Our Services.


  • Security Code Reviews

    The most accurate and efficient way to identify vulnerabilities. Our team reviews millions of lines of code each year, revealing tons of security defects.

  • Artboard 1

    Penetration Testing

    Our highly-experienced application security experts combine manual testing with open and commercial tools to deliver high-quality security assessments.

  • Mobile Penetration Testing

    We test and secure apps since the first banking apps were built. We know every little detail of the latest emerging threats and defenses in modern apps.

  • board Created with Sketch.

    Red Teaming

    Our highly experienced multidiscipline RED team performs a coordinated attack on your organization's digital, social and physical security. Analysing your detection and response capabilities (the Blue Team).

  • Artboard 1

    Agile Security Testing

    Security bugs can enter your software at any time. We help you to catch and prevent them early on by integrating security testing into your sprints.

  • Artboard 1

    CI / CD Security Testing

    We integrate automated security testing into your software delivery pipeline and optimize it for your targets using open source tooling such as OWASP ZAP.

  • Artboard 1

    Security Awareness

    We provide technical application security workshops with client-specific content specifically tailored to your threats and technologies.

  • Banking Malware Detection

    CSD provides protection against Web and Android based (banking) malware.

How we work

  • 1

    Intake

    During the intake (free of charge) we discuss your project and tell you more about us and our modus operandi. The main purpose is to collect all the information we need to create our proposal (plan of action).

  • 2

    Offer

    You will receive our proposal, including a detailed overview of the activities, deliverables, planning and costs.

  • 3

    Preparation

    When the proposal is accepted, we deliver a list of all the things that need to be prepared for the testing activities.

  • 4

    Executing activities

    The scheduled security testing activities will be executed in the planned time window. During the test frequent updates of findings and progress will be shared.

  • 5

    Findings meeting

    Once all testing activities have been executed, a findings meeting will be arranged to explain, demonstrate and discuss findings, impact and fixes.

  • 6

    FInal report

    The results of the assessment will be reported in detail. Each finding will consist of a description of the risk, instructions on how to reproduce and verify the finding, and a recommendation on how to resolve the finding or to mitigate the risk.

Work with us →