SERVICES WITHIN cyber security
service offerings - descriptions
Below you find descriptions of all our services.
Click on an icon for more information on a specific service.
Please contact us, if you have any challenges or needs you would like to discuss.
Tech Blog and Cyber Blog
We continuously publish findings, perspectives and discussions on our two blogs.Subscribe to our newsletter to keep updated on current and future development within IT security.
Tech Blog
Here We’re posting technical subjects
Cyber Blog
Here We’re posting non-technical subjects
Many organizations, either unknowingly or due to specific business requirements, have unwittingly exposed potential attack surfaces within their Azure Tenants. This situation arises due to the inherent features and functionalities of Guest and Collaboration settings. These vulnerabilities are difficult to recognize, even when detection measures are in operation.
To highlight this issue and the dangers of potentially flawed configurations, Security Advisor Jimmie Berk explains in a new white paper why many configurations, including the default, are not secure.
Register below to receive access to the full white paper, including a key take-aways section with specific configurations to improve your security posture.