“I always work on the assumption that you’ve been compromised”
Show notes for series 1, episode 7
What does a computer security breach look like? We talk about the things journalists don’t cover. And we examine some areas that people in the industry don’t like to talk about.
In this episode Simon and Marc focus on the basics of understanding and managing risk. They discuss insurance, how to assess the risk of anything (from dropping a cup of tea on an expensive server to animal attacks!) and touch on ransomware.
Updated 18th November, 2022: We no longer officially support Twitter
There are lots of ways that you can contact us, watch what we’re doing and keep up to date. But we’re stepping back from one so we can focus better on the others. Find out about the best 3 ways to follow SE Labs.
The 3 best ways to follow SE Labs
While we plan to continue maintaining a basic presence on Facebook, the best way to get the latest news, views and chat with us is to use one or more of the following three services.
“The claim that AV is dead is guaranteed to make headlines, which is why the claim is made so often”
Show notes for series 1, episode 3
Is anti-virus dead? A lot of people seem to think so, but they all have their reasons – some of which are more honest than others. We dig into the motives and passions behind this controversial question.
“Changing default settings, wildly and randomly, would achieve the tick”
Show notes for series 1, episode 2
Where can you get cyber security advice that you trust? Are certificates and Standards worthwhile and good value for money? We delve into the world of ‘official’ cyber security advice and give a balanced view on what we recommend.
Show notes for series 1, episode 1 (How Attackers Attack)
How do attackers attack? Simon and Marc look at their tactics and explore options to help recognise and evade them. They examine social engineering in a cyber security and physical context. And the guys also explore technical exploits. At the end of this episode you will have a great overview of how attackers attack.
“Even executives have families and personal lives”
Show notes for series 1, trailer 1
We’re excited to announce De:Coded Cyber, our new cyber security podcast covering security for large businesses, budding CISOs and we recognise that executives are real people too, with families and personal lives.
Understand what a real hacking attack looks like to the attacker and defenders
The IT security world is rocked by news of breach after breach, including the shocking disclosure of the SolarWinds attack. Data is stolen, deleted or corrupted and… well you know. It’s a total mess. Journalists focus on basic outcomes, while technical blogs look at esoteric technical details. We’ve explained, in laymen’s terms, what a breach looks like from an attacker’s point of view. And from the position of the defenders.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy policy