Tweaking (extended) Isolation Forests

Tweaking (extended) Isolation Forests

6 years ago

Introduction This blog post focuses on the optimization process and evaluation of a single component used for outlier detection. We…

Introducing Our New Logos

6 years ago

Today, we are thrilled to present our new logos. (more…)

How Pentoma Helps An E-Commerce Unicorn’s Cyber Posture

6 years ago

How Pentoma helps Mercari’s Cyber Posture (more…)

The Current Security State Of Top Fitness Mobile Apps

7 years ago

In January 2018, the news broke out that Strava, a social fitness tracking app exposed the locations of US military…

Cybersecurity: What Every CEO and CFO Should Know

7 years ago

*This article was originally written by Melissa Lin for TopTal.  "Think of [cybersecurity] more as safety and security in roads…

Our Effort To Comply With GDPR

7 years ago

Tomorrow, May 25th, 2018, is the day the General Data Protection Regulation (GDPR) in EU becomes in effect. Even though…

10 Most Common Web Security Vulnerabilities

7 years ago

*This article was originally written by Gergely Karman at TopTal.  For all too many companies, it’s not until after a…

Vulnerability Scanning: What No One Is Talking About

7 years ago

Getting a full scope of how possible it is for your mobile app to get hacked can be overwhelming. These…