Sign in to view Pete’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Pete’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Greater Cardiff Area
Sign in to view Pete’s full profile
Pete can introduce you to 10+ people at National Gas
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
549 followers
500+ connections
Sign in to view Pete’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Pete
Pete can introduce you to 10+ people at National Gas
Join with email
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Pete
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Pete’s full profile
or
Already on LinkedIn? Sign in
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
549 followers
-
Pete Maynard, Ph.D. shared thisYou've heard of triplex fault-tolerant computing, but what about Octuple? Time-triggered Ethernet networks to enforce determinism and a completely independent Backup Flight Software system. The Orion capsule has it all. Can't wait to read about the verification workflows. https://lnkd.in/eaJBYGc2How NASA Built Artemis II’s Fault-Tolerant ComputerHow NASA Built Artemis II’s Fault-Tolerant Computer
-
Pete Maynard, Ph.D. reposted thisPete Maynard, Ph.D. reposted thisDTRAP have just published the paper from my RITICS fellowship research looking at the current state of operational technology (OT) penetration testing. Across the literature and interviews with practitioners and asset owners, a consistent picture emerges: there is still no clear, shared definition of what ‘good’ looks like in practice. Approaches are often shaped by adapting IT practices to environments where they do not fully translate. That tends to result in testing that focuses on vulnerability discovery rather than meaningful outcomes. Lists of CVEs are straightforward to produce, but they rarely reflect how an adversary would actually achieve impact in an OT environment. Instead, the work highlights the need for a shift towards attack narratives grounded in process comprehension, where the objective is not just access, but credible paths to operational impact. It also explores some of the broader challenges shaping the space, particularly the nascent cultural and organisational dynamics between cyber security and engineering that influence how these engagements are scoped and delivered. This builds on much of the thinking I’ve been developing around process-level impact and how we represent it in practice. The paper also sets out additional findings, along with recommendations for how the practice can move forward. Link to open access PDF in comments. #OTsecurity #ICSsecurity
-
Pete Maynard, Ph.D. reposted thisPete Maynard, Ph.D. reposted this📢 All members of the wider Zero Debris community: register now & join the Zero Debris Technical Forum webinar on 22 April. The public webinar will give an update on the latest developments of the Zero Debris community. Progress related to the Zero Debris Technical Booklet will be presented as well as the ongoing work carried out together with community contributors. It’s a team effort – together we can take concrete, technical steps towards achieving Zero Debris by 2030. #EventInShort 📅 22 April 2026 🕓 16:00 – 17:00 CEST 🔗 Registration: https://lnkd.in/ez5_heeA We look forward to engaging once more with both existing & new members of the Zero Debris technical community!
-
Pete Maynard, Ph.D. reposted thisPete Maynard, Ph.D. reposted thisESA-CCSDS Space Protocol Development Competition - Deadline for Applications Extended Due to strong interest and a number of requests from prospective participants, the deadline for applications to the ESA- CCSDS Space Protocol Development Competition has been extended to 5 April 2026. This competition invites teams to implement and demonstrate key space communications protocols—specifically LunaNet Signal-in-Space (LSIS–AFS) and Space Communications Session Control (CCSDS 235.1)—contributing to the development of interoperable, standards-based systems for future missions. Participants will have the opportunity to: Work with CCSDS-aligned protocols Develop real implementations Engage with experts from ESA, industry, and the amateur space community Contribute to the future of space communications As part of the programme, there is also a potential future opportunity for selected concepts to contribute to an experimental communications payload on a cislunar spacecraft (subject to agency funding and programme approval). The competition is being delivered in collaboration with ESA, Goonhilly Earth Station, AMSAT-UK, and AMSAT-DL, bringing together expertise from across the space and amateur communications communities. We encourage universities, research groups, and developers to take advantage of this extension and submit an application. 🔗 Further details and application information: https://lnkd.in/eWMW4tup
-
Pete Maynard, Ph.D. reposted thisPete Maynard, Ph.D. reposted this🥶 If you don't mind the (extremely) cold, we're hiring! ESA is looking for its next biomedical research doctor at Concordia station, Antarctica 🇦🇶🧪 ⏰ Apply by this 𝐒𝐚𝐭𝐮𝐫𝐝𝐚𝐲 31 𝐉𝐚𝐧𝐮𝐚𝐫𝐲 👉https://lnkd.in/gg6kKF_K 📸: ESA/IPEV/PNRA/S. Gaier
-
Pete Maynard, Ph.D. reposted thisPete Maynard, Ph.D. reposted thisHow to spot hidden spy cams in a room: a cheap ($150) and open-source device for your DIY practice! 🕵️♂️👀🧲🚫📷 A group of academic security researchers from China publicly presented a new technical method for detecting hidden spy devices with wireless connectivity, especially hidden spy cameras. The main advantages of this method are its low cost ($150-$200 USD) and open specifications, allowing anyone to build it at home. The device detection mechanism uses the physical principle of electromagnetic diffraction. It was implemented using commercial off-the-shelf hardware and tested across six environments and eleven camera models. It’s quite impressive to see the device calculate packets in the air and then turn itself toward the direction of a hidden camera—check the demo video (link below)! Now we all have a DIY project to work on before the next vacation. :) More details: WiFi Hidden Camera Localization Based on Electromagnetic Diffraction [PDF]: https://lnkd.in/dUd8D99V Code [Github]: https://lnkd.in/dwDP72fe Demo [Video]: https://lnkd.in/dVb7kWdD #surveillance #privacy #spy #data #cybersecurity #RaspberryPi #Wireless #WiFi #vacation #travel #hacking #research #webcam #infosec #tech
-
Pete Maynard, Ph.D. shared thisAnother great feature for golang, which already has a great crypto library - https://lnkd.in/epDC26Pk
-
Pete Maynard, Ph.D. reposted thisResearch Institute for Sociotechnical Cyber Security (RISCS)
Research Institute for Sociotechnical Cyber Security (RISCS)
5moPete Maynard, Ph.D. reposted this🚨 Call for Papers - CyberUK Tech Talks 🚨 The National Cyber Security Centre is inviting papers for 'Tech Talks' at CyberUK 2026, the flagship NCSC event taking place 21-23 April at the SEC, Glasgow. 🛡️ Theme: 'The next decade: accelerating our cyber defence' ⏱️ Length: 20-minute talks (+ 5 mins for questions) ‼️ Deadline: 12 December 2025 Each talk should take the form of an advanced briefing on innovation, future technology or a piece of research, aligned with one of 3 topics: 🔹 Cyber Applications of AI 🔹 What Works: Approaches that reduce cyber harm 🔹 The Evolving Threat Find out more 👉 https://lnkd.in/ejMfmxpK -
Pete Maynard, Ph.D. shared thisInteresting research from Microsoft on side-channel attacks targeting TLS-encrypted AI communications. https://lnkd.in/eq6yxqZT
-
Pete Maynard, Ph.D. liked thisPete Maynard, Ph.D. liked thisSo proud of this bunch of brilliant people for making the inaugural BSides OT UK so fantastic on Friday! All my fellow organisers, our wonderful volunteers, our generous sponsors, all the incredible speakers, and every single person who bought a ticket and came along - thank you - what a superb result! Here's to 2027 and beyond! 🎉🐝❤️
-
Pete Maynard, Ph.D. liked thisPete Maynard, Ph.D. liked thisLLMs have become disturbingly capable pen-testers. With 579 lines of python scaffolding code, an LLM can autonomously compromise an Active Directory network. Privilege escalation, lateral movement, domain dominance.. the whole thing, as tested against the GOAD (Game of Active Directory) testbed. We've just released a new version of Cochise (https://lnkd.in/dMJFCN-u), our open-source prototype for autonomous assumed-breach pentesting, with a focus on simplicity and readability. If you're researching LLM-based offensive security, this is meant as a baseline and starting point. The accompanying paper was accepted at ACM TOSEM, and I'll be presenting at ICSE in Rio de Janeiro next week. If you're there and want to grab a coffee or an after-conference drink, message me.GitHub - andreashappe/cochise: Autonomous Assumed Breach Penetration-Testing Active Directory NetworksGitHub - andreashappe/cochise: Autonomous Assumed Breach Penetration-Testing Active Directory Networks
-
Pete Maynard, Ph.D. liked thisPete Maynard, Ph.D. liked this💻 Great energy yesterday at the quarterly project review meeting and networking lunch with Cyber-AI Hub industry partners! These sessions are a fantastic way to connect and share progress, bringing together industry partners, academics, engineers, PhD researchers and MSc students. Huge thanks to Vincent Raes, Head of Software at ANGOKA, for a really engaging update on their collaboration with the Cyber-AI Hub. It's brilliant to see the innovation taking shape 🚀 . Lewis Rennie, Maire O'Neill, Judith Millar #CyberAiHub, #Angoka, #CSIT, #Cybersecurity, #ArtificialIntelligence #IndustryCollaboration
-
Pete Maynard, Ph.D. liked thisPete Maynard, Ph.D. liked thisWe have a BIG announcement!!! FastNetMon is collaborating with NLnet Labs to advance Rotonda, an open source BGP routing platform written in Rust. Development areas include: • Add Path capability • BGP message creation (UPDATE announcements + withdrawals) • Advanced RIB inspection • Detailed BGP session visibility • BGP Flow Spec support for traffic filtering and DDoS mitigation All features are released under open source licenses (MPL 2.0 / BSD 3-Clause) and integrated into the main Rotonda codebase. Announcement: https://lnkd.in/gNmJtqS2 #BGP #OpenSource #Rust #NetworkOperations #FlowSpec #NetEng
Experience & Education
-
National Gas
******** ********
-
********* ********
******** ********* ****** ************** ******* ******
-
******* ********** * ********* ********
******** *****
-
******* ********** *******
******** ********* ******** ******* ********** *** ******** ************** undefined
-
-
********** ** ****** ***********
******** ** ******* ***** ******** *******
-
View Pete’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
Volunteer Experience
Honors & Awards
-
Best lightning talk presentation
TMA2020
-
Top of class
-
Languages
-
English
Native or bilingual proficiency
-
Welsh
Elementary proficiency
-
Bulgarian
Limited working proficiency
-
Russian
Elementary proficiency
View Pete’s full profile
-
See who you know in common
-
Get introduced
-
Contact Pete directly
Other similar profiles
Explore more posts
-
Ivan Ristić
Red Sift • 3K followers
After years of work, we have decent security standards, but we'll continue to struggle until we adopt security by default. Take the relationship between TLS 1.2 and 1.3, for example. Both protocols can provide reasonable security, but TLS 1.2 supports a kitchen sink of options, and you need to know what you're doing to configure it correctly. TLS 1.3, on the other hand, just works, no further work needed. This is just one example; there are dozens of standards and situations for everyone to consider when it comes to their network infrastructure. Until we get security by default, the only way to stay ahead is to have comprehensive configuration monitoring to catch problems and drift. I created Hardenize to solve exactly this problem. Our free test is still available at hardenize.com, and the commercial product has been rolled into Red Sift's. Now that Mail Check and Web Check are being retired, I am very happy that there is still a way for Hardenize to continue to serve.
13
1 Comment -
Wayne Horkan
West Midlands Cyber Hub • 28K followers
Important announcement from Ciaran Martin, ex-CEO of the National Cyber Security Centre (NCSC) re: the accusations that China had access to state secrets in the alleged 2020 breach: 1. China is a significant threat. 2. But this did not happen. 1: "For many years China has been, and continues to be, a significant cyber security threat to Britain and British interests. Chinese state actors target British government, commercial and other networks for espionage purposes." 2: "But it is categorically untrue that in 2020 briefings were given to the effect that the Chinese state had compromised the bespoke systems used for circulating Strap and other highly classified state secrets."
5
2 Comments -
Dudley J.
576 followers
Giltar Information Security Ltd are delighted to be supporting the early discovery and development work for the UK military's Digital Targeting Web. The DTW is a £1bn game changing capability which featured as a key recommendation in the recent Strategic Defence Review and it will transform the speed and precision of the sense/decide/effect chain leveraging AI along with a shift from network and application centricity to data centric operations. It will align with NATO standards enabling alliance interoperability and position the UK as the blue force leader in the digital targeting space. Giltar Information Security Ltd will lead the early security work developing guidance, principles and architecture that will lay the foundations for compliance with #SecureByDesign principles. We will also enable dynamic and proportionate security assurance of early minimum viable product demonstrations. #DigitalTransformation
28
2 Comments -
TheNextGenTechInsider.com
559 followers
🌟 New Blog Just Published! 🌟 📌 NCSC Warns: Fix Observability to Stop Cyber Threats 🚀 ✍️ Author: Hiren Dave 📖 The NCSC has sounded a clear warning: observability and threat hunting across UK organisations vary wildly, and that variance translates directly into missed attacks. Ollie Whitehouse , the agency’s..... 🕒 Published: 2025-10-10 📂 Category: Cybersecurity 🔗 Read more: https://lnkd.in/dWsgs7af 🚀✨ #ncsc #observability #threathunting
-
Get Cyber Certified
39 followers
Want to win more government and private-sector contracts while cutting cyber risk? Cyber Essentials is the simplest, fastest way to show you take security seriously. This guide breaks down the five key controls, why certification matters, and how to get certified — including the assessor-led route that speeds approval and boosts your chances of success. Read the full guide to: • Understand the Cyber Essentials controls • See the step-by-step certification process • Learn practical tips to stay compliant If you support UK organisations or sell IT services, offering Cyber Essentials certification can be a game-changer for your clients and your business. Learn how Get Cyber Certified helps organisations get certified quickly and reliably. 🔒 Find out more: https://wix.to/exDaUhM #CyberEssentials #CyberSecurity #Compliance
-
Harj Singh
Aristi Limited • 855 followers
The UK’s National Cyber Security Centre (NCSC) has published pragmatic guidance to help organisations, especially those responsible for Critical National Infrastructure (CNI), plan, prepare and respond effectively to severe cyber threats. It’s a timely reminder that cyber resilience goes beyond technology. It requires strategic planning, operational readiness and organisational alignment. Key takeaways include: - Plan early and proactively: Embed severe threat response into enterprise risk planning and leadership decision-making. - Enhance situational awareness: Build threat intelligence and monitoring capabilities to detect and understand emerging risks quickly. - Harden and rehearse defences: Identify tactical measures to reduce exposure, document response actions, and regularly test them through exercises. - Integrate recovery planning: Connect response plans with wider business continuity and organisational objectives to ensure swift restoration. - Build long-term resilience: Plan not just for immediate threats but for adaptability and recovery across the threat lifecycle. In an increasingly hostile cyber landscape, this guidance reinforces the importance of preparedness, coordination and resilience at every level of the organisation. https://lnkd.in/gNYRiSJj #CyberSecurity #CyberResilience #CriticalNationalInfrastructure #CNI #IncidentResponse #BusinessContinuity #RiskManagement #OperationalResilience #NCSC #Leadership #SecurityStrategy
5
-
Colin Topping
Ginger Cat Cyber Security • 5K followers
A good bit of analysis by Tony of the consequences of over reliance and acceptance of AI output when, as he quite nicely puts it, organisations forgo methodology for buttonology. Fire and forget may work in some circumstances, but not when organisations that should know better deliver critical evidence on the basis that OSINT is assumed but not embraced.
3
1 Comment -
Silent Push
15K followers
Preemptive cyber defence is no longer optional. Shifting from reactive to proactive security using Indicators of Future Attack (IOFA) lets organisations stay ahead of campaigns and reduce risk at scale. This is the mindset CISOs need to protect their digital estates effectively. 💪 Our latest blog explores how the UK’s Active Cyber Defence strategy demonstrates the value of identifying attacker infrastructure before it hits. Read the short piece here: https://hubs.ly/Q03Z9SfC0 #cybersecurity #cyberdefense #ciso #infosec #proactivesecurity
20
-
MacKay Hannah: Conferences and Webinars
473 followers
SEPA, West Lothian Council, SAMH: don’t join the list of cyber breached Scottish organisations Cyber resilience failure is potentially career and organisation ending. Criminals used to be largely local and visible. That has changed. Scotland’s cyber criminal threats are invisible, literally global and trying to probe and attack 24 hours a day. This half-day will help you to know the cyber threat landscape, develop incident response planning, ensure reputation and assurance response and develop and embed a cyber resilience culture. Can you afford not to? For more information or to book a place👉 https://ow.ly/8N1250WAEGm #CyberResilience #Governance #BusinessContinuity #Scotland
1
-
Jason Brooks
1K followers
🕵️♂️ DSAR Surprise: When a Long-Overdue Response Comes with Extras... What do you do when an organisation you previously secured a non-compliant finding by the ICO finally responds to your Data Subject Access Request, and the attached PDF includes more than just your data? Naturally, I ran it through pdfid.py (kudos to Didier Stevens for the tool), and found: ✅ /Encrypt streams present ⚠️ /JS and /AA actions embedded 🧱 /ObjStm structures detected 🤔 No /xref or /trailer, highly unusual for a properly structured PDF Oh, and there was a hidden comment buried right after the %%EOF. 📦 What was supposed to be a straightforward document turned into a digital onion, layers, anomalies, and subtle metadata surprises. 🔐 Under UK GDPR Article 5(1)(f) and Article 32, organisations are expected to ensure appropriate technical and organisational security measures when handling personal data, including in how they transmit and package that data. Sending an active-content PDF without explanation or controls? That might raise eyebrows... and questions. 💡 Canary tokens are alive and well... 📡 ET... phones home... 👽🛸👾 💬 Anyone else ever receive a PDF that had more going on than expected? #DSAR #PDFSecurity #CyberSecurity #InfoSec #DataPrivacy #OpenSourceTools #Forensics #TransparencyMatters
-
Thomas Ballin
Cytix • 6K followers
One implication of the UK’s Cyber Security and Resilience Bill that isn’t getting enough attention yet is how application security testing will need to evolve Most modern organisations ship software continuously. Applications are shaped by a constant stream of - Feature releases - Bug fixes - Dependency updates - Config changes - New integrations - APIs modifications But security assurance for applications is still often based on periodic penetration tests In a resilience-focused regulatory model, that creates a gap. A pentest is a snapshot of the application at a moment in time, while the application might change hundreds of times before the next assessment For organisations falling within the scope of the bill, the more relevant question becomes "how do you validate the security impact of dev changes as they happen?" One approach we’re seeing increasing interest in is change-driven AppSec testing Instead of testing the whole application periodically, security validation is aligned with specific development changes. This is at the heart of what Cytix does... - Automatically reviewing development changes to identify security-relevant modifications - Generating micro-pentest scopes based on the threat model for each ticket or pull request - Delivering targeted penetration testing continuously as changes are introduced The goal isn’t to replace traditional testing entirely, but to close the assurance gap created by continuous software delivery As regulatory expectations shift to demonstrating resilience, organisations will increasingly need to answer a simple question "What security validation occurs when your application changes?" For teams operating modern development environments, the answer will need to move beyond periodic testing toward continuous, change-driven security assurance
11
3 Comments -
Susan Brown
Asset Chain • 7K followers
Zortrex ADE Multi-Agent Threat Containment (Demo) This demo shows the Agent Defence Engine (ADE) operating across a simulated multi-agent environment under mixed conditions, valid behaviour, misconfiguration, spoofing, and drift. Multiple agent types (sensors, actuators, drones, comms) issue intents concurrently across platoons, and each action is independently verified at the decision boundary using ephemeral presence-derived prefixes. What’s important here is not throughput, but selective containment. Agents with matching expected and observed prefixes are accepted and allowed to proceed. Actions that show presence mismatch or drift are blocked immediately, without impacting other agents in the system. There is no global shutdown and no cascading failure containment is local, precise, and auditable. The audit view intentionally records execution truth rather than assumptions, who acted, what intent was expressed, what presence condition applied, and why an action was accepted or blocked. This enables post-incident forensics without leaking operational payloads or embedding long-lived authority. Replay and escalation signals are visible, but execution power remains bound to live conditions, not stored credentials. This is a defensive simulation only. The purpose of the demo is to show how ephemeral validation and containment can interrupt drift, spoofing, and off-platoon behaviour in real time even in dense, asynchronous agent swarms without relying on static keys, shared secrets, or centralised trust anchors.
7
-
Futurescot
10K followers
📊 Securing Trust Boundaries: Cross Domain in the Scottish Public Sector Sam Black is demonstrating how Cross Domain Solutions (CDS) were positioned as a critical enabler to secure collaboration across Scotland’s public sector — protecting sensitive systems while allowing controlled data flow across trust boundaries. 🔹 CDS provides a controlled, risk-managed pipeline to transfer information between distinct trust zones — enforcing segregation and preventing unauthorised or unsafe data flow. 🔹 Designed to protect against unauthorised export, protocol attacks, persistent compromise, and unsafe content ingestion. ➤ High-impact risks — disruption, loss of trust, and safety implications — arise when higher trust zones are compromised. ➤ Protective controls include protocol break, sandboxing, session isolation, data-in-transit and at-rest protection, and strict authentication enforcement. The message is clear: cross-domain capability is no longer optional. It is foundational to enabling secure analytics, operational resilience, and trusted digital collaboration across complex public sector ecosystems. #CrossDomain #CyberResilience #PublicSectorSecurity Sam Black
8
-
Paul Newman
Access100 • 3K followers
Newly published independent research from the Department for Science, Innovation & Technology (DSIT) highlights the economic impact of cyber attacks in the UK. Key findings include: • The average cost of a “significant” cyber attack for a UK business is £195,000, with an estimated total impact on the economy of around £14.7 billion annually (approximately 0.5% of GDP). • The theft of intellectual property and knowledge assets via cyber attacks is projected to range from £1 billion to £8.5 billion in 2024. • Consumer-facing consequences are significant; for instance, a three-day outage of online banking services could result in costs between £5.5 million and £231 million. • In a worst-case scenario, a systemic cyber incident in the rail network could lead to costs of up to £1.8 billion from just one week’s disruption. Recommendations include: • Elevating cyber discussions to board level, given the clear financial stakes. • Strengthening foundational controls by implementing frameworks like Cyber Essentials and other best-practice governance. • Viewing cyber as integral to business continuity, innovation, and growth, rather than merely a cost centre. Link in comments 👇
21
6 Comments -
Phil Neray, CCSK
Multiple Companies • 5K followers
"Agents force a reckoning with a problem we've been half-solving for years. When deterministic code calls APIs, we have decent permissions systems. When humans predictably use tools, we have decent permissions systems. But when autonomous and non-deterministic systems that make decisions based on unstructured inputs call APIs … we're still figuring that out ... The solution probably looks like “permissions,” but not the kind we're used to (cough: RBAC). We need permissions that understand context and intent, not just identity and resource. We need monitoring, alerting, and audit trails so security teams can run agents in production without relying on "trust the model" assumptions. When something goes wrong, we need to trace what happened, why it happened, and what to change to prevent a repeat."
3
-
Md. Khaledul Islam
Cyber Shadow • 306 followers
OSINT is more than just "Googling" - it’s about connecting the dots. As an OSINT Practitioner, I am frequently asked: "What is the most important tool for digital investigations?" The answer isn't a specific software or a script. It is critical thinking. In the world of Open-Source Intelligence, the challenge isn't finding information - it is verifying it. Whether investigating a security breach or analyzing digital footprints, I follow three core principles: • Pivot Point Analysis: A single data point - like an old username or a unique CSS class on a website - is just the starting point used to pivot into larger data sets. • Verification (The Rule of Three): Never trust a single source. An investigation is only as strong as its verified evidence from multiple independent origins. • Digital Hygiene: A professional investigator must ensure they do not leave their own digital footprints behind during the process. Tools like Shodan, Maltego, and custom Python scripts are essential, but they only serve to support a solid investigative mindset. What is your most effective OSINT pivot point? Let’s discuss in the comments. #OSINT #CyberSecurity #DigitalInvestigations #EthicalHacking #Infosec #SocialEngineering #ThreatIntelligence
5
-
SCG South West
2K followers
The UK’s National Cyber Security Centre (NCSC) has launched the Vulnerability Research Initiative (VRI), a forward thinking program that will collaborate with third-party cybersecurity experts to enhance vulnerability research in both commodity and specialised technologies. Currently, the NCSC boasts a team of internal researchers with expertise in various technologies, conducting extensive vulnerability research across a wide range of products—ranging from traditional tech to specialised solutions utilised in niche environments. Read more about it here: https://lnkd.in/g8pxFC4i #CyberSecurity #VulnerabilityResearch #Innovation #UKTech
8
1 Comment
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content