News
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop ...
Our team has experience across various AI deployment models, with services which can cater to the risks associated with each. Our internal methodologies are aligned with industry standard ...
Ken Munro will be presenting: All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship ...
The UK Cyber Security and Resilience Bill (CS&R) was announced last year in the King’s Speech. It addresses gaps in current ...
Artificial intelligence (AI) and machine learning (ML) features are being implemented on devices. They could allow the ...
When we planned PTP Cyber Fest, we set out to create something different from the usual cybersecurity events. After two busy ...
We use essential cookies to make our site work. With your consent, we may also use non-essential cookies to improve user experience and analyze website traffic. By clicking “Accept,” you agree to our ...
Keeping on top of a dynamic internet footprint is hard; your attack surface is continually changing. Development, cloud, unmanaged & managed change, mergers & acquisitions, even 3rd parties can change ...
Enhance your organisation's password security with Pen Test Partners' PAPA service. Identify weak credentials by securely ...
Continuous development workflows such as CI/CD do not lend themselves well to ‘point in time’ pen testing. A pen test is a deep and thorough manual test of a system. IF that system or app is ...
Unit 2, Verney Junction Business Park, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results