Services

Host Remediation

All forms of internet badness are physically hosted somewhere.

Sounds simple, but how do you find it and remove it? That's not so simple. Hosting of malware, exploits and their control centers has become increasingly sophisticated. So much so that web hosts are often blocked from scanning content on their own network. Even if they can scan all content on their servers, most exploits won't ...

Read more...

Botnet Analysis

Botnets have existed for some time, but the landscape has dramatically changed.

Botnets now operate purely on economic or political grounds. They are traded and retraded in the same way that insurance is reinsured, with every slave machine representing a unit of money. A large botnet will typically have dozens of individuals involved in its operation at some level, each taking on their sha...

Read more...

Corporate Alerts

CyberDefcon offers a suite of customizable alert services according to client need. From real-time intelligence on a broad array of cyber threats to tailored alerts on specific threats or vulnerabilities, the CyberDefcon alert service provides appropriate and trustworthy information to warn your organization when you are at risk.

Corporate and client alerts are informative, easy to underst...

Read more...

Application Testing

CyberDefcon offers a comprehensive suite of application security solutions tailored to the needs of your individual organization. We won't offer you a 'one size fits all' approach as used historically by most in the industry. Instead, we offer realistic solutions to real threats. Solutions that are appropriate to the individual needs of your organization. Solutions that match the hybrid att...

Read more...

Penetration Testing

CyberDefcon provides Penetration Testing as part of a comprehensive suite of audit tools designed to rigorously test your infrastructure. Whether it's a private network or a public-facing application, we identify vulnerabilities and weaknesses both at system and procedural level. That is, we not only locate vulnerabilities in your software but also in the procedures of the people administra...

Read more...

Risk Assessments

The conundrum facing enterprises today is how to effectively manage risk when the threat is constantly changing. Many of the methods used to-date have provided little success for businesses at risk; cybercrime and data breaches are at an all-time high.

A new approach

CyberDefcon has a different approach. With proactive methods of tracking evolving threats - derived from our extensive wo...

Read more...