The Coalition for Content Provenance and Authenticity ( C2PA) is tackling the issue of misleading information online by ...
Non-tech aspects to breach follow-up are often overlooked but essential NDAs, supply chain, and third party contracts and obligations should be reviewed Reviewing communication protocols and employee ...
A red team engagement is an objective-based assessment that requires a holistic view of the organisation from the perspective of an adversary. This assessment process is designed to meet the needs of ...
Many mobile applications interact with an API server. Sniffing traffic between a device and the API server, or decompiling the mobile application will allow the workings of the API to be discovered ...
We have talented testers for virtually any scenario, a bold claim but true nonetheless. We’ve provided a sample of the types of pen testing we conduct, it’s not exhaustive but gives a flavour of what ...
As ships get bigger, with more automation, fewer crew members, and more connectivity, the attack surface of a modern commercial vessel is becoming as complex and diverse as that of a connected car or ...
ICS (Industrial Control Systems) cyber security deals with the security of the control systems and associated processes, equipment, and instrumentation that are used in a wide range of sectors. We ...
The threat landscape has never been more challenging. Significant numbers of highly skilled and motivated threat actors present a real danger. They have many potential goals such as penetrating your ...
IASME recognises Pen Test Partners as a Cyber Essentials certifier; something we’re very pleased about. By working with us you can achieve Cyber Essentials scheme status with a minimum of fuss and ...
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high ...
Access cards can be cloned There are practical measures to make card cloning difficult Practical guidance on how these systems work and why you should make sure they’re configured right What is a ...
Traditional penetration testing tends to focus on systems that are already in place, either in development or production environments. The shorter dev cycles and continuous delivery demands of DevOps ...