Information Security Consulting & Research Services
Deja vu Security is a leading trusted provider of information security research and consulting services to some of the world’s largest companies. We focus on helping clients build secure solutions and provide a full-range of security services.
Find out how our application security, IoT security, merger and acquisition security, and other services can help you operate your business with peace of mind.
Read our blog, find out where to see us next, check out our datasheets, catch up on best practices with our case studies, or study up on some white papers.
Learn about our organization history, mission, and leadership. Discover the expert minds behind our methods. Contact us and find out how we can help you.
“You know it’s good work when you’ve got people challenging you in different areas,” she said. “It shows they have done a thorough analysis. These require some thought from you. An audit that doesn’t challenge, doesn’t provide value.”
Deja vu Security and Peach Tech staff recently attended DefendCon, a Seattle-based cybersecurity conference intended as a safe space for women and non-binary folks.
Deja vu Security CEO Adam Cecchetti spoke on the importance of net neutrality at a press conference led by Washington Senator Maria Cantwell on Sunday, May 6th, 2018. Cecchetti was joined by other Pacific Northwest business leaders, all throwing their weight behind an upcoming congressional push to undo a controversial FCC decision from late 2017.
How will the proliferation of blockchain-based technologies change the enterprise security landscape?
Join us for a half day summit on building cyber security into the decentralized digital economy. Security and industry experts will share their insights on the realities and risks of these growing technologies.
To build a safer more connected tomorrow we are going to have to change how we build devices today. This post explores four ways our industry can attack the issue of IoT device security.
The coffee shop is quieter than usual; as soon as Sam walks in the door, both his laptop and cell phone connect to the Wi-Fi. Sam sits down drink in hand and begins to work through his email.
The greatest trick a computer ever pulled was convincing you it was only one computer. If you've been wondering how drilling a three inch hole can make an ATM freely dispense its contents, you're about to find out.
In the last 20 years, firmware engineering has gotten better, but perhaps we should take another look at what we declare a minimum viable missile.
ATM hacking and skimming is on the rise, but how bad is it really? And what can you as an individual and an organization do about it? Read on and learn.