About Us

Our Story
4D5A Security is designed to be different, with proactive risk reduction at a great value at the heart of what we do. We choose to collaborate in leadership, instead of control, for your benefit, during a crisis. We augment and train your staff and work ourselves out of a job teaching our clients how to do our jobs when and where it makes sense to do so. Lastly, we provide Ninjas at Night, who have day jobs and consult and augment some of the most complex, niche skills, abilities, and experience in the world to bring you the elite at an affordable price. Our team has rolled out some of the best and brightest security centers and teams in the world, fought the most elite Dark Web and well-known breaches and actor to date, and actually discovered and disclosed some of the most critical threats in the history of computing to date. The value is clear, outcomes proven, and competitive rate unbeatable for what you get in return. Join us in a partnership to reduce risk!

Naming of 4D5A Security
4D5A Security is named after the hexadecimal representation of the two ASCII characters “MZ”, initials for Mark Zbikowski, who lead development of MS-DOS and the “magic number” seen in the header of any executable file on Windows. If you’re a threat hunter you’re looking for “MZ” in ASCII or “4D 5A” in ‘hex’ to confirm its an executable as part of content inspection when looking for hostile executables like that of malware.
The 4D5A logo is composed of two letters, M and Z, manipulated within an image program to create the image you see today, to the left of this description.
How Can We Help?
Frequently Asked Questions
How does IR work?
4D5a Security supports all the stages of Incident Response, with you, leading or augmenting as it makes the best sense to so to rapidly reduce risk and cost for you while in the middle of a crisis. We save you literally millions of dollars in our collaborate approach with Ninjas at Night.
What's the cost of IR?
4D5A Security offers proactive and reactive pricing to help you best manage and reduce risk. We also offer bulk hour discounts and pre-paid discount along with special offers. Inquire for current pricing and packages that best meet your needs!
Do you offer deals?
We regularly offer new client and new services deals, renewal offers and more. Reach out to us to see what is available to you today!
What is Vciso?
A Virtual Chief Information Officer, aka vCISO, is a leader that is hard to find! We offer interim staff to meet your needs while you seek to backfill a position, which can take a year or longer in this industry. We also offer part time staffing to augment your needs or to provide augmentation for scale and assurances where you have an existing CISO. Let us round out your CISO needs with our pool of global experts.
How does table top training work?
Tabletop exercises run by 4D5A Security demand outcomes that move the needle to reduce risk! Tired of ‘Ho Hum’ compliance driven exercises that are a waste of time? We partner with executives to identify perceived gaps, target areas of operations and risk, and involve every single stakeholder in simulations and injects for maximum output. We also use our own interactive assessments and metrics throughout, coupled with extensive monitoring and note taking, to capture gaps and recommendations to build out a prioritized risk roadmap following a tabletop exercise.
We also offer customized training. For example one client wanted to build out operations to augment MSSP services where they could start to handle their own malware samples and analyze some components of it for assurances and intel and also make sure the MSSP was doing a good job. We partnered to build out a safe and effective set of operations and then hosted a training workshop to prove it out in operations to onboard it for a successful launch into production.
What is your experience?
We are called Ninjas at Night for a reason, with some of the most experienced and recognized global experts on the planet at your fingertips. Our leader, Ken Dunham, is a recognized global leader, top 1%, with two number one startups in the space, is a Distinguished Fellow, has a best selling book, international article of the year on espionage, and was the top quoted security professional in the world. Our expert leaders all have a minimum of ten years niche experience in areas that are impressive, like setting up global SOC operations, breaking cryptography, native Russian language skills coupled with amazing malware attribution experience, and more. Join us for a team of excellence with success as your outcome.