GPS is one service in the Global Navigation Satellite System (GNSS) – others include Russia’s GLONASS and the EU’s Galileo constellations. These are all used to provide Position, Navigation, and ...
Non-tech aspects to breach follow-up are often overlooked but essential NDAs, supply chain, and third party contracts and obligations should be reviewed Reviewing communication protocols and employee ...
Safety and transparency are important in aviation. One tool that helps here is the Cockpit Voice Recorder (CVR), which records audio from the cockpit during flights. It is crucial for accident ...
A silly-season BLE connectivity story Overheat people’s smart ski socks …but only when in Bluetooth range AND when the owner’s phone is out of range of their feet! Having experienced painfully cold ...
“Everyone has a plan until they get punched in the face.” This Mike Tyson boxing quote perfectly encapsulates the chaos of a cybersecurity breach. Accept that you will get punched in the face Train ...
Access cards can be cloned There are practical measures to make card cloning difficult Practical guidance on how these systems work and why you should make sure they’re configured right What is a ...
The Pen Test Partners Security Blog brings you the latest news and trends in penetration testing and the internet security industry. More about our security blog » Pen Test Partners delivers ground ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.