Latest from Praetorian Blog
Praetorian provides a full suite of information security assessment and advisory services:
Obtain an accurate understanding of your security and risk posture, while ensuring compliance with industry regulators and information security best practices.
Companies that identify and remediate software vulnerabilities early and often will generate software maintenance savings that reduce overall development costs.
Identify vulnerabilities in mobile apps and prioritize remediation with research-driven security evaluations guided by the OWASP Application Security Verification Standard.
Services designed to help protect the confidentiality, integrity, and availability of systems and data in your organization's growing cloud environments.
Full coverage Internet of Things (IoT) security testing and assurance services to help your organization better deliver secure connected products to the market.
Praetorian always considers the broader set of enterprise services we have here at Qualcomm so reports and recommendations can be actionable.Gabe Lawrence Senior IT Security Engineer, Qualcomm
Excellent engagement, very professional and flexible. Nice detailed reporting.Mike Smallwood Senior Manager, Information Security, Blackbaud
Very skilled, professional, and detail oriented. Did a great job explaining results and the process to create the results which was extremely helpful.Joshua Scott Director Information Security, Move.com
I was very happy with the team, everyone was professional, the items found were useful, and I've received positive feedback from others here in engineering.Mike Yoder Software Engineer, Cloudera
Jamie Caramanica Director of Operations, Djed Studios
Very helpful, responsive and knowledgeable.
Rarely have we been so impressed and pleased. Praetorian executed the entire engagement flawlessly, and they gave us a huge push forward in tightening our systems security.Bronwen Stine Director IT, Carnegie Hall
Henry Hernandez Senior Vice President & IT Audit Officer, IBC Bank
Satisfaction with quality of delivered services.
We are constantly learning and adapting to our ever evolving industry. Explore what we've been up to:
Tuesday, April 26, 2016Engineering Efficiency and Continuous Improvement in Security Services
Wednesday, April 20, 2016JTAGulator vs. JTAGenum, Tools for Identifying JTAG Pins in IoT Devices
Tuesday, April 12, 2016Email Filters: A Reliable Phishing Protection?
Thursday, April 07, 2016End-to-End WhatsApp: An Opinionated Series on Why Signal Protocol is Well-Designed
Wednesday, March 16, 2016Why are JTAG and UART still effective attack vectors for IoT devices?