Dishing – Social Engineering with Deepfake

In 1997, Bregler, Michele, and Slaney wrote a paper about a genuinely innovative and, at the time, unique piece of software. Essentially it automated what some production studios could do only with hours upon hours of manual work, the Video Rewrite Program. It tied these together by building upon older work that created realistic audio […]

NIS2: The Sequel

Why NIS2? Legislation under the EU undergoes regular revision, and The Network and Information Systems Regulations (NIS) is no exception. There’s no confirmation on if or exactly how NIS2 or an equivalent will make its way into UK law. However, it is likely, given the rapid growth in cybercrime and cyber security incidents in recent […]

The NIS Directive

EU NIS directive

The NIS Directive was passed into EU law in 2016. It made its way into UK law as the Network and Information Systems Regulations 2018 two years later. Unlike with GDPR and the Data Protection Act 2018, many barely noticed the piece of legislation coming. Likely because outside of critical national infrastructure (CNI), essential services, […]

404: Ep.25 – The one with John Strand

In this podcast, David and Brad interview John and share stories and anecdotes about their dealings with organisations across all verticals over the years.

The one with John Strand

David talks to John Strand about his experience over the last two decades and share stories and anecdotes about dealing with organisations across all verticals.

404: Ep. 22 – Risk Assessments

A one-size-fits-all approach does not work when it comes to risk. Every organisation is different. Every organisation is different. And that is why a risk assessment should be completed upfront. You have to make sure that you identify the impact and likelihood of the worst problems taking place, so that you can assess the effort […]

Risk Assessments

Why should you do a risk assessment in the first place?  When we are approached about cybersecurity and someone asks what the first steps should be, the response is always the same; start with a risk assessment. Everyone should have a cybersecurity budget to work with. In most cases, you would be working with a […]

Tales from the Crypt

https://youtu.be/Hbs2Y3uaUfU We have a few fascinating stories from the trenches for you today as we delve into our crypt of memories! We do a lot of penetration testing and cybersecurity reviews at Samurai, and, unfortunately, people ignore our advice. This is quite strange when you consider the fact that we are paid to dispense information. And to […]