Our Blog

Read our latest blog posts

How much does a data breach cost you?

Executive summary for the Cost of a Data Breach Report 2020, highlighting factors that strengthen an organization’s...

Continue reading

Weekly Cyber Trivia Quiz Contest #3

Cyber Trivia Quiz is here! Find out if you’re up-to-date on your cybersecurity news from across the...

Continue reading

The lifecycle of a ransomware written in Python (featuring KMike)

Detailing the different stages in the lifecycle of a ransomware and its infection process, with insights on...

Continue reading

Weekly Cyber Trivia Friday #2

Cyber Trivia Friday is here! Find out if you’re up-to-date on your cybersecurity news from across the...

Continue reading

What makes Android apps vulnerable to cyberattacks?

In 2018, high risk vulnerabilities were found in 43% Android apps. These are the security flaws that...

Continue reading

Want to deter threat actors? Start by nullifying your data leaks.

Companies that have experienced a breach, underperform the market by > 15%, even years later. Here are...

Continue reading

Quickstart Shodan: What is it and how does it work

Security professionals, government agencies trust Shodan to alert them on unmanaged IoT devices. Learn more about Shodan...

Continue reading

With Herbie, humanoid robots are finally here

We delve into the mechanical structure and sensory faculties of the humanoid Herbie, which is a Socially...

Continue reading

Here’s how we proactively monitor XVigil’s 50+ Machine Learning models

Monitoring ML models is a daunting task and yet indispensable. Here's how CloudSEK deploys and monitors its 50+...

Continue reading

A peek into the black-box: Debugging deep neural networks for better...

It is imperatvie to develop computational methods to audit and debug complex and opaque ML models that...

Continue reading