Alyned Thinking

Why new thinking is needed and how we are putting our expertise to work.
  • Intro image
    Articles

    Snapshot of Current Cyber Attacks on Alyne

    Even though Alyne is a relatively small organisation, we are subject to a surprisingly large range of targeted phishing attacks. Our customers trust highly sensitive data for processing in Alyne and it is our responsibility to be good custodians of that data - and trust.
    Karl Viertel
    Karl Viertel
    Read more
  • Intro image
    Articles

    IDW PS 340 n.F. – Yet another task or rather an opportunity for risk management?

    The recent revision of the auditing standard IDW PS 340 n.F. has caused a heated debate around topics such as risk-bearing capacity and aggregation, placing a greater focus on the methodology of the risk management system and the degree of importance for using quantitative approaches.
    Claudia Howe
    Claudia Howe
    Read more
  • Intro image
    Tech Talk

    Using WebCola and D3.js to create hierarchical layout

    A good layout is essential to uncover the inherent structure in the connected data. Hierarchical layouts are typically used to display parent-child relationships among the graph nodes. D3.js off-the-shelf D3.js implementation of hierarchical layout cannot be used in case of the real-world data in which a child node can have multiple parent nodes. We use WebCola and D3.js to draw hierarchical graph layout using declarative constraint specification in a few lines of code.
    Bhushan Chaudhari
    Bhushan Chaudhari
    Read more
  • Intro image
    Articles

    2020 Cyber Security is not about Technology

    On July 15, Twitter accounts of some of the most influential members on Twitter were compromised, including the former US President Barack Obama, Bill Gates, Joe Biden and more. But how much does this breach have to do with technology and how much is human error?
    Karl Viertel
    Karl Viertel
    Read more
  • Intro image
    Articles

    Contact Tracing Apps - Protect Your Privacy or Let Reduced Privacy Protect You

    Despite concerns revolving around privacy and state surveillance, many authorities have adopted contact tracing infrastructures to ensure public safety. Is it possible to have the best of both worlds?
    Eunice Cheah
    Eunice Cheah
    Read more