0
Skip to Content
Seeking Eureka
Home
Insights
Projects
Seeking Eureka
Home
Insights
Projects
Home
Insights
Projects
The Hidden Threat: Why Software Extensions Are Your Organization’s Blind Spot
Patrick Lefler 10/29/25 Patrick Lefler 10/29/25

The Hidden Threat: Why Software Extensions Are Your Organization’s Blind Spot

Transitive dependencies—software extensions— represent 80% of modern application code, yet remain largely invisible to security processes—making this a critical blind spot for enterprises to address.

Read More
Proactive Third-Party Risk Management with Shodan Intelligence
Patrick Lefler 10/20/25 Patrick Lefler 10/20/25

Proactive Third-Party Risk Management with Shodan Intelligence

Read More
Beyond Binary Alerts: Using Markov Switching Models to Detect Insider Threats
Patrick Lefler 10/14/25 Patrick Lefler 10/14/25

Beyond Binary Alerts: Using Markov Switching Models to Detect Insider Threats

Read More
Simpson’s Paradox in Cybersecurity: Why Your New Security Tool May Be Less Effective Than the One It Replaced
Patrick Lefler 10/9/25 Patrick Lefler 10/9/25

Simpson’s Paradox in Cybersecurity: Why Your New Security Tool May Be Less Effective Than the One It Replaced

Read More
Beyond the Patch: Leveraging Poisson Distribution to Transform Bug Reporting into Strategic Risk Insight
Patrick Lefler 9/9/25 Patrick Lefler 9/9/25

Beyond the Patch: Leveraging Poisson Distribution to Transform Bug Reporting into Strategic Risk Insight

Read More
The Hidden Dangers of Networked Risk: A Graph Theory Approach to Systemic Vulnerability
Patrick Lefler 9/4/25 Patrick Lefler 9/4/25

The Hidden Dangers of Networked Risk: A Graph Theory Approach to Systemic Vulnerability

Read More
Applying K-Means Clustering for Vulnerability Prioritization
Patrick Lefler 9/2/25 Patrick Lefler 9/2/25

Applying K-Means Clustering for Vulnerability Prioritization

Read More
Unmasking Malicious Webs: How the Bellman-Ford Algorithm Detects Threats in Social Networks
Patrick Lefler 8/21/25 Patrick Lefler 8/21/25

Unmasking Malicious Webs: How the Bellman-Ford Algorithm Detects Threats in Social Networks

Read More
Poisson Distribution: A Cybersecurity Defender’s Ally in Detecting Brute-Force Attacks
Patrick Lefler 8/12/25 Patrick Lefler 8/12/25

Poisson Distribution: A Cybersecurity Defender’s Ally in Detecting Brute-Force Attacks

Read More
Human Risk, Mathematical Solution: A Bayesian View on Insider Threat Detection
Patrick Lefler 8/7/25 Patrick Lefler 8/7/25

Human Risk, Mathematical Solution: A Bayesian View on Insider Threat Detection

Read More