The broad definition of offensive security includes several offensive but ethical activities aimed at identifying flaws and vulnerabilities by, for example, carrying out targeted attacks against software, systems and services. These services are carried out like an attacker who has gathered information from public or closed sources of information or through assigned detailed information for the mission.
The number of IT attacks is increasing every day and the costs can be devastating. Penetration tests of your external infrastructure, web applications and internal IT environments identify weaknesses and opportunities for attackers to take over your domain.
External Exposure Analysis
It is not always easy to know how much is exposed to the internet. Want to get the same perspective and insight into your attack surface that a real attacker has?
Red Teaming Exercise
During a Red Teaming execution, you will get a total analysis of your company from an attacker’s point of view. You may have an almost openable external environment, but what about your physical security?
How much information from your company is available online? More than you think, we’d say – social media, open source, leaked passwords and more. We help you assess potential threats and malicious events that need to be addressed – before they happen.
When acquiring a company, it is essential to carry out a proper investigation of the new company’s security status. We can ensure that this company has a sufficiently secure environment for it to be connected to your infrastructure.
Andreas is a full stack developer with an emphasis on frontend who likes new technology. He has experience in various programming languages, technologies, industries and platforms - from mobile to application and web. In previous assignments, he has also worked in both Scrum and SAFe.
Andreas RothCyber Security Specialist
Aron's expertise is network security and he has extensive experience with Fortinet's security solutions.
He is adept at Advanced Threat Projection and firewalls and likes new challenges
Aron TydénCyber Security Consultant
Jesper is a committed and passionate IT security specialist with several years of industry experience. who has worked in multiple sectors within IT. He is driven, inventive and likes to enhance the strengths of his colleagues and completes a team with his good humor.
Jesper CzapnikCybers Security Consultant
Jesse likes new challenges and is always aiming to learning and develop new skills. He has experience from various fast-paced projects and can easily juggle several simultaneous tasks. He is a relaxed person who has a calming effect on the team.
Jesse WatsonSenior Cyber Security Specialist
Jon is a driven, inclusive and passionate IT security specialist who always has a smile on his face. Throughout his years as a professional IT security expert, he has worked in most sectors and is a skilled presenter for both small and large groups.
Jon JezierskiSenior Cyber Security Specialist
Mattias is a smiling guy who laughs a lot and appreciates meeting and including new people. During his time in IT security, he has worked globally and traveled the world to perform a variety of penetration tests.
Mattias DöjSenior Cyber Security Specialist
Patrik has many years of experience working with IT security from multiple perspectives. His technical knowledge is both deep and broad as his curiosity and creative ability easily take on new tasks. Over the years, he has had time to work in several different sectors where he had several different areas of responsibility.
Patrik JezierskiSenior Cyber Security Specialist
How to think and work with application security
Most of us understand that security is important but don’t really know how and where to start. In this webinar, we will talk about application security with a focus on bringing security into the development process, the common attacks, etc.