Research entries on relevant and emerging
cyber attacks, security vulnerabilities and exploits,
concepts and techniques involved in designing, and so on.
- Machine Learning
Monitoring ML models is a daunting task and yet indispensable. Here’s how CloudSEK deploys and monitors its 50+ different ML models.
It is imperatvie to develop computational methods to audit and debug complex and opaque ML models that deliver incoherent outputs.
Cyber Trivia Friday is here! In our first-ever cyber quiz, we want to find out if you’re up-to-date on your cybersecurity news from across the world. If you’re behind on the news, fret not. We’ve sprinkled in some hints to help you along. The winners will be the first 3 people to submit the quiz…
Although GraphQL is one of the most efficient alternatives to REST API, it is vulnerable to attacks. Here, we discuss common GraphQL flaws.
This part of a two part series on GraphQL explains what GraphQL is & how it is configured, and explores its superior data fetching techniques
This article outlines the various methods of generating and verifying CAPTCHAs, their application, and multiple ways to bypass CAPTCHAs.
Attackers use a variety of tools and techniques to discover and exploit security vulnerabilities in widely used software products.
Typography plays a significant role in the process of writing textual content. The aesthetic of the text is important in conveying ideas with clarity. It’s not just what, but also how, a writer presents their content, that determines its impact on the reader.