TL;DR Introduction I live in the countryside & as a result, know quite a few farmers. The subject of connected farming ...
TL;DR Introduction Digital Forensics and Incident Response (DFIR) has a certain appeal to aspiring cybersecurity ...
Gerard Kerrigan will be on the panel of judges at the Hampshire and Sussex Cyber Cluster’s Dragons’ Den-style event.
TL;DR Chartership and professional titles UKCSC has announced that the CHECK Team Leaders and CHECK Team Members will be ...
Pwning web sites through their AI chatbot agents and politely breaking guard rails  Everyone is implementing AI chatbots to ...
A Hacker’s first Solo: the pitfalls of aviation connectivity EFBs sit in a bit of a no mans land of certification, variously ...
Even if you think you’re only sharing with friends and family, your posts may still be visible to malicious users. Weak privacy settings, or someone else’s public or compromised account, can expose ...
In the field of maritime cyber, we often cite the movie Speed 2: Cruise Control from 1997 as an interesting prediction of the future. It illustrates the reality of today quite well, despite being ...
Pwning web sites through their AI chatbot agents and politely breaking guard rails Everyone is implementing AI chatbots to improve their customer experience and journey, without increasing call centre ...
When responding to an incident, logs provide a vital record of events within a system and serve as a critical source of evidence during an incident investigation. They help identify what happened, ...
Have you ever found yourself in a client’s hardened, containerised environment where you needed to scan their internal infrastructure? If so, you’ve probably encountered an issue where the instance ...
TL;DR  Introduction  Kubernetes has changed the way we deploy and scale workloads. It’s powerful, flexible, and very good at hiding a lot of complexity. It is also very good at hiding security ...