As an experienced security partner, we have been successfully securing your entire IT & OT for the past 20 years. We use the relevant international standards of IT and OT security and go with our 'Security Testing Process' with 5 methods far beyond classic penetration testing to identify the points of attack in your systems: Security vulnerabilities in software, firmware and microcode without them all attacks are unsuccessful. Of course, we are also available for you at any time in case of an emergency and support you in restarting your IT in a timely manner – including forensic investigations.
»The experienced consultants of softScheck have given us valuable impulses for the architecture and design of our Java applications by implementing a threat modeling as well as their practical implementation within the framework of our Secure SDLC.«
»It was a really very good and pleasant cooperation with your colleagues. I had a lot of fun!«
»The customer-oriented consultants of softScheck GmbH successfully supported us during the threat modeling of a Java EE application.«
May 15, 2023
Drones are becoming increasingly popular, but they are also vulnerable. Hackers can take control of a drone, steal its data, or even crash it. We explored possible attacks and countermeasures against civilian UAVs.
Read Article