Today, creating a truly secure IT infrastructure requires access to highly specialized knowledge, intelligence, and expertise in order to stay at least one step ahead of the evolving risks. Because Praetorian is an authority on information security, your business can leverage our subject matter expertise to solve these challenging business problems. To that end, we invite you to enjoy the following information security resources.
Information Security Resources
We trust you will benefit from the following information security resources.
Highly specialized knowledge, intelligence, and expertise
Free Security Tools
Creator and Project Lead: Nathan Sportsman
JBroFuzz is a web application fuzzer for requests being made over HTTP and/or HTTPS. Its purpose is to provide a single, portable application that offers stable web protocol fuzzing capabilities.
Learn more about OWASP JBroFuzz
Scalable Tailored Application Analysis Framework
Creator and Project Lead: Ryan W. Smith
There has been no shortage of Android malware analysis reports recently, but thus far that trend has not been accompanied with an equivalent scale of released public Android application tools or frameworks. To address this issue, we are presenting the Scalable Tailored Application Analysis Framework (STAAF), released as a new OWASP project for public use under Apache License 2.0. The goal of this framework is to allow a team of one or more analysts to efficiently analyze a large number of Android applications. In addition to large scale analysis, the framework aims to promote collaborative analysis through shared processing and results.
View the STAAF Presentation
Hacking Exposed 6th Edition
Contributing Author: Nathan Sportsman
The tenth anniversary edition of the world's bestselling computer security book! The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities.
The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more. Hacking Exposed 6 applies the authors' internationally renowned computer security methodologies, technical rigor, and "from-the-trenches" experience to make computer technology usage and deployments safer and more secure for businesses and consumers.
"A cross between a spy novel and a tech manual."
Mark A. Kellner, Washington Times
"The seminal book on white-hat hacking and countermeasures... Should be required reading for anyone with a server or a network to secure."
Bill Machrone, PC Magazine
"A must-read for anyone in security... One of the best security books available."
Tony Bradley, CISSP, About.com
Learn more about Hacking Exposed 6th Edition