Tell us about your project

Services you are interested in:

  • Home
  • Services
    Web3 Security Penetration Testing Virtual CISO Operational Security Personal CyberSecurity DevSecOps Security Operations Center (SOC)
    • Protocol and Smart Contracts Security
    • Web3 Monitoring and Incident Response
    • DevSecOps
    • Virtual CISO
    • Web3 Operational Security
    Protocol and Smart Contracts Security

    Threat modeling, secure choke points, pause/timelocks & rate-limits, CI static analysis, invariants/fuzzing, and post-audit fix sprints.

    Read more →
    Web3 Monitoring and Incident Response

    24/7 real-time monitoring for both on-chain and critical off-chain events.

    Read more →
    DevSecOps

    Secure repos, least-privacy CI, SAST/DAST/secrets scans, SBOMs, signed artifacts, branch protections, and gated deploys with automated attack checks.

    Read more →
    Virtual CISO

    Fractional CISO for startups and scaleups: governance, DevSecOps guardrails, incident playbooks, vendor risk, and board-ready reporting—executed via a 30/60/90 plan and maintained monthly.

    Read more →
    Web3 Operational Security

    Real-world OPSEC: audits, hardening, instructions and playbooks, trainings, honeypots.

    Read more →
    Penetration Testing

    Tiered, adversary-mapped pentests — from Essential VAPT to Bespoke Red Team-covering web/mobile, APIs, cloud/K8s/AD, and Web3, with add-on modules, PoC-rich reports, and a 90-day retest.

    Read more →
    Virtual Ciso

    Fractional CISO for startups and scaleups: governance, DevSecOps guardrails, incident playbooks, vendor risk, and board-ready reporting—executed via a 30/60/90 plan and maintained monthly.

    Read more →
    • OpSec Audit
    • Monitoring and Incident Response
    • Security Operations Center (SOC)
    • Security Awareness Training
    • DevSecOps
    OpSec Audit

    Comprehensive review of people, process, and tooling across identity, email, endpoints, cloud, and comms-clear gap analysis and a staged remediation plan.

    Read more →
    Monitoring and Incident Response

    Crown-jewel-aligned monitoring with SIEM/SOAR or our 24/7 SOC, noise-cutting alerts, battle-tested playbooks, and safe automations to shrink MTTA/MTTR.

    Read more →
    Security Operations Center (SOC)

    24/7 SOC tuned to your stack: unify on-chain + off-chain telemetry in SIEM/SOAR, trigger first moves (pauses, rate-limits), and prove response with MTTD/MTTR dashboards and re-runnable runbooks.

    Read more →
    Security Awareness Training

    Turn security into muscle memory with role-tailored drills from real incidents - phishing, social, SIM-swap, and browser traps - plus simple checks: slow down, verify on a second channel, and sign like it matters.

    Read more →
    DevSecOps

    Secure repos, least-privacy CI, SAST/DAST/secrets scans, SBOMs, signed artifacts, branch protections, and gated deploys with automated attack checks.

    Read more →
    • Personal OSINT research
    • Public Password Exposure
    • Personal Security Training
    Personal OSINT research

    Ethical, consent-only collection from open and restricted sources — clear findings, context, and a practical checklist to lower your footprint fast

    Read more →
    Public Password Exposure

    Password exposure, simplified: surface/dark web scan, combo/hash correlation, reuse detection, and a practical action list to lock accounts down.

    Read more →
    Personal Security Training

    Personal threat model → practical plan: tailored tools & habits, realistic simulations (phish/imposters/travel), and playbooks you can run tomorrow.

    Read more →
    DevSecOps

    Secure repos, least-privacy CI, SAST/DAST/secrets scans, SBOMs, signed artifacts, branch protections, and gated deploys with automated attack checks.

    Read more →
    Security Operations Center (SOC)

    24/7 SOC tuned to your stack: unify on-chain + off-chain telemetry in SIEM/SOAR, trigger first moves (pauses, rate-limits), and prove response with MTTD/MTTR dashboards and re-runnable runbooks.

    Read more →
  • About
  • Home
  • About
  • Web3 Security
  • Penetration Testing
  • Virtual CISO
  • Operational Security
  • Personal CyberSecurity
  • DevSecOps
  • Security Operations Center (SOC)
  • Protocol and Smart Contracts Security
  • Web3 Monitoring and Incident Response
  • DevSecOps
  • Virtual CISO
  • Web3 Operational Security
  • OpSec Audit
  • Monitoring and Incident Response
  • Security Operations Center (SOC)
  • Security Awareness Training
  • DevSecOps
  • Personal OSINT research
  • Public Password Exposure
  • Personal Security Training
Home Services About

Terms of Use & Privacy Policy | DualForce Security

Terms of use and privacy policy for the DualForce Security website, covering acceptable use, intellectual property, PDPA/GDPR-friendly data protection, cookies, retention and your rights.

Terms of Use & Privacy Policy

Last updated: 7 October 2025

These Terms of Use (“Terms”) and Privacy Policy (“Policy”) govern your use of the website operated by DualForce Security Pte. Ltd. (“Company”, “we”, “us”, “our”). By using this site, you agree to these Terms and this Policy. If you do not agree, please do not use the site.


1) Definitions

  • “Site” — all pages and subdomains under this domain.
  • “User” — a natural person visiting the Site.
  • “Personal Data” — information that identifies or can reasonably identify a person (e.g., name and email).

2) Acceptable Use

You agree not to:

  • violate any applicable laws or third-party rights;
  • attempt unauthorized access to the Site or its systems;
  • upload or distribute malicious code, or conduct DDoS attacks;
  • copy or reuse content beyond what is allowed by law or by our written permission.

We may suspend or restrict access to the Site at any time, with or without notice.


3) Intellectual Property

All content on the Site (text, images, logos, design, code, etc.) is owned by the Company or used under license. Any use beyond what is expressly permitted on the Site requires our prior written consent.


4) Disclaimer & Limitation of Liability

The Site is provided “as is”. While we strive for accuracy and uptime, we do not warrant:

  • error-free or uninterrupted operation; or
  • completeness or timeliness of content.

To the maximum extent permitted by law, we are not liable for any indirect, incidental, consequential, exemplary, or punitive damages arising from your use or inability to use the Site.


5) Third-Party Links

The Site may link to third-party resources that we do not control. We are not responsible for their content or data practices. You access them at your own risk.


6) Privacy Policy (PDPA / GDPR-friendly)

6.1 Data We Collect

When you submit our contact form, we collect:

  • Name
  • Email

We may also process technical data such as:

  • log data (IP address, date/time, referrer, user agent);
  • cookies or similar identifiers (see “Cookies” below).

If the Site uses bot-mitigation (e.g., Cloudflare Turnstile), that provider may process device/browser signals to verify you’re human.

6.2 Legal Bases

  • Consent — you voluntarily submit the form;
  • Legitimate interests — to operate a secure Site and respond to inquiries.

6.3 Purposes

  • Responding to your inquiry and ongoing communication about it;
  • Site analytics (aggregated/de-identified);
  • Security and abuse prevention (including anti-bot checks).

6.4 Sharing & International Transfers

We may use service providers (hosting, email gateways, security/anti-bot) to process data on our behalf under appropriate contracts. This may involve international transfers (e.g., EU/US/Singapore and other locations) with appropriate safeguards (such as standard contractual clauses or equivalent).

6.5 Retention

We retain Personal Data only as long as necessary for the purposes above or as required by law. After that, we delete or anonymize it.

6.6 Your Rights

Subject to your jurisdiction (including Singapore PDPA and, where applicable, GDPR), you may have rights to:

  • request access to your Personal Data;
  • request correction of inaccurate data;
  • request deletion (where applicable);
  • restrict or object to processing (where applicable);
  • data portability (where applicable);
  • withdraw consent at any time (does not affect processing prior to withdrawal).

To exercise rights, contact: [email protected]. We may ask for verification of your identity.

6.7 Cookies & Similar Technologies

We may use functional cookies (for operation), analytics (to improve the Site), and security cookies (anti-bot). You can manage cookies in your browser settings. Disabling some cookies may impact Site functionality.

6.8 Children

The Site is not intended for individuals under 16 (or the age of consent in your jurisdiction). If you believe a child provided data to us, please contact us to remove it.


7) Communications

By submitting the form, you agree to receive our replies to your inquiry at the email you provide. We do not send marketing emails without your separate consent. You may withdraw consent anytime by contacting [email protected].


8) Security

We implement reasonable organizational and technical measures (e.g., encryption in transit, access controls, logging). No method of transmission or storage is 100% secure.


9) Changes

We may update these Terms and this Policy from time to time. The updated version becomes effective upon posting on the Site with the new “Last updated” date.


10) Contact

Company: DualForce Security Pte. Ltd.
Contact email: [email protected]

© 2025 · DualForce Security · All Rights Reserved

Telegram E-mail LinkedIn Телефон