• Secure Software Development Lifecycle (SSDLC)

    Secure Software Development Lifecycle (SSDLC)

    Secure software development life cycle is simply the set of processes that aid to build software that is more secure. But the question that is frequently asked raised is, Why bother with secure software development? A lot of that question is loaded in the myths that surround software development such as: Secure Software Development Lifecycle…

    Read more →

  • What is a Software Development Lifecycle (SDL)?

    What is a Software Development Lifecycle (SDL)?

    Software Development Lifecycle (SDL) is the set of processes that aid in the creation of high-quality software. Formal or defined SDLs are nothing new, they have been around in one form or another since the 1970’s. If you are a user of software, you probably have some understanding of the aspects that make software high-quality.…

    Read more →

  • Computer Naming Conventions

    Computer Naming Conventions

    There’s a well-known joke in the realm of software engineering: “What are the two hardest things in software engineering?” But let’s focus on the second point – naming things. It’s indeed a challenging aspect, especially when clients inquire about how to name their IT assets. My response usually is: “It depends.” There are several naming…

    Read more →

  • Proactive Threat Hunting on My Home Network

    Proactive Threat Hunting on My Home Network

    On my home network, I run OpnSense and have enabled the Intrusion Prevention System (IPS) based on Suricata with the key from proofpoint to enable the rules. The first time that I enabled the IPS, I had a sense to turn on the rule sets slowly to understand what would break. My routine was to…

    Read more →

  • Public Wi-Fi and Security

    Public Wi-Fi and Security

    You have probably seen it, a slick marketing campaign about protecting your privacy, and stopping the nasty hackers sitting at your local coffee shop from intercepting your web requests. And the only solution is to use their VPN solution. Well, in a lot of instances, that is all security pantomime, and simply moves the trust…

    Read more →

  • Pizza Base Dough

    Pizza Base Dough

    As the months get cooler, we unpack our smoker and pizza oven (OzPig) to spend the evening making pizza for the week and enjoying a toasted marshmallow over the fire. The basic recipe below is what we follow to make about 6 x 10″ pizzas. It would be possible to make them slightly larger by…

    Read more →

  • Demystifying VPNs: Their Relevance and Advantages in contemporary IT

    Demystifying VPNs: Their Relevance and Advantages in contemporary IT

    You might often hear your tech team discussing the implementation of Virtual Private Networks (VPNs). These networks could be between your personal devices and the corporate network, or even between different sites. However, many users’ express concerns about the performance and setup process of VPN technologies. This is often coupled with a lack of understanding…

    Read more →

  • Passkeys, and how the easier authentication method makes it more secure

    Passkeys, and how the easier authentication method makes it more secure

    I am sure you have experienced it, your IT team, your bank, a government department, favourite social media platform has required you to setup Multi-Factor Authentication. This usually has been by sending an email, text message, using a code from an app, or a biometric scan to show that not only do you know about…

    Read more →

  • Eucalyptus Tree at Moonbi Lookout

    Eucalyptus Tree at Moonbi Lookout

    On a recent road trip from Toowoomba (QLD) to Gunnedah (NSW) for a wedding, our return drive went through Tamworth and Armidale. On the north side of Tamworth we took a quick detour to stretch our legs at the Moonbi Lookout and took in the view over the valley. Behind the monolithic lookout was a…

    Read more →