News

Assess your organisation's physical security with Pen Test Partners' covert and overt testing services. Our experts simulate real-world intrusion attempts to identify vulnerabilities, test staff ...
On your iOS device, go to Settings -> General -> Profiles & Device Management. Tap “Trust [Your Apple ID],” then tap “Trust” ...
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (9.8 Critical severity) CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N (9.3 Critical severity) CVSS:3.1 ...
Practice being punched in the face. The realities of incident response preparation “Everyone has a plan until they get punched in the face.” This Mike Tyson boxing quote perfectly encapsulates the ...
We use essential cookies to make our site work. With your consent, we may also use non-essential cookies to improve user experience and analyze website traffic. By clicking “Accept,” you agree to our ...
Introduction Over the years we have been fortunate to have been called upon to help with some challenging investigations.
All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship. Cruise ships are possibly the most complex collection of systems that you’ll find in one physical, moving ...
The Pen Test Partners Security Blog brings you the latest news and trends in penetration testing and the internet security industry. More about our security blog » Pen Test Partners delivers ground ...
Using dual-homed devices as a segregation tool is not recommended as a security design solution Use dedicated hardware and robust firewalls to segregate networks to limit access to critical networks ...
Enhance your organisation's password security with Pen Test Partners' PAPA service. Identify weak credentials by securely ...
Evaluate and enhance your organisation's cybersecurity posture with Pen Test Partners' Cyber Security Maturity Assessment (CSMA). Our tailored assessments benchmark your security controls against ...