Dakota State University students walking around campus

Preparation + opportunity = success

That's the DSU equation. We're a four-year university with nationally recognized programs, cutting-edge facilities, and the brightest thinkers. But we're also a tight-knit, inclusive community. Small class sizes mean hands-on training and individualized attention. All this with an affordable, public school price that's among the best values in the region.

Majors & Degrees

Boundary Fence

Project Boundary Fence is a free resource for South Dakota county and city governments provided by the Attorney General’s Office of South Dakota. Our goal is simple, we want to help secure county and city networks from cyber attacks through external penetration testing on outward facing technology infrastructures.

What we do

Project Boundary Fence identifies network vulnerabilities while also validating current security defenses. PBF will help county and city governments understand their current security posture, reduce cyber risk, facilitate compliance, and improve operational efficiency. We focus on long-term relationships to build an accurate profile of primary business functions, where threats originate, and individual goals of security assessments.

Who we are

We are a team of cybersecurity professionals from the Deep Red Lab and DigForCE Lab at DSU MadLabs® dedicated to assisting county and city governments to secure their technology infrastructure. We use applied security research and diverse tactics and techniques in penetration testing, also known as red teaming. We utilize validated and ethical tools and techniques to provide comprehensive security assessments. 

Together, we can work to stop cyber-attacks before they happen.

Who we partner with

Project Boundary Fence is a partnership between Dakota State University, the South Dakota Attorney General’s office, South Dakota county and city governments to provide free penetration testing. Together, we work to stop cyber attacks before they happen.

DSU Logo  |  Consumer Protection Logo  |  SD Attorney General Logo 


Reveal vulnerabilities an attacker could exploit to gain access to your network and systems.


Prioritized tactical and strategic recommendations address discovered vulnerabilities.


Receive validation of remediation efforts, as well as expert training to improve security defenses.

Tell us about your requirements

Fill out the form below to let us know your requirements. Once you do, we'll reach out to ask you a few questions to better understand your scope and timeline.


Fill out my online form.

“There are risks and costs to a program of action — but they are far less than the long range cost of comfortable inaction.”

John F. Kennedy