News
The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these ...
Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk — it’s an immersive, provocative session ...
If you went to our PTP Cyber Fest over the Infosec week you may have seen the PTP hack car being used as a games controller for the game SuperTuxKart (a free and open-source Mario Kart type game). You ...
Done properly, digital forensic investigations save your business time and money. Devices provide a wealth of evidence sources that can be used to prove or disprove facts. The aim of digital forensics ...
With the rights tools, and practice it’s possible for SMEs to do their own AD password audits without the expense of ...
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop ...
Our team has experience across various AI deployment models, with services which can cater to the risks associated with each. Our internal methodologies are aligned with industry standard ...
Vulnerability Advisory Time Travel Debugging: finding Windows GDI flaws Symeon Paraschoudis 10 Oct 2018 29 Min Read ...
Many organisations are turning to virtualisation of apps and desktops. This often involves virtualisation platforms such as Citrix to deliver these services. Get your configuration or lock-down wrong ...
Introduction The International Association of Classification Societies (IACS) have introduced two new Unified Requirements (UR); E26 “Cyber resilience of ships” and E27 “Cyber resilience of on-board ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results