Attacks/Breaches
5/4/2015
10:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Security Consulting Firms Form Unique Joint Venture Two Companies Plan To Disrupt Traditional Prepare and Recover Model

San Diego, CA.  and New York, May 4, 2015—CyberUnited, a cybersecurity intelligence consulting firm providing enterprise IT security consulting services and solutions, and LIFARS, a digital forensics and cybersecurity incident response firm, have formed a security consulting joint venture CyberUnited LIFARS  that will disrupt the traditional “prepare and recover” model used by traditional security consultants after a security incident.  Instead the new entity will also utilize continuous monitoring through new products and services that will enable organizations to reduce their chances of being attacked, while also providing remediation techniques in the event that an attack is successful.  The venture also provides an elite military-style cybersecurity breach preparedness training.

LIFARS was just named one of the hottest and most innovative cybersecurity companies to watch in 2015 according to Cybersecurity Ventures, well ahead of Symantec and Trustwave on their Cybersecurity

500 list.  The firm was ranked 101st in the nation and 2nd among firms in New York.

“Proactive preparation has become much more important recently, but most firms aren’t prepared to provide this type of service,” commented Darin Andersen, Founder and CEO of CyberUnited.  “While you can’t prevent attacks completely, our products and services can reduce the chance of these attacks significantly.  While we provide all the services of a traditional firm, we go beyond those solutions.”

“LIFARS’ hands on digital forensic investigations, data breach incident response, web application security testing, digital risk assessment, and academic research, coupled with CyberUnited’s highly skilled strategic cybersecurity consultants and products will provide a full range of cybersecurity services and business intelligence.”  commented Ondrej Krehel, Founder and CTO of LIFARS.

“There is a need to move beyond traditional consulting services for security advisory firms,” commented Mark Rasch of Securitycurrent.  “The combination of products and services designed to be proactive rather than passive, are just beginning to overtake existing consulting services that help audit and establish corporate policies; recommend traditional passive security products; and typical forensic remediation.”

The new entity will also enhance the products, services, markets, and geographic reach of the companies.  CyberUnited has been focused on general commercial, technology, and governments markets.  They recently hired Mike Coomes of the U.S. Department of Defense, for example.

LIFARS has significant experience and expertise in the financial services, medical, and software engineering industries.  Current engagements are with international medium to large corporations.

“In addition to our focus on food, oil and gas industries, we see insurance companies and law firms pushing for more proactive cybersecurity solutions,” Andersen concluded.

 

About CyberUnited

CyberUnited is a cybersecurity intelligence consulting firm providing enterprise IT security consulting services and solutions. CyberUnited’s team of highly skilled certified IT security professionals offer a full range of cybersecurity services and enterprise IT security consulting and implementation. These services include:  cybersecurity policy and operational procedure development and training.  Cybersecurity engineering and architecture design; operational security management; network security testing and evaluation; computer security incident response; vulnerability analysis; malicious code analysis; security risk assessment; and security assessment and authorization (A&A) compliance.

 

CyberUnited offers fixed and variable pricing on turnkey risk assessment and Authorization & Assessment services.  For more information visit:

www.cyberunited.com.

 

About LIFARS

 

LIFARS is a New York City based digital forensics and cybersecurity intelligence firm. At LIFARS, we believe that cybersecurity is a matter of trust - that is why most of our services are rendered in person at your premises while forming a personal relationship. Our solutions are based on best practices and personal hands-on experiences. LIFARS conducts digital forensic investigations, data breach incident response, web application security testing, digital risk assessments, and academic research. LIFARS continuously explores the latest innovations in the cybersecurity field and always seeks to find what is shaping tomorrow's industry landscape. Our company’s efforts were recently recognized and we were ranked the #2 cybersecurity firm in New York City on the Cybersecurity 500 list.

Learn more at www.lifars.com

Stay up to date with the latest cybersecurity news at LIFARS Blog.

Follow @LIFARSLLC on Twitter.

 

 

Contact:

 

Gary Thompson

Clarity Communications

415-963-4082 ext. 101

925-768-2400

[email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.