Resources

Security News

Loading...
------------------------------------------------------------------------
CDF Security Inc. is an independent security research, development and consulting firm.  We perform security audits, penetration tests and compliance analyses.  Our services include guidance for security procedures and incident response.

              

Remember, your security depends on others...

We believe that security needs to be an integral part of every organization and should be affordable.  We offer customized security services and access to an information security expert.  Under a fixed-cost agreement, CDF Security will:

  1. Gather information to create a security risk profile for your systems.
  2. Provide customized security patching guidance explaining when and where patches should be applied.
  3. Recommend alternative controls when they offer an equally effective solution at a lower cost.
  4. Supply a monthly security awareness newsletter to educate employees about security risk and provide viable solutions to eliminate the risk.
  5. Consult on best practice security solutions.
  6. Create comprehensive security procedures for employees and support organizations.
  7. Assist with proactive audit preparation and design effective remediations which balance business processes and security issues.
  8. Define solutions for regulatory compliance issues.
To enroll in a fixed cost service plan or discuss your companies requirements, please email David Kapusta for more information. 

The following services are available in addition to a service plan or on a per-project basis.  CDF Security can:

  1. Measure HIPAA compliance.
  2. Evaluate alignment with the PCI standard.
  3. Design and document a cost effective security architecture.
  4. Perform penetration tests (internal and/or external attacks).
  5. Review existing security procedures and policies.
  6. Assist with SOX compliance.
  7. Identify and document security vulnerabilities.
  8. Evaluate web server security including an analysis of SQL injection possibilities.
  9. Perform forensic analysis and evidence collection for security issues.

Please visit our blog and tell us what you like.