First book published

This a quick post to say that my first book has now been published on Amazon. In total its taken a good 9 months from the initial idea. The book focusses on Personal Information Security and how in business personal information needs to be secured and protected. The book is full of lots of practical[…]

PII Hacking

Privacy and Security go hand in hand

In our modern world its difficult to comprehend how many systems hold various bits of information on you, it ranges from banks, credit score agencies, dentists, all the way to SaaS providers and your telco. Social networks also have mountains of information on you that they mine to work out your personal preferences, so they[…]

User Authentication, you must do it right!

I must admit, one of my all time pet peeves is when engineers do not implement their user authentication service in the right way to be defendable against an attack. Take for the instance the recent hack against Zomato in which they had 6.6m hashed user passwords stolen. The real problem here is not that the[…]

The Evils of Technical Debt

Technical Debt – A phrase that brings shiver to any experienced engineer or software architect. In this article I’ll explore why it is so Evil and a few basic things you can do to stop it bringing your whole business to a go slow state. (This is a follow-up article from my talk on Technical[…]

software architecture skills, top 5

Software Architect skills, the top 5

Software Architects need a combination of skills to be able to succeed and deliver designs that are long lived and able to provide strong commercial value to a business. Below I list what I consider to be the top 5 skills in order to be a good Software Architect. #1 Able to listen and confirm[…]

Systems Architecture & Security, winning at both

Online systems need to be both secure and designed to last, so how can you achieve both and not blow the budget? This article covers a few simple principals you can adopt which are both good for your systems architecture and good for your security. #1 System Components should only do what they say on[…]

What is a software architect, really?

Software/Enterprise/System/X Architect all seem to be pretty much interchangeable titles these days – the trouble is for most people it’s hard to exactly pin down what a X Architect is and what they are expected to do on a day to day basis. Well you are in luck, this article will shed some light on[…]

Security and Architecture – always consider both together

Software or Systems architecture is often undertaken from a very technical point of view, the main concerns being around reducing technical complexity and dependencies to make it easier to deal with change in the long run. This is fine for ‘standalone systems’ but in today’s highly interconnected world – the boundary of a system is often[…]

Online Security

Having an independent assessment of your online security can highlight security weaknesses. At Aykira we have the expertise to conduct in-depth security audits that you can use to harden your systems and reduce your business risks. We also have the skills base to remediate problems found. We consider it very important that your systems be[…]