Samurai Security

  • A Practical Guide To Mitigate Cloud Misconfiguration Risks
    by Dr David Day on September 16, 2025 at 7:34 am

    A practical UK framework to find, prioritise and fix cloud misconfigurations, reduce breach risk and evidence compliance. The post A Practical Guide To Mitigate Cloud Misconfiguration Risks appeared first on Samurai security.

  • When to Hire a Virtual CISO: A Guide for UK Organisations
    by Samurai Brad on September 11, 2025 at 8:39 am

    When and how to hire a vCISO in the UK, with triggers, costs, compliance mapping and a practical procurement checklist. The post When to Hire a Virtual CISO: A Guide for UK Organisations appeared first on Samurai security.

  • Selecting a Digital Forensics Provider in the UK: Practical Guidance for CISOs
    by Samurai Brad on September 4, 2025 at 2:03 pm

    A step-by-step framework and checklist to choose a UK digital forensics provider that meets technical, legal and regulatory demands. The post Selecting a Digital Forensics Provider in the UK: Practical Guidance for CISOs appeared first on Samurai security.

  • Bridging the Skills Gap in Cloud Security
    by Dr David Day on April 17, 2025 at 1:19 pm

    Bridging the Skills Gap in Cloud Security, AI Risk, and OT Security: A Call to Action for Businesses The Cloud Security Skills Gap Despite the widespread adoption of cloud technology over the past two decades, cloud security remains one of the most significant areas of concern for cybersecurity professionals. According to O’Reilly’s 2024 State of The post Bridging the Skills Gap in Cloud Security appeared first on Samurai security.

  • vCISO vs. Traditional CISO: Which is Right for Your Business?
    by Dr David Day on December 19, 2024 at 6:07 pm

    With the increasing frequency and sophistication of cyber threats, businesses need strategic leadership to safeguard their digital assets. A key role for any large business to protect against cyber threats is a Chief Information Security Officer (CISO). This article will explore the fundamental differences between the two types of CISO – in house and virtual The post vCISO vs. Traditional CISO: Which is Right for Your Business? appeared first on Samurai security.

  • How to Prepare Your Business for a Penetration Test: A Step-by-Step Guide
    by Dr David Day on December 5, 2024 at 12:15 am

    Since the turn of the century, the amount and complexity of cybersecurity threats have continually been on the rise. Penetration testing (pen testing) has quickly become an essential method for identifying vulnerabilities before malicious actors exploit them. A pen test simulates a real-world attack on your systems, networks, or applications to uncover security weaknesses. Correct The post How to Prepare Your Business for a Penetration Test: A Step-by-Step Guide appeared first on Samurai security.

  • Different Types Of Penetration Testing: A Guide
    by Dr David Day on October 7, 2024 at 10:21 am

    Penetration testing, often called “pen testing,” is vital in today’s cybersecurity strategies. Essentially, it simulates an attack on a system, network, or application to uncover vulnerabilities that malicious actors could target. By replicating the methods used by real-world attackers, penetration tests offer valuable insights into an organisation’s security posture. This proactive approach allows businesses to The post Different Types Of Penetration Testing: A Guide appeared first on Samurai security.

  • ChatGPT Security Risks: Understanding the Cybersecurity Implications
    by Dr David Day on September 27, 2024 at 10:21 am

    ChatGPT, developed by OpenAI, represents a significant advancement in the field of artificial intelligence (AI) and natural language processing (NLP). As a large language model (LLM), it can generate human-like text, engage in detailed conversations, and assist with a wide range of tasks from drafting emails to generating code. However, as with any powerful tool, The post ChatGPT Security Risks: Understanding the Cybersecurity Implications appeared first on Samurai security.

  • A Guide to Automated Penetration Testing
    by Dr David Day on September 19, 2024 at 12:00 pm

    The frequency and sophistication of cyber threats are increasing. Organisations must proactively identify and mitigate vulnerabilities in their systems. Penetration testing is a key component of cybersecurity strategy and has evolved to include both manual and automated approaches. This guide will explore automated penetration testing, offering insights into its benefits, tools, drawbacks and best practices. The post A Guide to Automated Penetration Testing appeared first on Samurai security.

  • IIoT, ICS & OT: The Hidden Technology of Modern Society | 404 | Ep. 4
    by Dr David Day on July 11, 2024 at 1:01 pm

    Episode Summary In Episode #4 of the “404 Cybersecurity Not Found” podcast, our host, Brad Thomas, is joined by Red Teaming expert, Momen Eldawakhly. Our discussion centres on Industrial Control Systems (ICS) and the technology behind National Critical Infrastructure (NCI). Momen, a Senior Penetration Tester and Attack Simulation Lead at Samurai Security, shares his expertise The post IIoT, ICS & OT: The Hidden Technology of Modern Society | 404 | Ep. 4 appeared first on Samurai security.

Share Websitecyber
We are an ethical website cyber security team and we perform security assessments to protect our clients.