In this podcast, David and Brad interview John and share stories and anecdotes about their dealings with organisations across all verticals over the years.
David talks to John Strand about his experience over the last two decades and share stories and anecdotes about dealing with organisations across all verticals.
The average system pen test is not a complete replication of an actual cyber-attack. However, red teaming is. Learn more about red, blue and purple teaming.
Red teaming is an aggressive form of penetration testing, blue teaming is more defensive and purple teaming is a joint red and blue test.
The pillars of cybersecurity are confidentiality, integrity and availability of data. It is all about data security and protection.
A one-size-fits-all approach does not work when it comes to risk. Every organisation is different. Every organisation is different. And that is why a risk assessment should be completed upfront. You have to make sure that you identify the impact and likelihood of the worst problems taking place, so that you can assess the effort […]
Why should you do a risk assessment in the first place? When we are approached about cybersecurity and someone asks what the first steps should be, the response is always the same; start with a risk assessment. Everyone should have a cybersecurity budget to work with. In most cases, you would be working with a […]
When you do not remain secure online, you put everyone in your organisation at risk! Cybersecurity should not be about ‘box-ticking’. You can get the certification, but compliance does not equal security. And we can run all the penetration tests and cybersecurity reviews, but it is also important to implement the advice that follows. Unfortunately, […]
https://youtu.be/Hbs2Y3uaUfU We have a few fascinating stories from the trenches for you today as we delve into our crypt of memories! We do a lot of penetration testing and cybersecurity reviews at Samurai, and, unfortunately, people ignore our advice. This is quite strange when you consider the fact that we are paid to dispense information. And to […]
SMS has been around since 1992. It is a very familiar and convenient technology to use, so it is easy not to understand the dangers it may present from a cybersecurity perspective. Vodafone created the first text message in 1992, and sadly, it has not progressed much in terms of how it works since then. […]