• Hello! We Are Gort

    Gort Security ...

  • Penetration Testing

    Dynamic Threat Assessment and Mitigation

  • Phishing Assessment

    Threat Mitigation is an ongoing process. The best defense is a knowledgeable team.

  • Threat Modeling

    Assess your enterprise threat footprint.

  • Secure Development Training

    Educated people drive security.

Gort: Security Built-In

Information Security Risk Assessments, and Secure Software Development Lifecycle (SSDL) Consulting

Penetration Testing

Penetration testing uncovers critical issues in your application, network and other information assets using the same techniques that hostile attackers use. By engaging Gort's professional hackers to proactively attack your applications, you can discover and remediate critical issues before hostile attackers do.

Phishing Assessment

External email is one of the most dangerous attack vectors that modern businesses deal with on a daily basis. A large percentage of corporate breaches are initiated via phishing email. Gort Security's phishing assessments are a powerful, fun way to combat the threat by educating your personnel to the dangers inherent in email.

Threat Modeling

Threat modeling is an essential process for determining your organization's risk footprint, and driving security throughout your entire business process. Gort consultants are experts at leading your enterprise through a Threat Modeling exercise to reveal dangerous threat vectors and vulnerabilities waiting to be exploited by attackers.

Static Application Security Testing

HPE Fortify is the leading Static Code Analysis (SCA) / Static Application Software Testing (SAST) tool. Gort consultants are experts at integrating Fortify into your SDLC, customizing it to your needs, guiding your development teams through the assessment and remediation of your vulnerabilities, and training you to get the most out of it.

Security News

Kali Linux on Windows 10!

Gort Security Blog
Phillip H. Blanton | March 07 2018

Install Kali Linux on Windows 10?!

Kali Linux is now available to be installed directly on Windows 10, downloadable from the Windows store, for free! Until now, those who needed to run Kali Linux would either dual-boot, boot from a Live CD, or ...read more...

Equifax Go Boom!

Gort Security Blog
Phillip H. Blanton | September 11 2017

Equifax Largest Data Breach in History?

Hackers have had access to Equifax' networks now for three months from May to July 2017. The information lost contains full names, addresses, birth dates, social security and driver's license numbers for up to ...read more...

UK Parliament Hacked

Gort Security Blog
Phillip H. Blanton | June 26 2017

UK Parliament Hacked

The UK Parliament's email system was hit by a cyber-attack on Friday morning that compromised at least 90 email accounts belonging members of parliament and their staff. The accounts breached were all protected by weak passwords. As a precaution, external access to the Parliament's email system has been shut off. MP Henry Smith posted that ...read more...