Category Archives: News

The Significance of October

  Coming up half-way through the month of October, there is a sense of growing anticipation with the holiday season almost upon us. While it is easy to neglect October as simply the bridge month for our turkey dinners or creamy eggnogs, it has more significance than most would think. And no, I am not…

Interview tips from a Senior Security Leader

First off I would like to thank Anshu Gupta for allowing us to republish his article. Anshu has experience working at some of the biggest names in tech here in the USA and has sat on both sides of the table so his insight is invaluable. When I read it I thought it had some great advice…

Speaking at IANS CISO Roundtable

We are excited to announce that one of our Co-Founders Kris Rides will be speaking at the IANS CISO Round-table event in Downtown Los Angeles on Tuesday 15th May. Kris will be discussing “Overcoming Challenges to Build a High Performing Team” with a select group of CISOs. During this 1:1 interview, IANS CEO Phil Gardner will…

SXSW 2018 – Speaking on IoT Security

Tiro Security Co-Founder and Head of Penetration Testing, Rob Pope will be speaking at the world renowned SXSW Conference in Austin, TX on the 14th March 2018. Rob will be infusing some of his British humor into the talk entitled Internet of Scary Things: Botnet in a Box.  For more information please click here. We have posted these before but here…

Speaking at OWASP LA – February Meeting

We are excited to announce that Justin Regele one of our amazing Penetration Testers will be speaking at the OWASP Los Angeles meeting on Wednesday 28th February. Justin’s talk is titled: Better Git Hacking: Extracting “Deleted” Secrets from Git Databases with Grawler Grawler is a command line utility written in Bash and Python that crawls the…

Speaking at SchmooCon

We are excited to announce that Justin Regele one of our amazing Penetration Testers will be speaking at ScmooCon on Saturday 20th  January. Justin’s talk is titled: Better Git Hacking: Extracting “Deleted” Secrets from Git Databases with Grawler Grawler is a command line utility written in Bash and Python that crawls the object trees of a…

Zero-Day alert: Spectre and Meltdown Widespread Hardware Vulnerability

Your computer, your phone, your tablet, your TV server: if it has a computer chip and can be accessed, it is vulnerable to Spectre and Meltdown. These are the names of data security vulnerabilities found in the physical hardware that is used in nearly all computers and handheld devices dating back over 20 years. Companies…

Speaking today on IoT Security

With the recent launch of Amazon Key the visibility around Smart Homes and IoT Security is an even hotter topic.  Insecure IoT devices are helping to create some of the largest botnet networks we have ever seen.  These networks are being used to spread malware and create a huge platform for distributed denial-of-service (DDoS) attacks which take down…

All they need is a click!

Clickbait malware sites “You No Longer Need To Be A Member To Shop In Their Stores” (1) “NASA Confirms Earth Will Experience 15 Days of Complete Darkness in November” (2) “First she did this, and then you won’t believe what happened!” If you visit any social media, news sites, or see advertisements online, you will…

DEF CON: a Glimpse into the Largest IT Security Convention!

The largest, oldest, and most well-known convention for all things IT Security is DEF CON, which is currently being held in Las Vegas, Nevada! DEF CON began in 1993 as the first hacking convention. It was originally brainstormed as a going-away party for Platinum Net, which was an old hacking network once based in Canada….