The Coalition for Content Provenance and Authenticity ( C2PA) is tackling the issue of misleading information online by ...
GPS is one service in the Global Navigation Satellite System (GNSS) – others include Russia’s GLONASS and the EU’s Galileo constellations. These are all used to provide Position, Navigation, and ...
Non-tech aspects to breach follow-up are often overlooked but essential NDAs, supply chain, and third party contracts and obligations should be reviewed Reviewing communication protocols and employee ...
Safety and transparency are important in aviation. One tool that helps here is the Cockpit Voice Recorder (CVR), which records audio from the cockpit during flights. It is crucial for accident ...
A silly-season BLE connectivity story Overheat people’s smart ski socks …but only when in Bluetooth range AND when the owner’s phone is out of range of their feet! Having experienced painfully cold ...
“Everyone has a plan until they get punched in the face.” This Mike Tyson boxing quote perfectly encapsulates the chaos of a cybersecurity breach. Accept that you will get punched in the face Train ...
As ships get bigger, with more automation, fewer crew members, and more connectivity, the attack surface of a modern commercial vessel is becoming as complex and diverse as that of a connected car or ...
IASME recognises Pen Test Partners as a Cyber Essentials certifier; something we’re very pleased about. By working with us you can achieve Cyber Essentials scheme status with a minimum of fuss and ...
Pen Test Partners provides CBEST Red Teaming to assess the Prevention, Detection, and Response capabilities of financial institutions. It means that those institutions maintain resilience and are able ...
There is no endpoint solution in the world that can protect against your staff’s willingness to help a supposed colleague in need, or acquiescing to the demands of a “brand new member of the board”.
Many mobile applications interact with an API server. Sniffing traffic between a device and the API server, or decompiling the mobile application will allow the workings of the API to be discovered ...