In 1997, Bregler, Michele, and Slaney wrote a paper about a genuinely innovative and, at the time, unique piece of software. Essentially it automated what some production studios could do only with hours upon hours of manual work, the Video Rewrite Program. It tied these together by building upon older work that created realistic audio […]
In this podcast, David and Brad interview John and share stories and anecdotes about their dealings with organisations across all verticals over the years.
David talks to John Strand about his experience over the last two decades and share stories and anecdotes about dealing with organisations across all verticals.
The average system pen test is not a complete replication of an actual cyber-attack. However, red teaming is. Learn more about red, blue and purple teaming.
Red teaming is an aggressive form of penetration testing, blue teaming is more defensive and purple teaming is a joint red and blue test.
When shopping for security for your networks, several web application terms get thrown around. Due to this, non-technical people such as CEO’s and management may not understand these terms and may make the wrong purchase. When thinking about your digital security, you may think that by having an anti-virus system, a top-end firewall or even […]
Prior to the COVID lockdown we were testing more and more cloud deployments. The lockdown seems to have caused a large increase in the number of cloud migrations, probably migrations which were planned but have now been rushed forward. Based on this cloud migration a common conversation we have with clients is this; ‘we don’t […]