Alyned Thinking

Why new thinking is needed and how we are putting our expertise to work.
  • Intro image
    Articles

    Snapshot of Current Cyber Attacks on Alyne

    Even though Alyne is a relatively small organisation, we are subject to a surprisingly large range of targeted phishing attacks. Our customers trust highly sensitive data for processing in Alyne and it is our responsibility to be good custodians of that data - and trust.
  • Intro image
    Library Updates

    Library Update: Cybersecurity Law of the People's Republic of China

    The Cybersecurity Law of the People's Republic of China Control Set has recently been rolled out, containing 212 robust Controls, helping organisations operating in mainland China to become compliant with the Chinese regulation through setting up relevant internal Controls.
  • Intro image
    Articles

    IDW PS 340 n.F. – noch mehr lästige Pflicht oder eine Chance für das Risikomanagement?

    Die kürzlich veröffentlichte neue Fassung des Prüfungsstandards IDW PS 340 hat zu hitzigen Diskussionen über Themen wie Risikotragfähigkeit und Aggregation geführt und dabei zugrunde liegende Methoden des Risikomanagementsystems und die Bedeutung quantitativer Ansätze in den Mittelpunkt gerückt.
  • Intro image
    Tech Talk

    Using WebCola and D3.js to create hierarchical layout

    A good layout is essential to uncover the inherent structure in the connected data. Hierarchical layouts are typically used to display parent-child relationships among the graph nodes. D3.js off-the-shelf D3.js implementation of hierarchical layout cannot be used in case of the real-world data in which a child node can have multiple parent nodes. We use WebCola and D3.js to draw hierarchical graph layout using declarative constraint specification in a few lines of code.
  • Intro image
    Articles

    2020 Cyber Security is not about Technology

    On July 15, Twitter accounts of some of the most influential members on Twitter were compromised, including the former US President Barack Obama, Bill Gates, Joe Biden and more. But how much does this breach have to do with technology and how much is human error?