw\/hw) is not sufficient but is all too common a practice. Real due diligence involves kinda-trusting then verifying that the claims are accurate.<\/p>\n<p>Rigorous product testing on the part of the original sourcing organization and follow-up assurance testing at the point of acquisition would have very likely caught this issue before it became a responsibly disclosed vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>(A reminder to folks expecting &#8220;R&#8221;\/&#8221;data science&#8221; content: the feed for that is at https:\/\/rud.is\/b\/category\/r\/feed\/ if you don&#8217;t want to see the occasional non-R\/datasci posts.) Over at the $WORK blog we posted some research into the fairly horrible Cisco RV320\/RV325 router vulnerability. The work blog is the work blog and this blog is my blog [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[681,3],"tags":[],"class_list":["post-11825","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-information-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Acquisitions and Supply Chains: The Achilles&#039; heel of Product\/Organizational Security - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Acquisitions and Supply Chains: The Achilles&#039; heel of Product\/Organizational Security - rud.is\" \/>\n<meta property=\"og:description\" content=\"(A reminder to folks expecting &#8220;R&#8221;\/&#8221;data science&#8221; content: the feed for that is at https:\/\/rud.is\/b\/category\/r\/feed\/ if you don&#8217;t want to see the occasional non-R\/datasci posts.) Over at the $WORK blog we posted some research into the fairly horrible Cisco RV320\/RV325 router vulnerability. The work blog is the work blog and this blog is my blog [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-29T14:50:29+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Acquisitions and Supply Chains: The Achilles&#8217; heel of Product\/Organizational Security\",\"datePublished\":\"2019-01-29T14:50:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/\"},\"wordCount\":352,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"articleSection\":[\"Cybersecurity\",\"Information Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/\",\"url\":\"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/\",\"name\":\"Acquisitions and Supply Chains: The Achilles' heel of Product\/Organizational Security - rud.is\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/#website\"},\"datePublished\":\"2019-01-29T14:50:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rud.is\/b\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Acquisitions and Supply Chains: The Achilles&#8217; heel of Product\/Organizational Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rud.is\/b\/#website\",\"url\":\"https:\/\/rud.is\/b\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rud.is\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\/\/rud.is\"],\"url\":\"https:\/\/rud.is\/b\/author\/hrbrmstr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Acquisitions and Supply Chains: The Achilles' heel of Product\/Organizational Security - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/","og_locale":"en_US","og_type":"article","og_title":"Acquisitions and Supply Chains: The Achilles' heel of Product\/Organizational Security - rud.is","og_description":"(A reminder to folks expecting &#8220;R&#8221;\/&#8221;data science&#8221; content: the feed for that is at https:\/\/rud.is\/b\/category\/r\/feed\/ if you don&#8217;t want to see the occasional non-R\/datasci posts.) Over at the $WORK blog we posted some research into the fairly horrible Cisco RV320\/RV325 router vulnerability. The work blog is the work blog and this blog is my blog [&hellip;]","og_url":"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/","og_site_name":"rud.is","article_published_time":"2019-01-29T14:50:29+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Acquisitions and Supply Chains: The Achilles&#8217; heel of Product\/Organizational Security","datePublished":"2019-01-29T14:50:29+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/"},"wordCount":352,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"articleSection":["Cybersecurity","Information Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/","url":"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/","name":"Acquisitions and Supply Chains: The Achilles' heel of Product\/Organizational Security - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2019-01-29T14:50:29+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2019\/01\/29\/acquisitions-and-supply-chains-the-achilles-heel-of-product-organizational-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Acquisitions and Supply Chains: The Achilles&#8217; heel of Product\/Organizational Security"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-34J","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":6685,"url":"https:\/\/rud.is\/b\/2017\/10\/09\/enabling-concerned-visitors-ethical-security-researchers-with-security-txt-web-security-policies-plus-analyze-them-at-scale-with-r\/","url_meta":{"origin":11825,"position":0},"title":"Enabling Concerned Visitors &#038; Ethical Security Researchers with security.txt Web Security Policies (plus analyze them at-scale with R)","author":"hrbrmstr","date":"2017-10-09","format":false,"excerpt":"I've blogged a bit about robots.txt --- the rules file that documents a sites \"robots exclusion\" standard that instructs web crawlers what they can and cannot do (and how frequently they should do things when they are allowed to). This is a well-known and well-defined standard, but it's not mandatory\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2896,"url":"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/","url_meta":{"origin":11825,"position":1},"title":"Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords &#038; Reproducible Research","author":"hrbrmstr","date":"2014-02-09","format":false,"excerpt":"Jay Jacobs (@jayjacobs)\u2014my co-author of the soon-to-be-released book [Data-Driven Security](http:\/\/amzn.to\/ddsec)\u2014& I have been hard at work over at the book's [sister-blog](http:\/\/dds.ec\/blog) cranking out code to help security domain experts delve into the dark art of data science. We've covered quite a bit of ground since January 1st, but I'm using\u2026","rel":"","context":"In &quot;Data Analysis&quot;","block_context":{"text":"Data Analysis","link":"https:\/\/rud.is\/b\/category\/data-analysis-2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5178,"url":"https:\/\/rud.is\/b\/2017\/03\/19\/exploring-2017-retail-store-closings-with-r\/","url_meta":{"origin":11825,"position":2},"title":"Exploring 2017 Retail Store Closings with R","author":"hrbrmstr","date":"2017-03-19","format":false,"excerpt":"A story about one of the retail chains (J.C. Penny) releasing their list of stores closing in 2017 crossed paths with my Feedly reading list today and jogged my memory that there were a number of chains closing many of their doors this year, and I wanted to see the\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/03\/bls-1.png?fit=1200%2C1050&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/03\/bls-1.png?fit=1200%2C1050&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/03\/bls-1.png?fit=1200%2C1050&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/03\/bls-1.png?fit=1200%2C1050&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2017\/03\/bls-1.png?fit=1200%2C1050&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3558,"url":"https:\/\/rud.is\/b\/2015\/07\/25\/roll-your-own-gist-comments-notifier-in-r\/","url_meta":{"origin":11825,"position":3},"title":"Roll Your Own Gist Comments Notifier in R","author":"hrbrmstr","date":"2015-07-25","format":false,"excerpt":"As I was putting together the [coord_proj](https:\/\/rud.is\/b\/2015\/07\/24\/a-path-towards-easier-map-projection-machinations-with-ggplot2\/) ggplot2 extension I had posted a (https:\/\/gist.github.com\/hrbrmstr\/363e33f74e2972c93ca7) that I shared on Twitter. Said gist received a comment (several, in fact) and a bunch of us were painfully reminded of the fact that there is no built-in way to receive notifications from said comment\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4385,"url":"https:\/\/rud.is\/b\/2016\/05\/10\/new-rstats-podcast-r-world-news\/","url_meta":{"origin":11825,"position":4},"title":"New #rstats Podcast &#8211; R World News","author":"hrbrmstr","date":"2016-05-10","format":false,"excerpt":"Keeping up with R-related news on Twitter, GitHub, CRAN & even R-Bloggers (et al) can be an all-encompassing task that may be fun, but doesn't always make it easy to get work done. There is so much going on in the R community that we (myself and @jayjacobs) felt there\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/05\/r-world-news.png?fit=1200%2C860&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/05\/r-world-news.png?fit=1200%2C860&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/05\/r-world-news.png?fit=1200%2C860&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/05\/r-world-news.png?fit=1200%2C860&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/05\/r-world-news.png?fit=1200%2C860&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2782,"url":"https:\/\/rud.is\/b\/2013\/11\/13\/visual-anatomy-of-r-packages-used-in-data-driven-security\/","url_meta":{"origin":11825,"position":5},"title":"Visual Anatomy Of R Packages Used in Data Driven Security","author":"hrbrmstr","date":"2013-11-13","format":false,"excerpt":"Since @jayjacobs & I are down to the home stretch on Data Driven Security, I thought it would be interesting to do some post-writing pseudo-analyses of the book itself. I won't have exact page or word counts for a bit, but I wanted to see how many R packages we\u2026","rel":"","context":"In &quot;Data Analysis&quot;","block_context":{"text":"Data Analysis","link":"https:\/\/rud.is\/b\/category\/data-analysis-2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/11825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=11825"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/11825\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=11825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=11825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=11825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}