

{"id":1438,"date":"2012-07-02T12:38:54","date_gmt":"2012-07-02T17:38:54","guid":{"rendered":"http:\/\/rud.is\/b\/?p=1438"},"modified":"2017-03-27T09:40:50","modified_gmt":"2017-03-27T14:40:50","slug":"2012-whitehat-security-website-security-statistics-report-redux","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/","title":{"rendered":"2012 WhiteHat Security Website Security Statistics Report Redux"},"content":{"rendered":"<blockquote><p>This is an inaugural post for @MetricsHulk, on the condition that there are few \u2013\u00a0if any \u2013\u00a0&#8220;ALL CAPS&#8221; bits. Q3&#038;4 tend to be &#8220;report season&#8221;, and @MetricsHulk usually has some critiques, praises, opines and suggestions (some <i>smashes<\/i>, too) to offer as we are inundated with a blitz of infographics.<\/p><\/blockquote>\n<p>The always #spiffy @WhiteHatSec released their <a href=\"https:\/\/www.whitehatsec.com\/\" target=\"_blank\">2011 Web Site Security stats report<\/a> [<span class=\"removed_link\" title=\"https:\/\/www.whitehatsec.com\/assets\/WPstats_summer12_12th.pdf\">direct link<\/span> (PDF)] last week (here&#8217;s one of their teaser tweets):<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"510\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The Avg # of Serious* vulns found per website per year was 79, way less<br \/>than 230 in 2010 &amp; down from 1,111 in 2007. <a href=\"http:\/\/t.co\/Q5GIwZKi\">http:\/\/t.co\/Q5GIwZKi<\/a><\/p>\n<p>&mdash; Synopsys Software Integrity (@SynopsysAppsec) <a href=\"https:\/\/twitter.com\/SynopsysAppsec\/status\/218046945783054337?ref_src=twsrc%5Etfw\">June 27, 2012<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>With over 7,000 sites and hundreds of diverse organizations represented in the report, it is a great resource for folks to see how they stack up (more on that in a bit). Security folks should also take some encouragement from the report since:<\/p>\n<ul>\n<li>Real vulnerabilities are down (significantly)<\/li>\n<li>WAFs <i>can<\/i> help<\/li>\n<li>Vulnerabilities are getting fixed faster (when found)<\/li>\n<\/ul>\n<p>@WhiteHatSec does a fine job summarizing key &#038; extended findings (hint: read the report), and they are awesomely up-front and honest with regard to the findings (see pages 4 &#038; 5 for their analysis on why the &#8216;good stats&#8217; might be so good).<\/p>\n<p>The report is chock-full of <i>data<\/i>. Real. Data. The only way it could have been better data-wise is if they provided a <a href=\"https:\/\/docs.google.com\/spreadsheets\/d\/1FhXPu1OzR9i3ZR3nVBaHsv7h87gVBNrRbMoedepBW9c\/edit\" target=\"_blank\">Google Docs bundle of raw numbers<\/a>. (NOTE: I didn&#8217;t get <em>all<\/em> the data in there, but it has decent amount from the report)<\/p>\n<p>I do think there is some room for improvement. Take, for example, the \u2013 sigh \u2013\u00a0donut chart on page 9. I might be inclined to refrain from comment if this was one of those hipster infographics that seem to be everywhere these days. A pie chart isn&#8217;t much better, but at least we&#8217;re able to process the relative sizes a bit better when the actual angles are present. Here&#8217;s a before\/after makeover for your comparison\/opine (<em>click for larger version<\/em>):<\/p>\n<p><center><a target=\"_blank\"  href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1446\" data-permalink=\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/fig-4-example-large\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large.png?fit=1006%2C456&amp;ssl=1\" data-orig-size=\"1006,456\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"fig-4-example-large\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large.png?fit=300%2C135&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large.png?fit=510%2C231&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large.png?resize=300%2C135&#038;ssl=1\" alt=\"\" title=\"fig-4-example-large\" width=\"300\" height=\"135\" class=\"aligncenter size-medium wp-image-1446\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large.png?resize=300%2C135&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large.png?w=1006&amp;ssl=1 1006w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><\/p>\n<p>We get an immediate sense of scale from the bars and it removes the need for the &#8220;Frosted Lucky Charms&#8221; color-wheel effect. The @WhiteHatSec folk use bars (very appropriately) almost everywhere else, so I&#8217;m not sure what the design decision was for deviating for this part of the report.<\/p>\n<p>The next bit that confused me was Figure 18 (page 15). I&#8217;m having difficulty both figuring out where the &#8220;79&#8221; value comes from (I can&#8217;t get to it by averaging the values presents) and grok&#8217;ing the magnitude of the differences from the bubbles. So, here&#8217;s another before\/after makeover for your comparison\/opine (<em>click for larger version<\/em>):<\/p>\n<p><center><a href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-18-large.png?ssl=1\" rel=\"attachment wp-att-1449\" target=\"_blank\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1449\" data-permalink=\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/fig-18-large\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-18-large.png?fit=1134%2C500&amp;ssl=1\" data-orig-size=\"1134,500\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"fig-18-large\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-18-large.png?fit=300%2C132&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-18-large.png?fit=510%2C225&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-18-large.png?resize=300%2C132&#038;ssl=1\" alt=\"\" title=\"fig-18-large\" width=\"300\" height=\"132\" class=\"aligncenter size-medium wp-image-1449\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-18-large.png?resize=300%2C132&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-18-large.png?resize=1024%2C451&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-18-large.png?w=1134&amp;ssl=1 1134w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><\/p>\n<p>Finally, I think Figure 23 &#038; 24 could do with a bit of a <a href=\"https:\/\/rud.is\/b\/tag\/slopegraph\/\">slopegraph<\/a> makeover, as the spirit of the visualization is to show year-over-year differences. The first two slopegraphs used the &#8220;<a ref=\"http:\/\/rud.is\/b\/2012\/06\/05\/slopegraphs-the-quintessential-gdp-example-revisited\/\">Tufte binning technique<\/a>&#8220;, so you&#8217;ll need to refer to the companion data tables if you want exact numbers for comparison (the trend is more important, IMO).<\/p>\n<p><center><b>Average Days Open<\/b><br \/><a target=\"_blank\" href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-open.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1453\" data-permalink=\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/wh-avg-days-open\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-open.png?fit=1843%2C680&amp;ssl=1\" data-orig-size=\"1843,680\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"wh-avg-days-open\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-open.png?fit=300%2C110&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-open.png?fit=510%2C188&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-open.png?resize=300%2C110&#038;ssl=1\" alt=\"\" title=\"wh-avg-days-open\" width=\"300\" height=\"110\" class=\"aligncenter size-medium wp-image-1453\"\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-open.png?resize=300%2C110&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-open.png?resize=1024%2C377&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-open.png?w=1843&amp;ssl=1 1843w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-open.png?w=1530&amp;ssl=1 1530w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><\/p>\n<p><center><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1461\" data-permalink=\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/open\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/open.png?fit=200%2C371&amp;ssl=1\" data-orig-size=\"200,371\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"open\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/open.png?fit=161%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/open.png?fit=200%2C371&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/open.png?resize=200%2C371&#038;ssl=1\" alt=\"\" title=\"open\" width=\"200\" height=\"371\" class=\"aligncenter size-full wp-image-1461\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/open.png?w=200&amp;ssl=1 200w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/open.png?resize=161%2C300&amp;ssl=1 161w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/center><\/p>\n<p><center><b>Average Days to Close<\/b><br \/><a target=\"_blank\" href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-to-close.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1452\" data-permalink=\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/wh-avg-days-to-close\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-to-close.png?fit=1908%2C539&amp;ssl=1\" data-orig-size=\"1908,539\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"wh-avg-days-to-close\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-to-close.png?fit=300%2C84&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-to-close.png?fit=510%2C144&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-to-close.png?resize=300%2C84&#038;ssl=1\" alt=\"\" title=\"wh-avg-days-to-close\" width=\"300\" height=\"84\" class=\"aligncenter size-medium wp-image-1452\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-to-close.png?resize=300%2C84&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-to-close.png?resize=1024%2C289&amp;ssl=1 1024w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-to-close.png?w=1908&amp;ssl=1 1908w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-avg-days-to-close.png?w=1530&amp;ssl=1 1530w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><\/p>\n<p><center><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1460\" data-permalink=\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/close\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/close.png?fit=200%2C372&amp;ssl=1\" data-orig-size=\"200,372\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"close\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/close.png?fit=161%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/close.png?fit=200%2C372&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/close.png?resize=200%2C372&#038;ssl=1\" alt=\"\" title=\"close\" width=\"200\" height=\"372\" class=\"aligncenter size-full wp-image-1460\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/close.png?w=200&amp;ssl=1 200w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/close.png?resize=161%2C300&amp;ssl=1 161w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/center><\/p>\n<p><center><b>Remediation Rates by Year<\/b><br \/><a target=\"_blank\" href=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-vuln-remed-rates.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1451\" data-permalink=\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/wh-vuln-remed-rates\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-vuln-remed-rates.png?fit=1415%2C2142&amp;ssl=1\" data-orig-size=\"1415,2142\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"wh-vuln-remed-rates\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-vuln-remed-rates.png?fit=198%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-vuln-remed-rates.png?fit=510%2C773&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-vuln-remed-rates.png?resize=198%2C300&#038;ssl=1\" alt=\"\" title=\"wh-vuln-remed-rates\" width=\"198\" height=\"300\" class=\"aligncenter size-medium wp-image-1451\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-vuln-remed-rates.png?resize=198%2C300&amp;ssl=1 198w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-vuln-remed-rates.png?resize=676%2C1024&amp;ssl=1 676w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-vuln-remed-rates.png?w=1415&amp;ssl=1 1415w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/wh-vuln-remed-rates.png?w=1020&amp;ssl=1 1020w\" sizes=\"auto, (max-width: 198px) 100vw, 198px\" \/><\/a><\/center><\/p>\n<p>(You can also download <a href=\"https:\/\/rud.is\/dl\/wh-12-fig-23-24-slopegraph.zip\" target=\"_blank\">easier to read PDFs of the slopegraphs<\/a>)<\/p>\n<p><b>Absolutely no one<\/b> should take the makeover suggestions as report slander. As stated at the beginning of the post, @WhiteHatSec is open about the efficacy of their data and analysis, plus they provide <i>actual data<\/i>. The presentation of stats &#038; trending by industry and vulnerability type should help any organization with an appsec program figure out if they are doing better or worse the others in their sector and see if they are smashing bugs with similar success. It also gives the general infosec community a view that we would otherwise not have. I would encourage other organizations to follow @WhiteHatSec&#8217;s example, even if it means more donut charts (mmm\u2026donuts).<\/p>\n<p><em>What information did you glean from the WhiteHat report, or what makeovers would you encourage for the next one?<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is an inaugural post for @MetricsHulk, on the condition that there are few \u2013\u00a0if any \u2013\u00a0&#8220;ALL CAPS&#8221; bits. Q3&#038;4 tend to be &#8220;report season&#8221;, and @MetricsHulk usually has some critiques, praises, opines and suggestions (some smashes, too) to offer as we are inundated with a blitz of infographics. The always #spiffy @WhiteHatSec released their [&hellip;]<\/p>\n","protected":false},"author":33,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[664,24,3,47],"tags":[],"class_list":["post-1438","post","type-post","status-publish","format-standard","hentry","category-appsec","category-charts-graphs","category-information-security","category-metrics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2012 WhiteHat Security Website Security Statistics Report Redux - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2012 WhiteHat Security Website Security Statistics Report Redux - rud.is\" \/>\n<meta property=\"og:description\" content=\"This is an inaugural post for @MetricsHulk, on the condition that there are few \u2013\u00a0if any \u2013\u00a0&#8220;ALL CAPS&#8221; bits. Q3&#038;4 tend to be &#8220;report season&#8221;, and @MetricsHulk usually has some critiques, praises, opines and suggestions (some smashes, too) to offer as we are inundated with a blitz of infographics. The always #spiffy @WhiteHatSec released their [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2012-07-02T17:38:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-27T14:40:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large-300x135.png\" \/>\n<meta name=\"author\" content=\"metricshulk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"metricshulk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/\"},\"author\":{\"name\":\"metricshulk\",\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/4cb9a3b8bd4594d2ca8934e4dd5cb07d\"},\"headline\":\"2012 WhiteHat Security Website Security Statistics Report Redux\",\"datePublished\":\"2012-07-02T17:38:54+00:00\",\"dateModified\":\"2017-03-27T14:40:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/\"},\"wordCount\":476,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"image\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large-300x135.png\",\"articleSection\":[\"AppSec\",\"Charts &amp; Graphs\",\"Information Security\",\"Metrics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/\",\"url\":\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/\",\"name\":\"2012 WhiteHat Security Website Security Statistics Report Redux - rud.is\",\"isPartOf\":{\"@id\":\"https:\/\/rud.is\/b\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large-300x135.png\",\"datePublished\":\"2012-07-02T17:38:54+00:00\",\"dateModified\":\"2017-03-27T14:40:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large.png?fit=1006%2C456&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large.png?fit=1006%2C456&ssl=1\",\"width\":\"1006\",\"height\":\"456\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rud.is\/b\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2012 WhiteHat Security Website Security Statistics Report Redux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rud.is\/b\/#website\",\"url\":\"https:\/\/rud.is\/b\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rud.is\/b\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\/\/rud.is\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/rud.is\/b\/#\/schema\/person\/4cb9a3b8bd4594d2ca8934e4dd5cb07d\",\"name\":\"metricshulk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/rud.is\/b\/wp-content\/wphb-cache\/gravatar\/d6c\/d6c2d869b176c31bdbd9963ea54b0b15x96.jpg\",\"url\":\"https:\/\/rud.is\/b\/wp-content\/wphb-cache\/gravatar\/d6c\/d6c2d869b176c31bdbd9963ea54b0b15x96.jpg\",\"contentUrl\":\"https:\/\/rud.is\/b\/wp-content\/wphb-cache\/gravatar\/d6c\/d6c2d869b176c31bdbd9963ea54b0b15x96.jpg\",\"caption\":\"metricshulk\"},\"sameAs\":[\"https:\/\/twitter.com\/#!\/metricshulk\"],\"url\":\"https:\/\/rud.is\/b\/author\/metricshulk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2012 WhiteHat Security Website Security Statistics Report Redux - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/","og_locale":"en_US","og_type":"article","og_title":"2012 WhiteHat Security Website Security Statistics Report Redux - rud.is","og_description":"This is an inaugural post for @MetricsHulk, on the condition that there are few \u2013\u00a0if any \u2013\u00a0&#8220;ALL CAPS&#8221; bits. Q3&#038;4 tend to be &#8220;report season&#8221;, and @MetricsHulk usually has some critiques, praises, opines and suggestions (some smashes, too) to offer as we are inundated with a blitz of infographics. The always #spiffy @WhiteHatSec released their [&hellip;]","og_url":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/","og_site_name":"rud.is","article_published_time":"2012-07-02T17:38:54+00:00","article_modified_time":"2017-03-27T14:40:50+00:00","og_image":[{"url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large-300x135.png","type":"","width":"","height":""}],"author":"metricshulk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"metricshulk","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/"},"author":{"name":"metricshulk","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/4cb9a3b8bd4594d2ca8934e4dd5cb07d"},"headline":"2012 WhiteHat Security Website Security Statistics Report Redux","datePublished":"2012-07-02T17:38:54+00:00","dateModified":"2017-03-27T14:40:50+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/"},"wordCount":476,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large-300x135.png","articleSection":["AppSec","Charts &amp; Graphs","Information Security","Metrics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/","url":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/","name":"2012 WhiteHat Security Website Security Statistics Report Redux - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#primaryimage"},"image":{"@id":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large-300x135.png","datePublished":"2012-07-02T17:38:54+00:00","dateModified":"2017-03-27T14:40:50+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#primaryimage","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large.png?fit=1006%2C456&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2012\/07\/fig-4-example-large.png?fit=1006%2C456&ssl=1","width":"1006","height":"456"},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2012\/07\/02\/2012-whitehat-security-website-security-statistics-report-redux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"2012 WhiteHat Security Website Security Statistics Report Redux"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"]},{"@type":"Person","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/4cb9a3b8bd4594d2ca8934e4dd5cb07d","name":"metricshulk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/wp-content\/wphb-cache\/gravatar\/d6c\/d6c2d869b176c31bdbd9963ea54b0b15x96.jpg","url":"https:\/\/rud.is\/b\/wp-content\/wphb-cache\/gravatar\/d6c\/d6c2d869b176c31bdbd9963ea54b0b15x96.jpg","contentUrl":"https:\/\/rud.is\/b\/wp-content\/wphb-cache\/gravatar\/d6c\/d6c2d869b176c31bdbd9963ea54b0b15x96.jpg","caption":"metricshulk"},"sameAs":["https:\/\/twitter.com\/#!\/metricshulk"],"url":"https:\/\/rud.is\/b\/author\/metricshulk\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-nc","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":754,"url":"https:\/\/rud.is\/b\/2012\/01\/03\/businessweek-infographic-illustrates-the-pounding-we-took-in-2011\/","url_meta":{"origin":1438,"position":0},"title":"Businessweek Infographic Illustrates The Pounding We Took In 2011","author":"hrbrmstr","date":"2012-01-03","format":false,"excerpt":"Another #spiffy tip from @MetricsHulk: Evan Applegate put together a great & simple infographic for Businessweek that illustrates the number and size of 2011 data breaches pretty well. (Click for larger version) The summary data (below the timeline bubble chart) shows there was a 37.4% increase in reported incidents and\u2026","rel":"","context":"In &quot;Breach&quot;","block_context":{"text":"Breach","link":"https:\/\/rud.is\/b\/category\/breach\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1705,"url":"https:\/\/rud.is\/b\/2012\/10\/22\/putting-cybercrime-infographics-behind-bars\/","url_meta":{"origin":1438,"position":1},"title":"Putting Cybercrime [Infographics] Behind Bars","author":"metricshulk","date":"2012-10-22","format":false,"excerpt":"HP & the Ponemon Institute have released their third annual \"Cost of Cybercrime\" report and the web wizards at HP have given us an infographic from it: (You can see the full size one at the above link) While some designers may think that infographic visualizations are not subject to\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1517,"url":"https:\/\/rud.is\/b\/2012\/07\/14\/fibonacci-graphing\/","url_meta":{"origin":1438,"position":2},"title":"&#8220;Fibonacci&#8221; Graphing","author":"metricshulk","date":"2012-07-14","format":false,"excerpt":"Benchmarking\/profiling is one of the fundamental practices for tech folk and Feng Shen's recent post to Hacker News continues this fine tradition with a look at startup & run times for \"fibonacci(40)\" in seven computer languages (two 'C' variants, Clojure, go, python, node & Java). Good, quick project, but I\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4121,"url":"https:\/\/rud.is\/b\/2016\/03\/14\/spinning-cycles-in-box-4-to-take-the-pies-out-of-pi-day\/","url_meta":{"origin":1438,"position":3},"title":"Spinning Cycles in Box #4 To Take the Pies out of Pi Day","author":"hrbrmstr","date":"2016-03-14","format":false,"excerpt":">UPDATE: time spent per task factor order was wrong before. now fixed. I caught this tweet today: INSTEAD OF WORRYING ABOUT HOW OTHER DATA SCIENTISTS USE ? PERHAPS @WSJGraphics COULD SPEND THEIR ? LEARNING DATAVIZ pic.twitter.com\/xrP2eUhaaQ\u2014 Metrics Hulk (@MetricsHulk) March 14, 2016 The WSJ folks usually do a great job,\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/03\/RStudioScreenSnapz018.png?fit=1200%2C894&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/03\/RStudioScreenSnapz018.png?fit=1200%2C894&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/03\/RStudioScreenSnapz018.png?fit=1200%2C894&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/03\/RStudioScreenSnapz018.png?fit=1200%2C894&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2016\/03\/RStudioScreenSnapz018.png?fit=1200%2C894&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1213,"url":"https:\/\/rud.is\/b\/2012\/06\/07\/slopegraphs-in-python-log-scales-spam-data-analysis\/","url_meta":{"origin":1438,"position":4},"title":"Slopegraphs in Python \u2013 Log Scales &#038; Spam Data Analysis","author":"hrbrmstr","date":"2012-06-07","format":false,"excerpt":"Given the focus on actual development of the PySlopegraph tool in most of the blog posts of late, folks may be wondering why an infosec\/inforisk guy is obsessing so much on a tool and not talking security. Besides the fixation on filling a void and promoting an underused visualization tool,\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3775,"url":"https:\/\/rud.is\/b\/2015\/11\/08\/visualizing_survey_data\/","url_meta":{"origin":1438,"position":5},"title":"Visualizing Survey Data : Comparison Between Observations","author":"hrbrmstr","date":"2015-11-08","format":false,"excerpt":"Cybersecurity is a domain that really likes surveys, or at the very least it has many folks within it that like to conduct and report on surveys. One recent survey on threat intelligence is in it's second year, so it sets about comparing answers across years. Rather than go into\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/11\/Visualizing_Survey_Data___Comparison_Between_Observations.png?fit=1200%2C721&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/11\/Visualizing_Survey_Data___Comparison_Between_Observations.png?fit=1200%2C721&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/11\/Visualizing_Survey_Data___Comparison_Between_Observations.png?fit=1200%2C721&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/11\/Visualizing_Survey_Data___Comparison_Between_Observations.png?fit=1200%2C721&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2015\/11\/Visualizing_Survey_Data___Comparison_Between_Observations.png?fit=1200%2C721&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=1438"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/1438\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=1438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=1438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=1438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}