Analysis, commentary, and practical guidance from SALTT Tech's practitioners — including the SALTT Tech Cyber Weekly podcast.
Traditional penetration testing has a coverage problem. A typical web application assessment covers somewhere between 20 and 40 per cent of an application's actual attack surface. Human testers make j...
Read ArticlePenetration testing has not changed much in its fundamentals over the past two decades. A skilled consultant, a defined scope, a time-boxed ...
Most organisations that commission a penetration test understand, broadly, what they are asking for: a skilled consultant to attempt to brea...
The Essential 8 has been part of the Australian cybersecurity landscape for nearly a decade. In that time it has evolved from a recommended ...
Russian military intelligence unit APT28 has been systematically compromising consumer and small-business routers to conduct cyber espionage...
Microsoft researchers have reported a technique, informally dubbed “BitUnlocker”, that enables bypass of BitLocker full volume encryption un...
Deepfake technology, though impressively innovative, poses serious threats to both individuals and businesses on a global scale. These threa...
KnowBe4 has launched an interactive and exciting way to learn cyber security in a relaxed environment, in the form of a game called 'Hack-A-...
Cybersecurity professionals across industries are diligently working to counteract a rising tide of cyber threats powered by next-generation...
Web application and API protection is a critical aspect of maintaining the security and integrity of online systems. These systems, which in...