Do you know your cyber risk score? Defend Edge will identify your organization's level of exposure to cybercrime and the liabilities that stem from IT vulnerabilities. Click the link now to take our free cyber risk score quiz! bit.ly/FreeCyberRiskScore #cybercrime #datasecurity #cyberscore #ransomware #phishing #ethicalhacking #cybersecuritytraining #cybersecurityawareness #malware #informationsecurity #infosec
DefendEdge
Computer and Network Security
Glen Ellyn, Illinois 1,835 followers
Your Partner in Cyber Security
About us
DefendEdge is a leading US-based cybersecurity firm specializing in protecting clients' firewalls, endpoints, and applications against cyber threats and vulnerabilities. Leveraging our Managed Detection & Response (MDR) practice housed within our state-of-the-art Security Operations Center and Network Operations Center, we provide round-the-clock monitoring and proactive threat mitigation. With an 85% veteran workforce holding security clearances and exclusively comprised of US citizens, we offer unparalleled expertise and dedication to safeguarding our clients' assets. We pride ourselves on never outsourcing our practices, ensuring the highest standards of service delivery. Additionally, our Cyber Threat Intelligence (CTI) team offers comprehensive monitoring of impersonations, social media activities, and deep/dark web for compromised credentials and take-downs, enabling swift action to mitigate risks and protect against emerging threats. Trust DefendEdge for robust cybersecurity solutions tailored to your organization's needs.
- Website
-
https://www.defendedge.com
External link for DefendEdge
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- Glen Ellyn, Illinois
- Type
- Privately Held
- Founded
- 2017
- Specialties
- Cyber Security, Threat Intelligence, Information Security, Managed Detection Response, Managed Security, Penetration Test, EDR, Fortinet, WithSecure, Okta, Onelogin, Azure, AWS, Data Breach, Firewall, Endpoint Security, Application Security, Vulnerability Scans, 24/7/365, US-based, Veterans, Cyber Security Training, Skillbridge, DoD, and DHS
Products
U.S. Security Operations Center
IT Infrastructure Monitoring Tools
Our Security Operations Services provide comprehensive protection for your digital assets, utilizing state-of-the-art technologies and expert personnel to monitor, detect, and respond to cybersecurity threats in real-time. From round-the-clock surveillance in our Security Operations Center to advanced threat intelligence analysis, we deliver proactive defense strategies tailored to your organization's unique needs, ensuring continuous protection against evolving cyber threats.
Locations
-
Primary
800 Roosevelt Rd
Glen Ellyn, Illinois 60137, US
Employees at DefendEdge
-
Taso Triantafillos
Chief Executive Officer at DefendEdge
-
Michael Jager
IT Risk Consultant at DefendEdge
-
Lewis J Borsellino
DefendEdge offers comprehensive cybersecurity solutions, including a 24/7 Security Operations Center (SOC) with 130 skilled analysts. Our Competitive…
-
Deborah Andrews
Cybersecurity Intern
Updates
-
This week, DefendEdge's CTI team explored the new Ransomware group Helldown, which emerged in 2024 and is known for using sophisticated encryption methods like AES, Salsa20, and RSA. They specialize in infiltrating networks, exploiting vulnerabilities, and exfiltrating large volumes of sensitive data, focusing on IT services and manufacturing sectors. The group operates with a high level of anonymity, leveraging the dark web and cryptocurrencies to conceal their activities. Notably, they have carried out significant attacks against companies like ZyxelNetworks and KBO Fire & Security Ltd, demonstrating their capacity to cause substantial operational disruptions and financial losses. Despite their impact, details about their exact location or origin remain unknown. Stay informed with DefendEdge as we investigate and share insights on the latest emerging threats! #CyberSecurity #CyberThreats #Ransomware #DefendEdge #CTI #HelldownRansomware
-
CISA unveiled the Federal Civilian Executive Branch (FCEB) Operational Cybersecurity Alignment (FOCAL) Plan, crafted with input from FCEB agencies. This plan standardizes essential cybersecurity components and harmonizes defense capabilities across federal agencies, enhancing their collective response to evolving cyber threats and recommending significant improvements in operational cybersecurity. #DefendEdge #CyberSecurity Read more here:
-
🚨 New Blog Posted! 🚨 As technology continues to evolve and the use of artificial intelligence has skyrocketed, the need for regulations is also increasing. Read More Here 📖: https://buff.ly/3B7i8mV #AI #DefendEdge #MSSP #CyberSecurity #SOC #CTI #CyberThreatIntelligence #CybersecurityRegulations
-
🖥️ The next service tier offered by DefendEdge’s Cyber Threat Intelligence (CTI) team is the Operator tier. This plan has a focus on Brand Reputation and Identity Protection. This service tier includes all services included in the previously covered Lite and Recon packages. Phishing remains a highly effective attack method for threat actors. Proactively monitoring domain permutations and social media mentions and identifying compromised credentials can help prevent unauthorized access and protect sensitive information, which is the goal of the Operator package. 🛡️To learn more about the service tiers DefendEdge has to enhance your safety visit: https://buff.ly/4dp1gGh #DefendEdge #ServiceTier #Operator #CyberSecurity
-
🔍DefendEdge penetration testing is cutting through cyber threats one test at a time. Let's unveil your vulnerabilities before cyber villains do. Get proactive with penetration testing and contact us today. 🛡️Find out more: https://buff.ly/4b9ViIt #DefendEdge #PenetrationTesting #CyberSecurity #DataProtection
-
This week, DefendEdge's CTI team explored NoName05716, a pro-Russian hacktivist group that takes action against those who have taken an openly hostile position toward Russia. According to their manifesto published on their Telegram channel, this group does not work for financial gain and is also willing to cooperate with like-minded groups. The group runs 5 Telegram channels; among them is their private channel for group members labeled “DDosiaProject,” named for the DDoSia malware tool they use for their attacks. As their DDoSia tool evolves, they have been observed leveraging it against countries such as Lithuania, Ukraine, Poland, Italy, the Czech Republic, Denmark, Latvia, France, the UK, and Switzerland, all countries who have taken a heavy stance against Russia, especially since the onset of the Russia-Ukrainian war outbreak. Stay informed with DefendEdge as we investigate and share insights on the latest emerging threats! #CyberSecurity #CyberThreats #RussiaThreatActor #DefendEdge #CTI #NoName05716
-
Citrix Releases Security Updates for Citrix Workspace App for Windows Read more here: https://buff.ly/3XoJPiq #DefendEdge #Cybersecurity
Citrix Releases Security Updates for Citrix Workspace App for Windows - Defend Edge
https://www.defendedge.com
-
A surge in cyber extortion emails has been observed, claiming to use Pegasus Spyware, with numerous individuals receiving identical threats. The emails consistently originate from a @gmail address. The threat actors always include the victim's name and address and claim to have access to their system and all social media accounts. They threaten to have a compromising video of the victim and that they will distribute it to the victim's contacts if they do not send them a specific amount of cryptocurrency. Cyber extortion and scam emails are a longstanding threat within the cybersecurity landscape. Cyber extortion is an attack where someone demands payment to stop sharing private information, such as photos or videos, with contacts in the victim's email or social media accounts. These types of threats are sent when someone creates a template for an email that seems very threatening. They distribute this template. All that needs to happen is for the threat actor to get the victim's name, address, and other details that may be relevant to the threat they are sending. Interested in reading more about this scam? Click here for more: https://buff.ly/3z9ypqR #DefendEdge #Cybersecurity #Emergingthreats #Spyware #CTI #CyberThreatIntelligence
-
🏆 As an award-winning leader in cybersecurity, DefendEdge is committed to excellence. But don’t just hear it from us—see what our clients are saying. 🛡️Interested in unbeatable security solutions? Visit our website to learn more: https://buff.ly/4b9ViIt #DefendEdge #ClientTestimonial #CyberSecurity