<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/rdhJ1PRU" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>404: Cybersecurity Not Found</title>
    <description>How can we improve our cybersecurity? The experts of Samurai Security share stories of hackers, unstable apps, and blunders into the digital realm - all while having a laugh!</description>
    <copyright>2020 Samurai Security Ltd</copyright>
    <language>en-gb</language>
    <pubDate>Thu, 11 Jul 2024 13:42:03 +0000</pubDate>
    <lastBuildDate>Thu, 11 Jul 2024 13:42:14 +0000</lastBuildDate>
    <image>
      <link>https://www.samuraisecurity.co.uk/</link>
      <title>404: Cybersecurity Not Found</title>
      <url>https://image.simplecastcdn.com/images/cf3be460-a757-4d89-a758-f94afd6be321/779345d3-6d78-4297-85f7-bdba292bf099/3000x3000/final-podcast-cover.jpg?aid=rss_feed</url>
    </image>
    <link>https://www.samuraisecurity.co.uk/</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>How can we improve our cybersecurity? The experts of Samurai Security share stories of hackers, unstable apps, and blunders into the digital realm - all while having a laugh!</itunes:summary>
    <itunes:author>Samurai Security</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/cf3be460-a757-4d89-a758-f94afd6be321/779345d3-6d78-4297-85f7-bdba292bf099/3000x3000/final-podcast-cover.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/rdhJ1PRU</itunes:new-feed-url>
    <itunes:keywords>cyber, cyber security, cybersecurity, samurai, samurai security, security</itunes:keywords>
    <itunes:owner>
      <itunes:name>David Day</itunes:name>
      <itunes:email>dday@samuraisecurity.co.uk</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="Business"/>
    <itunes:category text="Comedy"/>
    <item>
      <guid isPermaLink="false">f84860ed-a805-41b2-8f63-b2fec83dc040</guid>
      <title>IIoT, ICS &amp; OT: The Hidden Technology of Modern Society | Ep. 4</title>
      <description><![CDATA[In Episode #4 of "404 Cybersecurity Not Found," host Brad Thomas welcomes Momen Eldawakhly, Senior Penetration Tester and Attack Simulation Lead at Samurai Security, for a deep dive into Operational Technology (OT) and Industrial Control Systems (ICS). They discuss the critical role these systems play in modern infrastructure, the cybersecurity challenges they face, and the potential catastrophic impacts of cyber-attacks. Discover the hidden technologies behind our daily lives and learn about the importance of securing these essential systems. Tune in for an eye-opening discussion on the future of cybersecurity in critical infrastructures.
]]></description>
      <pubDate>Thu, 11 Jul 2024 13:42:03 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Momen Eldawakhly, Brad Thomas)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="57514310" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/56fd058e-562d-49d5-9a58-b4aff2377779/audio/c01115f9-199e-47c5-9a8e-c105c0296f56/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>IIoT, ICS &amp; OT: The Hidden Technology of Modern Society | Ep. 4</itunes:title>
      <itunes:author>Momen Eldawakhly, Brad Thomas</itunes:author>
      <itunes:duration>00:59:34</itunes:duration>
      <itunes:summary>In Episode #4 of &quot;404 Cybersecurity Not Found,&quot; host Brad Thomas welcomes Momen Eldawakhly, Senior Penetration Tester and Attack Simulation Lead at Samurai Security, for a deep dive into Operational Technology (OT) and Industrial Control Systems (ICS). They discuss the critical role these systems play in modern infrastructure, the cybersecurity challenges they face, and the potential catastrophic impacts of cyber-attacks. Discover the hidden technologies behind our daily lives and learn about the importance of securing these essential systems. Tune in for an eye-opening discussion on the future of cybersecurity in critical infrastructures.</itunes:summary>
      <itunes:subtitle>In Episode #4 of &quot;404 Cybersecurity Not Found,&quot; host Brad Thomas welcomes Momen Eldawakhly, Senior Penetration Tester and Attack Simulation Lead at Samurai Security, for a deep dive into Operational Technology (OT) and Industrial Control Systems (ICS). They discuss the critical role these systems play in modern infrastructure, the cybersecurity challenges they face, and the potential catastrophic impacts of cyber-attacks. Discover the hidden technologies behind our daily lives and learn about the importance of securing these essential systems. Tune in for an eye-opening discussion on the future of cybersecurity in critical infrastructures.</itunes:subtitle>
      <itunes:keywords>ics security, operational technology, infosec, industrial control systems, cybersecurity, ot security, information security, digital security, cybersecurity awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">52043b27-e471-4d46-80a8-e1425e36c633</guid>
      <title>AI &amp; Quantum Computing | Ep. 3</title>
      <description><![CDATA[In this episode of "404 Cybersecurity Not Found," our host Brad Thomas and Dr. David Day, CEO of Samurai Security, dive deep into the intersection of AI and Quantum Computing and their transformative impact on cybersecurity. They explore how AI is currently enhancing data analysis and incident response, discuss the challenges of unstructured data, and envision the future with quantum computing's unparalleled speed and power. The conversation highlights real-world applications, potential cyber threats, and the evolving arms race between attackers and defenders. Tune in for a thought-provoking discussion on the cutting-edge of cybersecurity technology.
]]></description>
      <pubDate>Fri, 17 May 2024 19:30:48 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Brad Thomas, Dr David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="47167736" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/0756b3a0-ae2c-4de0-8243-70e901dee065/audio/355f9ae3-63ad-40f9-a5f3-cd426529c5d4/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>AI &amp; Quantum Computing | Ep. 3</itunes:title>
      <itunes:author>Brad Thomas, Dr David Day</itunes:author>
      <itunes:duration>00:48:09</itunes:duration>
      <itunes:summary>In this episode of &quot;404 Cybersecurity Not Found,&quot; our host Brad Thomas and Dr. David Day, CEO of Samurai Security, dive deep into the intersection of AI and Quantum Computing and their transformative impact on cybersecurity. They explore how AI is currently enhancing data analysis and incident response, discuss the challenges of unstructured data, and envision the future with quantum computing&apos;s unparalleled speed and power. The conversation highlights real-world applications, potential cyber threats, and the evolving arms race between attackers and defenders. Tune in for a thought-provoking discussion on the cutting-edge of cybersecurity technology.</itunes:summary>
      <itunes:subtitle>In this episode of &quot;404 Cybersecurity Not Found,&quot; our host Brad Thomas and Dr. David Day, CEO of Samurai Security, dive deep into the intersection of AI and Quantum Computing and their transformative impact on cybersecurity. They explore how AI is currently enhancing data analysis and incident response, discuss the challenges of unstructured data, and envision the future with quantum computing&apos;s unparalleled speed and power. The conversation highlights real-world applications, potential cyber threats, and the evolving arms race between attackers and defenders. Tune in for a thought-provoking discussion on the cutting-edge of cybersecurity technology.</itunes:subtitle>
      <itunes:keywords>artificial intelligence, ai in cybersecurity, infosec, cybersecurity, quantum computing, information security, digital security, ai, cybersecurity awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ecd39419-1e5a-4e5e-a16a-2f3793c5d395</guid>
      <title>The Impact of Quantum Computing on Cybersecurity | Ep. 2</title>
      <description><![CDATA[Welcome to this episode of "404 Cybersecurity Not Found", where we delve into the revolutionary world of quantum computing and its implications for cybersecurity. In this engaging podcast, host Brad and Dr. David Day, CEO of Samurai Security, explore the cutting-edge intersection of quantum computing and digital security. This discussion unpacks the potential of quantum computing to transform the cybersecurity landscape, particularly focusing on encryption and the formidable computing power quantum systems promise. Dr. Day explains the basic principles of quantum mechanics, like superposition and entanglement, and discusses their profound effects on computing power and data security. From theoretical underpinnings to practical challenges and future implications, this episode is a deep dive into how quantum advancements could reshape our approach to cybersecurity. Tune in to learn about the state of current research, the potential for quantum supremacy, and how these technologies might influence global security dynamics.
]]></description>
      <pubDate>Wed, 8 May 2024 15:29:16 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Brad Thomas, Dr David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="50115929" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/9ba99d93-83f7-44c9-8002-919744295ee7/audio/2be22b66-a146-4fb1-80b5-5d0486519314/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>The Impact of Quantum Computing on Cybersecurity | Ep. 2</itunes:title>
      <itunes:author>Brad Thomas, Dr David Day</itunes:author>
      <itunes:duration>00:51:49</itunes:duration>
      <itunes:summary>Welcome to this episode of &quot;404 Cybersecurity Not Found&quot;, where we delve into the revolutionary world of quantum computing and its implications for cybersecurity. In this engaging podcast, host Brad and Dr. David Day, CEO of Samurai Security, explore the cutting-edge intersection of quantum computing and digital security. This discussion unpacks the potential of quantum computing to transform the cybersecurity landscape, particularly focusing on encryption and the formidable computing power quantum systems promise. Dr. Day explains the basic principles of quantum mechanics, like superposition and entanglement, and discusses their profound effects on computing power and data security. From theoretical underpinnings to practical challenges and future implications, this episode is a deep dive into how quantum advancements could reshape our approach to cybersecurity. Tune in to learn about the state of current research, the potential for quantum supremacy, and how these technologies might influence global security dynamics.</itunes:summary>
      <itunes:subtitle>Welcome to this episode of &quot;404 Cybersecurity Not Found&quot;, where we delve into the revolutionary world of quantum computing and its implications for cybersecurity. In this engaging podcast, host Brad and Dr. David Day, CEO of Samurai Security, explore the cutting-edge intersection of quantum computing and digital security. This discussion unpacks the potential of quantum computing to transform the cybersecurity landscape, particularly focusing on encryption and the formidable computing power quantum systems promise. Dr. Day explains the basic principles of quantum mechanics, like superposition and entanglement, and discusses their profound effects on computing power and data security. From theoretical underpinnings to practical challenges and future implications, this episode is a deep dive into how quantum advancements could reshape our approach to cybersecurity. Tune in to learn about the state of current research, the potential for quantum supremacy, and how these technologies might influence global security dynamics.</itunes:subtitle>
      <itunes:keywords>infosec, quantum computing, information security, digital security, cybersecurity awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e96500c7-0a6a-499f-8d44-3d45972ff24f</guid>
      <title>AI &amp; Cybersecurity | Ep. 1</title>
      <description><![CDATA[]]></description>
      <pubDate>Wed, 1 May 2024 12:59:25 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Simran Basra, Dr David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <content:encoded><![CDATA[]]></content:encoded>
      <enclosure length="40661626" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/303d1755-84c8-414a-94a1-dc021890ec11/audio/25aee494-e23d-4040-82ab-44a5b777944c/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>AI &amp; Cybersecurity | Ep. 1</itunes:title>
      <itunes:author>Simran Basra, Dr David Day</itunes:author>
      <itunes:duration>00:42:00</itunes:duration>
      <itunes:summary>In this episode of &quot;404 Cybersecurity Not Found,&quot; Dr. David Day discusses the impact of AI on cybersecurity, explaining how it enhances both cyberattacks and defenses by learning from vast datasets to predict and mitigate threats. He emphasises the need for cybersecurity professionals to embrace AI as a tool to augment their capabilities and stay ahead of emerging threats.</itunes:summary>
      <itunes:subtitle>In this episode of &quot;404 Cybersecurity Not Found,&quot; Dr. David Day discusses the impact of AI on cybersecurity, explaining how it enhances both cyberattacks and defenses by learning from vast datasets to predict and mitigate threats. He emphasises the need for cybersecurity professionals to embrace AI as a tool to augment their capabilities and stay ahead of emerging threats.</itunes:subtitle>
      <itunes:keywords>artificial intelligence, ai in cybersecurity, infosec, cybersecurity, information security, digital security, ai, cybersecurity awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3c0ff500-923f-43cf-a007-c28a4ac8146a</guid>
      <title>404: Ep. 27 - Is Cyber Awareness Important?</title>
      <description><![CDATA[Our in-house cyber-security expert, Luke Hill, explains the importance of cyber awareness training for your business.
]]></description>
      <pubDate>Wed, 25 Aug 2021 15:50:09 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Brad Thomas, Luke Hill)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="39522805" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/7ded8ad6-9149-474c-8609-4a7a61d5b25d/audio/a0415d7d-6022-4fa7-bf0f-448903825f26/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 27 - Is Cyber Awareness Important?</itunes:title>
      <itunes:author>Brad Thomas, Luke Hill</itunes:author>
      <itunes:duration>00:40:25</itunes:duration>
      <itunes:summary>Our in-house cyber-security expert, Luke Hill, explains the importance of cyber awareness training for your business.</itunes:summary>
      <itunes:subtitle>Our in-house cyber-security expert, Luke Hill, explains the importance of cyber awareness training for your business.</itunes:subtitle>
      <itunes:keywords>cybersecurity awareness</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fc55d0a7-8059-4b1c-8360-598c8ebb4c11</guid>
      <title>404: Ep.26 - Cybersecurity Insurance - is it worth having?</title>
      <description><![CDATA[<p>Dr David Day and Brad Thomas discuss their experiences of cybersecurity insurance; the pros, and cons, will they pay a claim, what will it cover, is it worth it?  They also discuss insurers assessing client cybersecurity with a view to changing the premiums and using stealthy loss adjusters dressed as cybersecurity heroes to wriggle free of paying a claim. </p><p><a href="www.samuraisecurity.co.uk">www.samuraisecurity.co.uk</a></p><p><a href="https://www.linkedin.com/in/davidjday/">David Day PhD | LinkedIn</a></p><p><a href="https://www.linkedin.com/company/samuraidigitalsecurity">https://www.linkedin.com/company/samuraidigitalsecurity</a></p><p><a href="https://twitter.com/drdavidjday">Dr David Day (@drdavidjday) / Twitter</a></p><p><a href="https://twitter.com/SamuraiDigSec">Samurai Digital Security Ltd (@SamuraiDigSec) / Twitter</a></p><p><a href="https://www.facebook.com/samuraidigitalsec/">Samurai Digital Security | Facebook</a></p>
]]></description>
      <pubDate>Fri, 9 Jul 2021 13:48:47 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Brad Thomas, Dr David J Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <content:encoded><![CDATA[<p>Dr David Day and Brad Thomas discuss their experiences of cybersecurity insurance; the pros, and cons, will they pay a claim, what will it cover, is it worth it?  They also discuss insurers assessing client cybersecurity with a view to changing the premiums and using stealthy loss adjusters dressed as cybersecurity heroes to wriggle free of paying a claim. </p><p><a href="www.samuraisecurity.co.uk">www.samuraisecurity.co.uk</a></p><p><a href="https://www.linkedin.com/in/davidjday/">David Day PhD | LinkedIn</a></p><p><a href="https://www.linkedin.com/company/samuraidigitalsecurity">https://www.linkedin.com/company/samuraidigitalsecurity</a></p><p><a href="https://twitter.com/drdavidjday">Dr David Day (@drdavidjday) / Twitter</a></p><p><a href="https://twitter.com/SamuraiDigSec">Samurai Digital Security Ltd (@SamuraiDigSec) / Twitter</a></p><p><a href="https://www.facebook.com/samuraidigitalsec/">Samurai Digital Security | Facebook</a></p>
]]></content:encoded>
      <enclosure length="30296141" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/0285f941-2418-42df-b830-0a44eedf7247/audio/bb970211-3412-45e1-a01e-2095f159efe2/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep.26 - Cybersecurity Insurance - is it worth having?</itunes:title>
      <itunes:author>Brad Thomas, Dr David J Day</itunes:author>
      <itunes:duration>00:30:51</itunes:duration>
      <itunes:summary>Dr David Day and Brad Thomas discuss their experiences of cybersecurity insurance, the pros, and cons, will they pay a claim, what will it cover, is it worth it? </itunes:summary>
      <itunes:subtitle>Dr David Day and Brad Thomas discuss their experiences of cybersecurity insurance, the pros, and cons, will they pay a claim, what will it cover, is it worth it? </itunes:subtitle>
      <itunes:keywords>cyberinsurance, cyber security, incident response, cybersecurity incident response, cyberincident response, cybersecurity, cybersecurity insurance, cyber insurance, cyber incident</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d4ea0273-50d7-4c19-ae5c-83b67e317ce8</guid>
      <title>404: Ep.25 - The one with John Strand</title>
      <description><![CDATA[
John Strand is the owner of Black Hills Information Security, and he has over 2 decades of experience in cybersecurity. In this podcast, David and Brad from Samurai interview John and share stories and anecdotes about their dealings with organisations across all verticals over the years. 

When you start planning against a hack, you need to make sure that you can identify your risks. When you strip down risk to its core, it boils to threats and vulnerabilities. Don’t be blinded by one aspect of the danger and assume that the same threat will be repeated. An attacker will never follow just one type of methodology. The threat actors will use any technique at their disposal!

Listen further to find out what the best approach is to start protecting your organisation.
]]></description>
      <pubDate>Fri, 11 Jun 2021 10:23:44 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (John Strand, Brad Thomas, Dr David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="48287979" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/4df15f62-97c7-428b-bab0-3751587a31c3/audio/4a2dd105-cceb-47c2-b708-7c87bda46148/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep.25 - The one with John Strand</itunes:title>
      <itunes:author>John Strand, Brad Thomas, Dr David Day</itunes:author>
      <itunes:duration>00:49:35</itunes:duration>
      <itunes:summary>
John Strand is the owner of Black Hills Information Security, and he has over 2 decades of experience in cybersecurity. In this podcast, David and Brad from Samurai interview John and share stories and anecdotes about their dealings with organisations across all verticals over the years. 

When you start planning against a hack, you need to make sure that you can identify your risks. When you strip down risk to its core, it boils to threats and vulnerabilities. Don’t be blinded by one aspect of the danger and assume that the same threat will be repeated. An attacker will never follow just one type of methodology. The threat actors will use any technique at their disposal!

Listen further to find out what the best approach is to start protecting your organisation.</itunes:summary>
      <itunes:subtitle>
John Strand is the owner of Black Hills Information Security, and he has over 2 decades of experience in cybersecurity. In this podcast, David and Brad from Samurai interview John and share stories and anecdotes about their dealings with organisations across all verticals over the years. 

When you start planning against a hack, you need to make sure that you can identify your risks. When you strip down risk to its core, it boils to threats and vulnerabilities. Don’t be blinded by one aspect of the danger and assume that the same threat will be repeated. An attacker will never follow just one type of methodology. The threat actors will use any technique at their disposal!

Listen further to find out what the best approach is to start protecting your organisation.</itunes:subtitle>
      <itunes:keywords>mitre attack technique matrix, pen test, vulnerabilities, cloud centricity, cloud centric, samurai digital, threat emulation, threats, accountability framework, risk assessments, samurai, cybersecurity, gdpr, risk, penetration test, vulnerability management, vulnerability assessments</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">326a5cdc-1ff3-43d0-9558-c38a900a889a</guid>
      <title>404: Ep.24 - What is Red, Blue &amp; Purple Testing</title>
      <description><![CDATA[The red team instigates the trouble when it comes to penetration testing. Red teaming is quite aggressive - a nuclear version of a pen test if you will. The red team goes the whole hog, and all vulnerabilities are exposed. Blue teaming is more defensive, and it is all about evaluating the detection/prevention tools you have put in place to protect yourself against an attack. Purple teaming is a joint red and blue test. Brad Thomas probes Dr. David Day to give us the scoop on red, blue, and purple teaming in this podcast. Listen in.
]]></description>
      <pubDate>Fri, 28 May 2021 11:54:58 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Brad Thomas, Dr David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="25463339" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/e304ccc5-715c-4636-9c7a-e55fe42bd08f/audio/931967a1-bfb2-41c4-a040-c59c6b57c824/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep.24 - What is Red, Blue &amp; Purple Testing</itunes:title>
      <itunes:author>Brad Thomas, Dr David Day</itunes:author>
      <itunes:duration>00:26:00</itunes:duration>
      <itunes:summary>The red team instigates the trouble when it comes to penetration testing. Red teaming is quite aggressive - a nuclear version of a pen test if you will. The red team goes the whole hog, and all vulnerabilities are exposed. Blue teaming is more defensive, and it is all about evaluating the detection/prevention tools you have put in place to protect yourself against an attack. Purple teaming is a joint red and blue test. Brad Thomas probes Dr. David Day to give us the scoop on red, blue, and purple teaming in this podcast. Listen in.</itunes:summary>
      <itunes:subtitle>The red team instigates the trouble when it comes to penetration testing. Red teaming is quite aggressive - a nuclear version of a pen test if you will. The red team goes the whole hog, and all vulnerabilities are exposed. Blue teaming is more defensive, and it is all about evaluating the detection/prevention tools you have put in place to protect yourself against an attack. Purple teaming is a joint red and blue test. Brad Thomas probes Dr. David Day to give us the scoop on red, blue, and purple teaming in this podcast. Listen in.</itunes:subtitle>
      <itunes:keywords>hacking, pen test, network intrusion, network detection, blue teaming, purple teaming, samurai, cybersecurity, penetration test, firewalls, red teaming, systems testing</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c2873b69-f396-4a84-b14d-465d7f1cd16c</guid>
      <title>404: Ep.23 - Cybersecurity Pillars</title>
      <description><![CDATA[Cybersecurity relates back to the basic tenets of confidentiality, integrity and availability of data. Confidentiality is inextricably linked to passwords protection, integrity requires for information to be delivered without interception or alteration and it is crucial that against all odds, business systems remain available and robust against attacks. Brad Thomas explores all these concepts, and much more in this cybersecurity podcast with Dr David Day. Listen in for more insights.
]]></description>
      <pubDate>Fri, 21 May 2021 06:36:20 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Dr David Day, Brad Thomas)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="35680787" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/206e96b1-1cb9-4e86-ada4-3e01edbefa1d/audio/b84cd980-581b-412b-ab91-d1d43a8ce45a/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep.23 - Cybersecurity Pillars</itunes:title>
      <itunes:author>Dr David Day, Brad Thomas</itunes:author>
      <itunes:duration>00:36:31</itunes:duration>
      <itunes:summary>Cybersecurity relates back to the basic tenets of confidentiality, integrity and availability of data. Confidentiality is inextricably linked to passwords protection, integrity requires for information to be delivered without interception or alteration and it is crucial that against all odds, business systems remain available and robust against attacks. Brad Thomas explores all these concepts, and much more in this cybersecurity podcast with Dr David Day. Listen in for more insights.</itunes:summary>
      <itunes:subtitle>Cybersecurity relates back to the basic tenets of confidentiality, integrity and availability of data. Confidentiality is inextricably linked to passwords protection, integrity requires for information to be delivered without interception or alteration and it is crucial that against all odds, business systems remain available and robust against attacks. Brad Thomas explores all these concepts, and much more in this cybersecurity podcast with Dr David Day. Listen in for more insights.</itunes:subtitle>
      <itunes:keywords>data integrity, data confidentiality, data availability, salting, hashing, cybersecurity pillars, 404 cybersecurity not found</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cfa98bb7-cf30-45cb-8164-f54680c959a7</guid>
      <title>404: Ep.22 - The importance of doing risk assessments</title>
      <description><![CDATA[When evaluating your cybersecurity health, always start with a risk assessment. There are so many different attacks and prevention mechanisms to consider, that you may not know which one is the most important to fix. It is important to have standards and frameworks to follow. However, frameworks can be subjective as not all organisations are the same. You cannot apply a one-size-fits-all approach when needs in terms of business processes, functions, culture, and risk appetite differ. Brad Thomas asked Dr. David Day to share his thoughts on the importance of doing a risk assessment. Take a listen.
]]></description>
      <pubDate>Fri, 14 May 2021 12:54:28 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Brad Thomas, Dr David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="19565873" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/6ede8cc9-1794-4c68-a25f-ef82f68e4e8a/audio/959463cb-e27c-4cc2-9c6f-ab13fb4840d8/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep.22 - The importance of doing risk assessments</itunes:title>
      <itunes:author>Brad Thomas, Dr David Day</itunes:author>
      <itunes:duration>00:20:04</itunes:duration>
      <itunes:summary>When evaluating your cybersecurity health, always start with a risk assessment. There are so many different attacks and prevention mechanisms to consider, that you may not know which one is the most important to fix. It is important to have standards and frameworks to follow. However, frameworks can be subjective as not all organisations are the same. You cannot apply a one-size-fits-all approach when needs in terms of business processes, functions, culture, and risk appetite differ. Brad Thomas asked Dr. David Day to share his thoughts on the importance of doing a risk assessment. Take a listen.</itunes:summary>
      <itunes:subtitle>When evaluating your cybersecurity health, always start with a risk assessment. There are so many different attacks and prevention mechanisms to consider, that you may not know which one is the most important to fix. It is important to have standards and frameworks to follow. However, frameworks can be subjective as not all organisations are the same. You cannot apply a one-size-fits-all approach when needs in terms of business processes, functions, culture, and risk appetite differ. Brad Thomas asked Dr. David Day to share his thoughts on the importance of doing a risk assessment. Take a listen.</itunes:subtitle>
      <itunes:keywords>samurai security, samurai digital, risk assessments, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a97dea97-74b2-4daa-ae26-63d4e8fd700c</guid>
      <title>404: Ep.21 - Tales from the Crypt</title>
      <description><![CDATA[When you do not remain secure online, you put everyone in your organisation at risk! Cybersecurity should not be about ‘box-ticking’. You can get the certification, but compliance does not equal security. And we can run all the penetration tests and cybersecurity reviews, but it is vital to implement the advice that follows. 

Unfortunately, we have had a few instances where clients would simply ignore our findings, or they were seeking findings to support their decisions. 

Listen to how Dr. David Day digs deep into his treasure trove of experiences and shares a few gripping stories with Brad Thomas on what happens when Samurai's advice is ignored. All shared anonymously, of course!
]]></description>
      <pubDate>Thu, 22 Apr 2021 06:21:19 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Dr David Day, Brad Thomas)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="30703581" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/58075365-e316-4543-b877-a178e53f53b4/audio/a44f8c0c-93e0-4c5e-9f41-a6a5aa5bd880/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep.21 - Tales from the Crypt</itunes:title>
      <itunes:author>Dr David Day, Brad Thomas</itunes:author>
      <itunes:duration>00:31:28</itunes:duration>
      <itunes:summary>When you do not remain secure online, you put everyone in your organisation at risk! Cybersecurity should not be about ‘box-ticking’. You can get the certification, but compliance does not equal security. And we can run all the penetration tests and cybersecurity reviews, but it is vital to implement the advice that follows. 

Unfortunately, we have had a few instances where clients would simply ignore our findings, or they were seeking findings to support their decisions. 

Listen to how Dr. David Day digs deep into his treasure trove of experiences and shares a few gripping stories with Brad Thomas on what happens when Samurai&apos;s advice is ignored. All shared anonymously, of course!</itunes:summary>
      <itunes:subtitle>When you do not remain secure online, you put everyone in your organisation at risk! Cybersecurity should not be about ‘box-ticking’. You can get the certification, but compliance does not equal security. And we can run all the penetration tests and cybersecurity reviews, but it is vital to implement the advice that follows. 

Unfortunately, we have had a few instances where clients would simply ignore our findings, or they were seeking findings to support their decisions. 

Listen to how Dr. David Day digs deep into his treasure trove of experiences and shares a few gripping stories with Brad Thomas on what happens when Samurai&apos;s advice is ignored. All shared anonymously, of course!</itunes:subtitle>
      <itunes:keywords>cybersecurity reviews, samurai security, box-ticking, samurai, cybersecurity, penetration test, 404 cybersecurity not found</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">76dd8b69-164c-4a2d-84d8-a005efe53a93</guid>
      <title>404: Ep.20 - The Problem with SMS</title>
      <description><![CDATA[SS7 signalling protocol has been around since 1975, and it is archaic to say the least. Remarkably, we are still dependant on SS7 as a protocol for SMS. Dr David Day and Kieran Twidale-Smith explores the issues relating to SMS
]]></description>
      <pubDate>Thu, 8 Apr 2021 07:52:08 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Dr David Day, Kieran Twidale-Smith)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="41478450" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/6558d221-057f-4dcc-bfb0-c84cb832789c/audio/95d1982c-a3c6-4ccb-8773-b7dd4cffe639/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep.20 - The Problem with SMS</itunes:title>
      <itunes:author>Dr David Day, Kieran Twidale-Smith</itunes:author>
      <itunes:duration>00:42:29</itunes:duration>
      <itunes:summary>SS7 signalling protocol has been around since 1975, and it is archaic to say the least. Remarkably, we are still dependant on SS7 as a protocol for SMS. Dr David Day and Kieran Twidale-Smith explores the issues relating to SMS</itunes:summary>
      <itunes:subtitle>SS7 signalling protocol has been around since 1975, and it is archaic to say the least. Remarkably, we are still dependant on SS7 as a protocol for SMS. Dr David Day and Kieran Twidale-Smith explores the issues relating to SMS</itunes:subtitle>
      <itunes:keywords>denial of service, sim swop, sms, ss7 protocol, cybersecurity, mobile technology</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">46eef8db-b777-4bb5-9a62-7a4bfa21bf99</guid>
      <title>404: Ep.19 - Hacking the Brain</title>
      <description><![CDATA[We willingly allow our minds to be programmed to conform to how the creator of the content has intended. And in doing that, there is no mindfulness or effort to filter the content.  Brad Thomas delves deeper into the subject matter with Dr David Day
]]></description>
      <pubDate>Thu, 1 Apr 2021 07:39:18 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Brad Thomas, Dr David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="25924379" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/4c1bbbe6-9304-46cf-b74d-ec5553bbc3c1/audio/d5d4890d-2ffc-498d-821d-69a9cb9b3866/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep.19 - Hacking the Brain</itunes:title>
      <itunes:author>Brad Thomas, Dr David Day</itunes:author>
      <itunes:duration>00:26:39</itunes:duration>
      <itunes:summary>We willingly allow our minds to be programmed to conform to how the creator of the content has intended. And in doing that, there is no mindfulness or effort to filter the content.  Brad Thomas delves deeper into the subject matter with Dr David Day</itunes:summary>
      <itunes:subtitle>We willingly allow our minds to be programmed to conform to how the creator of the content has intended. And in doing that, there is no mindfulness or effort to filter the content.  Brad Thomas delves deeper into the subject matter with Dr David Day</itunes:subtitle>
      <itunes:keywords>samurai security, cybersecurity, brain hacking, echo chambers, samurai cybersecurity, hacking the brain</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">32979c80-008c-4671-b91c-bf58ec45c569</guid>
      <title>404: Ep.18 - Brain-Computer Interfaces</title>
      <description><![CDATA[Dr David Day sheds some light on the topic of Brain Computer Interfaces. As we unpack this topic, it is crucial that we also look at the cybersecurity implications.
]]></description>
      <pubDate>Tue, 30 Mar 2021 10:53:13 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="29776000" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/357c33ce-53ba-42a0-9372-7faff62cd250/audio/13261aab-3fa9-4dca-9a92-a70a9738564a/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep.18 - Brain-Computer Interfaces</itunes:title>
      <itunes:author>David Day</itunes:author>
      <itunes:duration>00:30:39</itunes:duration>
      <itunes:summary>Dr David Day sheds some light on the topic of Brain Computer Interfaces. As we unpack this topic, it is crucial that we also look at the cybersecurity implications.</itunes:summary>
      <itunes:subtitle>Dr David Day sheds some light on the topic of Brain Computer Interfaces. As we unpack this topic, it is crucial that we also look at the cybersecurity implications.</itunes:subtitle>
      <itunes:keywords>bci, brain-computer interface, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">02b78609-9d85-46ec-8fd2-386476693bda</guid>
      <title>404: Ep.17 - How working from home leaves us vulnerable to hackers</title>
      <description><![CDATA[
]]></description>
      <pubDate>Mon, 29 Mar 2021 18:17:58 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Brad Thomas, Dr David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="31714924" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/88fbd01e-c4a0-4c28-b29e-e869b6f15504/audio/7f8ac3b6-99ed-4df6-9449-ca008ff81279/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep.17 - How working from home leaves us vulnerable to hackers</itunes:title>
      <itunes:author>Brad Thomas, Dr David Day</itunes:author>
      <itunes:duration>00:32:47</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:keywords>cybersecurity, working from home</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a15a8257-a243-40c6-ab69-acc44fd50e1a</guid>
      <title>404: Ep. 16 - Quantum cybersecurity</title>
      <description><![CDATA[Brad Thomas interviews Dr David Day on how quantum physics may impact computing and cybersecurity
]]></description>
      <pubDate>Mon, 15 Feb 2021 17:51:53 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Brad Thomas, Dr David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="34274821" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/7d6e90c1-e272-417f-8b9d-b29738cf0d18/audio/92def7d5-3c99-4a0a-a88c-bb7a1ee7919b/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 16 - Quantum cybersecurity</itunes:title>
      <itunes:author>Brad Thomas, Dr David Day</itunes:author>
      <itunes:duration>00:35:31</itunes:duration>
      <itunes:summary>Brad Thomas interviews Dr David Day on how quantum physics may impact computing and cybersecurity</itunes:summary>
      <itunes:subtitle>Brad Thomas interviews Dr David Day on how quantum physics may impact computing and cybersecurity</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, encryption, quantum computing, quantum physics</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">025e294b-a895-4c21-8d48-2268bae3b006</guid>
      <title>404: Ep.15 - Why do we keep making the same mistakes?</title>
      <description><![CDATA[Why do we keep getting hacked? Having data leaked? Making the same mistakes? What's wrong with us?!! Dr David Day does his best to fathom it out in half an hour.
]]></description>
      <pubDate>Mon, 9 Nov 2020 20:03:23 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="33234981" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/74608aac-b8bd-4dac-b66a-2ab339203b73/audio/da88bbc9-98c0-4ec2-ac57-73a72d580373/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep.15 - Why do we keep making the same mistakes?</itunes:title>
      <itunes:author>David Day</itunes:author>
      <itunes:duration>00:34:37</itunes:duration>
      <itunes:summary>Why do we keep getting hacked? Having data leaked? Making the same mistakes? What&apos;s wrong with us?!! Dr David Day does his best to fathom it out in half an hour.</itunes:summary>
      <itunes:subtitle>Why do we keep getting hacked? Having data leaked? Making the same mistakes? What&apos;s wrong with us?!! Dr David Day does his best to fathom it out in half an hour.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">89dd1d1b-0280-4fe3-ad1f-b6d589bd0fcf</guid>
      <title>404: Ep. 14 - What do Facebook have on you?</title>
      <description><![CDATA[How and why Facebook collect your data, and how are they getting away with it, and why are we such suckers for it.
]]></description>
      <pubDate>Tue, 27 Oct 2020 21:12:31 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="50357005" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f1781-308f-4403-b74c-7f8ba64f7816/episodes/e771e809-88fe-4e53-9b43-77073ae8dbe7/audio/5f245384-e8b2-47f8-a6d9-1da7d160541d/default_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 14 - What do Facebook have on you?</itunes:title>
      <itunes:author>David Day</itunes:author>
      <itunes:duration>00:52:27</itunes:duration>
      <itunes:summary>How and why Facebook collect your data, and how are they getting away with it, and why are we such suckers for it.</itunes:summary>
      <itunes:subtitle>How and why Facebook collect your data, and how are they getting away with it, and why are we such suckers for it.</itunes:subtitle>
      <itunes:keywords>cyber security, privacy, facebook, digital marketing, tracking, cybersecurity, marketing, data privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">75aadca5-b649-4cd2-a9f6-0084602f75f7</guid>
      <title>404: Ep. 13 - Mapping the Cloud</title>
      <description><![CDATA[David, Luke and Jay run through the latest cybersecurity news, covering cloud systems, the new MS update and quantum computing.
]]></description>
      <pubDate>Fri, 11 Sep 2020 11:25:23 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Luke Hill, David Day, Jay Drake)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="10221963" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/2eebdb54-28f4-4f5f-96e6-32c916fcd1d9/edited_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 13 - Mapping the Cloud</itunes:title>
      <itunes:author>Luke Hill, David Day, Jay Drake</itunes:author>
      <itunes:duration>00:12:09</itunes:duration>
      <itunes:summary>David, Luke and Jay run through the latest cybersecurity news, covering cloud systems, the new MS update and quantum computing.</itunes:summary>
      <itunes:subtitle>David, Luke and Jay run through the latest cybersecurity news, covering cloud systems, the new MS update and quantum computing.</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c9ecb302-c9e2-4343-a8b5-eb20454b7e36</guid>
      <title>404: Ep. 12 - Certifications Galore!</title>
      <description><![CDATA[David, Luke, Kieran and Brad talk about which certifications you would be best getting if you're thinking of becoming a penetration tester.
]]></description>
      <pubDate>Tue, 8 Sep 2020 12:15:35 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Luke Hill, Kieran Twidale-Smith, David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="25669806" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/5be6ffad-a61c-41c6-9789-62f0262e809b/edited_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 12 - Certifications Galore!</itunes:title>
      <itunes:author>Luke Hill, Kieran Twidale-Smith, David Day</itunes:author>
      <itunes:duration>00:32:18</itunes:duration>
      <itunes:summary>David, Luke, Kieran and Brad talk about which certifications you would be best getting if you&apos;re thinking of becoming a penetration tester.</itunes:summary>
      <itunes:subtitle>David, Luke, Kieran and Brad talk about which certifications you would be best getting if you&apos;re thinking of becoming a penetration tester.</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, penetration testing</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4cb473a2-11f1-4b06-8b12-2e205e8b54c3</guid>
      <title>404: Ep. 11 - An Uber Serious Hack</title>
      <description><![CDATA[David, Luke, Kieran and Jay talk about the Uber hack that affected 57 million people.
]]></description>
      <pubDate>Mon, 24 Aug 2020 10:52:26 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (David Day, Kieran Twidale-Smith, Luke Hill, Jay Drake)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="16472994" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/b7ebb7e3-3619-4b81-a45a-66b0c196ea3b/edited_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 11 - An Uber Serious Hack</itunes:title>
      <itunes:author>David Day, Kieran Twidale-Smith, Luke Hill, Jay Drake</itunes:author>
      <itunes:duration>00:17:44</itunes:duration>
      <itunes:summary>David, Luke, Kieran and Jay talk about the Uber hack that affected 57 million people.</itunes:summary>
      <itunes:subtitle>David, Luke, Kieran and Jay talk about the Uber hack that affected 57 million people.</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, uber</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">547df017-682d-4f3e-b8e7-4b1c33e61c61</guid>
      <title>404: Ep. 10 - Pen Tests vs. Vulnerability Assessments</title>
      <description><![CDATA[Neil and Luke talk about the difference between penetration testing and vulnerability assessments.
]]></description>
      <pubDate>Fri, 14 Aug 2020 11:22:24 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Luke Hill, Neil Richardson)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="19474823" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/0851e161-f89c-420d-8e37-7390bad4ba8d/10_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 10 - Pen Tests vs. Vulnerability Assessments</itunes:title>
      <itunes:author>Luke Hill, Neil Richardson</itunes:author>
      <itunes:duration>00:22:05</itunes:duration>
      <itunes:summary>Neil and Luke talk about the difference between penetration testing and vulnerability assessments.</itunes:summary>
      <itunes:subtitle>Neil and Luke talk about the difference between penetration testing and vulnerability assessments.</itunes:subtitle>
      <itunes:keywords>cyber security, pen testing, cybersecurity, penetration testing</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9d7cb3cc-5fa2-427d-b564-4145a2e4e689</guid>
      <title>404: Ep. 9 - Sliding into Your DMs</title>
      <description><![CDATA[Luke, David and Jay talk about the tech hearing, the Garmin hack and new info on the Twitter hack.
]]></description>
      <pubDate>Fri, 31 Jul 2020 15:56:11 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Luke Hill, Jay Drake, David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="38748230" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/6cc14f89-db2a-4bd2-a101-b48d0cb77e7a/404-episode-9-recording-1-2020-07-31-t01-31-45pm-dday_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 9 - Sliding into Your DMs</itunes:title>
      <itunes:author>Luke Hill, Jay Drake, David Day</itunes:author>
      <itunes:duration>00:41:21</itunes:duration>
      <itunes:summary>Luke, David and Jay talk about the tech hearing, the Garmin hack and new info on the Twitter hack.</itunes:summary>
      <itunes:subtitle>Luke, David and Jay talk about the tech hearing, the Garmin hack and new info on the Twitter hack.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">70c7406e-bc0c-4f19-ade6-69c852578c0b</guid>
      <title>404: Ep. 8 - Droning On about Blackbaud and DJI</title>
      <description><![CDATA[David, Luke, Jay and newcomer Kieran talk about the late release of the May Blackbaud hack details as well as the insecurities of the DJI drone app.
]]></description>
      <pubDate>Fri, 24 Jul 2020 16:15:26 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Luke Hill, David Day, Kieran Twidale-Smith, Jay Drake)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="30656290" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/2ef69773-8e59-49c4-a4ac-f306a01aed0d/edited_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 8 - Droning On about Blackbaud and DJI</itunes:title>
      <itunes:author>Luke Hill, David Day, Kieran Twidale-Smith, Jay Drake</itunes:author>
      <itunes:duration>00:39:07</itunes:duration>
      <itunes:summary>David, Luke, Jay and newcomer Kieran talk about the late release of the May Blackbaud hack details as well as the insecurities of the DJI drone app.</itunes:summary>
      <itunes:subtitle>David, Luke, Jay and newcomer Kieran talk about the late release of the May Blackbaud hack details as well as the insecurities of the DJI drone app.</itunes:subtitle>
      <itunes:keywords>cyber-security, cyber security, cybersecurity, blackbaud, dji</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">988da346-b6e1-4bc7-a628-be759f21e705</guid>
      <title>404: Ep. 7 - The Big, Bad Twitter Hack</title>
      <description><![CDATA[Apparently, 130 accounts had been targeted and 30 were actually breached in the most recent Twitter hack. Let's talk about responsibility for a hot second.
]]></description>
      <pubDate>Mon, 20 Jul 2020 13:45:30 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Neil Richardson, Luke Hill)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="11395465" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/2236fb19-1922-4942-9048-af5571b15197/edited_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 7 - The Big, Bad Twitter Hack</itunes:title>
      <itunes:author>Neil Richardson, Luke Hill</itunes:author>
      <itunes:duration>00:15:29</itunes:duration>
      <itunes:summary>Apparently, 130 accounts had been targeted and 30 were actually breached in the most recent Twitter hack. Let&apos;s talk about responsibility for a hot second.</itunes:summary>
      <itunes:subtitle>Apparently, 130 accounts had been targeted and 30 were actually breached in the most recent Twitter hack. Let&apos;s talk about responsibility for a hot second.</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ba7b93e2-4b9d-4e65-acf7-9b7578d76a75</guid>
      <title>404: Ep. 6 - Tiktok Tiktok Tiktok, Boom!</title>
      <description><![CDATA[Every Kids favourite app Tiktok is causing privacy concerns.  Should it? 
]]></description>
      <pubDate>Tue, 14 Jul 2020 11:35:50 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Luke Hill, Jack Hague, Dr David Day)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="10924675" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/f5eb0368-1b41-46dc-afc4-a4a708184502/ep6-final-mix_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 6 - Tiktok Tiktok Tiktok, Boom!</itunes:title>
      <itunes:author>Luke Hill, Jack Hague, Dr David Day</itunes:author>
      <itunes:duration>00:13:00</itunes:duration>
      <itunes:summary>Every Kids favourite app Tiktok is causing privacy concerns.  Should it? </itunes:summary>
      <itunes:subtitle>Every Kids favourite app Tiktok is causing privacy concerns.  Should it? </itunes:subtitle>
      <itunes:keywords>privacy, malware, tiktok, china</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f35793b1-e704-4432-b096-66caeb8f3efb</guid>
      <title>404: Ep. 5 - A.I. for the Bad Guy</title>
      <description><![CDATA[David, Neil, Luke and Jack talk about how artificial intelligence is being weaponised into precision-targeted malware. Be afraid, be very afraid.  
]]></description>
      <pubDate>Tue, 14 Jul 2020 11:31:12 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Dr David Day, Jack Hague, Neil Richardson, Luke Hill)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="29453459" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/2e5b2be7-17a3-4f62-becd-484770f14da8/episode-5-final-mixdown_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 5 - A.I. for the Bad Guy</itunes:title>
      <itunes:author>Dr David Day, Jack Hague, Neil Richardson, Luke Hill</itunes:author>
      <itunes:duration>00:30:38</itunes:duration>
      <itunes:summary>David, Neil, Luke and Jack talk about how artificial intelligence is being weaponised into precision-targeted malware. Be afraid, be very afraid.  </itunes:summary>
      <itunes:subtitle>David, Neil, Luke and Jack talk about how artificial intelligence is being weaponised into precision-targeted malware. Be afraid, be very afraid.  </itunes:subtitle>
      <itunes:keywords>machine learning, artificial intelligence, malware, a.i., ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3a2d6e54-c01b-4f19-91c1-4c9cd0e9f11b</guid>
      <title>404: Ep. 4 - Transparency or Privacy?</title>
      <description><![CDATA[In this short episode, David, Neil and Jay talk about whether public safety is worth relinquishing your privacy for 'the greater good'.
]]></description>
      <pubDate>Mon, 6 Jul 2020 15:56:54 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Neil Richardson, David Day, Jay Drake)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="22692156" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/03955602-087d-4cfd-85a4-7a6b69bdb9d7/edited-2_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 4 - Transparency or Privacy?</itunes:title>
      <itunes:author>Neil Richardson, David Day, Jay Drake</itunes:author>
      <itunes:duration>00:27:54</itunes:duration>
      <itunes:summary>In this short episode, David, Neil and Jay talk about whether public safety is worth relinquishing your privacy for &apos;the greater good&apos;.</itunes:summary>
      <itunes:subtitle>In this short episode, David, Neil and Jay talk about whether public safety is worth relinquishing your privacy for &apos;the greater good&apos;.</itunes:subtitle>
      <itunes:keywords>cyber security, cybersecurity, cyber, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d9876e39-2391-49f1-bf51-24ec0407614a</guid>
      <title>404: Ep. 3 - NIS, TPS, GDPR and PECR</title>
      <description><![CDATA[Or: The One That Needed a Tonne of Editing. David, Neil, Luke and Jack talk about the cybersecurity standard on a Monday morning, due to microphone issues on Friday. Lets see how that goes.
]]></description>
      <pubDate>Mon, 29 Jun 2020 15:51:52 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Neil Richardson, David Day, Jack Hague, Luke Hill)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="49255412" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/8ded40f4-6ad2-4a73-b41d-af15d0db8c4a/edited_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 3 - NIS, TPS, GDPR and PECR</itunes:title>
      <itunes:author>Neil Richardson, David Day, Jack Hague, Luke Hill</itunes:author>
      <itunes:duration>01:02:58</itunes:duration>
      <itunes:summary>Or: The One That Needed a Tonne of Editing. David, Neil, Luke and Jack talk about the cybersecurity standard on a Monday morning, due to microphone issues on Friday. Lets see how that goes.</itunes:summary>
      <itunes:subtitle>Or: The One That Needed a Tonne of Editing. David, Neil, Luke and Jack talk about the cybersecurity standard on a Monday morning, due to microphone issues on Friday. Lets see how that goes.</itunes:subtitle>
      <itunes:keywords>cyber-security, cybersecurity, cyber, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7caff850-276e-45c8-af30-687072de8a60</guid>
      <title>404: Ep. 2 - Dave&apos;s 50th Birthday Bash</title>
      <description><![CDATA[On David's 50th birthday, we introduce Charlie to the podcast, talk about more about the track 'n' trace app and cover a fan's question.
]]></description>
      <pubDate>Mon, 22 Jun 2020 15:40:53 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (David Day, Neil Richardson, Jack Hague, Charlie Drake)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="47999153" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/733deff7-8c63-49ed-b925-b9de45927b34/ep-2_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 2 - Dave&apos;s 50th Birthday Bash</itunes:title>
      <itunes:author>David Day, Neil Richardson, Jack Hague, Charlie Drake</itunes:author>
      <itunes:duration>01:01:47</itunes:duration>
      <itunes:summary>On David&apos;s 50th birthday, we introduce Charlie to the podcast, talk about more about the track &apos;n&apos; trace app and cover a fan&apos;s question.</itunes:summary>
      <itunes:subtitle>On David&apos;s 50th birthday, we introduce Charlie to the podcast, talk about more about the track &apos;n&apos; trace app and cover a fan&apos;s question.</itunes:subtitle>
      <itunes:keywords>cyber-security, cyber security, cybersecurity, cyber, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">992fca89-1a38-46dd-9a22-98cc305294fb</guid>
      <title>404: Ep. 1 - Pilot</title>
      <description><![CDATA[David, Neil, Luke and Jack kick off the new podcast with a bang; talking Zoom, Track 'n' Trace and Bluetooth usage.
]]></description>
      <pubDate>Mon, 15 Jun 2020 16:21:32 +0000</pubDate>
      <author>dday@samuraisecurity.co.uk (Luke Hill, David Day, Neil Richardson, Jack Hague)</author>
      <link>https://www.samuraisecurity.co.uk/</link>
      <enclosure length="38582199" type="audio/mpeg" url="https://cdn.simplecast.com/audio/3d9f17/3d9f1781-308f-4403-b74c-7f8ba64f7816/d7ce0f68-42ec-4586-b896-1a78983eb217/pilot-edited_tc.mp3?aid=rss_feed&amp;feed=rdhJ1PRU"/>
      <itunes:title>404: Ep. 1 - Pilot</itunes:title>
      <itunes:author>Luke Hill, David Day, Neil Richardson, Jack Hague</itunes:author>
      <itunes:duration>00:55:06</itunes:duration>
      <itunes:summary>David, Neil, Luke and Jack kick off the new podcast with a bang; talking Zoom, Track &apos;n&apos; Trace and Bluetooth usage.</itunes:summary>
      <itunes:subtitle>David, Neil, Luke and Jack kick off the new podcast with a bang; talking Zoom, Track &apos;n&apos; Trace and Bluetooth usage.</itunes:subtitle>
      <itunes:keywords>cyber security, samurai security, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>