Cybersecurity vision

We believe in minimizing business disruption by preventing security risks from entering production environments. Our focus is on a proactive security approach rather than a reactive one.

By identifying and addressing security issues swiftly and efficiently, using automated processes and advanced technical expertise, we aim to reduce production risks.

We understand compliance as a consequence of a robust security practice.

our cybersecurity services

Cybersecurity services

Security posture

Focused on DevSecOps practices to automate the identification, risk evaluation, remediation and process follow up based on an ASPM tool to get an unified view of the application and release security posture. This for in-house developing and/or 3rd party software providers security requirements. 

Implementation strategy

Focused on the production environment infrastructure and applications to automate the identification, risk evaluation, remediation and process follow up based on an ASPM tool to get an unified view of the application and release security posture.

Incident response

Having a hard technical skilled team to analyze the production stack (application and infrastructure) to identify the flaw, contain the damage, get a root cause analysis and implement actions to prevent new incidents.

Security posture

Application Security

  • Threat Modeling
  • Static Application Security Testing (SAST, MobSF)
  • Supply chain security (SCA and SBOM)
  • Secret scan
  • IaC recipes scan
  • Container Registry Security (Quay)

QA Security

OWASP ZAP to build an automated security testing library

Infrastructure Security Posture

Focused on DevSecOps and Infrastructure security practices to ensure the release process of the software component. Check and monitor the container registry (ex: Quay) and the related infrastructure security configuration and release policies.

Security Posture Management Tool

Centralized tool for al the previous stages scans results to build an unified view of the risk status, automated triage for risk evaluation, follow up the resolution process and company’s tools integrations (ex: Jira)

security posture schema

Implementation strategy

To build a realistic, company aligned and technically aligned implementation of the security posture be start by doing an assessment and defining and implementation strategy and roadmap. On this assessment, we identify business needs, goals and compliance security requirements to understand the main security risks and assets.

Based on the business alignment process, the risk appetite, the security goals, security guidelines (OWASP, SAMM, NIST, etc) support the company’s security team to define a strategy and set a technical action plan/roadmap to achieve the security goals in a business compatible way. 

Incident response team

Incident Prevention

Support in defining incident response procedures and incident management training (for C-levels, managers, etc.) focusing on the decision-making processes during an incident. For the technical team, workshops conducting attack scenario simulations to practice forensic techniques. Also, perform general attack scenarios (ex: phishing) to help measure the awareness program effectivity. 

Incident Response

On an incident, provide a high technical qualified team to perform tasks like:

  • incident containment and initial analysis to find the main indicators of compromise (IoC), define an initial impact and potential lateral movements.
  • Perform a full root cause analysis to have a deep understanding on why the incident happened, including technical and process evaluation. 
  • Report and evidence collection required by insurance companies.
  • Lesson learned and recommendations to prevent similar incidents to happen again.

Talk to one of our nerds

They are usually friendly and wise experts (won’t bite you)

Head of Data/ML

Nico M

Nico, head of Data/ML at Netlabs

Nico doesn’t just handle data—he builds the highways it travels on. With a master’s degree in his pocket and years of deep experience, he’s the mastermind behind the data pipelines, lighthouses, and ETL workflows that keep everything flowing smoothly (and fast).

Forget dashboards—Nicolás lives in the engine room. He designs architectures that scale, automates the boring stuff, and makes sure your data shows up on time, every time. If your systems are talking to each other, chances are he wrote the translator.

Quietly brilliant, a bit allergic to unnecessary meetings, and dangerously efficient when left alone with a terminal—Nicolás is the kind of person who makes things happen.
Need a data backbone you can trust? Nicolás already built it.

View more
talk to Nico