Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

The Need for More Cybersecurity Legislation

In this video, Keith Christie-Smith shares his opinion on the current state of cybersecurity legislation and why he believes that more legislation is necessary. He argues that there are still many verticals where more legislation is needed and that organizations should be mandated to apply the most stringent cybersecurity policies and frameworks available. He also discusses the importance of organizations doing as much as possible from a cybersecurity perspective to protect themselves and their clients.

Coffee with Jim - Securing Against Supply Chain Cyber Attacks

Following the ransomware attack on US IT firm Kaseya, join us for a chat about the ever-increasing need to secure ourselves successfully against not only direct ransomware attacks, but those that affect us through our supply chains. An estimated 200+ firms have been crippled by the attack on Kaseya, simply because they use Kaseya’s software. The implication of this is that it can feasibly happen to any aspect of your supply chain, so if cyber security is not high on your board’s list of priorities, it really should be. How could the attack on Kaseya, and other supply chain attacks, have been avoided? How can you reduce the probability of it happening to your own organisation? And crucially, how can you make the solution cost effective?

Hack Your Way To Your Dream Job In Cyber Security

Part 1 – Top Tips for Job Applications Firstly this week, we’ll be addressing a question posed by one of our masterclass attendees: “I am currently studying cyber security and I would love to know what you look for in candidates?” This is a great question and the answer is critical in helping you get into cyber security – I’ll give you my top tips in the first part of our masterclass.

Strengthening Cyber Security: The Impact of Compliance and Legislation

Josh Davies, Keith Christie-Smith, and I dive into the world of legislation and compliance and explore the stark contrast between the need for rigorous security and the burden placed on businesses to comply. “One of the big problems we have in security is that you spend all this money pre-empting your defence in depth to try to protect you against things that you could perceive could happen to you." Josh Davies

The Need for a Universal Set of Information Security Regulations: Insights from Industry Experts

In this video, we discuss the importance of having a joined-up approach to information security regulations. As a believer in creating a think tank of different information security professionals from various industries and stages of their careers, we explore the benefits of having a universal set of regulations that are not set hard in stone, but rather adaptable to different companies' needs. We understand that different companies have different security measures depending on their business activities, and we aim to bring together experts to develop a comprehensive and flexible set of regulations that can be universally implemented.

The Importance of Isolated Backups for Cybersecurity

In this video, we discuss the critical role of isolated backups in protecting your organization from cyber threats such as DDOS attacks and ransomware. We explain how disk backups are done on a daily, weekly, or monthly basis and can be stored in a safe and controlled environment, ensuring that critical data can be restored in the event of a breach. By keeping backups isolated from your network infrastructure, you can prevent cybercriminals from accessing them and ensure that your organization can recover quickly and effectively.

Cybersecurity Advice for Businesses Without Information Security Professionals

In this video, we explore what businesses without information security professionals can do to protect themselves from cyber threats. While it would be ideal for all businesses to have experienced cyber personnel who can advise on critical assets and best steps, this is not always possible. Connect with Your host James Rees Hello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.

Fallout from Paying Ransomware: A UK Government Perspective

In this video, we discuss the potential consequences of organizations paying ransomware, specifically from a UK government perspective. We explore the hypothetical scenario of an organization being hit by the Conti ransomware and having the financial means to pay the ransom. While this may unlock their systems and maintain business continuity, it also raises questions about the legality of paying ransoms and the potential fallout from doing so. We delve into the potential repercussions of breaking the law and the importance of having robust disaster recovery policies in place to minimize the impact of such attacks. Join us as we explore this complex and timely issue.

Analysis of Recent Official Statements on Ransomware Sanctions

James Rees questions the motivations behind the decision, whether it is due to ransomware or political sanctions. Connect with Your host James Rees Hello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.