Yotam PerkalinInfoSec Write-upsFrom Conflict to Collaboration: The Evolution of Vulnerability Disclosure1d ago1d ago
Yotam PerkalCISA KEV — A Balanced PerspectiveThe advantages and limitations of the CISA KEV catalog, and how to effectively integrate it into an holistic, risk-based VM strategy.Jan 18Jan 18
Yotam PerkalinInfoSec Write-upsNahamCon CTF 2023 — OSINT Challenges WalkthroughA detailed walkthrough of all four OSINT Challenges from NahamCon CTF 2023 | by Yotam PerkalJun 20, 20231Jun 20, 20231
Yotam PerkalinInfoSec Write-upsApproaching CTF OSINT Challenges — Learn by ExampleNew to OSINT challenges? General recommendations & Tips on solving OSINT Challenges based on examples from the recent 2022 NahamCon CTF.May 25, 2022May 25, 2022
Yotam PerkalinInfoSec Write-upsNahamCon 2022 CTF Write-up: “No Space Between Us” ChallengeMy approach and learnings from solving the NahamCon 2022 CTF ‘No Space Between Us’ challenge (solved by 62 teams out of over 4000).May 4, 2022May 4, 2022
Yotam PerkalinTowards Data ScienceHow I went from Automation Engineer to Data ScientistAdvice and lessons learned from my journey into the world of Data Science and Machine Learning (applicable to any career transition).Aug 12, 20191Aug 12, 20191
Yotam PerkalinThe PayPal Technology BlogHow I went from Automation Engineer to Data ScientistAdvice and lessons learned from my journey into the world of Data Science and Machine Learning.Jul 13, 20191Jul 13, 20191