红领巾瓜报

Information Security Services

lock icon

Audit and Compliance Support

Provides audit and compliance support, assisting with meeting requirements for government, corporate, and industry regulations.

network icon

Network Security Ops Augmentation

Supplement, expand or replace existing Security Operations Center (SOC) capabilities and provide training for other SOC analyst and other security engineers.

 research and development icon

Research and Development

Provide technical and analytical expertise to support the modernization of cyber development, operations, infrastructure, and training for partner organizations.

 

Corporate Partners who have incorporated our applied learning initiative have found co-op opportunities to be more cost effective than traditional outsourcing while providing more meaningful benefits and services.

 

 Our Innovative Approach

Student monitoring a variety of security apps.

A Better Way to Safeguard Your Business

With the growing demand for cybersecurity professionals in the work place, CSFRG at 红领巾瓜报 wants to partner with you by providing you with the right resources to connect your business to talented, local students.  Partner with CSFRG to close the tech gap you face today--and  help us continue to build a workforce pipeline that meets current and future needs. 

Download CSFRG Flyer

 


+504 new cyber threats per minute
1 in 4 will experience a data breach
24089 records average number per breach

Companies we work with

logos of companies csfrg work with

 

Workshop diverse students

 

 

Partnering with CSFRG

We provide student employees that are high quality, performance focused, better prepared, and eager to work and learn. As a CSFRG Employer Partner, we save you time and money:

  • By Defining Skills Gap & Development Pathway
  • Recruitment
  • Hiring
  • Management
  • Performance and Ongoing Training
  • Responsibility & Liability
  • Payroll and Taxes

In addition, our WSU Career Coaches work with students to ensure they are equipped to be successful in their professional roles. They also serve as advisors and liaisons--ensuring your needs are met.

photo of Jilian Slagter
It used to be that we had to find a student with limited skills and spend months in training, now through the Applied Learning model at WSU can help students develop the right skills for our jobs.
Jillian Slagter
Chief Human Resources Officer, Curo Financial

Trends & Insights

artificial intelligence
cybersecurity

The use of artificial intelligence (AI) in cybersecurity, while often overhyped, is not a new concept. Hackers have included countermeasures in malware since its inception to detect runtime environments or sense detection attempts.

OWASP top 10 security risks and vulnerabilities
csfrg

The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security.

A Boeing 737-800 jet from Malaysia Airlines. (Md Shaifuzzaman Ayon, CC BY-SA 4.0, via Wikimedia Commons)
csfrg

Malaysia Airlines faces the daunting task of investigating over nine years鈥 worth of compromised data after learning of a 鈥渄ata security incident.鈥

We'll find the right candidates for you.

We'll help you find the tech talent you need to protect your organization, so you can focus on running your business.