News

Jo Dalton & Andrew Tierney are presenting: Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk ...
The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these ...
US Office. Pen Test Partners Inc, 222 Broadway 22nd Floor, Suite 2525, New York, NY 10038, US +1 646 693 2501 ...
With the rights tools, and practice it’s possible for SMEs to do their own AD password audits without the expense of ...
TL;DR Converted a real car into a game controller by intercepting CAN data Tapped into the CAN bus using cheap wire splicers and a Kvaser USBCAN interface Mapped steering, brake, and throttle signals ...
Ken Munro will be presenting: All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship ...
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop ...
TL;DR: This year PTP Cyber Fest had more villages, more speakers, and more chances for people to get involved. Thank you to our partners RiverSafe, Retail & Hospitality ISAC, Automotive ISAC, and the ...
How Tos How to load unsigned or fake-signed apps on iOS George Waterfield 28 May 2025 10 Min Read ...
TL;DR Using dual-homed devices as a segregation tool is not recommended as a security design solution Use dedicated hardware and robust firewalls to segregate networks to limit access to critical ...