

{"id":2871,"date":"2014-01-06T07:06:12","date_gmt":"2014-01-06T12:06:12","guid":{"rendered":"http:\/\/rud.is\/b\/?p=2871"},"modified":"2014-01-06T07:13:02","modified_gmt":"2014-01-06T12:13:02","slug":"announcing-the-launch-of-the-data-driven-security-blogpodcast","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/","title":{"rendered":"Announcing The Launch Of The Data Driven Security [Blog|Podcast]"},"content":{"rendered":"<div style=\"margin:auto\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2872\" data-permalink=\"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/dds-header-image\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2014\/01\/dds-header-image.png?fit=269%2C269&amp;ssl=1\" data-orig-size=\"269,269\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"dds-header-image\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2014\/01\/dds-header-image.png?fit=269%2C269&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2014\/01\/dds-header-image.png?resize=269%2C269&#038;ssl=1\" alt=\"dds-header-image\" width=\"269\" height=\"269\" class=\"aligncenter size-full wp-image-2872\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2014\/01\/dds-header-image.png?w=269&amp;ssl=1 269w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2014\/01\/dds-header-image.png?resize=150%2C150&amp;ssl=1 150w\" sizes=\"auto, (max-width: 269px) 100vw, 269px\" \/><\/div>\n<div style=\"clear:both\"><\/div>\n<p>While you&#8217;re waiting for the [book](http:\/\/amzn.to\/ddsec) by @jayjacobs &#038; @hrbrmstr to hit the shelves, why not head on over to the inaugural post of the [Data Driven Security Blog](http:\/\/datadrivensecurity.info\/blog) &#038; give a listen to the first episode of the [Data Driven Security Podcast](http:\/\/datadrivensecurity.info\/podcast).<\/p>\n<p>The Data Driven Security Blog aspires to be your go-to &#8220;how to&#8221; and &#8220;what&#8217;s new?&#8221; resource for all facets of security data science and the Data Driven Security Podcast aims to expand on the blog and showcase all the practitioners leading the way in, well, data-driven security.<\/p>\n<p>We start the blog with some D3 visualizations of our book&#8217;s [github logs](http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Jan\/dds-github\/), and the [inaugural podcast episode](http:\/\/datadrivensecurity.info\/podcast\/data-driven-security-episode-0.html) gives a bit of background on Jay, Bob, the book and the goal of the podcast.<\/p>\n<p>Join in the discussion on @ddsecblog, @ddsecpodcast and on [Google+](https:\/\/plus.google.com\/+DatadrivensecurityInfo1\/posts). If you prefer e-mail updates over Twitter and\/or RSS\/Atom feeds, you can also sign up for our non-spammy [newsletter](http:\/\/datadrivensecurity.info\/blog\/pages\/subscribe.html).<\/p>\n<p>We welcome all feedback, suggestions and ideas, so don&#8217;t be shy!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While you&#8217;re waiting for the [book](http:\/\/amzn.to\/ddsec) by @jayjacobs &#038; @hrbrmstr to hit the shelves, why not head on over to the inaugural post of the [Data Driven Security Blog](http:\/\/datadrivensecurity.info\/blog) &#038; give a listen to the first episode of the [Data Driven Security Podcast](http:\/\/datadrivensecurity.info\/podcast). The Data Driven Security Blog aspires to be your go-to &#8220;how to&#8221; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[677,709,678,673,674],"tags":[],"class_list":["post-2871","post","type-post","status-publish","format-standard","hentry","category-data-analysis-2","category-data-driven-security","category-data-visualization","category-datavis-2","category-dataviz"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Announcing The Launch Of The Data Driven Security [Blog|Podcast] - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Announcing The Launch Of The Data Driven Security [Blog|Podcast] - rud.is\" \/>\n<meta property=\"og:description\" content=\"While you&#8217;re waiting for the [book](http:\/\/amzn.to\/ddsec) by @jayjacobs &#038; @hrbrmstr to hit the shelves, why not head on over to the inaugural post of the [Data Driven Security Blog](http:\/\/datadrivensecurity.info\/blog) &#038; give a listen to the first episode of the [Data Driven Security Podcast](http:\/\/datadrivensecurity.info\/podcast). The Data Driven Security Blog aspires to be your go-to &#8220;how to&#8221; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-06T12:06:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-01-06T12:13:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2014\/01\/dds-header-image.png\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Announcing The Launch Of The Data Driven Security [Blog|Podcast]\",\"datePublished\":\"2014-01-06T12:06:12+00:00\",\"dateModified\":\"2014-01-06T12:13:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/\"},\"wordCount\":216,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2014\\\/01\\\/dds-header-image.png\",\"articleSection\":[\"Data Analysis\",\"data driven security\",\"Data Visualization\",\"DataVis\",\"DataViz\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/\",\"name\":\"Announcing The Launch Of The Data Driven Security [Blog|Podcast] - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2014\\\/01\\\/dds-header-image.png\",\"datePublished\":\"2014-01-06T12:06:12+00:00\",\"dateModified\":\"2014-01-06T12:13:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2014\\\/01\\\/dds-header-image.png?fit=269%2C269&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2014\\\/01\\\/dds-header-image.png?fit=269%2C269&ssl=1\",\"width\":269,\"height\":269},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2014\\\/01\\\/06\\\/announcing-the-launch-of-the-data-driven-security-blogpodcast\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Announcing The Launch Of The Data Driven Security [Blog|Podcast]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Announcing The Launch Of The Data Driven Security [Blog|Podcast] - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/","og_locale":"en_US","og_type":"article","og_title":"Announcing The Launch Of The Data Driven Security [Blog|Podcast] - rud.is","og_description":"While you&#8217;re waiting for the [book](http:\/\/amzn.to\/ddsec) by @jayjacobs &#038; @hrbrmstr to hit the shelves, why not head on over to the inaugural post of the [Data Driven Security Blog](http:\/\/datadrivensecurity.info\/blog) &#038; give a listen to the first episode of the [Data Driven Security Podcast](http:\/\/datadrivensecurity.info\/podcast). The Data Driven Security Blog aspires to be your go-to &#8220;how to&#8221; [&hellip;]","og_url":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/","og_site_name":"rud.is","article_published_time":"2014-01-06T12:06:12+00:00","article_modified_time":"2014-01-06T12:13:02+00:00","og_image":[{"url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2014\/01\/dds-header-image.png","type":"","width":"","height":""}],"author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Announcing The Launch Of The Data Driven Security [Blog|Podcast]","datePublished":"2014-01-06T12:06:12+00:00","dateModified":"2014-01-06T12:13:02+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/"},"wordCount":216,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"image":{"@id":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2014\/01\/dds-header-image.png","articleSection":["Data Analysis","data driven security","Data Visualization","DataVis","DataViz"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/","url":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/","name":"Announcing The Launch Of The Data Driven Security [Blog|Podcast] - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/#primaryimage"},"image":{"@id":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2014\/01\/dds-header-image.png","datePublished":"2014-01-06T12:06:12+00:00","dateModified":"2014-01-06T12:13:02+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/#primaryimage","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2014\/01\/dds-header-image.png?fit=269%2C269&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2014\/01\/dds-header-image.png?fit=269%2C269&ssl=1","width":269,"height":269},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2014\/01\/06\/announcing-the-launch-of-the-data-driven-security-blogpodcast\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Announcing The Launch Of The Data Driven Security [Blog|Podcast]"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-Kj","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":2896,"url":"https:\/\/rud.is\/b\/2014\/02\/09\/data-driven-security-roundup-betapert-shiny-honeypots-passwords-reproducible-research\/","url_meta":{"origin":2871,"position":0},"title":"Data Driven Security Roundup: betaPERT, Shiny, Honeypots, Passwords &#038; Reproducible Research","author":"hrbrmstr","date":"2014-02-09","format":false,"excerpt":"Jay Jacobs (@jayjacobs)\u2014my co-author of the soon-to-be-released book [Data-Driven Security](http:\/\/amzn.to\/ddsec)\u2014& I have been hard at work over at the book's [sister-blog](http:\/\/dds.ec\/blog) cranking out code to help security domain experts delve into the dark art of data science. We've covered quite a bit of ground since January 1st, but I'm using\u2026","rel":"","context":"In &quot;Data Analysis&quot;","block_context":{"text":"Data Analysis","link":"https:\/\/rud.is\/b\/category\/data-analysis-2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2969,"url":"https:\/\/rud.is\/b\/2014\/04\/25\/moving-from-system-calls-to-rcpp-interfaces\/","url_meta":{"origin":2871,"position":1},"title":"Moving From system() calls to Rcpp Interfaces","author":"hrbrmstr","date":"2014-04-25","format":false,"excerpt":"Over on the [Data Driven Security Blog](http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Apr\/making-better-dns-txt-record-lookups-with-rcpp\/) there's a post on how to use `Rcpp` to interface with an external library (in this case `ldns` for DNS lookups). It builds on [another post](http:\/\/datadrivensecurity.info\/blog\/posts\/2014\/Apr\/firewall-busting-asn-lookups\/) which uses `system()` to make a call to `dig` to lookup DNS `TXT` records. The core code\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2938,"url":"https:\/\/rud.is\/b\/2014\/03\/15\/guardian-words-visualized\/","url_meta":{"origin":2871,"position":2},"title":"Guardian Words: Visualized","author":"hrbrmstr","date":"2014-03-15","format":false,"excerpt":"Andy Kirk (@visualisingdata) & Lynn Cherny (@arnicas) tweeted about the Guardian Word Count service\/archive site, lamenting the lack of visualizations: Want to know num of words written in each day's Guardian paper by section + approx reading time? http:\/\/t.co\/wP4W1EzUsx via @bengoldacre\u2014 Andy Kirk (@visualisingdata) March 15, 2014 This gave me\u2026","rel":"","context":"In &quot;Data Visualization&quot;","block_context":{"text":"Data Visualization","link":"https:\/\/rud.is\/b\/category\/data-visualization\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2933,"url":"https:\/\/rud.is\/b\/2014\/02\/20\/using-twitter-as-a-data-source-for-monitoring-password-dumps\/","url_meta":{"origin":2871,"position":3},"title":"Using Twitter as a Data Source For Monitoring Password Dumps","author":"hrbrmstr","date":"2014-02-20","format":false,"excerpt":"I shot a quick post over at the [Data Driven Security blog](http:\/\/bit.ly\/1hyqJiT) explaining how to separate Twitter data gathering from R code via the Ruby `t` ([github repo](https:\/\/github.com\/sferik\/t)) command. Using `t` frees R code from having to be a Twitter processor and lets the analyst focus on analysis and visualization,\u2026","rel":"","context":"In &quot;Data Analysis&quot;","block_context":{"text":"Data Analysis","link":"https:\/\/rud.is\/b\/category\/data-analysis-2\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":13120,"url":"https:\/\/rud.is\/b\/2021\/07\/20\/packet-maze-solving-a-cyberdefenders-pcap-puzzle-with-r-zeek-and-tshark\/","url_meta":{"origin":2871,"position":4},"title":"Packet Maze: Solving a CyberDefenders PCAP Puzzle with R, Zeek, and tshark","author":"hrbrmstr","date":"2021-07-20","format":false,"excerpt":"It was a rainy weekend in southern Maine and I really didn't feel like doing chores, so I was skimming through RSS feeds and noticed a link to a PacketMaze challenge in the latest This Week In 4n6. Since it's also been a while since I've done any serious content\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2889,"url":"https:\/\/rud.is\/b\/2014\/01\/31\/data-driven-security-the-book-update-shamelessselfpromotion\/","url_meta":{"origin":2871,"position":5},"title":"Data-Driven Security (The Book)  Update #ShamelessSelfPromotion","author":"hrbrmstr","date":"2014-01-31","format":false,"excerpt":"If I made a Venn diagram of the cross-section of readers of this blog and the [Data Driven Security](http:\/\/dds.ec\/) web sites it might be indistinguishable from a pure circle. However, just in case there are a few stragglers out there, I figured one more post on the fact that the\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/2871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=2871"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/2871\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=2871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=2871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=2871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}