Secure Cloud Transformation in(to) AWS, Azure, and GCP
NIS 2, DORA, CRA, KRITIS/Critical Infrastructures, ISMS/ISO 27001, Data Protection with a legal background
External and Internal Vulnerability Scanning & Vulnerability Management
Code Audits, Secure Software Development & Security CI/CD Pipelines
Actionable, Efficient & Consumable
If need be, we do the testing (e.g. Web Apps/APIs), but mostly we evaluate pentest reports and rebuild pentesting programs
We'll be in touch.