Evaluating software architectures against security risk rules and generating mitigation advice in an agile fashion.
Read MoreAttacking web applications, backends, APIs, and mobile apps in order to find vulnerabilities before others do.
Read MoreChecking the security and hardening of your cloud infrastructure and services against best-practices.
Read MoreSecurity review of your container orchestration platform (Kubernetes) as part of a defense-in-depth approach.
Read MoreSecurity review of software architectures and system designs, defining a roadmap for improvement and hardening.
Read MoreIdentification and mapping of the public attack surface using reconnaissance, scanning, and OSINT techniques.
Read MoreSecurity review of your Software Development Lifecycle Process (SDLC) as part of a defense-in-depth approach.
Read MoreSecurity analysis of software via manual and semi-automated sourcecode audits with individual triage and risk report.
Read MoreLow-volume newsletter to announce new trainings, services & conference talks (about six mails per year):