We use cookies to enhance your experience of our website, save your preferences and provide us with information on how you use our website. For more information please read our Privacy Policy. By using our website without changing your browser settings you consent to our use of cookies.
Posts
Deconstructing Apple card: A hacker’s perspective
July 4, 2021 Deconstructing Apple card: A hacker’s perspective
​Securing emerging technologies: strategies for more effective IoT and cloud threat
July 6, 2021 ​Securing emerging technologies: strategies for more effective IoT and cloud threat
Apple iOS ‘Zero-Click Exploit’ Discovery Walk through: Takeaways for Security Professionals
Dec. 20, 2020 Apple iOS ‘Zero-Click Exploit’ Discovery Walk through: Takeaways for Security Professionals
Critical Medtronic Heart Device Flaws Show Need for Internet of Things (IoT) Security
April 19, 2019 Critical Medtronic Heart Device Flaws Show Need for Internet of Things (IoT) Security
Case Study
Penetration testing helps Fortune 100 technology company enhance product security
Penetration testing helps Fortune 100 technology company enhance product security