Skip to content
I'm Under Attack
  • Services

    Key Solutions & Services

    Comprehensive cybersecurity solutions through managed services, technical support, and advanced training programs.

    • Cybersecurity Experts
    • Staffing
    • Cloud Security
    • Technology Optimization
    • Consulting
    • Cybersecurity Training
    • Managed Security Service
    • Cybersecurity Experts
    • Staffing
    • Cloud Security
    • Technology Optimization
    • Consulting
    • Cybersecurity Training
    • Managed Security Service

    Detection and Response

    Real-time threat monitoring and rapid response to detect and neutralize cyber threats before they impact your business.

    Read More

    Incident Response

    Comprehensive support to address, mitigate, and recover from cybersecurity incidents with minimal impact on your organization.

    Read More

    Technical Support

    Expert guidance and assistance to ensure uninterrupted security operations and quick resolution of cybersecurity challenges.

    Read More

    Tabletop Wargames

    Interactive scenario-based exercises that simulate cybersecurity incidents, enhancing strategic decision-making, crisis management, and team coordination.

    Read More

    Purple Team

    Collaborative training where offensive and defensive teams unite to enhance threat detection, mitigation, and overall cybersecurity posture.

    Read More

    Red Team

    Simulate real-world cyberattacks to uncover vulnerabilities and enhance your team's offensive security skills.

    Read More

    Embedded Systems Security Engineering

    We provide expert guidance and hands-on support for integrating advanced cybersecurity features into embedded and IoT devices. This includes secure boot architecture, tamper resilience, secure communications, firmware-over-the-air (FOTA) mechanisms, task-level isolation, and endpoint hardening—optimized for FreeRTOS and other RTOS environments.

    Read More

    Training and Development

    Julie Security’s Training and Development services help equip your team with the skills and knowledge needed to tackle evolving cybersecurity challenges, from foundational concepts to advanced threat management.

    Read More

    Flexible Outstaffing Solutions

    Julie Security’s Flexible Outstaffing Solutions provide dedicated cybersecurity experts to integrate seamlessly into your team, allowing you to scale resources quickly and cost-effectively.

    Read More
  • Company

    About Us

    Your Trusted Partner in Strengthening Cybersecurity Resilience

    Our Values

    Your Trusted Partner in Strengthening Cybersecurity Resilience

    Our Services

    Your Trusted Partner in Strengthening Cybersecurity Resilience

    Our Story

    The numbers tell our story

    The Mission

    Our mission is to understand the unique challenges organizations face, delivering innovative and tailored cybersecurity solutions that empower resilience, ensure protection, and drive confidence in a connected world.

    The Commitment

    At Julie Security, we are committed to empowering organizations with the tools, expertise, and solutions needed to safeguard their digital assets in an increasingly complex and connected world. Founded on a passion for cybersecurity excellence, our mission is to deliver tailored, cutting-edge solutions that address the unique challenges of businesses across diverse industries.

    The Team

    Our team of seasoned cybersecurity professionals brings years of experience and an unwavering commitment to protecting our clients from evolving threats. By combining technical expertise with a deep understanding of industry-specific needs, we partner with organizations to build resilient defenses that secure their operations today and prepare them for the challenges of tomorrow.

  • Resources
    • Home
    • Managed Security Service
    • Cybersecurity Experts
    • Cybersecurity Training
    • Staffing
    • Cloud Security
    • Technology Optimization
    • Consulting
    • About Us
    • Opt-out preferences
    • Home
    • Managed Security Service
    • Cybersecurity Experts
    • Cybersecurity Training
    • Staffing
    • Cloud Security
    • Technology Optimization
    • Consulting
    • About Us
    • Opt-out preferences
    • Breach
    • Insider Threat
    • IoT Security
    • Malware
    • OT security
    • Phishing
    • Ransomware
    • Social Engineering
    • Zero-Day Exploit
    • Breach
    • Insider Threat
    • IoT Security
    • Malware
    • OT security
    • Phishing
    • Ransomware
    • Social Engineering
    • Zero-Day Exploit
Contact
I'm Under Attack
  • Home
  • Managed Security Service
  • Cybersecurity Experts
  • Cybersecurity Training
  • Staffing
  • Cloud Security
  • Technology Optimization
  • Consulting
  • About Us
  • Opt-out preferences
Contact Us
Linkedin X-twitter Youtube Facebook Github

This page was last changed on January 23, 2025, last checked on January 23, 2025 and applies to citizens and legal permanent residents of the United States.

1. Introduction

Our website, https://juliesecurity.com (hereinafter: "the website") uses cookies and other related technologies (for convenience all technologies are referred to as "cookies"). Cookies are also placed by third parties we have engaged. In the document below we inform you about the use of cookies on our website.

2. Cookies

When you visit our website it can be necessary to store and/or read certain data from your device by using technologies such as cookies.

2.1 Technical or functional cookies

Some cookies ensure that certain parts of the website work properly and that your user preferences remain known. By placing functional cookies, we make it easier for you to visit our website. This way, you do not need to repeatedly enter the same information when visiting our website and, for example, the items remain in your shopping cart until you have paid. We may place these cookies without your consent.

2.2 Statistics cookies

We use statistics cookies to optimize the website experience for our users. With these statistics cookies we get insights in the usage of our website.

2.3 Marketing/Tracking cookies

Marketing/Tracking cookies are cookies or any other form of local storage, used to create user profiles to display advertising or to track the user on this website or across several websites for similar marketing purposes.

3. Placed cookies

Most of these technologies have a function, a purpose, and an expiration period.

  1. A function is a particular task a technology has. So a function can be to "store certain data."
  2. Purpose is "the Why" behind the function. Maybe the data is stored because it is needed for statistics.
  3. The expiration period shows the length of the period the used technology can “store or read certain data."

Elementor

Statistics (anonymous)

Usage

We use Elementor for content creation. Read more

Sharing data

This data is not shared with third parties.

Statistics (anonymous)

Name
elementor
Expiration
persistent
Function
Store performed actions on the website

WordPress

Functional

Usage

We use WordPress for website development. Read more

Sharing data

This data is not shared with third parties.

Functional

Name
wpEmojiSettingsSupports
Expiration
session
Function
Store browser details
Name
wp-settings-*
Expiration
persistent
Function
Store user preferences
Name
wp-settings-time-*
Expiration
1 year
Function
Store user preferences
Name
wordpress_logged_in_*
Expiration
persistent
Function
Store logged in users

Complianz

Functional

Usage

We use Complianz for cookie consent management. Read more

Sharing data

This data is not shared with third parties. For more information, please read the Complianz Privacy Statement.

Functional

Name
cmplz_banner-status
Expiration
365 days
Function
Store if the cookie banner has been dismissed

HubSpot

Functional

Usage

We use HubSpot for marketing automation (automated email marketing). Read more

Sharing data

For more information, please read the HubSpot Privacy Statement.

Functional

Name
__hs_opt_out
Expiration
6 months
Function
Store cookie consent preferences

Purpose pending investigation

Name
__hs_cookie_cat_pref
Expiration
Function
Name
messagesUtk
Expiration
Function
Name
__hssc
Expiration
Function
Name
__hstc
Expiration
Function
Name
__hsmem
Expiration
Function
Name
hs-messages-is-open
Expiration
Function
Name
*_key
Expiration
Function
Name
hs_ab_test
Expiration
Function
Name
__hs_do_not_track
Expiration
Function

Google Analytics

Statistics

Usage

We use Google Analytics for website statistics. Read more

Sharing data

For more information, please read the Google Analytics Privacy Statement.

Statistics

Name
_ga_*
Expiration
1 year
Function
Store and count pageviews
Name
_gid
Expiration
1 day
Function
Store and count pageviews
Name
_ga
Expiration
2 years
Function
Store and count pageviews

CloudFlare

Functional

Usage

We use CloudFlare for content distribution network (CDN) services. Read more

Sharing data

For more information, please read the CloudFlare Privacy Statement.

Functional

Name
__cf_bm
Expiration
30 minutes
Function
Read and filter requests from bots

Mixpanel

Purpose pending investigation

Usage

We use Mixpanel for website statistics. Read more

Sharing data

For more information, please read the Mixpanel Privacy Statement.

Purpose pending investigation

Name
*_mixpanel
Expiration
Function

Google Fonts

Purpose pending investigation

Usage

We use Google Fonts for display of webfonts. Read more

Sharing data

For more information, please read the Google Fonts Privacy Statement.

Purpose pending investigation

Name
Google Fonts API
Expiration
Function

YouTube

Purpose pending investigation

Usage

We use YouTube for video display. Read more

Sharing data

For more information, please read the YouTube Privacy Statement.

Purpose pending investigation

Name
GPS
Expiration
Function
Name
VISITOR_INFO1_LIVE
Expiration
Function
Name
YSC
Expiration
Function
Name
PREF
Expiration
Function

Miscellaneous

Purpose pending investigation

Usage

Sharing data

Sharing of data is pending investigation

Purpose pending investigation

Name
__mpq_150605b3b9f979922f2ac5a52e2dcfe9_ev
Expiration
Function
Name
hjActiveViewportIds
Expiration
Function
Name
e_kit-elements-defaults
Expiration
Function
Name
_cfuvid
Expiration
Function
Name
cf_*
Expiration
Function
Name
image-optimization-trial-end-close-time
Expiration
Function
Name
_hjSessionUser_1958074
Expiration
Function
Name
_hjSession_1958074
Expiration
Function
Name
_gat_UA-78483756-3
Expiration
Function
Name
o0xut17x
Expiration
Function
Name
mvpivgst
Expiration
Function

4. Browser and Device based Consent

When you visit our website for the first time, we will show you a pop-up with an explanation about cookies. You do have the right to opt-out and to object against the further use of non-functional cookies.

4.1 Manage your opt-out preferences

You have loaded the Cookie Policy without javascript support. On AMP, you can use the manage consent button on the bottom of the page.

5. Enabling/disabling and deleting cookies

You can use your internet browser to automatically or manually delete cookies. You can also specify that certain cookies may not be placed. Another option is to change the settings of your internet browser so that you receive a message each time a cookie is placed. For more information about these options, please refer to the instructions in the Help section of your browser.

Please note that our website may not work properly if all cookies are disabled. If you do delete the cookies in your browser, they will be placed again after your consent when you visit our website again.

6. Your rights with respect to personal data

You have the following rights with respect to your personal data:

  • you may submit a request for access to the data we process about you;
  • you may object to the processing;
  • you may request an overview, in a commonly used format, of the data we process about you;
  • you may request correction or deletion of the data if it is incorrect or not or no longer relevant, or to ask to restrict the processing of the data.

To exercise these rights, please contact us. Please refer to the contact details at the bottom of this Cookie Policy. If you have a complaint about how we handle your data, we would like to hear from you.

For more information about your rights with respect to personal data, please refer to our Privacy Statement

7. Contact details

For questions and/or comments about our Cookie Policy and this statement, please contact us by using the following contact details:

Julie Security Inc
600 N Broad Street Suite 5
Middletown, DE 19709

United States
Website: https://juliesecurity.com
Email: privacy@ex.comjuliesecurity.com
Phone number: + 1 (833) 7585433

This Cookie Policy was synchronized with cookiedatabase.org on January 17, 2025.

Get Updates And Stay Connected -Subscribe To Our Newsletter

Services

Embedded Systems Security Engineering

Training and Development

Flexible Outstaffing Solutions

Incident Response Specialists

CISO and Leadership Support

Cybersecurity Experts On-Demand

Technology Implementation and Migration

Technology Assessments

Solution Engineering and Support

Cybersecurity Architecture and Design

Cybersecurity Strategy

Detection and Response

Solutions

Cloud Security Architecture Design

Cloud Security Assessment and Audit

Cloud Migration Security Support

Continuous Cloud Security Monitoring

Personal Training

Red Team

Purple Team

Tabletop Wargames

Technical Support

Incident Response

Detection and Response

Cybersecurity Strategy

Company

About

Blog

Terms & Conditions

Privacy Policy

Contact US

Our Locations

Talk with our Expert

2025 © Copyright Julie Security Inc.
Linkedin Github