122 lines
6.7 KiB
HTML
122 lines
6.7 KiB
HTML
<!DOCTYPE html>
|
|
<html lang="{{ page.lang | default: site.lang | default: en }}">
|
|
|
|
{%- include head.html -%}
|
|
|
|
<body>
|
|
<div class="container">
|
|
|
|
{%- include header.html -%}
|
|
|
|
<main>
|
|
<section class="flex-container">
|
|
<div class="flex-container-inner">
|
|
<div class="text-well">
|
|
<h2>How can we help you?</h2>
|
|
<p>Distrust offers a wide range of services which are tailored to your organization. Whether you need a complete security assessment, want to create or improve an open source security tool, need a security built from scratch, or want to focus on assessing a specific aspect of your organization or system - we are here to help. Our experienced staff will work closely with you to understand your unique needs and create a tailor made solution that works for you.</p>
|
|
<br />
|
|
<a href="/contact.html" class="action-button">Request a Quote</a>
|
|
<br />
|
|
</div>
|
|
</div>
|
|
<div class="flex-container-inner">
|
|
</div>
|
|
</section>
|
|
|
|
<hr />
|
|
|
|
<section class="flex-container">
|
|
<div class="flex-container-inner">
|
|
<div class="text-well">
|
|
<h3>Security Assessment</h3>
|
|
<p>Holistic assessments of systems tailored to your needs. We leverage our in house expertise to analyze your system, thinking from first principles, in order to ensure its design, implementation and deployment all work coherently to establish a strong security posture. The methodologies we leverage vary based on the context, and client needs.</p>
|
|
</div>
|
|
</div>
|
|
<div class="flex-container-inner">
|
|
<ul>
|
|
<li>Penetration Testing</li>
|
|
<li>Secure Code Review</li>
|
|
<li>Cloud Configuration Review</li>
|
|
<li>Threat Modeling</li>
|
|
</ul>
|
|
|
|
</div>
|
|
</section>
|
|
|
|
<hr />
|
|
|
|
<section class="flex-container">
|
|
<div class="flex-container-inner">
|
|
<div class="text-well">
|
|
<h3>Security Engineering</h3>
|
|
<p>Our team consists of engineers who are experienced in a wide range of areas spanning across applied cryptography, HSMs, secure coding using languages such as rust and golang, quorum authentication, kernel hardening, CI/CD hardening and more. Leverage our experience to ensure your systems are secure by design, and use the best available architecture patterns.</p>
|
|
</div>
|
|
</div>
|
|
<div class="flex-container-inner">
|
|
<ul>
|
|
<li>Secure Code Development</li>
|
|
<li>Cryptocurrency Custodial Solutions</li>
|
|
<li>Quorum Authentication Design and Implementation</li>
|
|
<li>Cryptographic Key Escrow / Signer</li>
|
|
<li>Reproducible / Deterministic Builds</li>
|
|
<li>Production Engineering Practice</li>
|
|
</ul>
|
|
</div>
|
|
</section>
|
|
|
|
<hr />
|
|
|
|
<section class="flex-container">
|
|
<div class="flex-container-inner">
|
|
<div class="text-well">
|
|
<h3>Retained Security Support</h3>
|
|
<p>We offer monthly retainer contracts to augment your existing security team with access to our combined experience as needed. You can drop questions to our team in a chat, or include is in security-relevant meetings as you like. Almost anything an in-house security team might do to protect your organization is in scope for us as well, including qualifying candidates, conducting interviews, reviewing code, evaluate third party risks, or be a security voice in the room when you are planning new products.</p>
|
|
</div>
|
|
</div>
|
|
<div class="flex-container-inner">
|
|
<ul>
|
|
<li>Security Program Development</li>
|
|
<li>General Security Consulting</li>
|
|
<li>Assistance With Hiring Security Talent</li>
|
|
<li>Business Continuity Planning</li>
|
|
<li>Physical Security</li>
|
|
</ul>
|
|
</div>
|
|
</section>
|
|
|
|
<hr />
|
|
|
|
<section class="flex-container">
|
|
<div class="flex-container-inner">
|
|
<div class="text-well">
|
|
<h3>Research & Development</h3>
|
|
<p>Rather than write the same document or tool 10 times and bill each client for it, we focus our unused retainer hours on open sourcing every document and tool we legally can, so we can focus our time with clients on their unique situations. If we are doing public work you would like so see more of, or that -almost- meets your needs, we would love to hear that and figure out a path to see your needs met.</p>
|
|
</div>
|
|
</div>
|
|
<div class="flex-container-inner">
|
|
<h4>Development</h4>
|
|
<ul>
|
|
<li><a href="https://git.distrust.co/public/keyfork">keyfork: a hierarchical deterministic key management toolkit</a></li>
|
|
<li><a href="https://git.distrust.co/public/ocirep">ocirep: oic base images for deterministic builds</a></li>
|
|
<li><a href="https://git.distrust.co/public/airgap">airgap: a minimal linux distro for high risk scenarios</a></li>
|
|
<li><a href="https://git.distrust.co/public/git-sig">git-sig: a multi-sig trust toolkit for git</a></li>
|
|
</ul>
|
|
|
|
<h4>Research</h4>
|
|
<ul>
|
|
<li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39910">CVE-2023-39910</a></li>
|
|
<li><a href="https://milksad.info">MilkSad</a></li>
|
|
<li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9234">CVE-2018-9234</a></li>
|
|
<li><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9057">CVE-2018-9057</a></li>
|
|
<li><a href="https://www.vice.com/en/article/3kxy4k/high-tech-japanese-hotel-service-robots-easily-hackable">Japanese Robot Hotel</a></li>
|
|
</ul>
|
|
</div>
|
|
</section>
|
|
</main>
|
|
|
|
{%- include footer.html -%}
|
|
|
|
</div>
|
|
</body>
|
|
|
|
</html> |