Infosec

Infosec company information, Employees & Contact Information

Explore related pages

Related company profiles:

At InfoSEC, we don't just keep up with the rapid pace of cybersecurity—we set it. Our innovative solutions and strategic partnerships make us the vanguard of digital defense. With 37 elite solution partners and a host of industry accolades, we ensure that your business is protected by the best in the field. As the sole Ambassador Partner of Vectra in Turkey, InfoSEC brings AI-driven cybersecurity innovations to protect against the most sophisticated threats. Our Platinum Partner status with Forcepoint underscores our commitment to delivering premier security solutions to our valued customers in the EMEA region. Our renowned roundtables and large-scale events, held in collaboration with our solution partners, are cornerstones of our thought leadership. These gatherings are not just events—they are think tanks where top minds in cybersecurity collaborate, innovate, and push the boundaries of what’s possible. Through these interactions, we forge stronger, smarter defense strategies that benefit our clients and partners alike. Our commitment to excellence extends to education and training. As an Authorized Training Center for both Check Point and Forcepoint, we empower professionals with the skills and knowledge needed to defend against cyber threats.

Company Details

Employees
57
Founded
-
Address
Merdivenköy Mah. Nur Sok. No:1/a, Business İstanbul A Blok Kat:13 Daire:127,united Arab Emirates
Phone
+90 (216) 515 40 00
Email
in****@****.com.tr
Industry
Computer And Network Security
Keywords
IT Consulting.
HQ
ISTANBUL
Looking for a particular Infosec employee's phone or email?

Infosec Questions

News

Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource - Black Hills Information Security, Inc.

Offensive Tooling Cheatsheets: An Infosec Survival Guide Resource Black Hills Information Security, Inc.

Caging Copilot: Lessons Learned in LLM Security - Black Hills Information Security, Inc.

Caging Copilot: Lessons Learned in LLM Security Black Hills Information Security, Inc.

Stop Spoofing Yourself! Disabling M365 Direct Send - Black Hills Information Security, Inc.

Stop Spoofing Yourself! Disabling M365 Direct Send Black Hills Information Security, Inc.

John Strand’s 5 Phase Plan For Starting in Computer Security - Black Hills Information Security, Inc.

John Strand’s 5 Phase Plan For Starting in Computer Security Black Hills Information Security, Inc.

Community - Black Hills Information Security, Inc.

Community Black Hills Information Security, Inc.

Mental Health – An Infosec Challenge - Black Hills Information Security, Inc.

Mental Health – An Infosec Challenge Black Hills Information Security, Inc.

Light at the End of the Dark Web - Black Hills Information Security, Inc.

Light at the End of the Dark Web Black Hills Information Security, Inc.

Offensive IoT for Red Team Implants – Part 1 - Black Hills Information Security, Inc.

Offensive IoT for Red Team Implants – Part 1 Black Hills Information Security, Inc.

BHIS and Antisyphon Training - Black Hills Information Security, Inc.

BHIS and Antisyphon Training Black Hills Information Security, Inc.

GRC for Security Managers: From Checklists to Influence - Black Hills Information Security, Inc.

GRC for Security Managers: From Checklists to Influence Black Hills Information Security, Inc.

Getting Started With Wireshark - Black Hills Information Security, Inc.

Getting Started With Wireshark Black Hills Information Security, Inc.

How to Get a Job in Cybersecurity - Black Hills Information Security, Inc.

How to Get a Job in Cybersecurity Black Hills Information Security, Inc.

Bronwen Aker - Black Hills Information Security, Inc.

Bronwen Aker Black Hills Information Security, Inc.

Let’s Talk About TikTok - Black Hills Information Security, Inc.

Let’s Talk About TikTok Black Hills Information Security, Inc.

Monitoring High Risk Azure Logins - Black Hills Information Security, Inc.

Monitoring High Risk Azure Logins Black Hills Information Security, Inc.

A Letter from John - Black Hills Information Security, Inc.

A Letter from John Black Hills Information Security, Inc.

Go-Spoof: A Tool for Cyber Deception - Black Hills Information Security, Inc.

Go-Spoof: A Tool for Cyber Deception Black Hills Information Security, Inc.

From High School to Cyber Ninja—For Free (Almost)! - Black Hills Information Security, Inc.

From High School to Cyber Ninja—For Free (Almost)! Black Hills Information Security, Inc.

Indecent Exposure: Your Secrets are Showing - Black Hills Information Security, Inc.

Indecent Exposure: Your Secrets are Showing Black Hills Information Security, Inc.

Augmenting Penetration Testing Methodology with Artificial Intelligence - Part 1: Burpference - Black Hills Information Security, Inc.

Augmenting Penetration Testing Methodology with Artificial Intelligence - Part 1: Burpference Black Hills Information Security, Inc.

Creating the Next Generation of Interns - Black Hills Information Security, Inc.

Creating the Next Generation of Interns Black Hills Information Security, Inc.

How to Secure Your Home Network - Black Hills Information Security, Inc.

How to Secure Your Home Network Black Hills Information Security, Inc.

BHIS Tribe of Companies - Black Hills Information Security, Inc.

BHIS Tribe of Companies Black Hills Information Security, Inc.

Detecting Malware Beacons With Zeek and RITA - Black Hills Information Security, Inc.

Detecting Malware Beacons With Zeek and RITA Black Hills Information Security, Inc.

Your Browser is Not a Safe Space - Black Hills Information Security, Inc.

Your Browser is Not a Safe Space Black Hills Information Security, Inc.

Blue Team, Red Team, and Purple Team: An Overview - Black Hills Information Security, Inc.

Blue Team, Red Team, and Purple Team: An Overview Black Hills Information Security, Inc.

Espanso: Text Replacement, the Easy Way - Black Hills Information Security, Inc.

Espanso: Text Replacement, the Easy Way Black Hills Information Security, Inc.

WEBCAST: Your 5 Year Plan into InfoSec - Black Hills Information Security, Inc.

WEBCAST: Your 5 Year Plan into InfoSec Black Hills Information Security, Inc.

Crafting the Perfect Prompt: Getting the Most Out of ChatGPT and Other LLMs - Black Hills Information Security, Inc.

Crafting the Perfect Prompt: Getting the Most Out of ChatGPT and Other LLMs Black Hills Information Security, Inc.

Each time we work with a customer, we strive to answer the following critical security question: - Black Hills Information Security, Inc.

Each time we work with a customer, we strive to answer the following critical security question: Black Hills Information Security, Inc.

Cyber Range - Black Hills Information Security, Inc.

Cyber Range Black Hills Information Security, Inc.

Revisiting Insecure Direct Object Reference (IDOR) - Black Hills Information Security, Inc.

Revisiting Insecure Direct Object Reference (IDOR) Black Hills Information Security, Inc.

Spamming Microsoft 365 Like It’s 1995 - Black Hills Information Security, Inc.

Spamming Microsoft 365 Like It’s 1995 Black Hills Information Security, Inc.

Spoofing Microsoft 365 Like It’s 1995 - Black Hills Information Security, Inc.

Spoofing Microsoft 365 Like It’s 1995 Black Hills Information Security, Inc.

Securing the Cloud: A Story of Research, Discovery, and Disclosure - Black Hills Information Security, Inc.

Securing the Cloud: A Story of Research, Discovery, and Disclosure Black Hills Information Security, Inc.

Cyber Range Updates - Black Hills Information Security, Inc.

Cyber Range Updates Black Hills Information Security, Inc.

Satellite Hacking - Black Hills Information Security, Inc.

Satellite Hacking Black Hills Information Security, Inc.

Hunting for SSRF Bugs in PDF Generators - Black Hills Information Security, Inc.

Hunting for SSRF Bugs in PDF Generators Black Hills Information Security, Inc.

Abusing S4U2Self for Active Directory Pivoting - Black Hills Information Security, Inc.

Abusing S4U2Self for Active Directory Pivoting Black Hills Information Security, Inc.

Cisco Smart Installs and Why They’re Not “Informational” - Black Hills Information Security, Inc.

Cisco Smart Installs and Why They’re Not “Informational” Black Hills Information Security, Inc.

DLL Jmping: Old Hollow Trampolines in Windows DLL Land - Black Hills Information Security, Inc.

DLL Jmping: Old Hollow Trampolines in Windows DLL Land Black Hills Information Security, Inc.

Adversary in the Middle (AitM): Post-Exploitation - Black Hills Information Security, Inc.

Adversary in the Middle (AitM): Post-Exploitation Black Hills Information Security, Inc.

Your Reporting Matters: How to Improve Pen Test Reporting - Black Hills Information Security, Inc.

Your Reporting Matters: How to Improve Pen Test Reporting Black Hills Information Security, Inc.

Adding Egress Brute Force to PowerShell Payloads - Black Hills Information Security, Inc.

Adding Egress Brute Force to PowerShell Payloads Black Hills Information Security, Inc.

RFID Proximity Cloning Attacks - Black Hills Information Security, Inc.

RFID Proximity Cloning Attacks Black Hills Information Security, Inc.

How to Weaponize the Yubikey - Black Hills Information Security, Inc.

How to Weaponize the Yubikey Black Hills Information Security, Inc.

Weaponizing Princess Toys: Crafting Wi-Fi Attack Kits - Black Hills Information Security, Inc.

Weaponizing Princess Toys: Crafting Wi-Fi Attack Kits Black Hills Information Security, Inc.

Getting PowerShell Empire Past Windows Defender - Black Hills Information Security, Inc.

Getting PowerShell Empire Past Windows Defender Black Hills Information Security, Inc.

Admin’s Nightmare: Combining HiveNightmare/SeriousSAM and AD CS Attack Path’s for Profit - Black Hills Information Security, Inc.

Admin’s Nightmare: Combining HiveNightmare/SeriousSAM and AD CS Attack Path’s for Profit Black Hills Information Security, Inc.

Machine-in-the-Middle (MitM) BLE Attack - Black Hills Information Security, Inc.

Machine-in-the-Middle (MitM) BLE Attack Black Hills Information Security, Inc.

How to Not Get Scammed on Discord - Black Hills Information Security, Inc.

How to Not Get Scammed on Discord Black Hills Information Security, Inc.

Towards a Quieter Firefox - Black Hills Information Security, Inc.

Towards a Quieter Firefox Black Hills Information Security, Inc.

What’s Changed in Recon-ng 5.x - Black Hills Information Security, Inc.

What’s Changed in Recon-ng 5.x Black Hills Information Security, Inc.

Dumping Firmware With the CH341a Programmer - Black Hills Information Security, Inc.

Dumping Firmware With the CH341a Programmer Black Hills Information Security, Inc.

Red + Blue = Purple - Black Hills Information Security, Inc.

Red + Blue = Purple Black Hills Information Security, Inc.

Using CloudFront to Relay Cobalt Strike Traffic - Black Hills Information Security, Inc.

Using CloudFront to Relay Cobalt Strike Traffic Black Hills Information Security, Inc.

Red Teaming Microsoft: Part 1 – Active Directory Leaks via Azure - Black Hills Information Security, Inc.

Red Teaming Microsoft: Part 1 – Active Directory Leaks via Azure Black Hills Information Security, Inc.

How to Phish for Geniuses - Black Hills Information Security, Inc.

How to Phish for Geniuses Black Hills Information Security, Inc.

How to Bypass Anti-Virus to Run Mimikatz - Black Hills Information Security, Inc.

How to Bypass Anti-Virus to Run Mimikatz Black Hills Information Security, Inc.

How to Bypass Application Whitelisting & AV - Black Hills Information Security, Inc.

How to Bypass Application Whitelisting & AV Black Hills Information Security, Inc.

How to Phish for User Passwords with PowerShell - Black Hills Information Security, Inc.

How to Phish for User Passwords with PowerShell Black Hills Information Security, Inc.

Pentesting ASP.NET Cookieless Sessions with Burp - Black Hills Information Security, Inc.

Pentesting ASP.NET Cookieless Sessions with Burp Black Hills Information Security, Inc.

Top Infosec Employees

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant