Automated penetration testing has become a new way to replace and/or complement the traditional manual penetration testing methods. In this…
There are many aspects to consider when it comes to cybersecurity. From using a secure host to adding firewalls…
For this year's Halloween treat, we present Pentoma®'s support for private cloud and on-premise implementations. (more…)
Introduction This blog post focuses on the optimization process and evaluation of a single component used for outlier detection. We…