Do you know your cyber risk score? Defend Edge will identify your organization's level of exposure to cybercrime and the liabilities that stem from IT vulnerabilities. Click the link now to take our free cyber risk score quiz! bit.ly/FreeCyberRiskScore #cybercrime #datasecurity #cyberscore #ransomware #phishing #ethicalhacking #cybersecuritytraining #cybersecurityawareness #malware #informationsecurity #infosec
DefendEdge
Computer and Network Security
Glen Ellyn, Illinois 1,828 followers
Your Partner in Cyber Security
About us
DefendEdge is a leading US-based cybersecurity firm specializing in protecting clients' firewalls, endpoints, and applications against cyber threats and vulnerabilities. Leveraging our Managed Detection & Response (MDR) practice housed within our state-of-the-art Security Operations Center and Network Operations Center, we provide round-the-clock monitoring and proactive threat mitigation. With an 85% veteran workforce holding security clearances and exclusively comprised of US citizens, we offer unparalleled expertise and dedication to safeguarding our clients' assets. We pride ourselves on never outsourcing our practices, ensuring the highest standards of service delivery. Additionally, our Cyber Threat Intelligence (CTI) team offers comprehensive monitoring of impersonations, social media activities, and deep/dark web for compromised credentials and take-downs, enabling swift action to mitigate risks and protect against emerging threats. Trust DefendEdge for robust cybersecurity solutions tailored to your organization's needs.
- Website
-
https://www.defendedge.com
External link for DefendEdge
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- Glen Ellyn, Illinois
- Type
- Privately Held
- Founded
- 2017
- Specialties
- Cyber Security, Threat Intelligence, Information Security, Managed Detection Response, Managed Security, Penetration Test, EDR, Fortinet, WithSecure, Okta, Onelogin, Azure, AWS, Data Breach, Firewall, Endpoint Security, Application Security, Vulnerability Scans, 24/7/365, US-based, Veterans, Cyber Security Training, Skillbridge, DoD, and DHS
Products
U.S. Security Operations Center
IT Infrastructure Monitoring Tools
Our Security Operations Services provide comprehensive protection for your digital assets, utilizing state-of-the-art technologies and expert personnel to monitor, detect, and respond to cybersecurity threats in real-time. From round-the-clock surveillance in our Security Operations Center to advanced threat intelligence analysis, we deliver proactive defense strategies tailored to your organization's unique needs, ensuring continuous protection against evolving cyber threats.
Locations
-
Primary
800 Roosevelt Rd
Glen Ellyn, Illinois 60137, US
Employees at DefendEdge
-
Taso Triantafillos
Chief Executive Officer at DefendEdge
-
Michael Jager
IT Risk Consultant at DefendEdge
-
Lewis J Borsellino
DefendEdge offers comprehensive cybersecurity solutions, including a 24/7 Security Operations Center (SOC) with 130 skilled analysts. Our Competitive…
-
Deborah Andrews
Cybersecurity Intern
Updates
-
🖥️ The next service tier offered by DefendEdge’s Cyber Threat Intelligence (CTI) team is the Operator tier. This plan has a focus on Brand Reputation and Identity Protection. This service tier includes all services included in the previously covered Lite and Recon packages. Phishing remains a highly effective attack method for threat actors. Proactively monitoring domain permutations and social media mentions and identifying compromised credentials can help prevent unauthorized access and protect sensitive information, which is the goal of the Operator package. 🛡️To learn more about the service tiers DefendEdge has to enhance your safety visit: https://buff.ly/4dp1gGh #DefendEdge #ServiceTier #Operator #CyberSecurity
-
🔍DefendEdge penetration testing is cutting through cyber threats one test at a time. Let's unveil your vulnerabilities before cyber villains do. Get proactive with penetration testing and contact us today. 🛡️Find out more: https://buff.ly/4b9ViIt #DefendEdge #PenetrationTesting #CyberSecurity #DataProtection
-
This week, DefendEdge's CTI team explored NoName05716, a pro-Russian hacktivist group that takes action against those who have taken an openly hostile position toward Russia. According to their manifesto published on their Telegram channel, this group does not work for financial gain and is also willing to cooperate with like-minded groups. The group runs 5 Telegram channels; among them is their private channel for group members labeled “DDosiaProject,” named for the DDoSia malware tool they use for their attacks. As their DDoSia tool evolves, they have been observed leveraging it against countries such as Lithuania, Ukraine, Poland, Italy, the Czech Republic, Denmark, Latvia, France, the UK, and Switzerland, all countries who have taken a heavy stance against Russia, especially since the onset of the Russia-Ukrainian war outbreak. Stay informed with DefendEdge as we investigate and share insights on the latest emerging threats! #CyberSecurity #CyberThreats #RussiaThreatActor #DefendEdge #CTI #NoName05716
-
Citrix Releases Security Updates for Citrix Workspace App for Windows Read more here: https://buff.ly/3XoJPiq #DefendEdge #Cybersecurity
-
A surge in cyber extortion emails has been observed, claiming to use Pegasus Spyware, with numerous individuals receiving identical threats. The emails consistently originate from a @gmail address. The threat actors always include the victim's name and address and claim to have access to their system and all social media accounts. They threaten to have a compromising video of the victim and that they will distribute it to the victim's contacts if they do not send them a specific amount of cryptocurrency. Cyber extortion and scam emails are a longstanding threat within the cybersecurity landscape. Cyber extortion is an attack where someone demands payment to stop sharing private information, such as photos or videos, with contacts in the victim's email or social media accounts. These types of threats are sent when someone creates a template for an email that seems very threatening. They distribute this template. All that needs to happen is for the threat actor to get the victim's name, address, and other details that may be relevant to the threat they are sending. Interested in reading more about this scam? Click here for more: https://buff.ly/3z9ypqR #DefendEdge #Cybersecurity #Emergingthreats #Spyware #CTI #CyberThreatIntelligence
-
🏆 As an award-winning leader in cybersecurity, DefendEdge is committed to excellence. But don’t just hear it from us—see what our clients are saying. 🛡️Interested in unbeatable security solutions? Visit our website to learn more: https://buff.ly/4b9ViIt #DefendEdge #ClientTestimonial #CyberSecurity
-
🚨 New Blog Posted! 🚨 We all understand what phishing is, but have you ever considered the psychology and history behind it? Read More Here 📖: https://buff.ly/3MDZYeU #Phishing #DefendEdge #MSSP #CyberSecurity #SOC #CTI #CyberThreatIntelligence
-
➡️ Check out some of the latest vulnerabilities published by CISA in their weekly summary shared on our website. One interesting CVE released is CVE-2024-7970 for Google Chrome. An out of bounds write in V8 in Google Chrome prior to 128.0.6613.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Read more here: https://buff.ly/3XEaLuX
Vulnerability Summary for the Week of September 2, 2024
https://www.defendedge.com
-
Congratulations to our Robot Analyst of the Month, Josh Heminger, and Cyborg Analyst of the Month, Jermaine James! Hive Lead Mariane Lai said the following about Josh and his accomplishments: "He is the kind of team player who not only teaches others how to navigate the technical tasks but also leads by example, constantly learning and improving. His contributions have been a game-changer, all while maintaining stellar communication and a positive impact on the entire team!" Cyber Threat Intelligence Lead Katey Waszkiewicz congratulated Jermaine with the following message: "Jermaine has demonstrated exceptional leadership and motivation in his daily responsibilities and extracurricular activities over the past few weeks. His advancement to a Tier II CTI Analyst and his involvement in bi-weekly blog posts reflect his commitment to being a proactive team member and his adaptability beyond his standard role. With the addition of two new analysts to his team and the departure of others, Jermaine has assumed a pivotal role in training and ensuring the overall success of the team and the company as a whole." Again, congratulations to both of you. Keep up the great work!