Securing the Software Supply Chain with Metadata - Part 1 - What and Why

2023-10-10 00:00:00 +0000

Recent years have witnessed a meteoric rise in Software Supply Chain (SSC) attacks. The 8th Annual State of the Software Supply Chain Report by Sonatype reported a 742% annual increase in SSC attacks since 2019. An SSC attack involves a two-pronged approach: an upstream attack, where malicious code infiltrates a...

How to find your point and improve your presentations

2022-07-10 00:00:00 +0000

Imagine that recent presentations from you or your team have fallen flat. You were not able to get your point across. Your audience was bored and disengaged. How would you improve? You might believe that your PowerPoint slides are the root cause. In this case, your solution might involve buying...

How to read a book

2020-07-19 00:00:00 +0000

Lessons from Mortimer J. Adler Recently, a medical scare pushed me back to working from home for a while. When you don’t travel to and from an office, you suddenly have a couple of extra hours daily. So, like any (in)sane people with(out) a life, I spent the time reflecting...

ICSA 2020 Presentation

2020-03-14 00:00:00 +0000

Blockchain technologies have been increasingly adopted by enterprises to increase operational efficiency and enable new business models. These enterprise blockchain applications generally run on dedicated blockchain networks due to regulations and security requirements. The design process of these networks involves many decisions and trade-offs that impact security, governance, and performance...



Ingkarni Wardli, The University of Adelaide
Adelaide, SA 5005