CloudShield Technologies

CloudShield Technologies

CloudShield Technologies

  • Nov 15 at 6:03 PM
    Check out our Threat Researcher, Marcelle Lee at SecTor Canada! She spoke about "Security Training in a (Virtual) Box", a virtual training environment we designed that allows the user to step through the quintessential phases of an attack: reconnaissance, scanning and enumeration, gaining access, maintaining access, and covering tracks.
  • Nov 9 at 4:15 PM
    LookingGlass ranked on the Deloitte Fast 500 list! http://ow.ly/KD8J30gt6lL
  • Oct 30 at 4:15 PM
    Software Engineer Engineering San Jose, California LOOKINGGLASS CYBER SOLUTIONS is hiring for an experienced, dynamic and technically versed Software Engineer. This chosen candidate will look to be apart of and support a small software engineering team responsible for assessing requirements, developing use cases, and designing, coding, documenting, debugging and maintaining software applications. Read more about that position and others here: http://ow.ly/tWJs30fXV2c
  • Oct 27 at 4:05 PM
    Hackers are finding new and sophisticated techniques to compromise networks everyday. Yet one of the most tried and true attack methods brute force attacks remains popular. Learn how to protect yourself: http://ow.ly/srdn30fXTYX

Nov 15, 6:03 PM

Check out our Threat Researcher, Marcelle Lee at SecTor Canada! She spoke about "Security Training in a (Virtual) Box", a virtual training environment we designed that allows the user to step through the quintessential phases of an attack: reconnaissance, scanning and enumeration, gaining access, maintaining access, and covering tracks.

Nov 9, 4:15 PM

LookingGlass ranked on the Deloitte Fast 500 list! http://ow.ly/KD8J30gt6lL

Oct 30, 4:15 PM

Software Engineer Engineering San Jose, California LOOKINGGLASS CYBER SOLUTIONS is hiring for an experienced, dynamic and technically versed Software Engineer. This chosen candidate will look to be apart of and support a small software engineering team responsible for assessing requirements, developing use cases, and designing, coding, documenting, debugging and maintaining software applications. Read more about that position and others here: http://ow.ly/tWJs30fXV2c

Oct 27, 4:05 PM

Hackers are finding new and sophisticated techniques to compromise networks everyday. Yet one of the most tried and true attack methods brute force attacks remains popular. Learn how to protect yourself: http://ow.ly/srdn30fXTYX