Non-intrusive scanning and evaluation of servers, websites, applications, and devices.
Take vulnerablity scanning to the next level with attempts to compromise your systems or networks.
Get custom advising on how to secure your networks, servers, and communications, or build your new network securely from the ground up.
Evaluate cloud products, deployments and service providers for your security and privacy needs.
Why you won't find me on social media...
Advertisers, employers (and
prospective employers), intelligence agencies, and many other entities use
social media accounts as a boon of information about individuals. In
addition, in most cases, social media companies OWN the information
that users put into their services. In many cases, users can't trust that
their information will be deleted when they leave the platform (and not used
for "profiling"). I believe that users have a right to control their own
information and to decide who profits from it and when.
There are some excellent resources out there that discuss this topic at
length. A few for your perusal:
Social Media: Trust, Distrust & Privacy
Bruce Schneier On Privacy and the Data Free For All
Data and Goliath
I Am Not a Gadget
Social Networking Privacy
All that said, I also recognize that there are compromises we have to make to live effectively in a society. To find my way in new cities, I use google maps, to collaborate with my partner, I use other google services. I'm considering using linked-in for an upcoming job hunt. Though I believe its important to be purposeful in my decisions, I also recognize there's a danger in taking myself too seriously. Ideology should be a means, not an end -- the people and the lives that we live with them are what's important to me these days. Buildings and bridges have to bend in the wind.