Laura VoicuSecurity Through the Lens of Statistical Distributions: Understanding the Beta Distribution and its…This article is a continuation of the series of articles on “Security Through the Lens of Statistical Distributions”. If you’ve missed the…Mar 162Mar 162
Laura VoicuinThe Deep HubSecurity Through the Lens of Statistical Distributions: Understanding the Poisson Distribution and…A Long Winded IntroductionFeb 161Feb 161
Laura VoicuMeasuring the Immeasurable: Quantifying the Value of DataCommon phrases we hear all the time: “data is the lifeblood of a business”, “data is the new oil”, “a critical asset driving the modern…Jan 202Jan 202
Laura VoicuinThe Deep HubIn Cybersecurity Risk, You Don’t Need More Data, You Need Bayesian Thinking (Part 2)In the first article we looked at how we can use Bayesian methods to make inferences from very little data, and as a concrete example…Dec 9, 2023Dec 9, 2023
Laura VoicuinThe Deep HubIn Cybersecurity Risk, You Don’t Need More Data, You Need Bayesian Thinking (Part 1)I’ve transitioned into the realm of cybersecurity from the data space to work on cyber risk quantification. The idea of confronting…Nov 17, 20231Nov 17, 20231
Laura VoicuRisk, Coffee, and Cyber Laughs: Some Considerations on Quantifying Cyber RisksHave you ever wondered if diving into the nitty-gritty of cyber risks is as valuable as finding a coffee shop with Wi-Fi? Well, it turns…Nov 17, 2023Nov 17, 2023