Twenty Year Anniversary

Security Consulting Services

Security Training

Do your engineers understand the difference between cross site scripting and local file inclusion? Do you notice that there are some people who understand how the document object model works and some people who write java, but you cannot seem to hire one engineer who understands both? We can help! Packet Storm offers customized training classes on everything from secure network design to best practice coding principles.

Staff Augmentation

It is really hard to find qualified, capable security engineers. For us, we are always on the lookout. If you go on any job site, you will see every major corporation has positions open (and it seems they always do regardless of the state of the economy). So what happens when you cannot find those candidates? Or worse, what if you work for a company where it is too hard to make the case to upper management that you need a staff of security engineers full time to help remediate issues? Did you just get a PCI audit and have a large amount of issues to remediate but no one to help assist you? Do you have a six month project that you could really use two resources on just to ensure it launches securely? We can help.

MNA Security Oversight

Mergers and Acquisitions are a delicate specialty of the consultants at Packet Storm. Over the years, we noticed a trend. Company A would buy Company B and immediately after public announcement of the deal, Company B would get broken into by attackers realizing that they could now pivot into Company A. We have also noticed that many times a purchase of a company can be done based on revenue numbers regardless of analzying the costs of integrating a new asset securely. Decisions of this nature have to be handled in a timely and sensitive manner. As a general rule of thumb with the SEC and other governing bodies, Company A cannot see Company B's source code, look at their inner workings, etc, but as an impartial third party, we can help assist in analyzing a company before you sign on the dotted line. This helps streamline the process for getting the deal done and lets both parties know that a thorough analysis was performed to mitigate risk to either side.

Deliverables

Packet Storm delivers a detailed, comprehensive, and customizable report at the end of each security engagement. Reports typically include an executive summary, detailed technical findings with well defined proof of concepts, and recommended remediation steps.

Contact Us

All fields required First Name + Last Name



File Archive:

October 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    26 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    2 Files
  • 7
    Oct 7th
    3 Files
  • 8
    Oct 8th
    23 Files
  • 9
    Oct 9th
    16 Files
  • 10
    Oct 10th
    15 Files
  • 11
    Oct 11th
    19 Files
  • 12
    Oct 12th
    16 Files
  • 13
    Oct 13th
    2 Files
  • 14
    Oct 14th
    2 Files
  • 15
    Oct 15th
    15 Files
  • 16
    Oct 16th
    20 Files
  • 17
    Oct 17th
    19 Files
  • 18
    Oct 18th
    21 Files
  • 19
    Oct 19th
    16 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Recent News

News RSS Feed
Presidential Race In Brazil Marred By WhatsApp Scandal
Posted Oct 19, 2018

tags | headline, government, privacy, phone, facebook, brazil
jQuery Zero-Day Was Exploited For At Least Three Years
Posted Oct 19, 2018

tags | headline, hacker, flaw, patch
Equifax Exec Only Gets House Arrest For Hack Insider Trading
Posted Oct 19, 2018

tags | headline, hacker, data loss, fraud, identity theft
Campaign 2018: Artificial Intelligence Is Automating Attacks On Political Campaigns
Posted Oct 19, 2018

tags | headline, government, microsoft, usa, russia, fraud, cyberwar, google, facebook
Twitter Releases 10M Tweets, Reveals Decades Of Foreign Influence, Including Russia's Efforts in 2016 Election
Posted Oct 18, 2018

tags | headline, government, usa, russia, fraud, cyberwar, twitter
Tea Party Super PAC Group Spilled 500k Voters' Info All Over Web
Posted Oct 18, 2018

tags | headline, government, privacy, usa, data loss
LuminosityLink Spyware Mastermind Gets 30 Months In The Clink
Posted Oct 18, 2018

tags | headline, hacker, malware, cybercrime, fraud
Oceansalt Linked To Defunct Chinese APT Comment Crew
Posted Oct 18, 2018

tags | headline, hacker, government, malware, china, cyberwar
Oracle Releases Patch To Address Over 300 Security Issues
Posted Oct 17, 2018

tags | headline, linux, database, flaw, patch, oracle
LibSSH Flaw Leaves Thousands Of Servers At Risk Of Hijacking
Posted Oct 17, 2018

tags | headline, hacker, flaw, cryptography
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close