🥇

Cyber Security DE:CODED – Cloud security

“As long as anything is online, it’s open for strangers to try to break protection” Show notes for series 2, episode 4 The ‘cloud’ is integrating with our lives at ever more ...
🥇

DE:CODED – Testing like hackers

“When it’s not a pay-to-play test that’s behind the curtain…” Show notes for series 2, episode 3 What does it mean to test like a hacker? Can a well-intentioned tester behave the ...
🥇

DE:CODED – Firewall speeds and VPN risks

“If they are not getting any money from you, then where are they getting the money from?” Show notes for series 2, episode 2 Is your firewall as fast as you think? ...
Cyber Security DE:CODED podcast

DE:CODED – Can Microsoft solve security?

“I have a PC… I like their delete key, which doesn’t exist on the Mac.” Show notes for series 2, episode 1 Can Microsoft solve security? Do you need anti-virus on your ...
Cyber Security DE:CODED podcast

DE:CODED Series Two Episodes

All episodes of DE:CODED, Series Two New episodes on the last Wednesday of the month. Find all of the episodes from the award-winning DE:CODED Series Two in one handy place. Find all ...
Helping enterprises plan

Helping enterprises plan security

A strategic alternative to penetration testing. Is Microsoft’s anti-virus good enough? Are the ‘next-gen’ endpoint products as good as they claim? Is our combination of anti-malware and whitelisting giving us full threat ...
Targeted Attacks Part 3 - The Exploit

Targeted Attacks Part 3 – The Exploit

In our October monthly episode we finish our three part series on targeted attacks. In this episode we discuss the exploit and malware analysis with special guest Tyler Hudak, Incident Response Practice ...
Targeted Attacks Part 2 - Pretexting and Attack Development

Targeted Attacks Part 2 – Pretexting and Attack Development

In our September monthly episode we continue our three part series on targeted attack. In this episode we discuss the pretext and how attackers develop and launch their attacks with special guests ...

Targeted Attacks Part 1 – OSINT and Reconnaissance

In our August monthly episode we start our three part series on targeted attacks. In this episode we focus on OSINT (Open Source Intelligence) and reconnaissance techniques used by attackers in phishing ...
Strong protection in uncertain times

Strong protection in uncertain times

A hacker mentality is keeping (computer) virus testing on track. Latest endpoint protection reports now online for enterprise, small business and home users. This is the first in our series of 2020 endpoint protection reports. And ...

Secure Guardrails