Mitchell TelatnikinInfoSec Write-upsHow to Assess Active Directory for Vulnerabilities Using Tenable Nessus’ Active Directory Starter…The Nessus vulnerability scanner from Tenable is a widely known tool for conducting vulnerability assessments of networks and devices, such…Nov 2, 2022Nov 2, 2022
Mitchell Telatnik3 Lessons Blockchain Smart Contract Developers can learn from Traditional IT Vulnerability…As I have watched the state of smart contract security mature, I can’t help but notice the parallels between securing smart contract code…Aug 22, 2022Aug 22, 2022
Mitchell TelatnikinCoinsBenchThree Open-Source Blockchain Smart Contract Vulnerability ScannersIn the traditional IT security world, vulnerability scanning has become a relatively mature space, with vendors such as Tenable, Rapid7…Aug 21, 20221Aug 21, 20221
Mitchell TelatnikinTowards Data ScienceMachine Learning and AI in Human Relations DepartmentsA New Age in Productivity or Removing the ‘Human’ from HR?Aug 7, 20201Aug 7, 20201
Mitchell TelatnikinThe Startup3 Best Books for Beginner Data ScientistsImprove your data analysis skills by getting these three key booksAug 4, 20201Aug 4, 20201
Mitchell TelatnikinTowards Data ScienceHow I Made An Intelligent Job Search Web AppUsing Resumes to Find Relevant Job PostingsJun 17, 2020Jun 17, 2020
Mitchell TelatnikinTowards Data ScienceHow ISIS Uses TwitterUsing Social Network Analysis and Community Detection to Understand Pro-ISIS TwitterMay 26, 2020May 26, 2020
Mitchell TelatnikinTowards Data ScienceHow ISIS Uses TwitterUnderstanding the Islamic State’s Twitter Network Using Social Network AnalyticsMay 24, 2020May 24, 2020
Mitchell TelatnikinTowards Data ScienceHow to Locate Dark Web Hacker Forums for Security ResearchSnowball Sampling for Dark Web Security ResearchMay 20, 20206May 20, 20206
Mitchell TelatnikinTowards Data ScienceHow To Scrape the Dark WebScraping the Dark Web using Python, Selenium, and TOR on Mac OSXMay 5, 20201May 5, 20201