Focused Security Analysis For Your Organisation’s IT Systems

In association with CENSUS 
 
Cyber espionage is on the rise, with intruders targeting all forms of intellectual property and data with the aim to steal from you or shut down aspects of your organisation. A cyber attack is deliberate criminal engagement with your computer systems, technology-dependent enterprises and networks. Cyber attacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cyber crimes, such as information and identity theft. 
 
CENSUS is a highly recommended IT security service provider for the cyber analysis and IT system audit required. The company has completed similar projects for governments, corporations and many different types of organisations with excellent results.
 
CENSUS is an independent, privately funded and internationally acclaimed Cyber Security services provider. They deliver high quality InfoSec services built upon their leading research supporting the needs of multiple industries. It provides IT and OT security services to public and private organizations worldwide since 2008, including international financial institutions and Fortune 500 companies. 
 
The CENSUS team consists of 60 experienced security experts including industry recognized security engineers and published authors that have been acknowledged by the media and the cyber security community. They regularly present their research at major IT security conferences such as Black Hat, DEFCON, and ZeroNights. 
 
Furthermore, CENSUS has compliance expertise and industry certified personnel, as well as its own CREST-accredited penetration testers with a fully checked background and certifications of completion like Black Hat Pentesting industrial control systems. 
 
CENSUS is an ISO 27001, ISO 9001 and CREST-certified company, while its engineering team holds Offensive Security, CREST, GCIH, CEH, ISACA Cobit5 and ISO 27001 and 9001 auditor certifications. CENSUS stands out for technical excellence in its work and high-quality deliverables, best supporting the complex needs of those that define the Digital Now.
 
The company is committed to the highest standards of service delivery and operations supporting the needs of multiple industries, including Software & Internet services, Banking & Finance, Insurance, Payments, Government, Defence, Maritime, Healthcare, Energy & Utilities, Consumer Electronics and Telecommunications.
 
Regarding the Healthcare industry in particular, since November 2017, the prestigious Mayo Clinic includes CENSUS on the list of recommended External Assessors for conducting vulnerability assessments to medical devices prior to purchase and installation in the Clinic's environment. Mayo Clinic provides device vendors the option of either having a device assessed by the internal Clinical Information Security team or through an External Assessor following a specific process.
 
CENSUS has performed IT Security Assessments on a wide range of medical technologies, including pacemakers, defibrillators, cardiac arrest monitors, infusion pumps, MRI & CT scan equipment and medical device gateways. It has also analysed cloud platforms for the exchange of medical information, PACS systems, patient record management software, patient monitoring technologies, physical access controls for clinics and smart medicine cabinets. 
 
CENSUS' assessment services covered all aspects of these medical technologies, from their hardware, software and firmware to their communications and default configuration.
 
Acknowledging the constant evolution of information security threats and with its specialisation and experience in the field,
CENSUS enables the team to go beyond the publicly known attack vectors, giving clients the opportunity to be protected from possible future threats to their infrastructure and products.
 
In order to systematically test the security of an organization, CENSUS offers the Security Testing process. Testing is performed with the same means that malicious users use, under a methodology that makes the results of the tests beneficial to the under-assessment organisation. The scope of the tests is not limited to hardware and software resources, but includes all aspects of the organisational structure, such as processes and human resources. 

CENSUS uses the latest attack techniques along with the results of its in-house vulnerability research to identify common and acknowledged vulnerabilities and distinguish the possibilities of zero-day attacks. 

CENSUS engineers do not focus only on the discovery of vulnerabilities, but go one step further, to the design and realization of attack scenarios on the client's infrastructure, combining knowledge acquired from the client's interaction with the Internet, from identified vulnerabilities, as well as from misconfigured or absent information security controls.  Thus, the maximum risk paths are discovered. CENSUS methodology helps its engineers quickly discover threats in the software and the firmware, as well as to identify of zero-day vulnerabilities. 
 
While CENSUS maintains its own security research centre, it does not base its methodology solely on security scanner tools and automated solutions. Instead, a great deal of manual assessment is performed. In addition, CENSUS has the ability to efficiently connect the “vulnerability aspect” to the “business aspect”, using the most suitable senior engineers to identify the
necessary actions and put the right priorities.
 
CENSUS security testing services can be offered in various ways depending on the required depth of testing and the nature of the organisation’s requirements. The following options are available:
 
  • Tiger Team: The ultimate security test; covers all aspects of an organisation's infrastructure. Holistic testing of an organisation’s security in a less controlled manner. Payment on this service is required only in the case where the Team has successfully seized one or more of the designated targets.
  • Red Teaming: Full-scope, intelligence-led, multi-layered attack simulation designed to measure how well a company’s people and networks, applications and physical security controls can withstand an attack from a real-life adversary. Often performed over an extended time Red Teaming combines multi-faceted testing approaches that are designed to not only seek to penetrate an organization, but also to verify the response, monitoring and incident response investigation process and actions.
  •  Penetration Testing: Customer-controlled security testing attacks. Conducted by CREST-accredited ethical hackers & SCADA-certified personnel, industry recognized consultants and published authors that have been recognized by the media and the cyber security community.
  • Web Application Testing: In-depth security testing for custom and off-the-shelf web applications. It examines all functions of a Web Application, all layers of the Web Application stack and all tiers of the Web Application architecture.
  • Mobile Application Testing: Services for applications of all major platforms (i0S, Android, Windows Phone, Blackberry OS and HTML5). The methodology utilises multiple analysis techniques: App Static Analysis, App Dynamic Analysis, API Testing, Third-Party Code Assessments and App Bundle Inspection. 
  • Device Testing: Tests the security of both hardware & software on a device (e.g. CPE equipment).
  • Network Infrastructure Testing: Checks the security parameters of network components, such as switches, routers, IPS, IDS, firewalls etc.
  • Wireless Infrastructure Testing: Tests in depth the configuration of wireless networks.
  • Social Engineering: Tests the information security awareness of personnel. 
  • Physical Security Testing: Tests the reliability and integrity of physical security controls, such as access authorisation mechanisms for restricted zones.  The resulting information from the security testing sessions is provided in strong classification with regards to the threats and the risks associated with the identified and exploited vulnerabilities.
CENSUS also offers vulnerability research services to ensure that a software product, a system implementation, or a new technology that an organisation is planning to invest in meets strict security requirements and does not suffer from vulnerabilities.  

CENSUS adopts a top-down approach which allows the identification of the most exposed applications and systems in a client's IT environment, followed by a thorough investigation for unknown vulnerabilities in these elements. 

With extensive experience and specialised knowledge in the field of vulnerability research, CENSUS employs focused techniques, such as fuzzing, reverse engineering, source code auditing (in cases where source code is available), static and dynamic analysis in order to identify vulnerabilities and clearly demonstrate their impact on a system's security model.
 
In addition, CENSUS provides specialised software security services to help businesses build and maintain a Secure Software Development Lifecycle (SDLC). These services range from consulting and training on Secure SDLC procedures, to security audits on the deliverables of each SDLC phase.  Secure SDLC methodologies allow for the early mitigation of security risks, by identifying and fixing security vulnerabilities during the early stages of software development. They also introduce best-of-breed proactive defenses in the design and implementation of the software, thus minimizing the released product's exposure to future threats.
 
CENSUS has extensive experience in auditing source code both for insufficient input validation vulnerabilities (like buffer overflows, XSS, SQL injections) and logic flaws (such as race conditions, concurrency violations).  Unlike traditional code auditing approaches, CENSUS does not rely on automated mechanisms to identify vulnerabilities. Instead, the preferred top-down approach offers an understanding of the investigated system and provides a detailed source code vulnerability report to the client. 
 
The company also provides software security testing services to companies that require an independent entity to assess the security of custom software they purchase from third parties. Furthermore, CENSUS offers Security Training courses to improve the security awareness of personnel and allow developers / management to identify and mitigate security issues early on in the software development lifecycle:
 
  • Security Awareness Training
  • Introduction to Software Security
  • Web Application Vulnerabilities
  • Mobile App Vulnerabilities (covering Android and iOS apps)
  • Implementing a Secure Software Development Lifecycle
  • Secure Development in Java
  • Secure Development in C
  • Secure Development in JavaScript
Finally, CENSUS provides Security Consulting services to companies and organisations worldwide.  Past projects include:
 
  • design-phase reviews of new protocols
  • software architecture reviews
  • network architecture security reviews
  • the assessment of binary protection solutions for desktop and mobile applications
  • the assessment of MDM solutions
  • the assessment of DRM technologies
  • the development of security policies
  • incident handling

CENSUS is a research-driven, high-end information security services firm with a proven history of better securing their customers through real-world scenarios created by our security experts. 

The company helps clients with the cybersecurity maturity journey by providing end-to-end, state-of-the-art assessment of costumers’ security posture to improve the cyber resilience and leverage the benefits of digital transformation. Additionally, CENSUS performs security assessments as an independent body and can provide attestation for these services, which can be used as a certificate for the customer and its products/services. It is important for the company to provide its services in an effective manner following a high-quality standard.
 
Census Labs - Healthcare:         Census Labs: - Mayo Clinic
 
You Might Also Read:
 
Check Your Organisation’s Security With A Cyber Audit:
 
 
« Facebook Pays Rupert Murdoch For News
Is Blockchain The Future Of SSL Certificates? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

KeepItSafe

KeepItSafe

KeepItSafe is a premium, white-glove service for online backup, disaster recovery and business continuity

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Cybellum

Cybellum

Cybellum provides software risk assessment for DevOps and security executives, by detecting vulnerabilities automatically, without source code.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

CYSEC Academy

CYSEC Academy

CYSEC Academy offer cyber certifications, cyber assurance and cyber defense training, hands-on learning training modules, public, private and bespoke training courses.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

BlockSafe Technologies

BlockSafe Technologies

BlockSafe Technologies is the only US-based company that secures the blockchain ecosystem from all angles: wallets, exchanges, and private blockchains.

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71)

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71) is Singapore's first cybersecurity entrepreneur hub.

Carson McDowell

Carson McDowell

Carson McDowell are one of Northern Ireland's leading law firms. We are the law firm of choice for many of Northern Ireland's Top 100 companies as well as international companies doing business here.

Sprint Networks

Sprint Networks

Sprint Networks is a trusted compliance and risk program advisor which deliver cost-effective technology to reduce enterprise-wide risk.

US Digital Corps

US Digital Corps

The U.S. Digital Corps is a new two-year fellowship for early-career technologists where you will work every day to make a difference in critical impact areas including cybersecurity.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.