When a breach happens, it’s not just technical defences that matter. Preparation in non-technical areas, like having key documents printed or emergency contacts accessible, can make all the difference ...
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high ...
Connected embedded devices often contain many processors. Alongside the main application processor it is common to find other sub-systems: A secondary microcontroller providing lower level safety or ...
As security is a process not a product, security training should never be commoditised. That’s why we deliver bespoke security training to all levels, from absolute novice users through to CISOs, ...
This represents how different teams can work; a collaboration wheel: Based on experience of attacker tactics and techniques as witnessed in our Incident Response division, our Red Team develops and ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.
We helped Channel 4 with trying to track down rental scammers. We are not the police so we could only take it so far and any proving guilt or innocence would be a police matter. We saw organised ...
For a long time, the primary security model for airplanes has been physical. Airside security controls are there to prevent access by unauthorised personnel. However, as connectivity with e-enabled ...
IASME recognises Pen Test Partners as a Cyber Essentials certifier; something we’re very pleased about. By working with us you can achieve Cyber Essentials scheme status with a minimum of fuss and ...
As ships get bigger, with more automation, fewer crew members, and more connectivity, the attack surface of a modern commercial vessel is becoming as complex and diverse as that of a connected car or ...