Skip to Main Content

Manage risk, ensure compliance, and empower business

Design an exceptional, custom security program alongside our security experts.

Protect sensitive data, systems, and infrastructure

Well-designed security programs strengthen defenses, reduce risk, and prevent unauthorized access.

Security design services

Discover services to design a more effective security program.

Loading...

Security expertise meets security passion

Meet the talented, security-obsessed team invested in achieving your goals.

“Weaving risk, group theory, and adaptation with business strategy is one way we stand out.”
Rockie BrockwayDirector of Advisory Innovations
Blog

The First Steps on Your Zero Trust Journey

Find out how the NIST 800-207 framework is a starting point that demystifies Zero Trust.

Practical cybersecurity thought-leadership

Discover our experts’ innovative blogs, webinars, podcasts.

Webinars September 25 2024

BEC Basics: Your First Step to Thwarting Email Scams

Attackers never stop evolving their business email compromise (BEC) tactics, leveraging phishing, credential harvesting, and email spoofing to infiltrate…

Read about this article
Blog September 19 2024

Console Cowboys: Navigating the Modern Terminal Frontier

In our little niche corner of technology, it’s hard not to get excited about all the new command line interface (CLI) tools popping up all the time. I decided…

Read about this article
Blog September 17 2024

How to Get the Most Out of a Pentest

TL;DRDefine the goal of an assessment.Take time to choose the right assessment type.The more detail you give about an asset, the better quality your report…

Read about this article
Blog September 12 2024

Putting Our Hooks Into Windows

We're back with another post about common malware techniques. This time we are talking about setting Windows hooks. This is a simple technique that can be used…

Read about this article
Podcasts September 06 2024

Security Noise - Episode 7.1

CrowdStrike After Action

Read about this article
Blog September 03 2024

When on Workstation, Do as the Local Browsers Do!

1    IntroductionWeb browsers are common targets for many different APTs. Tools like Redline Malware or penetration testing tools such as SharpChrome or…

Read about this article
Blog August 29 2024

Gobbling Up Forensic Analysis Data Using Velociraptor

Lately I have been working with Velociraptor for its endpoint and digital forensic capabilities and specifically spent time in many cases in the past two years…

Read about this article
Blog August 22 2024

The Hunter’s Workshop: Mastering the Essentials of Threat Hunting

As an incident unfolds, skilled threat hunters with a special talent for uncovering hidden threats stand at the ready. These hunters smoke jump into the chaos…

Read about this article
Webinars August 21 2024

Understanding and Documenting PCI DSS Scope

As new PCI DSS guidance emerges, the expectations placed on auditors and the entities they assess are evolving. New requirement 12.5.2 defines scope…

Read about this article
Blog August 15 2024

Oops I UDL'd it Again

IntroductionPhishing. We all love phishing. This post is about a new phishing technique based on some legacy knowledge I had that can be used to get past email…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.