TL;DR  Introduction  Kubernetes has changed the way we deploy and scale workloads. It’s powerful, flexible, and very good at ...
I live in the countryside & as a result, know quite a few farmers. The subject of connected farming systems comes up quite a lot in the local pub. Those of you who have watched Clarkson’s Farm will ...
Gerard Kerrigan will be on the panel of judges at the Hampshire and Sussex Cyber Cluster’s Dragons’ Den-style event.
TL;DR Introduction Digital Forensics and Incident Response (DFIR) has a certain appeal to aspiring cybersecurity ...
A Hacker’s first Solo: the pitfalls of aviation connectivity EFBs sit in a bit of a no mans land of certification, variously ...
Pwning web sites through their AI chatbot agents and politely breaking guard rails Everyone is implementing AI chatbots to improve their customer experience and journey, without increasing call centre ...
Pwning web sites through their AI chatbot agents and politely breaking guard rails  Everyone is implementing AI chatbots to ...
If you are a computer nerd, it’s statistically likely you’ll be self-hosting multiple kinds of web applications on some infrastructure you own for personal use. Whether it’s an old gaming PC running a ...
It’s strange how satisfying it is to turn off the lights, set up a tent under the stars, and watch the kids swap screen time for mud pies and marshmallows. Before I left for a 3-day family camping ...
Discord has become an attractive tool for attackers not because it’s malicious, but because it’s legitimate and trusted. It often flies under the radar of security controls and offers features that ...
If you haven’t read the previous posts, I would recommend them as a primer to the devices, BLE and what we’re doing. In part one, we made a low-cost key finder beep by capturing and replaying BLE ...