Two cybersecurity drills needed annual to test readiness.
Onsite ICS testing is risk averse Laboratory ICS device testing uncovers more A blended approach is key How that works Demonstrable benefits For safety’s sake onsite ICS testing adopts a risk averse ...
In an engagement we found an open directory on the internet belonging to our client By enumerating it we found a zip archive with a configuration file holding usernames and passwords That file gave us ...
Cyber threats aren’t just a problem for large shipping organizations, small maritime fleet operators are also at risk. Anything from phishing emails to ransomware attacks, these threats can disrupt ...
Body-worn cameras are typically used in public safety situations (e.g. by police officers or private security) and have an interesting cyber threat model. These cameras are frequently used to capture ...
Related to my last post which detailed forensic techniques for recovering data in smart watches, this post looks specifically at Garmin watches. This time, we’ll explore how data can be accessed much ...
We powered them up and did a basic set up for the default version of Android they ran, just as a regular user would. We initially assessed the Android build of the phones to look for the version of ...
IASME recognises Pen Test Partners as a Cyber Essentials certifier; something we’re very pleased about. By working with us you can achieve Cyber Essentials scheme status with a minimum of fuss and ...
Enter Keyword. Search for Events by Keyword.
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.