Our vision is to bring together the world's expertise to solve challenging security problems.
Inc. magazine today revealed that Praetorian was recognized for its seventh consecutive year on the Inc. 5000 list, the most prestigious ranking of the nation’s fastest-growing private companies.
Praetorian, a cybersecurity company on a mission to make the world safer and more secure, announced today the addition of former SailPoint Technologies executive Cam McMartin to its board of directors.
AUSTIN, TX — February 10, 2020 — Praetorian a cybersecurity company on a mission to make the world safer and more secure, today announced a $10M Series A round of funding. The investors include Bill Wood Ventures and McKinsey & Company.
Inc. magazine today revealed that Praetorian was recognized for its sixth consecutive year on the Inc. 5000 list, the most prestigious ranking of the nation’s fastest-growing private companies.
Praetorian, a leading provider of enterprise cybersecurity solutions, has been named one of Inc. magazine's Best Workplaces for 2019. The award follows numerous honors from Inc. magazine, which last year named Praetorian for the fifth consecutive year on its 37th annual Inc. 5000 list, the most prestigious ranking of the nation's fastest-growing private companies.
Matt Eble, Practice Director of IoT Security at Praetorian, joins co-host Daniel Elizalde for a Podcast interview to discuss how to build secure IoT products. This is the second time Daniel has had a guest from Praetorian on the show. On episode number 2, he interviewed Paul Jauregui, and they had a great conversation about creating a culture of security within your IoT organization.
In this episode, Matt shares his expertise around implementing IoT security and shares the work he did with the Industrial Internet Consortium (IIC) to develop their latest document called: The IoT Security Maturity Model: A Practitioner’s Guide.
Security continues to be one of the biggest challenges for IoT adoption, and we all believe security thought leadership, like the one Matt brings to the table, is extremely valuable for any company building IoT products. This is an episode no IoT product leader should miss.
Praetorian contributes expertise and technical guidance to help IoT stakeholders assess and manage the security maturity of IoT systems.
Praetorian, the expert in cybersecurity solutions, today announced its contribution to the new Security Maturity Model (SMM) Practitioner’s Guide, which provides detailed and actionable guidance for Internet of Things (IoT) stakeholders to assess current security state, set appropriate security targets, regularly measure against them and prioritize investments accordingly. Matthew Eble, practice director of IoT security services for Praetorian, co-authored the new SMM Practitioner’s Guide in conjunction with other security leaders who are also members of the Industrial Internet Consortium® (IIC™).
Matt Eble, Internet of Things (IoT) Practice Director at Praetorian, a leading information security assessment and advisory services firm, has joined a team of industry leaders at the Industrial Internet Consortium (IIC) to develop a Security Maturity Model (SMM), extending the group’s IoT security maturity model (SMM) for trustworthiness.
For three consecutive years in a row, Praetorian has been included in Austin Business Journal's annual Fast 50 list. The award highlights local companies with outstanding growth for the past three years, with some recording compound annual growth in the triple digits since 2015. All financial data was submitted by the companies and verified by a third party.
Praetorian is proud and honored to stand with the fellow Austin organizations representing some of the hardworking and brightest minds in the city.
Explore all 50 winners of this year's ABJ Fast 50...
Praetorian, a leading information security assessment and advisory services firm, announced it has been included for the fifth consecutive year on Inc. Magazine's 37th annual Inc. 5000 list, the most prestigious ranking of the nation’s fastest-growing private companies. Praetorian is one of the eight fastest-growing security companies in the United States this year to have received the Inc. 5000 honor for five or more consecutive years. In addition, the celebrated company takes first place on the list of fastest-growing cybersecurity companies throughout the entire state of Texas.
Positioned for accelerated growth in the cybersecurity market, Praetorian taps new leader to ensure that it scales appropriately while maintaining its hyper-growth track record.
Jeff Olson, expert in deep learning and artificial intelligence, joins Praetorian to lead development of state-of-the-art machine learning techniques used for continuous software vulnerability identification.
Featured in Inc. magazine's 2018 issue, Praetorian is honored with the Best Workplaces Award and recognized for trust in leadership, team dynamics, and personal engagement.
Praetorian, a leading provider of advanced cybersecurity solutions, today announced it will be working with Southwest Research Institute in support of a $750,000 contract award received from the Transportation Research Board (TRB) to help state and local agencies address cyberattack risks on current transportation systems and those posed by future connected vehicles. TRB is a unit of the National Academy of Sciences, Engineering and Medicine, a nonprofit organization that provides independent, objective, and interdisciplinary solutions to improve transportation.
Praetorian, a leading provider of advanced cybersecurity assessment and advisory services, today announced it has joined the Industrial Internet Consortium® (IIC™), the world’s leading organization transforming business and society by accelerating the adoption of the Industrial Internet of Things (IIoT). This membership provides Praetorian opportunities to leverage its vast Internet of Things (IoT) security expertise to advance industry protocols and best practices at multiple levels of the entire IoT ecosystem.
Praetorian, a leading cybersecurity assessment and advisory services firm, announces that it has joined the STMicroelectronics Partner Program to make its end-to-end Internet of Things (IoT) penetration testing and security assessment services available to organizations working on the next wave of innovation. As a part of the ST Partner Program, Praetorian will deliver a holistic approach to security auditing by reviewing the entire solution, from chip to cloud, while prioritizing vulnerabilities so ST’s customers can successfully balance risk with time-to-market pressures.
Inc. magazine today ranked Praetorian, a leading information security assessment and advisory services firm, for the fourth consecutive year on its 36th annual Inc. 5000, the most prestigious ranking of the nation’s fastest-growing private companies. The list represents a unique look at the most successful companies within the American economy’s most dynamic segment— its independent small and midsized businesses. Companies such as Microsoft, Dell, Pandora, LinkedIn, Yelp, Zillow, and many other well-known names gained their first national exposure as honorees of the Inc. 5000.
This week, Praetorian's vice president Paul Jauregui joined a panel of industry experts at the Enterprise IoT Summit in Austin, TX. He was joined by Jon Clay, Shane Rooney, Mahesh Kodukula, and with Steve Brumer as moderator. The panel was called, "Securing the Enterprise for IoT".
Microsoft has launched a new program for its Azure cloud platform to help business customers strengthen their security posture amid the rise of the Internet of Things. Security and privacy concerns are top of mind for IT pros as the IoT continues to grow within the enterprise. Many struggle to verify the security of their IoT infrastructure and may delay product implementation as they establish best practices.
"In today's connected world, the perception of security risk alone, even if not realized, can still negatively impact consumer confidence necessary for new technologies to meet their full market potential," says Paul Jauregui, VP Marketing and IoT Business Lead at Praetorian. Praetorian, as a partner in the program, will review organizations' full IoT solutions while focusing on vulnerabilities. By helping them close security gaps, Praetorian and other partner companies will help Microsoft's business customers balance risk and time-to-market.
"Solving and managing IoT security is going to take a village," says Jauregui.
Microsoft recognizes Praetorian as a "best-in-class" Internet of Things (IoT) global auditing partner and a founding member of its new Security Program for Azure IoT.
Praetorian today announced a partnership with Microsoft, becoming one of its first global auditing partners under the new Security Program for Azure IoT. The new program brings together a curated set of best-in-class security auditors that Microsoft customers can choose from to perform security audits on their IoT solutions, find issues and provide recommendations. As a part of the Security Program for Azure IoT, Praetorian will deliver a holistic approach to security auditing by reviewing the entire solution, from chip to cloud, while prioritizing vulnerabilities so Microsoft’s enterprise customers can successfully balance risk with time-to-market pressures.
Microsoft is working with best-in-class security auditors with multiple areas of expertise. Our initial auditing partners will deliver independently validated security assessments of our customers’ IoT solutions, find issues and provide recommendations. We are also working with standards organizations and consortia, such as the Industrial Internet Consortium (IIC), to establish industry protocols and best practices for security auditing at multiple levels of the entire IoT ecosystem.
The Security Program for Azure IoT is built on Microsoft’s holistic approach to security for customers with broad investments across platforms for devices, infrastructure, identity, apps and data. Businesses in many industries can benefit, including automotive, smart cities, healthcare, military and more.
The results are in: Praetorian was included in the list of winners in Austin Business Journal's annual Fast 50 contest, which highlights the area companies that have grown rapidly in the past three years.
The list is a valuable source of info for sales people, job seekers, executives trying to keep and eye on the competition and those just wondering who's doing the most business in Austin's booming economy.
You might not know it based on the hype and marketing dedicated to APTs and vulnerabilities, but most criminals don't need to target software or use fancy tactics to ruin a network and compromise sensitive data.
Josh Abraham, a practice manager for Praetorian, recently compiled a report on common attack vectors used during 100 pen test engagements at 75 different organizations between 2013 and 2016.
"We compiled this paper to detail the top internal attacks we used over the past three years that resulted in Praetorian achieving its objectives. Common objectives include achieving a sitewide compromise and/or access to sensitive information the client requested we gain access to."
Inc. magazine today ranked Praetorian, a leading information security assessment and advisory services firm, on its 35th annual Inc. 5000, the most prestigious ranking of the nation's fastest-growing private companies. The list represents a unique look at the most successful companies within the American economy’s most dynamic segment— its independent small businesses. Companies such as Microsoft, Dell, Domino’s Pizza, Pandora, Timberland, LinkedIn, Yelp, Zillow, and many other well-known names gained their first national exposure as honorees of the Inc. 5000.
Weak passwords and phishing offer far easier mechanisms for breaking into most organizations than exploiting software vulnerabilities.
A study by US cybersecurity firm Praetorian based on 100 penetration tests and 450 real-world attacks discovered that stolen credentials offer the best way into enterprise networks.
Ninety-seven per cent of organizations have more than one root cause of compromise. The practical upshot of the report is that there should be more focus on guarding against stolen credentials and network segmentation as defenses, rather than playing "whack-a-mole" with software vulnerabilities.
Hackers most commonly use stolen credentials, often first obtained through phishing or other social engineering, to break into targeted networks and (eventually) gain access to sensitive resources, sometimes as part of a multi-stage process.
Playing whack-a-mole with software vulnerabilities should not be top of security pros' priority list because exploiting software doesn't even rank among the top five plays in the attacker's playbook, according to a new report from Praetorian.
Organizations would be far better served by improving credential management and network segmentation, according to researchers there.
Over the course of 100 internal penetration tests, Praetorian pen testers successfully compromised many organizations using the same kinds of attacks. The most common of these "root causes" though, were not zero-days or malware at all.
Listen to Praetorian IoT business lead, Paul Jauregui, sits down with Bruce Sinclair for an interview on "The IoT Inc Business Show". Operating at the epicenter of both IoT and Security provides Praetorian with a unique and valuable prospective, which we enjoy sharing with audiences. In this episode of Bruce's podcast we discuss end-to-end IoT penetration testing and other things enterprise IoT business leaders need to know about when working with an external security assessment firm. Listen to this episode to gain confidence that your Internet of Things devices and data are secure.
With the software rejiggered, the FBI could launch a traditional “brute force” attack, employing a software program to rapidly try password combinations until it arrived at the correct one. Since Farook’s iPhone 5C used a four-digit passcode, a program could run through every one of the 10,000 possible password combinations in a matter of minutes.
“That brute force technology isn't very sophisticated,” says Dylan Ayrey, a security engineer with the information security company Praetorian. “You could go on Ebay right now and purchase ways to brute force older versions of the iPhone.”
Dylan Ayrey, a security engineer with the information security company Praetorian, points out that an iPhone’s lock screen is only the first barrier to its contents. WhatsApp recently announced that it would use end-to-end encryption for all its messaging services.
“Encryption is here whether we want it to be or not,” he says. “The landscape has changed forever, mostly for the better, and these types of proposals can't gain traction.”
However just last week, two U.S. senators introduced legislation to require tech companies to unlock phones and provide other “technical assistance” to government officials with a court order.
Mislan at Rochester Institute of Technology points out that as CEO of one of the world’s leading mobile forensics companies, Bollö would be uniquely positioned to profit from any software designed to execute FACT. Bollö insists that his competitors could do the same and says he is focused on developing a new industry standard rather than a software sales pitch."
Of course, we could develop this stuff and we'd be happy to do that but I'm not trying to push that,” Bollö says. “I'm trying to say, ‘Here's a solution that could work for everyone.’"
Rather than require companies to install a key, Praetorian’s Ayrey thinks the best solution is for mobile forensics companies such as MSAB and Praetorian to continue doing what they have been doing all along—finding vulnerabilities in each new device or operating system that is released, and exploiting those holes on behalf of clients until an update renders them obsolete.
For consumers, Mislan has an even simpler strategy. “For me, it boils down to: If you really want to protect something, don't put it on your phone,” he says.
Elvis Collado, a security research at cybersecurity provider Praetorian, also worries about attackers rewriting firmware code and installing it on an IoT device, saying “The attack vector varies from device to device, but improper key handling or firmware validation puts a great number of IoT devices at risk. If an attacker can program a backdoor into a device, whether it be remote or local, then it's game over.”
From Blaster to Heartbleed, it’s clear that the tech industry often acts on security only after a major problem becomes evident. What all four of the above experts agree on is that you shouldn’t expect “them” to fix a problem before it happens.
“Builders make the best breakers,” Collado believes. “At Praetorian, we’re all developers and engineers. We just happen to focus on security. If you're a developer, try breaking your code from a non-QA perspective. Can you cause information to be leaked? Can you cause memory corruption? Do you have test code that was compiled into production that can be potentially abused? Can users access hardware debug interfaces in situations when they're not supposed to? This type of mentality shift will greatly improve the quality of your code from a security perspective.”
Embargos and sanctions such as these could be the new norm in dealing with cyber warfare threats—especially since companies have no real teeth to fight back.
“It has become painfully clear that even the largest corporations are incapable of preventing state sponsored cyber attacks on their own,” says Nathan Sportsman, CEO of the Praetorian, which provides security assessment and advisory services.
For instance, corporations can’t exactly “hack back” against state-based incursions. The response would have to come from the U.S. government, Sportsman says. “While economic sanctions should not be considered a panacea, U.S. sanctions will provide a partial deterrence to the rampant cyber attacks that we are currently experiencing,” he says.
As cybersecurity job market suffers severe workforce shortage, a leading information security firm engages next-generation talent face-to-face to address skills gap.
The University of Texas at Austin welcomed two new adjunct professors to the department of computer science this fall. Nathan Sportsman and Chris Prosise, of Austin-based cybersecurity company Praetorian, have joined the university to teach the newly created CS 378 Ethical Hacking course. The two industry veterans are joining the talented and diverse group of professors as part of the computer science department’s expanded commitment to security as part of the degree curriculum. The class will provide students with a practical, hands-on opportunity to learn real-world security.
New Internet of Things (IoT) security testing and assurance services designed to help today’s leading manufacturers deliver and deploy secure connected products to the market.
Praetorian today announced expanded security testing and assurance services that cover end-to-end Internet of Things (IoT) product ecosystems. Praetorian’s Internet of Things security services take a holistic approach to security testing by reviewing the entire product ecosystem, from chip to code, while prioritizing vulnerabilities so connected product teams can successfully balance risk with time-to-market pressures.
“In today’s connected world, the perception of security risk alone, even if not realized, can still negatively impact consumer confidence necessary for new technologies to meet their full market potential,” said Paul Jauregui, Vice President of Marketing at Praetorian. “Recent, high-profile data breaches have heightened consumers’ awareness of data security and privacy issues. As a result, consumer adoption may suffer until vendors can adequately address security and privacy concerns,” he added.
Praetorian, an information security provider dedicated to helping organizations achieve risk-management success, has been honored by Inc. Magazine's 34th annual Inc. 5000, an exclusive ranking of the nation's fastest-growing private companies. The list represents the most comprehensive look at the most important segment of the economy—America’s independent entrepreneurs.
Security firm Praetorian outfitted a drone with custom hardware to learn how many connected devices are being used in Austin, TX.
Given the explosion of connected devices, also known as the Internet-of-things, it’s natural that people would want to know just how many such devices are out there.
But how do you go about figuring out just how many of these devices—like thermometers or light bulbs hooked to the Internet—are being used in a given city? The answer is apparently to enlist the services of a drone that can fly above the city proper and gather tons of data pertaining to the connected gadgets and appliances.
A team of researchers at security company Praetorian wanted to discover how many IOT-friendly devices were being used in Austin, TX, and found that the best way to do so would be to outfit a drone with the company’s custom built connected-device tracking appliance and have it fly over the city, Praetorian vice president of marketing Paul Jauregui told Fortune.