Dr David Day and Brad Thomas discuss their experiences of cybersecurity insurance; the pros, and cons, will they pay a claim, what will it cover, is it worth it? They also discuss insurers assessing client cybersecurity with a view to changing
John Strand is the owner of Black Hills Information Security, and he has over 2 decades of experience in cybersecurity. In this podcast, David and Brad from Samurai interview John and share stories and anecdotes about their dealings with organ
The red team instigates the trouble when it comes to penetration testing. Red teaming is quite aggressive - a nuclear version of a pen test if you will. The red team goes the whole hog, and all vulnerabilities are exposed. Blue teaming is more
Cybersecurity relates back to the basic tenets of confidentiality, integrity and availability of data. Confidentiality is inextricably linked to passwords protection, integrity requires for information to be delivered without interception or al
When evaluating your cybersecurity health, always start with a risk assessment. There are so many different attacks and prevention mechanisms to consider, that you may not know which one is the most important to fix. It is important to have sta
When you do not remain secure online, you put everyone in your organisation at risk! Cybersecurity should not be about ‘box-ticking’. You can get the certification, but compliance does not equal security. And we can run all the penetration test
SS7 signalling protocol has been around since 1975, and it is archaic to say the least. Remarkably, we are still dependant on SS7 as a protocol for SMS. Dr David Day and Kieran Twidale-Smith explores the issues relating to SMS
We willingly allow our minds to be programmed to conform to how the creator of the content has intended. And in doing that, there is no mindfulness or effort to filter the content. Brad Thomas delves deeper into the subject matter with Dr Davi
Dr David Day sheds some light on the topic of Brain Computer Interfaces. As we unpack this topic, it is crucial that we also look at the cybersecurity implications.
Why do we keep getting hacked? Having data leaked? Making the same mistakes? What's wrong with us?!! Dr David Day does his best to fathom it out in half an hour.
Apparently, 130 accounts had been targeted and 30 were actually breached in the most recent Twitter hack. Let's talk about responsibility for a hot second.
Or: The One That Needed a Tonne of Editing. David, Neil, Luke and Jack talk about the cybersecurity standard on a Monday morning, due to microphone issues on Friday. Lets see how that goes.