Security Project 3

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type…

Security Project 2

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type…

Public Safety CSCP

This project proposed the development of a standardized method to qualitatively evaluate mobile applications for potential risk and exposure. This methodology can be used by businesses, governments and private citizens to highlight the inherent risk of mobile applications. With the…

Virtual CSO

Are you considering new IT projects but don’t have a security sounding board? Have to meet new security requirements but don’t know where to start? Are you planning for growth and want to make sure that security and privacy are…

Breach Mitigation

Businesses have long struggled with how to handle the unfortunate moment when a network intrusion becomes a data breach. The security team at TwelveDot has developed a pre- and post- breach methodology to help organizations prepare for the day when…

ISO 27000

Building and maintaining an ISMS (Information Security Management System) is not always easy – especially for larger organizations who have already developed processes and procedures for managing risk. However, more governments, financial institutions and even software vendors now require partners…