Responding to our Top Cyber Threat..
China

Customized Cyber and SOC Security Strategies

Does your service infrastructure include fully redundant, high-performance cloud security that is reliable, air-tight, and FedRAMP, NIST, or FISMA compliant?

Step 1:

Map your cloud architecture. You can't protect devices you are unaware of.

Step 2:

Harden your surface. Simply and consolidate processes; reduce entries to 6 or less.

Step 3:

Access, certificate, and user controls. Use biometrics and device id. No duplicate log-ons.

Step 4:

Configuration, network, and compliance management. CDM. FedRAMP. NIST. FISMA.

SSL and Certificate Management

In any isp environment, this simple but over-looked feature can take down an empire. Don't let your teams let anything fail. Period. We provide training and evaluation for Big 4, government, and other mission-critical cyber teams in certificate and key evaluation and management.

Signed and Current SSL Certificates

Errors of ommission or laziness in public isp site certificates are deadly. Even worse than phishing.

Signed Private Certificates

China, our fiercest cyber enemy, is very clever at leveraging private keys or certificates - HP, Dell, Sectigo, other - to sneak in.

Getting Down to Basics

However advanced your cloud provider, the basics of cyber remain the same:

Automate Configuration Management

The DC Strategic Group's founder, Lucy Carpenter is one of the earliest designers for the CIA's (IBM) robotic data retrieval and storage framework. As with any other system, poor release management provides hidden back doors for clever espionage artists. Tricks exploited against the CIA in China, and against Anthem BCBS in Maryland.

Iterative Analysis, Real-Time Response

Can you imagine being told at 3 pm on a Sunday, your ISP cyber team would not respond until 8 am Monday morning? That's just what happened recently, on a major Chinese Cyber breach in north Virginia, when the discovering team phoned Verizon.


ISP &

Network Defense
  • Chargen/SNMP Responses
  • Invalid port numbers
  • Connection holding
  • HOIC and LOIC
  • Spoofed SYN

Web &

Traffic Security
  • TCP/UDP Floods
  • HTTP GET/POST Floods
  • UDP Fragmentations
  • XOR DDoS
  • SSDP/UPNP Responses

Don’t need all the bells and whistles? We also support Amazon AWS.

Absolutely the Best Cloud Cyber

Selected as the US Federal Government's cloud provider of choice, we think AWS - headquartered here in north Virginia - is also perfect for small businesses, biomed companies, or entrepreneurs with security needs. Let us support your public or private sector migration, solution architecture, or specific cyber framework development.


Discover how easy it can be to secure any cloud or enterprise computing environment: (571) 327-0585.