top of page
Blog Hub
1 min read
Best Cheat Sheet for ML Algorithms with use case and tip to remember
Machine learning models are powerful tools used across various domains to make predictions, classify data, and uncover patterns. Each...
2 min read
Understanding and Correcting ML Model Fit - Overfitting and Underfitting
Overfitting occurs when a machine learning model learns the training data too well, capturing noise and irrelevant patterns, leading to...
1 min read
For Auditors - Machine Learning Solutions - Fairness questions to ask
Below is a table outlining questions to ask at various stages of the machine learning (ML) lifecycle to ensure fairness by design: These...
1 min read
Is ChatGPT an AI or an ML or a Deep Learning or a Generative AI solution. What is it?
To conclude the above, let us firstly define clear differences between AI (Artificial Intelligence), ML (Machine Learning), DL (Deep...
2 min read
4 types of ML Drifts that need monitoring with an example
Below is a concise breakdown of the four types of drift, along with detection and remediation strategies: Concept Drift: Explanation:...
1 min read
Difference between DEVOPS and MLOPS - Are you ready?
Let's break it down: DEVOPS: Imagine you're building a house. DevOps is like having a smooth, well-coordinated construction process....
2 min read
How often should you retrain your ML Model?
Determining how often to retrain a machine learning (ML) model depends on several factors, including data dynamics, model performance,...
2 min read
Understanding the 4 Inference Types - Batch, Asynchronous, Serverless and Real-time
Batch Inference: Definition: Batch inference involves processing a large batch of data all at once. Example: Suppose a company has...
2 min read
Hyper Parameters tuning best practices
Hyperparameter tuning optimizes machine learning models by exploring parameter ranges, utilizing cross-validation, selecting relevant...
3 min read
Step by Step process to Implementing a Zero Trust Architecture
The steps involved in a Zero Trust planning and implementation project, including examples: 1. Data Inventory and Stakeholder Engagement:...
3 min read
Case study on ZTNA (Zero Trust Network Access)
ZTNA to the Rescue: Boosting Security at Retail Express. Retail Express, a rapidly growing clothing retailer, faced challenges with...
2 min read
Are there any regulations that require zero trust?
While Zero Trust architecture is not explicitly mandated by regulations, its principles align with industry-specific regulations,...
3 min read
Case study on Zero Trust - IOT
Securing a Smart City with Zero Trust: Traffic Light Management Example Imagine a smart city where traffic lights dynamically adjust...
2 min read
Does AWS use Zero Trust?
Yes, AWS incorporates Zero Trust principles into its services and infrastructure. While not a single, monolithic service, AWS offers...
1 min read
Does NIS 2 Directive expect implementing Zero Trust?
The NIS 2 Directive doesn't explicitly mandate Zero Trust as a requirement. However, it strongly encourages it as a key element for...
2 min read
Example of inside out and outside in and why does Zero Trust prefer inside out?
Inside-Out Approach: Imagine a team of developers tasked with building an e-commerce platform using the inside-out approach. They start...
2 min read
Success Criteria for Zero Trust Projects
NIST guides Zero Trust initiatives, aiming for reduced incidents, improved access control, compliance, user awareness, and...
2 min read
Does NIST expect implementing Zero trust?
NIST offers guidance for Zero Trust through SP 800-207, the CISA Zero Trust Maturity Model, and alignment with the Cybersecurity...
bottom of page