"The 2018 Kosovo/TAK's Adaptive Security System Development Pilot Project" which carried out for seven months through May to November for the Tax Administration of Kosovo has been successfully completed.
What We Do
For establishment your enterprise ISO/IEC 27001 Cert, Our staff is all ready to serve your needs with qualification, enough experience for many years and know-how.
read moreTo deal with technical threat(external/internal/privileged threat), Our staff provide various penetration test and the right solutions for your enterprise.
read moreOn the different system environment and conditions, we customize(design and develop for specific client) the basic security system using open source.
read moreFor satisfaction with the various compliance in your country, We already have enough lots of experience and understanding about various regulation. Indeed with official documents right in case.
read moreTo recognize and manage the present vulnerabilities in your systems(network, sever and application), We provide the latest vulnerability database and tools.
read moreWho we are
What We Think
"The 2018 Kosovo/TAK's Adaptive Security System Development Pilot Project" which carried out for seven months through May to November for the Tax Administration of Kosovo has been successfully completed.
In order to share our experiences and know-how of Cyber Security in Korea with peoples in the blind spot of information security, we ware started the WiKian-Junior, an internship program designed earlier this year.
WiKi Security Corporation, which participated in TAS(Transform Africa Summit) 2018, the largest ICT event in Africa, as an exhibitor, introduced information security consulting, security products and Training Center for cyber security. In particular, we participated in an official event to deliver certificates on behalf of ISO council as a result of ISO / IEC 27001 consulting service provided to KT Rwanda Network Ltd. earlier this year.
The Ministry of Information Technology and Communication (MITC) is a central specialized public administration body which elaborates and ensures the development of the Informational Society Statute (telecommunication, post, TV and broadcasts).
Philippines NTC is an attached agency of the Department of Information and Communication Technology, responsible for the supervision, adjudication and control over all telecommunications services throughout the country.
Rwanda's Telecom, KT Rwanda Networks Ltd, is a communications company with Rwanda's only LTE communications infrastructure, they are providing wholesale provision of universal mobile broadband network built on 4G LTE technology.
Tax Administration of Kosovo (TAK), as Enforcement Agency with full Autonomy, is responsible to administer the implementation of any tax type applicable by tax legislation in Republic of Kosovo.
CLIENT A company (oil refinery) BACKGROUND AND TOPIC - As a global company, it operates a large number of information systems and is obliged to comply with legal regulations in the Information and Communication Network Act, it regularly explores vulnerabilities and hacks to professional firms every year.
There was a consulting request from the client company for the AD security policy. AD security policy can be seen from various points of view from design of AD to account management, but since the total number of accounts is over 100,000, this consulting focused on identifying the latest issue, abnormal account, and suggesting improvement plan.
CLIENT The Ministry of Information and Communication of Moldova NATIONAL ICT STATUS The Republic of Moldova, which is a developing country in Eastern Europe, is centered on the Ministry of Information and Communication (MITC), ....
CLIENT A refinery (refinery) PROJCET BACKGROUND AND TOPIC As a representative company in the petroleum industry, the customer is a representative company of the oil industry. In order to secure the security of the process control system of the large refinery owned by the province ...
Most of the application source vulnerability diagnoses will receive a large number of source files and perform vulnerability diagnostics. Most of them are static diagnosis using a tool for diagnosing source vulnerabilities such as Fortify and dynamic ....
VPN has various methods such as remote access from site-to-site. However, from the viewpoint of an attacker, it is an attractive hacking object that can penetrate into an important path to enter an internal network only if a VPN is penetrated. Actually, site: vpn. * Com is a lot of domestic sites starting with vpn can be searched, but telecommuting,
* There are many purposes to hide your IP. - When Google pulled out of China, there were a lot of Chinese who used public VPNs to bypass blocking - There is a situation where you have to hide your IP inevitably in order to execute Real PT composed of Red Team - It may be used to bypass the blocked IP itself while diagnosing security vulnerabilities
What We Work For