what you don't know can hurt you

Security Consulting Services

Security Training

Do your engineers understand the difference between cross site scripting and local file inclusion? Do you notice that there are some people who understand how the document object model works and some people who write java, but you cannot seem to hire one engineer who understands both? We can help! Packet Storm offers customized training classes on everything from secure network design to best practice coding principles.

Staff Augmentation

It is really hard to find qualified, capable security engineers. For us, we are always on the lookout. If you go on any job site, you will see every major corporation has positions open (and it seems they always do regardless of the state of the economy). So what happens when you cannot find those candidates? Or worse, what if you work for a company where it is too hard to make the case to upper management that you need a staff of security engineers full time to help remediate issues? Did you just get a PCI audit and have a large amount of issues to remediate but no one to help assist you? Do you have a six month project that you could really use two resources on just to ensure it launches securely? We can help.

MNA Security Oversight

Mergers and Acquisitions are a delicate specialty of the consultants at Packet Storm. Over the years, we noticed a trend. Company A would buy Company B and immediately after public announcement of the deal, Company B would get broken into by attackers realizing that they could now pivot into Company A. We have also noticed that many times a purchase of a company can be done based on revenue numbers regardless of analzying the costs of integrating a new asset securely. Decisions of this nature have to be handled in a timely and sensitive manner. As a general rule of thumb with the SEC and other governing bodies, Company A cannot see Company B's source code, look at their inner workings, etc, but as an impartial third party, we can help assist in analyzing a company before you sign on the dotted line. This helps streamline the process for getting the deal done and lets both parties know that a thorough analysis was performed to mitigate risk to either side.

Deliverables

Packet Storm delivers a detailed, comprehensive, and customizable report at the end of each security engagement. Reports typically include an executive summary, detailed technical findings with well defined proof of concepts, and recommended remediation steps.

Contact Us

All fields required First Name + Last Name



File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    12 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Recent News

News RSS Feed
Google Play Bans Stalkerware And Misrepresentation
Posted Sep 18, 2020

tags | headline, privacy, phone, fraud, google, spyware
FBI Opens China-Related Counter Intelligence Case Every 10 Hours
Posted Sep 18, 2020

tags | headline, hacker, government, usa, china, data loss, cyberwar, fbi
Game Firms Targeted As Part Of Global Hacking Plot
Posted Sep 17, 2020

tags | headline, hacker, government, usa, china, cyberwar
Tony Abbott Hacked After Posting Boarding Pass On Instagram
Posted Sep 17, 2020

tags | headline, hacker, government, australia, facebook
North Korean And Russian Cybercriminals Are Cooperating
Posted Sep 17, 2020

tags | headline, hacker, government, malware, russia, cybercrime, fraud, korea
Hackers Are Launching Fresh Attacks Against Universities
Posted Sep 17, 2020

tags | headline, hacker, malware
US Charges Five Hackers Part Of Chinese State-Sponsored Group APT41
Posted Sep 16, 2020

tags | headline, hacker, government, usa, china, data loss, cyberwar
Dunkin Donuts Glazes Over Customer Data Loss In Lawsuit
Posted Sep 16, 2020

tags | headline, hacker, privacy, data loss
Accidental Airbnb Account Takeover Linked To Recycled Phone Numbers
Posted Sep 16, 2020

tags | headline, hacker, phone, password
Bluetooth Spoofing Bug Affects Billions Of IoT Devices
Posted Sep 16, 2020

tags | headline, wireless, flaw
View More News →
packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close