Alyned Thinking

Why new thinking is needed and how we are putting our expertise to work.
  • Intro image
    Articles

    Snapshot of Current Cyber Attacks on Alyne

    Even though Alyne is a relatively small organisation, we are subject to a surprisingly large range of targeted phishing attacks. Our customers trust highly sensitive data for processing in Alyne and it is our responsibility to be good custodians of that data - and trust.
    Karl Viertel
    Karl Viertel
    Read more
  • Intro image
    Library Updates

    Library Update: Cybersecurity Law of the People's Republic of China

    The Cybersecurity Law of the People's Republic of China Control Set has recently been rolled out, containing 212 robust Controls, helping organisations operating in mainland China to become compliant with the Chinese regulation through setting up relevant internal Controls.
    Faris Toh
    Faris Toh
    Read more
  • Intro image
    Articles

    IDW PS 340 n.F. – Yet another task or rather an opportunity for risk management?

    The recent revision of the auditing standard IDW PS 340 n.F. has caused a heated debate around topics such as risk-bearing capacity and aggregation, placing a greater focus on the methodology of the risk management system and the degree of importance for using quantitative approaches.
    Claudia Howe
    Claudia Howe
    Read more
  • Intro image
    Tech Talk

    Using WebCola and D3.js to create hierarchical layout

    A good layout is essential to uncover the inherent structure in the connected data. Hierarchical layouts are typically used to display parent-child relationships among the graph nodes. D3.js off-the-shelf D3.js implementation of hierarchical layout cannot be used in case of the real-world data in which a child node can have multiple parent nodes. We use WebCola and D3.js to draw hierarchical graph layout using declarative constraint specification in a few lines of code.
    Bhushan Chaudhari
    Bhushan Chaudhari
    Read more
  • Intro image
    Articles

    2020 Cyber Security is not about Technology

    On July 15, Twitter accounts of some of the most influential members on Twitter were compromised, including the former US President Barack Obama, Bill Gates, Joe Biden and more. But how much does this breach have to do with technology and how much is human error?
    Karl Viertel
    Karl Viertel
    Read more