In 1997, Bregler, Michele, and Slaney wrote a paper about a genuinely innovative and, at the time, unique piece of software. Essentially it automated what some production studios could do only with hours upon hours of manual work, the Video Rewrite Program. It tied these together by building upon older work that created realistic audio […]
Why NIS2? Legislation under the EU undergoes regular revision, and The Network and Information Systems Regulations (NIS) is no exception. There’s no confirmation on if or exactly how NIS2 or an equivalent will make its way into UK law. However, it is likely, given the rapid growth in cybercrime and cyber security incidents in recent […]
The NIS Directive was passed into EU law in 2016. It made its way into UK law as the Network and Information Systems Regulations 2018 two years later. Unlike with GDPR and the Data Protection Act 2018, many barely noticed the piece of legislation coming. Likely because outside of critical national infrastructure (CNI), essential services, […]
In this podcast, David and Brad interview John and share stories and anecdotes about their dealings with organisations across all verticals over the years.
David talks to John Strand about his experience over the last two decades and share stories and anecdotes about dealing with organisations across all verticals.
A one-size-fits-all approach does not work when it comes to risk. Every organisation is different. Every organisation is different. And that is why a risk assessment should be completed upfront. You have to make sure that you identify the impact and likelihood of the worst problems taking place, so that you can assess the effort […]
Why should you do a risk assessment in the first place? When we are approached about cybersecurity and someone asks what the first steps should be, the response is always the same; start with a risk assessment. Everyone should have a cybersecurity budget to work with. In most cases, you would be working with a […]
https://youtu.be/Hbs2Y3uaUfU We have a few fascinating stories from the trenches for you today as we delve into our crypt of memories! We do a lot of penetration testing and cybersecurity reviews at Samurai, and, unfortunately, people ignore our advice. This is quite strange when you consider the fact that we are paid to dispense information. And to […]