A presentation special from the AVAR conference in Singapore, December 2022! › What is the attack chain?Why is it good to test using full attack chains?And what are some of the alternative approaches...
Cheating in security testing | S2E8 (00:36:14)
We explore how testers behave, or misbehave. And the different ways, some more honest than others, that security vendors engage with testing. › Can you trust security tests?What do their results actu...
Security opportunities for Managed Services Providers | S2E7 (00:38:01)
Small business and Managed Service Provider special! › Do small businesses face the same cyber threats as large organisations?Are your security solutions 100% effective? And how do you pick a good o...
Mental health challenges | S2E6 (00:45:10)
Mental health is an important but often misunderstood area, full of prejudice and technical jargon. How can we look after ourselves better at work and in our personal lives? › Post-pandemic, we take...
Ransomware | S2E5 (00:58:13)
Ransomware is feared by businesses all over the world. What happens during and after an attack? We give a unique insight into the experiences of ransomware victims. › How do organisations react to a...
Cloud security | S2E4 (00:29:59)
The 'cloud' is integrating with our lives at ever more useful (or intrusive!) levels. We look at what securing the cloud means in the real world. › Securing the cloud and testing cloud securityCrypt...
Testing like hackers | S2E3 (00:42:32)
What does it mean to test like a hacker? Can a well-intentioned tester behave the same as a real cybercriminal? › When you’re looking for a good security test, how can you tell the useful from the m...
Firewall speeds and VPN risks | S2E2 (00:56:05)
Is your firewall as fast as you think? › What does XDR mean and how does it work?Do you need a personal VPN?We talk to Brian Monkman (NetSecOPEN), Chad Skipper (VMware), Luis Corrons (Avast) and Dani...
Can Microsoft solve security? | S2E1 (00:38:17)
Can Microsoft solve security? › Do you need anti-virus on your smartphone? And are Macs more secure than PCs? We ask Eugene Kaspersky (Kaspersky) and Christian Seifert (Microsoft) Security Life Hack...
9 Hollywood Hacker Movies Rated | S1E8 (01:03:04)
Simon and Marc discuss and dissect 9 Hollywood hacker movies from the last 30+ years, including: SnowdenBlackhatDie Hard 4.0 (Live Free or Die Hard)Who Am IFast and Furious 8 (The Fate of the Furious)...
What Does a Breach Look Like? | S1E7 (00:43:29)
In this episode we’re going to look at what a computer breach, or hack, actually looks like. From both the attacker and defender’s points of view. We welcome special guest St. John Harold, a cyber sec...
Understanding and Managing Risk | S1E6 (00:43:16)
In this episode Simon and Marc focus on the basics of understanding and managing risk. They discuss insurance, how to assess the risk of anything (from dropping a cup of tea on an expensive server to ...
Selling Security - The Insider's Guide | S1E5 (00:50:54)
Companies spend trillions on cyber security each year. But how do they decide which products and services are the best? We dig down into the sometimes shady world of cyber security sales, market anal...
Cyber Security First Principles | S1E4 (00:11:52)
We continue our first series on cyber security by looking at the most basic concepts. Why can't we just lock everything up in a safe?Is cyber security for large businesses more complicated than it nee...
Is Anti-Virus Dead? | S1E3 (00:26:23)
Anti-virus seems to keep dying! Simon Edwards looks at why people keep repeating the claim and why it's important to understand the issues, even if you don't agree with them. What is "anti-virus" an...
Official Cyber Security Advice | S1E2 (00:32:21)
Where can large and small businesses find good, basic cyber security advice? We look at the options and discuss the UK's Cyber Essentials programme. Is it a good start or a non-starter? (Full Show N...
How attackers attack | S1E1 (00:44:37)
How do attacker attack? We look at their tactics and explore your options to help recognise and evade them. We examine social engineering in a cyber security and physical context, as well as technical...