0
Skip to Content
Leviathan Security Group - Penetration Testing, Security Assessment, Risk Advisory
Services
Web Application Penetration Testing
Secure Code Review
Network Penetration Testing
Smart Device and IoT Security Assessment
Vendor Security
Risk Advisory Services
Virtual Chief Information Security Officer (VCISO)
Tabletop Exercises
Programs
Nest Device Access Security Assessment (SDM API)
Cloud Application Security Assessment (CASA)
ADA Mobile Profile
Shopify Partner Program - Technology Track
Research
TunnelVision
Blog
Company
Press Box
Careers
About Us
Privacy policy
Contact Us
Leviathan Security Group - Penetration Testing, Security Assessment, Risk Advisory
Services
Web Application Penetration Testing
Secure Code Review
Network Penetration Testing
Smart Device and IoT Security Assessment
Vendor Security
Risk Advisory Services
Virtual Chief Information Security Officer (VCISO)
Tabletop Exercises
Programs
Nest Device Access Security Assessment (SDM API)
Cloud Application Security Assessment (CASA)
ADA Mobile Profile
Shopify Partner Program - Technology Track
Research
TunnelVision
Blog
Company
Press Box
Careers
About Us
Privacy policy
Contact Us
Folder: Services
Back
Web Application Penetration Testing
Secure Code Review
Network Penetration Testing
Smart Device and IoT Security Assessment
Vendor Security
Risk Advisory Services
Virtual Chief Information Security Officer (VCISO)
Tabletop Exercises
Folder: Programs
Back
Nest Device Access Security Assessment (SDM API)
Cloud Application Security Assessment (CASA)
ADA Mobile Profile
Shopify Partner Program - Technology Track
Folder: Research
Back
TunnelVision
Blog
Folder: Company
Back
Press Box
Careers
About Us
Privacy policy
Contact Us
Guest User 3/5/15 Guest User 3/5/15

Unpopular Opinion - CSI: Cyber Could Be Good for Information Security

Read More
Network Security Frank Heidt 2/25/15 Network Security Frank Heidt 2/25/15

The Harms of Forced Data Localization

Read More
Enterprise Security Guest User 2/23/15 Enterprise Security Guest User 2/23/15

Scarcity of Cybersecurity Expertise

Read More
Application Security Alex Muentz 12/8/14 Application Security Alex Muentz 12/8/14

The Next Level

Read More
Enterprise Security Joshua Pitts 10/23/14 Enterprise Security Joshua Pitts 10/23/14

The Case of The Modified Binaries

Read More
Application Security Guest User 8/10/14 Application Security Guest User 8/10/14

Spideroak's Crypton: Design and Implementation Evaluation

Read More
Newer Posts
Older Posts
  • Services

    Application Security

    • Web Application Penetration Testing
    • Secure Code Review

    Network Security

    • Network Penetration Testing

    Risk and Advisory Services

    • VCISO Services
    • Tabletop Exercises

    Hardware Security

    • Smart Device/IoT Security Assessment

    Vendor Security

    • Vendor Security Management Services
  • Programs

    App Defense Alliance

    • Cloud Application Security Assessment (CASA)
    • Mobile Application Security Assessment (MASA)

    Google Programs

    • Nest SDM API Assessment

    Shopify Programs

    • Shopify Partner Program - Technology Track (formerly PCAP)
  • Research
    • TunnelVision
    • LibEvent CVE-2024-31735
  • Blog

    Featured

    TunnelVision (CVE-2024-3661): How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak

    Categories

    • Risk and Advisory Services
    • Application Security
    • Network Security
    • Enterprise Security
    • Hardware Security
    • View All Blog Posts
  • Company
    • Press Box
    • Careers
    • About Us
    • Privacy Policy

Services

Web Application Penetration Testing

Secure Code Review

Network Penetration Testing

VCISO Services

Tabletop Exercises

Smart Device/IoT Security Assessment

Vendor Security Management Services

Programs

Cloud Application Security Assessment (CASA)

Mobile Application Security Assessment (MASA)

Nest SDM API Assessment

Shopify Partner Program - Technology Track

Research

TunnelVision

LibEvent CVE-2024-31735

Blog

Risk Advisory

Application Security

Network Security

Enterprise Security

Hardware Security

View All Blog Posts

Company

Press Box

Careers

About Us

Privacy Policy

Contact Us