HOME    ABOUT    NEWS    SERVICES    PRINCIPLES    KNOWLEDGE    CAREERS    CONTACT
Application    Infrastructure    Supply Chain
SUPPLY CHAIN SECURITY: VALUE
Active participation in the research and ethical hacking communities keeps our analysts abreast of the current security trends. Given such a strong foundation in supply chain security, we are adept at identifying the latest attack vectors and relevant defense technologies - collectively enabling us to keep supply chain vendors safe. As security experts independent of your organization, we can strengthen your vendors’ security posture without conflict and any worry.
We offer supply chain security assessments including:
CASE STUDY: HTTPS Vulnerabilities
ISE identified 21 (70% of sites tested) financial, healthcare, insurance and utility account sites that failed to forbid browsers from storing cached content on disk, and as a result, after visiting these sites, unencrypted sensitive content is left behind on end-users' machines.
CASE STUDY: Exploiting RFIDs
The Texas Instruments DST tag is a cryptographically enabled RFID transponder used in several wide-scale systems including vehicle immobilizers and the ExxonMobil SpeedPass system. This page serves as an overview of our successful attacks on DST enabled systems.
White Papers
Case Studies
Our Principles
Contact Us
 

Copyright 2005-2013 Independent Security Evaluators, LLC. All rights reserved.