Open skorov opened 1 year ago
Ready for your review @skorov - https://github.com/shannaniggans/cyberanode/blob/main/pending-company-listing/volkis/volkis.md
Looks great! <3
@Rainbow-Boo - can you please do a review and comment here when you are done and happy
https://github.com/shannaniggans/cyberanode/blob/main/pending-company-listing/volkis/volkis.md
To register, companies must meet the following criteria:
Information to provide:
Company Details
Organisation Profile
The following is information about the products and services that you provide.
Penetration Testing
Service_category: Penetration testing We use the same hacking tools and techniques as attackers do to find as many vulnerabilities at possible. These vulnerabilities are always tied back to business impact to provide a realistic assessment of your security posture. We perform the following types regularly, but are not restricted to just these:
Red Team / Adversary simulation
Service_category: Adversary emulation / red team As close to a real-world hack as you're (legally) going to get. We employ the same tools, techniques, and attacks that real adversaries use and go after business-level objectives. This exercises tests your detection and response capabilities over a period of typically 2-4 months.
Social Engineering
Service_category: Training & education Using either email (phishing), phone calls (vishing), text messages (SMishing), or malicious USB drops, we try to trick your employees into providing credentials or running malware. By creating a new, custom campaign each time, employees get the hang of detecting future, real social engineering attempts.
Physical Intrusion
Service_category: Penetration testing Your on-prem systems are only as secure as the physical protections. We try to break into your offices/warehouses/buildings by using a combination of physical attack & bypass tools, and social engineering.
Security Review
Service_category: Not sure Make life harder for attackers by strengthening the security of your most critical environments such as Windows 11/MacOS SOE, Active Directory, Microsoft 365, AWS, Azure Cloud, and Kubernetes.
Compliance
Service_category: Governance, Risk, and Compliance Ensure you're compliant to a particular framework such as the ACSC Essential 8 Maturity Model, ISO27001, or NIST Cybersecurity Framework. We help you get to an audit-ready state.
Submission Guidelines
Additional Notes
I really hope this takes off! It's so badly needed in the industry right now.