We enjoy looking at devices, networks and applications (including mobile) for vulnerabilities and weaknesses. Let us tear apart your product to see what risks you might be exposing yourself to when it goes live.
The saying goes that you should know your enemy like you know yourself. We disagree - we'd rather know absolutely everything there is to know about ourselves before spending a minute on figuring out that an attacker might be based in Beijing, Boston or Berlin.
Incident triage is the assessment of an event to determine the severity, the priority and escalation paths, if required. Attack attribution is a key skill to have when performing incident triage. Understanding where the attack, or attackers, is from often allows us to understand intention, and attackers common tactics, techniques and procedures (TTP's) used. Our approach is influenced by the United States Air Force “OODA Loop” methodology through which we endeavor to shape operations by rapidly acquiring and internalizing information about the situation. Paramedics and other first responders have adopted the Simple Triage and Rapid Treatment (START) casualty sorting system when first on scene. This allows the first responder to focus activities in often chaotic and confusing environments. This approach works well for cyber incidents when large systems, or networks, are involved. Using our threat intelligence experience and global visibility, we can help you respond and recover from incidents when they happen.