SERVICES WITHIN cyber security

service offerings - descriptions

Below you find descriptions of all our services.
Click on an icon for more information on a specific service.
Please contact us, if you have any challenges or needs you would like to discuss.


Tech Blog and Cyber Blog

We continuously publish findings, perspectives and discussions on our two blogs.
Subscribe to our newsletter to keep updated on current and future development within IT security.

Protecting the frontline building a secure Windows 10 client

Tech Blog

Here We’re posting technical subjects

Cyber Blog Improsec

Cyber Blog

Here We’re posting non-technical subjects


MorningTech offers single-servings of hot cyber security topics to directors, CISO’s and IT professionals.  Get valuable insights on technical and strategic issues during your morning commute. Click here read more and register for the upcoming episode.


Many organizations, either unknowingly or due to specific business requirements, have unwittingly exposed potential attack surfaces within their Azure Tenants. This situation arises due to the inherent features and functionalities of Guest and Collaboration settings. These vulnerabilities are difficult to recognize, even when detection measures are in operation.

 To highlight this issue and the dangers of potentially flawed configurations, Security Advisor Jimmie Berk explains in a new white paper why many configurations, including the default, are not secure.

Register below to receive access to the full white paper, including a key take-aways section with specific configurations to improve your security posture.

Register to download here.


Sign up for OUR Newsletter