Maritime cyber insurance has been playing catch-up with maritime cyber security for a while now. It was all pretty good until the availability of cheap VSAT meant that ships became constantly ...
Testing a ship involves identifying and mitigating cybersecurity risks using the “Identify, Prevent, Detect, Respond, Recover” framework. Guidelines include MSC.428(98) ...
Memory forensics enhances investigations by analysing volatile data (in RAM) unavailable in disk forensics. Key insights from ...
MemProcFS was created by Ulf Frisk with the first release of v1.0 on github showing around 2018. Ulf Frisk is a well-known figure in the field of memory forensics and digital investigations. The tool ...
Memory forensics enhances investigations by analysing volatile data (in RAM) unavailable in disk forensics. Key insights from ...
CCTV is often overlooked; ‘shadow tech’ whose security isn’t as carefully reviewed as core IT assets It is often a responsibility for facilities managers who may have little experience of cyber ...
Imposter syndrome is the belief that you are undeserving of your achievements Anyone can be affected by it There are ways to cope Imposter syndrome is the psychological pattern in which a person ...
Always thank researchers for reporting vulnerabilities. Acknowledging their efforts can set the right tone. Lead all communications with researchers. Don’t let legal or PR teams take over. Provide ...
We’ve seen an increase in multi-stage Adversary in the Middle (AiTM) phishing BEC in M365. These usually originate from a compromised trusted party, and lead to a series of AiTM attacks and follow-on ...
The Pen Test Partners Security Blog brings you the latest news and trends in penetration testing and the internet security industry. More about our security blog » Pen Test Partners delivers ground ...