Sanketh IyerOpen-Source vs. Proprietary Solutions in CybersecurityBusinesses often worry whether to use open source or proprietary cybersecurity solutions in the fast-changing world. Each solution has pros…Jul 13Jul 13
Sanketh IyerFresh Threats: Fickle Stealer and AZStealer Highlight New Trends in CybersecurityIntroductionJun 24Jun 24
Sanketh IyerPost Deployment Metrics — Population Stability Index and Characteristic Stability IndexWhat is model Validation?Jan 26, 2023Jan 26, 2023
Sanketh IyerinTrading Data AnalysisOptimizing Stock Market Portfolio using PythonWhat is a Portfolio?Nov 2, 2022Nov 2, 2022
Sanketh IyerA Big Data Approach to Security Incidents and Event Management (SIEM)IntroductionSep 30, 2022Sep 30, 2022
Sanketh IyerKioptrix #5 — Vulnerable Machine ( Learning Offensive Security )Link: https://www.vulnhub.com/entry/kioptrix-2014-5,62/Sep 29, 2022Sep 29, 2022
Sanketh IyerThe DEATHNOTE: 1 Vulnerable Machine — A GuideBrushing up PenTesting skills with a CTFSep 24, 2022Sep 24, 2022