Skip to main content

This site uses cookies – small text files that are placed on your machine to help the site provide a better user experience. In general, cookies are used to retain user preferences, store information for things like shopping carts, and provide anonymised tracking data to third party applications like Google Analytics.

As a rule, cookies will make your browsing experience better. However, you may prefer to disable cookies on this site and on others. The most effective way to do this is to disable cookies in your browser. We suggest consulting the Help section of your browser or taking a look at the About Cookies website which offers guidance for all modern browsers

Further information about what information we collect and how we ue it can be found in our privacy policy.

The logs you’ll wish you had configured if (when) you are breached… 
  • Breach Handling
  • DFIR
The logs you’ll wish you had configured if (when) you are breached… 

7 Min Read

Oct 17, 2025

Compiling static Nmap binary for jobs in restricted environments
  • How Tos
Compiling static Nmap binary for jobs in restricted environments

8 Min Read

Oct 14, 2025

What Speed 2 gets right and wrong about ship hacking
  • Security Blog
What Speed 2 gets right and wrong about ship hacking

8 Min Read

Oct 08, 2025