Dishing – Social Engineering with Deepfake

In 1997, Bregler, Michele, and Slaney wrote a paper about a genuinely innovative and, at the time, unique piece of software. Essentially it automated what some production studios could do only with hours upon hours of manual work, the Video Rewrite Program. It tied these together by building upon older work that created realistic audio […]

NIS2: The Sequel

Why NIS2? Legislation under the EU undergoes regular revision, and The Network and Information Systems Regulations (NIS) is no exception. There’s no confirmation on if or exactly how NIS2 or an equivalent will make its way into UK law. However, it is likely, given the rapid growth in cybercrime and cyber security incidents in recent […]

The NIS Directive

EU NIS directive

The NIS Directive was passed into EU law in 2016. It made its way into UK law as the Network and Information Systems Regulations 2018 two years later. Unlike with GDPR and the Data Protection Act 2018, many barely noticed the piece of legislation coming. Likely because outside of critical national infrastructure (CNI), essential services, […]

Fireside Chat – Breach Prevention, Detection & Response

As businesses around the globe are more reliant on technology than ever before, the threat of cyber-attacks has become more increasingly prevalent. Every business should have cybersecurity measures in place to defend their networks, systems, and applications from being infiltrated. Considering this, businesses need to make provisions for cyber breaches, detection, and response to provide […]

404: Ep.9 – Sliding into your DMs

David, Luke and Jay discuss the idiocy that is the big tech congressional hearings with Apple, Google, Facebook and Amazon. What was the point? We suspect very little. Next we give a view on the latest news re: Garmin’s handling of the wasted locker ransomware. On a scale on 1 to 10 with 10 being […]

Hack the Track

Recently I was invited to deliver a talk at the Young Rail Professionals Forum at SNC Lavalin in Derby. I took this as a great opportunity to research the industry and fathom where the weaknesses exist, and what the worst-case rail scenarios for a cyber breach could be.  Most of my career has been spent […]