Power BI vs. Tableau: Which Data Modelling Tool is Right for You
As BI Developers, we often have the choice between working with Tableau or Power BI. Fortunately, I’ve had the opportunity…
As BI Developers, we often have the choice between working with Tableau or Power BI. Fortunately, I’ve had the opportunity…
In the world of data analytics, metadata is the unsung hero that provides clarity and context to the seemingly chaotic…
In my 18 years in the data analytics field, I’ve seen many innovations, but nothing as transformative as Microsoft Fabric.…
Skillfield Wins ANZ Partner of the Year Award in the Top Services Partner category at Elastic ANZ Partner Awards. …
As technology leaps forward, the once speculative idea of machines as customers is becoming a palpable reality. A Gartner report…
Artificial Intelligence (AI) has become a transformative force in today’s rapidly evolving technological landscape. Organisations worldwide are recognising its potential…
Every person, across every country on every continent, will be impacted by climate change. The climate crisis we face is…
Working with multiple buckets in Couchbase Couchbase is a popular NoSQL database often used in enterprise applications. It provides a…
Imagine you’re out at sea, enjoying a peaceful sail, when all of a sudden, you notice water seeping into your…
In the digital age, where technology evolves at breakneck speed, businesses find themselves at a critical juncture. They are challenged…
This article will explore how artificial intelligence (AI) revolutionises software development. We’ll discuss its advantages, tools, challenges, ethical considerations, and…
In the rapidly evolving landscape of modern big data management, one data management system that has grown in popularity is…
In today’s data-driven world, Tableau has become synonymous with powerful data visualisation and analytics. Whether you’re a seasoned data analyst…
This blog steps through a process for tackling a data mining and analysis problem using a sample business case and…
In today’s World, where data is being produced at unprecedented levels, organisations are seeking efficient tools to manage and process…
According to Gartner, “Every year, poor data quality costs organisations an average of $12.9 million.” Data quality is essential for…
About Mouaz Mouaz Alnouri, as the Managing Director of Skillfield, embodies an unwavering commitment to serving the cyber security community…
Alerting is a critical part of the monitoring system. It’s important for Ops teams to keep an eye on their…
I am often asked as a cyber security professional about the legal obligations and regulatory requirements concerning cyber security. This…
As a beginner, the task of preparing one’s computer for coding can seem daunting and overwhelming. However, with the proper…
Recent statistics show that the number of connected devices worldwide is expected to reach 30.9 billion units by 2025 .…
Identity compromise is a primary concern for any business operating in the cloud. The problem has become more blatant over…
The Director Sentiment Index’ surveys reported that Australian directors consistently rank cyber security and data theft as the number one…
Years ago, a breach that compromised the data of a few million people would have been few and far between.…
The Australian Cyber Security Centre (ACSC) has issued the Annual Cyber Threat Report for the 2021-2022 financial year. It’s the ACSC’s…
What is DevSecOps? Let’s break it down. “DevSecOps is actually a combination of three disciplines. Development, Security and Operations.” Back…
It can happen to any of us … Inside the Deakin University Cyber Attack I am a cyber security…
Enjoying Your Social Media Account? So are the Cyber Artifices! How would you feel if social media didn’t exist? If…
Why doesn’t Netflix crash? . . . Data Processing in Motion It’s that time! Our favourite web series has…
Data modelling is one of the most important steps in any analytical project, so it’s important to get it right!…
Introduction It is highly unlikely that a company with an online presence won’t own a piece of code (programme) in…
What are cyber crime startups? What are cyber crime smart startups and how are they affecting the industry? Today, cyberspace…
The world is watching closely the escalation of the Russo-Ukrainian War that began on 24 February 2022 by air,…
Quantum threat: Why you need to consider it now? What’s a quantum computer (in plain language)? A quantum computer uses…
IoT Security – Subject of Research and Concern In late 2019, Security experts from CheckPoint uncovered a security flaw in…
A community superpower-MITRE APT19 How you can leverage a community superpower-The MITRE framework to combat cyber threats Introduction Cybercrime…
Do your service providers really care about you? Does it even matter if they do? I believe it does and…
The Australian Cyber Security Centre (ACSC) developed the Essential Eight Maturity Model, known widely as the Essential 8. The ACSC…
Alert! The Australian Education Sector is under Attack The recent Australian Cyber Security Centre (ACSC) threat report has revealed…
Have you ever wondered why security detection is so important? Here is a practical example. A few months ago,…
You don’t know what you don’t know . . .so who is responsible for teaching us? I was browsing…
Introduction In February 2021, an Australian university was hit with a ransomware attack. The university quickly shut down its network…
Introduction “Freeze, I’m Ma Baker. Put your hands in the air and give me all your money!” This snarling from…
Macs are safer, but… We often hear that Mac users are less likely to be targeted by cybercriminals. This statement…
Most of the recent cyber security breaches have been related to compromised privileged accounts in one way or another.…
Introduction Have you heard of cybercrime as a Service? Australians have started the race to have 80% of the adult…
Generating self-signed public keypairs is a staple of many involved in DevOps, system admin, network administration and other roles.…
“Home and office routers come under attack by China state hackers, France warns” – Ars Technica headline. This story…
In this blog, we will show how Elastic Stack through machine learning, can help to quickly create detections to…
Not a day goes by without a cyber security incident reported in our news feed. Organisations are increasingly concerned…
When building containerized applications, logging is definitely one of the most important things to get right from a DevOps…
The death of information privacy has been heralded by the tech industry for over two decades. Then Sun Microsystems…
Well-known as a powerful search engine, Elasticsearch can help users collect and transform data in real-time. However, its capabilities of…
Over the last few decades, privacy and data security have become crucial to the reputation and success of organizations. The…
With a mushroom-like growth in the implementation of IoT practical use cases, there has been much thought about how…
What You Don’t See Might Hurt You We now live in a time when data flows like water. Data streams…
Introduction SOAR stands for Security Orchestration, Automation and Response, referring to a solution that is used in the threat landscape…
In the rapidly evolving landscape of cybersecurity, organisations face increasing challenges in protecting their networks from sophisticated cyber threats. As…
In today’s dynamic and interconnected digital landscape, organisations face an ever-increasing number of cyber security threats. Whether it’s a sophisticated…
Artificial Intelligence is an approach that makes a computer, a robot, or a product able to think smart as a…
In today’s market; every company has its own software that is being used either internally, by staff, or externally by…
Gartner predicts that by 2025, 40% of boards will have dedicated cyber security committees. So what information should be reported…
Security is everyone’s responsibility. However, the tools of yesterday can’t keep up with today’s challenges. Blind spots are the enemy, and the attack surface is