Attacking web applications, backends, APIs, and mobile apps in order to find vulnerabilities before others do.
Read MoreChecking the security and hardening of your cloud infrastructure and services against best-practices.
Read MoreSecurity review of your container orchestration platform (Kubernetes) as part of a defense-in-depth approach.
Read MoreIdentification and mapping of the public attack surface using reconnaissance, scanning, and OSINT techniques.
Read MoreSecurity review of your Software Development Lifecycle Process (SDLC) as part of a defense-in-depth approach.
Read MoreSecurity analysis of software via manual and semi-automated sourcecode audits with individual triage and risk report.
Read MoreLow-volume newsletter to announce new trainings, services, and conference talks (about six mails per year)