Exploiting A System Just By Measuring Response Times
The world of security is often quite mind-blowing, in a sense that people can exploit the most innocent looking crack in a system and use it to completely undermine its security. I...
Read more →Explore perspectives across engineering, secure systems, emerging technologies and the complex digital environments shaping modern organisations.
The world of security is often quite mind-blowing, in a sense that people can exploit the most innocent looking crack in a system and use it to completely undermine its security. I...
Read more →
Here at Vokke, we manage hundreds of networking elements and servers to deliver services to our clients. We manage cloud servers in Sydney, as well as edge components in rural Aust...
Read more →
If cybercrime were a country, which is estimated to inflict more than 6 trillion USD in damages globally by the end of 2021, it would be the world’s third-largest economy after the...
Read more →
We speak with many companies that have trouble automating customer bookings. They find it a constant source of frustration that eats into staff time and inhibits growth. It’s also...
Read more →
Here at Vokke, we’ve engaged in hundreds of digital transformation projects. Each engagement has its own distinctive set of challenges, often spawning from the sector the business...
Read more →
We use many tools internally here at Vokke, one of which is Harvest. It’s a great time tracking tool as it’s both readily adopted by team members and has fantastic out-of-the-box r...
Read more →
Highly disruptive organizations are using bots to gain an edge. It is easy to be forgiven thinking that automation is largely a mechanical, real-world construct; one of robotic ar...
Read more →
In a previous post, I gave a brief introduction to mandatory access control (MAC) and discretionary access control (DAC) access models. In this article, we’ll explore an actual imp...
Read more →