News
TL;DR Closing the Loop Just before COVID struck the world, I was travelling through Colorado on a Sunday on a ski trip with ...
TL;DR Introduction AI is proving to be a useful companion for analysing data at scale for forensic examiners (data that is ...
TL;DR Introduction BIOS protection is the digital equivalent of a locked front door, but what if the doorbell doubled as a ...
TL;DR Introduction We investigated a ransomware incident on a Windows Server 2012 host running in an SFTP-only role. The ...
Jo Dalton & Andrew Tierney are presenting: Malice, Mistakes & Misunderstandings: The Insider Threat Spectrum (PG) “Tough conversations. Home truths. Real self-reflection. This isn’t just another talk ...
Shelley Booker will be on a panel covering: “The behind-the-scenes, real stories you don’t get everyday. From accidental career pivots to hard-won promotions, these lightning talks will give you a ...
If you went to our PTP Cyber Fest over the Infosec week you may have seen the PTP hack car being used as a games controller for the game SuperTuxKart (a free and open-source Mario Kart type game). You ...
TL;DR Introduction The Content Security Policy (CSP) is a layer of security for web applications that helps detect and stop client-side attacks such as Cross-Site Scripting (XSS), Clickjacking, data ...
The UK Cyber Security and Resilience Bill (CS&R) was announced last year in the King’s Speech. It addresses gaps in current regulation, like NIS, with a broad scope, enhanced incident reporting ...
When we planned PTP Cyber Fest, we set out to create something different from the usual cybersecurity events. After two busy days, we can proudly say the event delivered exactly what we hoped for and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results