Solutions
Corporate Security
Security Program Strategy
Defensive Enablement
Purple Team Exercises
Red Team Operations
Incident Response
Product Security
Professional Security Evaluations
Continuous Security for DevOps
Automated Security Analysis
Software Maturity Modeling
Software Composition Analysis
new
By Expertise
Internet of Things
SaaS Applications
Mobile Applications
Cloud Infrastructure
Corporate Infrastructure
Critical Infrastructure
By Industry
Technology
Finance
Healthcare
Energy
Automotive
Manufacturing
Customers
Success Stories
Satisfaction
Testimonials
Resources
Security Blog
Whitepapers
GitHub Repos
Research Lab
Company
About Us
Executive Team
Board of Directors
News + Press
Careers
Contact Us
Security Blog
Latest Articles
Software
Network
Cloud
Hardware
Tools & Techniques
Security Insights
Explore
Paul Jauregui
Cloud
Security Insights
Navigating Today's Shared Security Responsibility Model in the Cloud
by
Paul Jauregui
March 24, 2015
Network
Security Insights
CRITICAL: Bash "Shellshock" Vulnerability
by
Paul Jauregui
September 26, 2014
Network
Security Insights
CRITICAL: New Internet Explorer Zero-day Vulnerability
by
Paul Jauregui
April 27, 2014
Software
Tools & Techniques
Exploiting Mobile Banking with HeartBleed Vulnerability
by
Paul Jauregui
April 11, 2014
Software
Security Insights
CRITICAL: HeartBleed Vulnerability
by
Paul Jauregui
April 8, 2014
Software
Security Insights
Whats up with WhatsApp’s Security?
by
Paul Jauregui
February 20, 2014
Community
Praetorian Moves Its Austin HQ to New Downtown Office Space
by
Paul Jauregui
October 28, 2013
Network
Security Insights
Advanced Threats: Driving Senior Leadership Awareness
by
Paul Jauregui
March 19, 2013
Software
Community
Twitter's Charlie Miller is Coming to Austin ISSA to Discuss iOS Security
by
Paul Jauregui
October 30, 2012
Software
Community
Praetorian sponsors 2012 Boston Application Security Conference (BASC)
by
Paul Jauregui
October 9, 2012
1 / 2
Next
We are bringing together the world's security expertise to solve the cybersecurity problem.
Popular
Getting Started with Praetorian’s ATT&CK Automation
Active Directory Visualization for Blue Teams and Threat Hunters
Cloud Data Exfiltration via GCP Storage Buckets and How to Prevent It
Why Praetorian Benchmarks to MITRE ATT&CK™ and Why You Should Too
Running a .NET Assembly in Memory with Meterpreter
Building a Domain Specific Language for Red Team Payload Generation
NIST Cybersecurity Framework Vignettes: Broadcast Name Resolution Poisoning
Google Cloud Platform (GCP) Service Account-based Privilege Escalation paths