Security Driven by Research

Adversaries are always finding new vulnerabilities and developing new tactics, so we do the same.

We leverage our original research and innovation to help organizations secure assets. Our core services include: blue team training and consulting, vulnerability analysis, security and data engineering, pen-testing and red team services.

In-person and web-based training, remote and onsite consulting, custom tailored to meet your needs.

  • Threat-hunting

  • Malware analysis

  • Incident-response

  • Threat intelligence analysis

Independent vulnerability research including:

  • Detection of known "N" day vulnerabilities

  • Discovery of new "0-day" vulnerabilities

  • Risk analysis related to vulnerabilities

  • Assistance in developing patches and mitigations

  • Industrial Control Systems (ICS) or Internet of Things (IoT) devices

  • App-sec consulting to "bake in" security

Design and engineer security infrastructure:

  • Network security including IDS and Firewalls

  • Logging from Windows Events and Sysmon, Linux and Mac OS logs

  • SIEMs including data ingest and Sigma rules, Elastic ELK, Splunk

  • Securing Industrial Control Systems (ICS) and Operational Technology (OT) environments

Full spectrum support for evaluating security posture:

  • Audits and governance policy or documentation assistance

  • Network pen-testing

  • Red team emulation of Advanced Persistent Threats (APT) following Mitre ATT&CK Framework