News

The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these ...
Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk — it’s an immersive, provocative session ...
TL;DR Converted a real car into a game controller by intercepting CAN data Tapped into the CAN bus using cheap wire splicers and a Kvaser USBCAN interface Mapped steering, brake, and throttle signals ...
Done properly, digital forensic investigations save your business time and money. Devices provide a wealth of evidence sources that can be used to prove or disprove facts. The aim of digital forensics ...
With the rights tools, and practice it’s possible for SMEs to do their own AD password audits without the expense of ...
TL;DR: This year PTP Cyber Fest had more villages, more speakers, and more chances for people to get involved. Thank you to our partners RiverSafe, Retail & Hospitality ISAC, Automotive ISAC, and the ...
Ken Munro will be presenting: All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship ...
Paul Brownridge will be presenting: Breach preparation. When it’s all going south, what should you wish that you had done yesterday?
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop client-side attacks such as Cross-Site Scripting (XSS), Clickjacking, data ...
TL;DR Announced July 2024; details added April 2025; expected Royal Assent in 2026. Applies to all critical services, their supply chains, and data centres. New requirements in standards conformance, ...