Whatever you hire us for you can be confident that we know how to do the job, and we know how to do it well. We hold certificates in all the work that we do to prove it.
GIAC Certified Penetration Tester (GPEN)
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
Offensive Security Certified Professional (OSCP)
GIAC Certified Intrusion Analyst (GCIA)
Certified Information Systems Security Professionals (CISSP)
ISO/IEC 27001 Lead Auditor
Certified Information Systems Auditor
Certified in Risk and Information Systems Control
We Do Research
We are constantly doing research. We take things apart and see how they work. When we are done, we see if we can break them. It’s that simple. If we find something interesting, we share it. You can find some of the things that we have shared in PC World, Computer World, Network Work, IT Work, Light Reading, SDXCentral, and Techtarget.
We Discover Zero-Days
During our research, we often find vulnerabilities. Many we can tell you about such as Opendaylight, Cumulus Linux, and rConfig. Others we can’t like the critical issue that we found in the EC-Council Website. Public or not, if there are vulnerabilities there, we will find them.
We Present Internationally
If it is really cool, they let us present it. We’ll show up at Defcon, Blackhat, and conferences all over Europe and Asia.
Top Ten Network Security Tips
Wondering what the "best practices" are for securing your network?
There is a very informative document called "The 60 Minute Network
Security Guide" on the National Security Agency Web site (www.nsa.gov).
Here's a brief summary