Kubernetes & Container Security Consulting

We’ve moved from hub and spoke network technologies, to servers, to virtualization, to cloud, and now we are graduating to container technologies using Docker and Kubernetes.  With this new evolution in technology brings new security review...

What Does a vCISO do?

If you want an information and cyber security leader, but don’t’ want to afford or be burdened by a full-time employee, a virtual CISO can be a great solution.  But without the leadership of a CISO, how do you know what the vCISO should do? It’s...

How Much Does a vCISO Cost?

You’re in charge of protecting the company’s assets and reputation. You have critical and sensitive information and you have regulation requirements you need to attest to and meet. You need someone that can manage this responsibility and lower risk without...

Overlooked Benefits of Hiring a vCISO

  The role of a CISO is critical within a business that has significant risk and needs to implement and maintain an operational security program. But hiring this role is expensive, and it can be hard to qualify and identify the right candidate.    A...

Minnesota Cybersecurity Companies

Minnesota is a hotbed of cybersecurity talent. To access that amazing talent, you should partner with a local cybersecurity company.  If you’re looking to for cybersecurity help with advisory services, consulting, or initiatives and want to support local...
When to Pen Test an Application?

When to Pen Test an Application?

Security testing developer applications Do you have an application that was developed to purchased and you’re wrestling with whether to pay for it to be security tested or not? So when should you penetration test an application? You should pen test an...