what you don't know can hurt you

Security Consulting Services

Security Training

Do your engineers understand the difference between cross site scripting and local file inclusion? Do you notice that there are some people who understand how the document object model works and some people who write java, but you cannot seem to hire one engineer who understands both? We can help! Packet Storm offers customized training classes on everything from secure network design to best practice coding principles.

Staff Augmentation

It is really hard to find qualified, capable security engineers. For us, we are always on the lookout. If you go on any job site, you will see every major corporation has positions open (and it seems they always do regardless of the state of the economy). So what happens when you cannot find those candidates? Or worse, what if you work for a company where it is too hard to make the case to upper management that you need a staff of security engineers full time to help remediate issues? Did you just get a PCI audit and have a large amount of issues to remediate but no one to help assist you? Do you have a six month project that you could really use two resources on just to ensure it launches securely? We can help.

MNA Security Oversight

Mergers and Acquisitions are a delicate specialty of the consultants at Packet Storm. Over the years, we noticed a trend. Company A would buy Company B and immediately after public announcement of the deal, Company B would get broken into by attackers realizing that they could now pivot into Company A. We have also noticed that many times a purchase of a company can be done based on revenue numbers regardless of analzying the costs of integrating a new asset securely. Decisions of this nature have to be handled in a timely and sensitive manner. As a general rule of thumb with the SEC and other governing bodies, Company A cannot see Company B's source code, look at their inner workings, etc, but as an impartial third party, we can help assist in analyzing a company before you sign on the dotted line. This helps streamline the process for getting the deal done and lets both parties know that a thorough analysis was performed to mitigate risk to either side.

Deliverables

Packet Storm delivers a detailed, comprehensive, and customizable report at the end of each security engagement. Reports typically include an executive summary, detailed technical findings with well defined proof of concepts, and recommended remediation steps.

Contact Us

All fields required First Name + Last Name



File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    9 Files
  • 26
    Nov 26th
    11 Files
  • 27
    Nov 27th
    15 Files
  • 28
    Nov 28th
    9 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files
packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close