Skip to Main Content

Manage risk, ensure compliance, and empower business

Design an exceptional, custom security program alongside our security experts.

Protect sensitive data, systems, and infrastructure

Well-designed security programs strengthen defenses, reduce risk, and prevent unauthorized access.

Security design services

Discover services to design a more effective security program.

Loading...

Security expertise meets security passion

Meet the talented, security-obsessed team invested in achieving your goals.

“Weaving risk, group theory, and adaptation with business strategy is one way we stand out.”
Rockie BrockwayDirector of Advisory Innovations
Blog

The First Steps on Your Zero Trust Journey

Find out how the NIST 800-207 framework is a starting point that demystifies Zero Trust.

Practical cybersecurity thought-leadership

Discover our experts’ innovative blogs, webinars, podcasts.

Webinars February 11 2025

2024 Conference Roundup

Join our panelists David Kennedy, Justin Elze, Jason Lang, and Oddvar Moe for their firsthand accounts and perspectives on what people were talking about at…

Read about this article
Blog February 06 2025

The Hidden Trap in the PCI DSS SAQ A Changes

The Payment Card Industry Security Standards Council (PCI SSC) just announced a change to Self Assessment Questionnaire A (SAQ A). The change eliminates two…

Read about this article
Podcasts February 04 2025

Security Noise - Episode 7.10

Authentication in 2025

Read about this article
Blog January 23 2025

Operating Inside the Interpreted: Offensive Python

IntroductionEvery once in a while, I get the urge to go back and revisit older techniques that used to be popular but have fallen out of favor with the…

Read about this article
Podcasts January 17 2025

Security Noise - Episode 7.9

On this episode of the Security Noise Podcast, we discuss user enumeration on Azure and "presence data" in Microsoft Teams with nyxgeek.

Read about this article
Webinars January 15 2025

DOD Contract Compliance: DFARS 7012 and CMMC

Advisory Compliance Practice Lead Chris Camejo will take a deep dive into the Department of Defense requirements for protecting FCI and CUI.

Read about this article
Blog January 14 2025

Command Line Underdog: WMIC in Action

My typical engagements are mostly Red Teams, so I do not often get a chance to play with terminal server application breakouts—but on a recent engagement, I…

Read about this article
Blog January 07 2025

Solving NIST Password Complexities: Guidance From a GRC Perspective

Not another password change! Isn’t one (1) extra-long password enough? As a former Incident Response, Identity and Access Control, and Education and Awareness…

Read about this article
Podcasts December 20 2024

Security Noise - Episode 7.8

Farewell 2024

Read about this article
Blog December 19 2024

Malware Series: Process Injection Mapped Sections

We're back with another post about common malware techniques. This time, we are talking about using shared memory sections to inject and execute code in a…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.