Then a while ago I had a call from the journalists behind the Panama Papers investigation. They had been looking at some ...
The default iPhone settings allow Siri access from the lock screen, with voice-activated commands like “Hey Siri” or pressing ...
Part two covers the response and remediation actions in M365. The response steps help to contain an incident and buy time to ...
Memory forensics enhances investigations by analysing volatile data (in RAM) unavailable in disk forensics. Key insights from ...
Maritime cyber insurance has been playing catch-up with maritime cyber security for a while now. It was all pretty good until the availability of cheap VSAT meant that ships became constantly ...
Testing a ship involves identifying and mitigating cybersecurity risks using the “Identify, Prevent, Detect, Respond, Recover” framework. Guidelines include MSC.428(98) ...
In my last blog post we delved into the Volatility Framework. In this two-part series I want to highlight how memory forensics plays a crucial role in enhancing forensic investigations by providing ...
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high ...
An Attack Surface Assessment (ASA) is an intentionally time constrained exercise that uses open-source information in a largely passive way to establish what services you are publishing to the ...