Seworks

Tweaking (extended) Isolation Forests

Tweaking (extended) Isolation Forests

Introduction This blog post focuses on the optimization process and evaluation of a single component used for outlier detection. We…

6 years ago

Introducing Our New Logos

Today, we are thrilled to present our new logos. (more…)

6 years ago

How Pentoma Helps An E-Commerce Unicorn’s Cyber Posture

How Pentoma helps Mercari’s Cyber Posture (more…)

7 years ago

The Current Security State Of Top Fitness Mobile Apps

In January 2018, the news broke out that Strava, a social fitness tracking app exposed the locations of US military…

7 years ago

Cybersecurity: What Every CEO and CFO Should Know

*This article was originally written by Melissa Lin for TopTal.  "Think of [cybersecurity] more as safety and security in roads…

7 years ago

Our Effort To Comply With GDPR

Tomorrow, May 25th, 2018, is the day the General Data Protection Regulation (GDPR) in EU becomes in effect. Even though…

7 years ago

10 Most Common Web Security Vulnerabilities

*This article was originally written by Gergely Karman at TopTal.  For all too many companies, it’s not until after a…

8 years ago

Vulnerability Scanning: What No One Is Talking About

Getting a full scope of how possible it is for your mobile app to get hacked can be overwhelming. These…

8 years ago