An Innocent Picture? How the rise of AI makes it easier to abuse photos online.

Introduction The topic of this blog post is not directly related to red teaming (which is my usual go-to), but something I find important personally. Last month, I gave an info session at a local elementary school to highlight the risks of public sharing of children’s pictures at school. They decided that instead of their … Continue reading An Innocent Picture? How the rise of AI makes it easier to abuse photos online.

Another spin to Gamification: how we used Gather.town to build a (great!) Cyber Security Game

CSI Game hosted on Gather.town platform Let's recap October. Cyber Security Awareness Month. For a cyber awareness enthusiast, it is hard to conceal the excitement that comes with a full month of initiatives in all shapes and sizes, built around a genuine and strong effort to help keep companies and their people “safe online”. At … Continue reading Another spin to Gamification: how we used Gather.town to build a (great!) Cyber Security Game

A checklist to populate your Acceptable Use Policy

In our previous blogpost, we discussed how to take some of the dust off your Acceptable Use Policy (AUP) or IT security code of conduct, making it a bit more user friendly and educational. Now, we're giving you a sort of checklist of the topics to discuss in a typical AUP, based on the table … Continue reading A checklist to populate your Acceptable Use Policy