What is DevSecOps?

What is DevSecOps? Let’s break it down. “DevSecOps is actually a combination of three disciplines. Development, Security and Operations.”  Back in the early days, if you knew how to code, you could develop anything you wanted, and you become a rockstar (assuming that it is bug-free of course). With the power of the internet, you…

The Deakin University Cyber Attack

It can happen to any of us … Inside the Deakin University Cyber Attack   I am a cyber security professional and I have been perplexed more than once by messages and emails having links in them. Have you received an unexpected SMS with a link for your pending parcel which almost had you click…

Social Media Cyber Security

Enjoying Your Social Media Account? So are the Cyber Artifices! How would you feel if social media didn’t exist? If you said ‘lost’, I am pretty sure many people feel the same way because, for many of us, social media is a way to express what’s going on in our minds and connect with people.…

Kafka Data Processing in Motion

Why doesn’t Netflix crash? . . . Data Processing in Motion   It’s that time! Our favourite web series has just been released on a streaming platform. Millions of users are waiting for it. Everyone starts streaming the moment it is available. But the platform can’t handle the millions of requests and crashes. The same…

Data Vault 2.0 Modelling in Data Warehousing

Data modelling is one of the most important steps in any analytical project, so it’s important to get it right! Data models are built around business needs, but what if those business needs or processes change? The data modelling technique used should address the relationship between data from various sources, while also being flexible enough…

Is my code vulnerable?

Introduction It is highly unlikely that a company with an online presence won’t own a piece of code (programme) in this day and age. The code could be a html page, SQL script, a shell script or a macro. For every line of code that you write, the chances are high that it can introduce…

Cyber Crime Smart Startups

What are cyber crime startups? What are cyber crime smart startups and how are they affecting the industry? Today, cyberspace is constantly evolving, presenting organisations with new opportunities to adopt cost-effective cloud services and use the internet to open new channels. Unfortunately, the same technologies bring unanticipated risks and consequences to cyber security. Barely a…

Quantum Computing and Cyber Security

Quantum threat: Why you need to consider it now? What’s a quantum computer (in plain language)? A quantum computer uses the rather strange properties of very small particles (smaller than an atom)  to encode information and performs special operations on that information. They are not like a normal computer (referred to as a “Classical Computer”),…

IoT Security

IoT Security – Subject of Research and Concern In late 2019, Security experts from CheckPoint uncovered a security flaw in Philips Hue Smart Light Bulbs. Hackers could exploit this flaw to gain entry into the targeted Wifi Network. The firm’s researchers identified vulnerabilities in the ZigBee low power Wifi protocol used by Philips and many…