security driven by research

Adversaries are always finding new vulnerabilities and developing new tactics, so we do the same.

We leverage our original research and innovation to help organizations secure assets through our core services: blue team training and consulting, vulnerability analysis, security and data engineering, pentesting and red team services.
 Blue Team Training and Consulting

In-person and web-based training, remote and onsite consulting, can custom tailor to meet customer needs.

  • Threat-hunting

  • Malware analysis

  • Incident-response

  • Threat intelligence analysis

Vulnerability Analysis
Independent vulnerability research including:

  • Detection of known "N" day vulnerabilities

  • Discovery of new "0-day" vulnerabilities

  • Risk analysis related to vulnerabilities

  • Assistance in developing patches and mitigations

 Security and Data Engineering

Design and engineer security infrastructure:

  • Network security including IDS, IPS, Firewalls

  • Logging from Windows Events, Sysmon, Linux, and Mac OS

  • SIEMs including data ingest and Sigma rules, Elastic ELK or Splunk

  • Industrial Control Systems (ICS) and Operation Technology (OT)

Red Team and Penetration Testing Services
Full spectrum support for evaluating security posture:

  • Audits and documentation assistance

  • Network pentesting

  • Emulation of Advanced Persistent Threats (APT) with Mitre ATT&CK Framework