Data Digest: UK GDPR Overhaul

There has been big waves in the UK regarding data protection yesterday; the government revealed two significant announcements that may drastically change the UK’s privacy posture in the years to come. Here’s a quick rundown of the announcements and what they might mean for the future of the UK’s data protection and privacy laws. Culture […]

404: Ep.27 – Is Cyber Awareness Important?

Cyber security awareness deals with the amount of knowledge that end-users have about cyber security threats and how to implement cyber security best practice to mitigate those threats. End-users are typically regarded as the weak links in an organisation, and hackers usually target vulnerable individuals. With that being said, cyber awareness has become more important than ever […]

Fireside Chat – Breach Prevention, Detection & Response

As businesses around the globe are more reliant on technology than ever before, the threat of cyber-attacks has become more increasingly prevalent. Every business should have cybersecurity measures in place to defend their networks, systems, and applications from being infiltrated. Considering this, businesses need to make provisions for cyber breaches, detection, and response to provide […]

404: Ep.26 – Cyber Insurance – is it worth having?

The cyber insurance market is still relatively in its infancy. The first policies were introduced in the early 90s with the onset of the internet, and it had quite a slow take-off. This was most likely due to a lack of perceived risk. With the explosion of technology, cyber-attacks increased, but cyber insurance probably only […]

The one with John Strand

Digital security

David talks to John Strand about his experience over the last two decades and share stories and anecdotes about dealing with organisations across all verticals.

Cybersecurity Pillars

Cybersecurity confidentiality availability integrity

The pillars of cybersecurity are confidentiality, integrity and availability of data. It is all about data security and protection.

Risk Assessments

Risk Assessments

Why should you do a risk assessment in the first place?  When we are approached about cybersecurity and someone asks what the first steps should be, the response is always the same; start with a risk assessment. Everyone should have a cybersecurity budget to work with. In most cases, you would be working with a […]

Tales from the Crypt

https://youtu.be/Hbs2Y3uaUfU We have a few fascinating stories from the trenches for you today as we delve into our crypt of memories! We do a lot of penetration testing and cybersecurity reviews at Samurai, and, unfortunately, people ignore our advice. This is quite strange when you consider the fact that we are paid to dispense information. And to […]

The Problem with SMS

problem with sms

SMS has been around since 1992. It is a very familiar and convenient technology to use, so it is easy not to understand the dangers it may present from a cybersecurity perspective. Vodafone created the first text message in 1992, and sadly, it has not progressed much in terms of how it works since then.  […]