The Coalition for Content Provenance and Authenticity ( C2PA) is tackling the issue of misleading information online by ...
We powered them up and did a basic set up for the default version of Android they ran, just as a regular user would. We initially assessed the Android build of the phones to look for the version of ...
Use asymmetric ECC ciphers to encrypt video footage on body worn cameras using the public key. Once recovered onto a central server and decrypted using the ECC private key, symmetric AES keys can be ...
GPS is one service in the Global Navigation Satellite System (GNSS). Others include Russia’s GLONASS and the EU’s Galileo constellations. These are all used to provide Position, Navigation, and Timing ...
A silly-season BLE connectivity story Overheat people’s smart ski socks …but only when in Bluetooth range AND when the owner’s phone is out of range of their feet! Having experienced painfully cold ...
We are vendor neutral and platform agnostic. This means that you get unbiased testing and appraisal of any and every environment. We keep a very clear and level head too. We are not fazed by high ...
We’re only as good as the people in our team, so we’re always looking for great people. Maybe that’s you? PTP is acutely aware of the lack of diversity in our industry, and are keen to address that.
IASME recognises Pen Test Partners as a Cyber Essentials certifier; something we’re very pleased about. By working with us you can achieve Cyber Essentials scheme status with a minimum of fuss and ...
Pen Test Partners provides CBEST Red Teaming to assess the Prevention, Detection, and Response capabilities of financial institutions. It means that those institutions maintain resilience and are able ...
Done properly digital forensic (DF) investigations save your business time and money. Devices provide a wealth of evidence sources that can be used to prove or disprove facts. The aim of DF is to ...