Web Analytics

Even though we’re knowledge management and information security consultants, we’re tech geeks at heart, and often, we’re found in the FireOak Tech Lab.

We use the FireOak tech lab to build new tools to help us diagnose and solve our clients’ knowledge management and information security problems. We routinely use many of our own custom-developed tools during information security and knowledge management assessments for engagements that include shadow IT discovery, penetration tests, vulnerability assessments, physical security evaluations, social engineering tests, or network evaluation components. Other tools get deployed for extended periods on-site at client offices so we have visibility into their networks and can efficiently detect cybersecurity incidents and monitor network traffic for anomalies.

Meet the FireOak Acorn

One of our tools, the FireOak Acorn, was developed in the FireOak Tech Lab using a combination of open source technologies and 3D-printed components. Acorns are heavily used during many of our knowledge management and information security engagements. 

More about the FireOak Acorn

Printing a component for the FireOak Acorn
Printing a component for the FireOak Acorn

Other Tools from the Tech Lab

While the Acorn is our most well-known product developed in the FireOak Tech Lab, we are always prototyping and refining our toolset. Another set of tools often used in information security engagements: mechanisms for testing out the physical security in place to protect organizations' information and data. Often, physical security is a weak link for organizations' information security programs, so we evaluate various types of devices as part of our overall information security work.

Building a self-contained proximity card reader, used in information security assessments
Building a self-contained proximity card reader, used in information security assessments
Eric Smith in the FireOak Tech Lab
Eric Smith in the FireOak Tech Lab