Service Overview

Agile Threat Modeling

Agile Threat Modeling

Evaluating software architectures against security risk rules and generating mitigation advice in an agile fashion.

Read More
Application Pentest

Application Pentest

Attacking web applications, backends, APIs, and mobile apps in order to find vulnerabilities before others do.

Read More
Cloud Security Check

Cloud Security Check

Checking the security and hardening of your cloud infrastructure and services against best-practices.

Read More
Container Platform Review

Container Platform Review

Security review of your container orchestration platform (Kubernetes) as part of a defense-in-depth approach.

Read More
Architecture Consulting

Architecture Consulting

Security review of software architectures and system designs, defining a roadmap for improvement and hardening.

Read More
Attack Surface Mapping

Attack Surface Mapping

Identification and mapping of the public attack surface using reconnaissance, scanning, and OSINT techniques.

Read More
Secure SDLC Process Review

Secure SDLC Process Review

Security review of your Software Development Lifecycle Process (SDLC) as part of a defense-in-depth approach.

Read More
Whitebox Analysis

Whitebox Analysis

Security analysis of software via manual and semi-automated sourcecode audits with individual triage and risk report.

Read More

Keep up to date

Low-volume newsletter to announce new trainings, services & conference talks (about six mails per year):