Security BY Design: Spring Cleaning
With the arrival of spring, it’s a good…
Nadia Hernandez,
20 3 月, 2023
3 min read
Security BY Design: Valentines and Big Game Crimes
The start of the year is busy for cybercrimin…
Nadia Hernandez,
8 2 月, 2023
3 min read
Digital Supply Chain Trends in High Tech and Semiconductor, Part 1
In a series of blog articles, the Product/Sol…
Terence Leung,
7 2 月, 2023
5 min read
New Threats in the New Year: Cybersecurity Predictions in 2023
In this new monthly “Security BY Design” blog…
Corwin Tobias,
19 1 月, 2023
5 min read
How To Fix Mean Absolute Error, Part 2
Part 2: How the Ranked Probability Score reco…
Malte Tichy,
9 1 月, 2023
9 min read
12 Days of Cybersecurity – Part 2
They see you when you’re sleeping, they…
Nadia Hernandez,
12 12 月, 2022
3 min read
12 Days of Cybersecurity – Part 1
It’s the most wonderful time of the yea…
Nadia Hernandez,
6 12 月, 2022
3 min read
Creating the Warehouse of the Future
Supply chain issues as a topic of dinner conv…
Terence Leung,
5 12 月, 2022
5 min read
How To Fix Mean Absolute Error, Part 1
The deceiving surprises that Mean Absolute Er…
Malte Tichy,
29 11 月, 2022
14 min read
Story Points Paradox
I have been an Agile enthusiast and a flag be…
Siddhartha Garg,
15 9 月, 2022
9 min read