Two cybersecurity drills needed annual to test readiness.
Determine your role: Merchant or service provider Determine your level and requirements Identify your validation method: SAQ or RoC Use the PCI website The Payment Card Industry Data Security Standard ...
Onsite ICS testing is risk averse Laboratory ICS device testing uncovers more A blended approach is key How that works Demonstrable benefits For safety’s sake onsite ICS testing adopts a risk averse ...
In an engagement we found an open directory on the internet belonging to our client By enumerating it we found a zip archive with a configuration file holding usernames and passwords That file gave us ...
Body-worn cameras are typically used in public safety situations (e.g. by police officers or private security) and have an interesting cyber threat model. These cameras are frequently used to capture ...
Cyber threats aren’t just a problem for large shipping organizations, small maritime fleet operators are also at risk. Anything from phishing emails to ransomware attacks, these threats can disrupt ...
Related to my last post which detailed forensic techniques for recovering data in smart watches, this post looks specifically at Garmin watches. This time, we’ll explore how data can be accessed much ...
We powered them up and did a basic set up for the default version of Android they ran, just as a regular user would. We initially assessed the Android build of the phones to look for the version of ...
IASME recognises Pen Test Partners as a Cyber Essentials certifier; something we’re very pleased about. By working with us you can achieve Cyber Essentials scheme status with a minimum of fuss and ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results