Offshore containers: The three basic steps to certification. 15 May 2017 International Maritime Organization (IMO) has specific guidelines for offshore container certification and there are three basic steps to... Read more
A quick analysis of the latest Shadow Brokers dump 17 Apr 2017 Just in time for Easter, the Shadow Brokers released the latest installment of an NSA data dump, which... Read more
Carbon Black - Security Advisories: CVE-2016-9570, CVE-2016-9568 and CVE-2016-9569 13 Apr 2017 Nettitude have discovered three vulnerabilities in Carbon Black; CVE-2016-9570, CVE-2016-9568 and CVE-2016-9569. Two of these have been patched at the... Read more
Creating value through technology and innovation. 22 Mar 2017 As a collective, we need to be looking at smarter and better ways of working, from enhancing exportation... Read more
Old red or new red? 10 Mar 2017 Henk Kombrink: Differentiating between Triassic and Devonian in the Moray Firth – lr.org Read more
Effectively analysing sysmon logs 9 Mar 2017 We previously covered setting up and using sysmon (System Monitor), which is part of the Sysinternals suite from Microsoft. In this... Read more
Putting attackers in hi vis jackets with sysmon 16 Feb 2017 Sysmon (short for system monitor) has been part of the Sysinternals suite for several years. It comprises kernel-mode driver... Read more
More XSS Shenanigans 3 Feb 2017 In September, we released our XSS Payloads collection of scripts and they went down really well within the pen-testing community.... Read more
Who owns your runtime? 11 Jan 2017 Can mobile applications trust their own runtime environment? The answer to this burning question that has no doubt... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*