Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/4/2015
10:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Security Consulting Firms Form Unique Joint Venture Two Companies Plan To Disrupt Traditional Prepare and Recover Model

San Diego, CA.  and New York, May 4, 2015—CyberUnited, a cybersecurity intelligence consulting firm providing enterprise IT security consulting services and solutions, and LIFARS, a digital forensics and cybersecurity incident response firm, have formed a security consulting joint venture CyberUnited LIFARS  that will disrupt the traditional “prepare and recover” model used by traditional security consultants after a security incident.  Instead the new entity will also utilize continuous monitoring through new products and services that will enable organizations to reduce their chances of being attacked, while also providing remediation techniques in the event that an attack is successful.  The venture also provides an elite military-style cybersecurity breach preparedness training.

LIFARS was just named one of the hottest and most innovative cybersecurity companies to watch in 2015 according to Cybersecurity Ventures, well ahead of Symantec and Trustwave on their Cybersecurity

500 list.  The firm was ranked 101st in the nation and 2nd among firms in New York.

“Proactive preparation has become much more important recently, but most firms aren’t prepared to provide this type of service,” commented Darin Andersen, Founder and CEO of CyberUnited.  “While you can’t prevent attacks completely, our products and services can reduce the chance of these attacks significantly.  While we provide all the services of a traditional firm, we go beyond those solutions.”

“LIFARS’ hands on digital forensic investigations, data breach incident response, web application security testing, digital risk assessment, and academic research, coupled with CyberUnited’s highly skilled strategic cybersecurity consultants and products will provide a full range of cybersecurity services and business intelligence.”  commented Ondrej Krehel, Founder and CTO of LIFARS.

“There is a need to move beyond traditional consulting services for security advisory firms,” commented Mark Rasch of Securitycurrent.  “The combination of products and services designed to be proactive rather than passive, are just beginning to overtake existing consulting services that help audit and establish corporate policies; recommend traditional passive security products; and typical forensic remediation.”

The new entity will also enhance the products, services, markets, and geographic reach of the companies.  CyberUnited has been focused on general commercial, technology, and governments markets.  They recently hired Mike Coomes of the U.S. Department of Defense, for example.

LIFARS has significant experience and expertise in the financial services, medical, and software engineering industries.  Current engagements are with international medium to large corporations.

“In addition to our focus on food, oil and gas industries, we see insurance companies and law firms pushing for more proactive cybersecurity solutions,” Andersen concluded.

 

About CyberUnited

CyberUnited is a cybersecurity intelligence consulting firm providing enterprise IT security consulting services and solutions. CyberUnited’s team of highly skilled certified IT security professionals offer a full range of cybersecurity services and enterprise IT security consulting and implementation. These services include:  cybersecurity policy and operational procedure development and training.  Cybersecurity engineering and architecture design; operational security management; network security testing and evaluation; computer security incident response; vulnerability analysis; malicious code analysis; security risk assessment; and security assessment and authorization (A&A) compliance.

 

CyberUnited offers fixed and variable pricing on turnkey risk assessment and Authorization & Assessment services.  For more information visit:

www.cyberunited.com.

 

About LIFARS

 

LIFARS is a New York City based digital forensics and cybersecurity intelligence firm. At LIFARS, we believe that cybersecurity is a matter of trust - that is why most of our services are rendered in person at your premises while forming a personal relationship. Our solutions are based on best practices and personal hands-on experiences. LIFARS conducts digital forensic investigations, data breach incident response, web application security testing, digital risk assessments, and academic research. LIFARS continuously explores the latest innovations in the cybersecurity field and always seeks to find what is shaping tomorrow's industry landscape. Our company’s efforts were recently recognized and we were ranked the #2 cybersecurity firm in New York City on the Cybersecurity 500 list.

Learn more at www.lifars.com

Stay up to date with the latest cybersecurity news at LIFARS Blog.

Follow @LIFARSLLC on Twitter.

 

 

Contact:

 

Gary Thompson

Clarity Communications

415-963-4082 ext. 101

925-768-2400

[email protected]

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...