Rhys explains LARPing
My name’s Rhys Parsons, I work as a GRC (Governance, Risk and Compliance Analyst) for Siker, however I’ve been asked to discuss some of my
My name’s Rhys Parsons, I work as a GRC (Governance, Risk and Compliance Analyst) for Siker, however I’ve been asked to discuss some of my
Many if not all businesses share some degree of similarity with one another even with their primary process being separate. Be it a car manufacturing
Late on Monday night, reports emerged of an attempted attack on a city in Florida’s water supply. It is the latest in an increasing number
Home Smart Devices Smart speakers (or voice-enabled assistants) can perform many different services, triggered by voice commands from the user including, but not limited to, playing
What is a CTF? CTF stands for Capture the Flag. In the Cyber Security world this relates to an event where the aim is to hack
By now most people will have used or at least heard of Zoom and subsequently some of the privacy and security issues that have been brought
The spread of Coronavirus has now made it an increasingly common topic which criminals are attempting to exploit for their own gain. These attacks are
Redcar and Cleveland Council were attacked with ransomware on Saturday, February 8th. The council website is still not fully operational today, and this is only one of the
The Challenge The Centre for the Protection of National Infrastructure (CPNI) had identified a need to increase the awareness of cyber security issues within the
The Challenge After several company members had attended one or both of the ICS Security courses that were being delivered for CPNI, the client contacted
In late 2018, Siker were contracted by the British Pipeline Agency to carry out analysis of the requirements for the completion of the BPA Cyber
Following the successful delivery for the IAEA, it was recognised that the Siker ICS405 course was a suitable certification level course for the SQUEP (Suitable