csg-devops1

Critical controls for a DevSecOps practice — Part 2

This is the second and final post of a two-part series on DevSecOps practice. Before we launch into...
Read More
csg-devsecops

Critical controls for a DevSecOps practice — Part 1

Building an app is akin to building a race car. Some may say app development and cybersecurity are...
Read More
feature-csg

Designing Better Cybersecurity Products — Part One: An Introduction to UX

UX is an enabler that humanises technology. By anticipating user needs and behaviour, we can create...
Read More
feature-csg

GovTech Cyber Security Group’s (CSG) zero-day hunters

2019 was a bountiful year for our team: CSG’s prolific cybersecurity specialists found 11 zero-day...
Read More
feature-agile

The role language pruning plays in agile transformations

The ‘Agile Enterprise’ is rapidly emerging as the dominant post-bureaucratic operating model. Every...
Read More
feature-agile

Leading in the age of agility

Leaders have always been thought of as a kind of superhero, ready to leap into action and save the...
Read More
feature-agile

Product owner and scrum master metrics

Now that agile has gone mainstream, I often find that people are concerned about the performance of...
Read More
feature-smart-district

The inner workings of a smart district

Smart District, to me, is made up of many smaller components — smart energy management, smart retail...
Read More
feature-python

Web development with Python, really?

To those who has never used a Python framework for web development, I hope this article encourages...
Read More
feature-ux

Designing an end-to-end experience for physiotherapist and patients

My first internship in software development, it was a steep learning curve but also one full of many...
Read More

STACK-X Webinar — National Digital Identity Stack: NDI Tech Stack (Part 2)

Welcome back to the second part of our series on the NDI tech stack. In this article, we’ll be...
Read More

STACK-X Webinar — National Digital Identity Stack: NDI Tech Stack (Part 1)

The following article was adapted from a STACK-X Webinar conducted by the National Digital Identity...
Read More