We enjoy looking at devices, networks and applications (including mobile) for vulnerabilities and weaknesses. Let us tear apart your product to see what risks you might be exposing yourself to when it goes live.
The saying goes that you should know your enemy like you know yourself.
We disagree - we'd rather know absolutely everything there is to know about ourselves before spending a minute on figuring out that an attacker might be based in Beijing, Boston or Berlin.
We look at what is important and relevant to our customers and understand that they might only have five seconds to understand and rely to your stakeholders why a threat is a threat. That is why we produce Threat Advisories that give you exactly that; a five second overview.
The Threat Advisory doesn't stop there because we also realise that sometimes you need to really know whats going on, and trawling through technical reports and jargon heavy white papers is not an efficient use of your time.
The high-level summary breaks that down into relatable terms and uses a scoring model that is understandable and not based on a 100 point, multi-factored nightmare. If something is Medium Severity we explain why, not just because the categories added up to 6,8.
We also include a visual guide of what is and is not affected, what can be used to minimise the risk and what is utterly useless in combating this threat, and how effective they are.
Of course all of the technical details are there, along with remediations that are relevant to the security controls that you use. While it is interesting that a group of cyber criminals are targeting traveling executives with malware at hotels, what is important to you is how to detect that with the tools that are available to you.