So a good system uses encryption and a custom key. The bad news is most systems also have default encryption keys, that are ...
Connected embedded devices often contain many processors. Alongside the main application processor it is common to find other sub-systems: A secondary microcontroller providing lower level safety or ...
When a breach happens, it’s not just technical defences that matter. Preparation in non-technical areas, like having key documents printed or emergency contacts accessible, can make all the difference ...
CCTV is often overlooked; ‘shadow tech’ whose security isn’t as carefully reviewed as core IT assets It is often a responsibility for facilities managers who may have little experience of cyber ...
I’m often asked why anyone would attempt to hack shipping. Simple: money. Cybercriminals exploit vulnerabilities in port systems and shipping networks for high-stakes rewards, often bypassing ...
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high ...
IASME recognises Pen Test Partners as a Cyber Essentials certifier; something we’re very pleased about. By working with us you can achieve Cyber Essentials scheme status with a minimum of fuss and ...
As ships get bigger, with more automation, fewer crew members, and more connectivity, the attack surface of a modern commercial vessel is becoming as complex and diverse as that of a connected car or ...
Done properly digital forensic (DF) investigations save your business time and money. Devices provide a wealth of evidence sources that can be used to prove or disprove facts. The aim of DF is to ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.