We understand that every business is unique and therefore we work closely with our clients to understand their specific needs and tailor our services to best protect their assets and data. Whether you are a small business or a large enterprise, we will provide solutions that are scalable to fit your organization's size and complexity.
From Employee to Entrepreneur
The Road to Independence
V's journey to becoming a cybersecurity expert was far from conventional - having worked previously as a translator, book editor, web developer, and DBA, they eventually found their passion in the field of cyber threat intelligence.
As their passion for the field grew, they made the bold decision to become an entrepreneur and founded V·ONE Labs, a cybersecurity company with a mission to innovate and protect businesses from cyber threats.
Through dedication and hard work, they successfully transitioned from employee to entrepreneur, carving out a unique path to independence and building a successful career on their own terms.
Professional Development
Starting out as a web developer, they became a cybersecurity consultant and eventually founded their own cybersecurity company: V·ONE Labs.
Achievements
Published best-selling book Practical Threat Intelligence and Data-Driven Threat Hunting translated to several languages.
Early Life and Education
Born in Argentina, majored in languages in Europe before returning to their home country. Shifted focus to technology and cybersecurity, and pursued these fields as a self-taught learner.
This book is not only an introduction for those who don't know much about the cyber threat intelligence (CTI) and the threat hunting (TH) world, but also a guide for those with more advanced knowledge of other cybersecurity fields who are looking to implement a TH program from scratch.
You will start by exploring what threat intelligence is and how it can be used to detect and prevent cyber threats. As you progress, you'll learn how to collect data, along with understanding it by developing data models. The book will also show you how to set up an environment for TH using open source tools. Later, you will focus on how to plan a hunt with practical examples, before going on to explore the MITRE ATT&CK framework.
By the end of this book, you'll have the skills you need to be able to carry out effective hunts in your own environment.
In the Spotlight
Interviews, Mentions & Talks
This section showcases a compilation of interviews, notable mentions in news articles, and conference appearances that reflect the V's contributions to the industry
Learn about V.'s journey to founding her own cybersecurity company in their profile.
Threat Quotient - Women in Cyber Spotlight
V. Costa-GazcónRaiders of the MITRE Framework: How to Build Your Own Threat Library
MITRE ATT&CKcon 2.0
V. Costa-Gazcón & Ruth E. E. Barbacil"Practical Threat Intelligence and Data-Driven Threat Hunting" con Valentina Palacin
SECO Institute
V. Costa-Gazcón, Rob van Os & Wim StoffelenAtomic Friday: Expanding your skillset with Atomic Red Team
Atomic Friday
V. Costa-Gazcón, Hare Sudhan, Matt Graeber & Carrie RobertsOnce Upon a Time in the West: A Story on DNS Attacks
THIR Summit 2019
V. Costa-Gazcón & Ruth E. E. BarbacilNmap me & you are dead! Ethics, Attribution & Bias
Ekoparty 2020
V. Costa-Gazcón, Ruth E. E. Barbacil & Luciano MartinsRaiders of the MITRE Framework: Cómo construir tu propia Threat Library
IntelCon 2020
V. Costa-Gazcón & Ruth E. E. Barbacil"Practical Threat Intelligence and Data-Driven Threat Hunting" con Valentina Palacin
EkoTv
V. Costa-GazcónValentina is a threat hunter who used to work as a translator, and she is currently a senior cyber threat intelligence analyst. She joins Ron and Chris to talk about her background in languages, poetry and the impact of words, and much more.
Hacker Valley Studio
V. Costa-Gazcón, Ron Eddings, Chris CochranHelping Small Companies Leverage CTI with an Open Source Threat Mapping
ATT&CKCon Power Hour - December 2020
V. Costa-GazcónCyber Threat Intelligence Panel
GrayHat 2020
V. Costa-Gazcón, Ruth E. E. Barbacil, Kelsey Helm & Lauren ProehlPractical Advice on Threat Hunting Panel
Blue Team Village
V. Costa-Gazcón, Ruth E. E. Barbacil, Roberto Rodriguez, Plug, Anna McAbee, Paul Melson, Tony Lambert, Samir Bousseaden"Practical Threat Intelligence and Data-Driven Threat Hunting" con Valentina Palacin
EkoTv
V. Costa-GazcónThreat Hunting - Hacking Nights 0x017
Hacking Nights
V. Costa-Gazcón, Ruth E. E. Barbacil & Alan Levy (El Mago)ImpulsoCYBER: Entrevista a Valentina Costa-Gazcón escritora del libro "Practical Threat Intelligence and Data-Driven Threat Hunting".
Comunidad Dojo
V. Costa-Gazcón & Eduardo SnapeCyber Kung Fu - Ciberseguridad como método de defensa personal
Nerdearla
V. Costa-Gazcón & Karla MorenoOnce Upon a Time in the West - A story on DNS Attacks
OWASP Tel Aviv
V. Costa-Gazcón & Ruth E. E. BarbacilOur Passion Fuels Your Success
Services
-
Security Research95%
-
Threat Hunting as a Service90%
-
vSOC80%
-
Security Assessments70%
Have any Questions?
Let's Get In Touch
-
Email: