News
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop ...
Our team has experience across various AI deployment models, with services which can cater to the risks associated with each. Our internal methodologies are aligned with industry standard ...
Ken Munro will be presenting: All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship ...
TL;DR Converted a real car into a game controller by intercepting CAN data Tapped into the CAN bus using cheap wire splicers and a Kvaser USBCAN interface Mapped steering, brake, and throttle signals ...
The UK Cyber Security and Resilience Bill (CS&R) was announced last year in the King’s Speech. It addresses gaps in current ...
Artificial intelligence (AI) and machine learning (ML) features are being implemented on devices. They could allow the ...
We use essential cookies to make our site work. With your consent, we may also use non-essential cookies to improve user experience and analyze website traffic. By clicking “Accept,” you agree to our ...
Introduction Microsoft Patches for October 2018 included a total of 49 security patches. There were many interesting ones including kernel privilege escalation as well as critical ones which could ...
Many organisations are turning to virtualisation of apps and desktops. This often involves virtualisation platforms such as Citrix to deliver these services. Get your configuration or lock-down wrong ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results