exploit the possibilities

Security Consulting Services

Security Training

Do your engineers understand the difference between cross site scripting and local file inclusion? Do you notice that there are some people who understand how the document object model works and some people who write java, but you cannot seem to hire one engineer who understands both? We can help! Packet Storm offers customized training classes on everything from secure network design to best practice coding principles.

Staff Augmentation

It is really hard to find qualified, capable security engineers. For us, we are always on the lookout. If you go on any job site, you will see every major corporation has positions open (and it seems they always do regardless of the state of the economy). So what happens when you cannot find those candidates? Or worse, what if you work for a company where it is too hard to make the case to upper management that you need a staff of security engineers full time to help remediate issues? Did you just get a PCI audit and have a large amount of issues to remediate but no one to help assist you? Do you have a six month project that you could really use two resources on just to ensure it launches securely? We can help.

MNA Security Oversight

Mergers and Acquisitions are a delicate specialty of the consultants at Packet Storm. Over the years, we noticed a trend. Company A would buy Company B and immediately after public announcement of the deal, Company B would get broken into by attackers realizing that they could now pivot into Company A. We have also noticed that many times a purchase of a company can be done based on revenue numbers regardless of analzying the costs of integrating a new asset securely. Decisions of this nature have to be handled in a timely and sensitive manner. As a general rule of thumb with the SEC and other governing bodies, Company A cannot see Company B's source code, look at their inner workings, etc, but as an impartial third party, we can help assist in analyzing a company before you sign on the dotted line. This helps streamline the process for getting the deal done and lets both parties know that a thorough analysis was performed to mitigate risk to either side.

Deliverables

Packet Storm delivers a detailed, comprehensive, and customizable report at the end of each security engagement. Reports typically include an executive summary, detailed technical findings with well defined proof of concepts, and recommended remediation steps.

Contact Us

All fields required First Name + Last Name



File Archive:

February 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    22 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    2 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    50 Files
  • 6
    Feb 6th
    24 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    6 Files
  • 9
    Feb 9th
    1 Files
  • 10
    Feb 10th
    1 Files
  • 11
    Feb 11th
    22 Files
  • 12
    Feb 12th
    25 Files
  • 13
    Feb 13th
    16 Files
  • 14
    Feb 14th
    32 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    10 Files
  • 17
    Feb 17th
    2 Files
  • 18
    Feb 18th
    27 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Recent News

News RSS Feed
GAO Gives Congress Go-Ahead For A GDPR-Like Legislation
Posted Feb 16, 2019

tags | headline, government, privacy, usa
FB Tackles Databases Leaking Over A Million User Records
Posted Feb 15, 2019

tags | headline, privacy, database, data loss, flaw, facebook
Facebook May Face Multi-Billion Dollar US Fine Over Privacy Lapses
Posted Feb 15, 2019

tags | headline, government, privacy, usa, data loss, fraud, facebook
Mobile Networks Call For 5G Security Inspector
Posted Feb 15, 2019

tags | headline, phone
JP Morgan Is Creating A Cryptocurrency Pegged To The Dollar
Posted Feb 15, 2019

tags | headline, bank, usa, cryptography
Thousands Of Android Apps Permanently Record Your Online Activity For Ad Targeting
Posted Feb 15, 2019

tags | headline, privacy, phone, data loss, google, spyware
Lenovo Watch X Riddled With Security Vulnerabilities
Posted Feb 14, 2019

tags | headline, flaw
Critical OkCupid Flaw Exposes Daters To App Takeovers
Posted Feb 14, 2019

tags | headline, privacy, flaw
How Google Tracks Hackers
Posted Feb 14, 2019

tags | headline, hacker, google
MacOS Trojan Disables Gatekeeper To Deploy Malicious Payloads
Posted Feb 14, 2019

tags | headline, malware, trojan, apple
View More News →
packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close