In Brief: Chariot Alignment with FDA Section 524B.1

Chariot is more than a product; it’s a partnership that combines automated monitoring and human analysis to identify externally-accessible security risks. In light of the FDA’s latest requirements for in-market device security ...
identity governance security Spera deepfake identity management

Identity Governance: Right People, Right Access, Right Time

Enterprise companies are increasing spending on software-as-a-service (SaaS) tools to enhance employee productivity and drive digital transformation projects. In doing so, IT teams are facing new challenges to ensure the right level ...
Security Boulevard
Cyber Cartography: Mapping a Target

Cyber Cartography: Mapping a Target

As Phil Venables has said, “at some level, cyber defense is a battle over whether the attacker or defender has better visibility of the target. Action is key, yes, but without good ...

Open Source Tools: From Our Lab to Your Fingertips

One of the core decisions we’ve made at Praetorian is to maximize efficiency and effectiveness. In pursuit of this, we carefully select and implement automation and technical solutions for tasks that don’t ...
Grappling with the Unpredictable Second-Order Effects of LLM

Grappling with the Unpredictable Second-Order Effects of LLM

Yogi Berra was (among other things) an incredible quote machine, and he’s often credited with the following gem: “It’s tough to make predictions, especially about the future.” Yes indeed. Seeing how the ...
ABAC in Lambda

ABAC in Lambda

During August 2022 we published a blog discussing AWS Security Trends of 2022 , one of which was ABAC in Lambda. AWS allows administrators to use tags to designate attributes for both ...

Six Months of Finding Secrets with Nosey Parker

Earlier this year we announced Nosey Parker, a new scanner that uses machine learning techniques to detect hardcoded secrets in source code with few false positives. Since then we’ve continued its development ...

Part I – CyberSecurity is Adversarial, and What that Means for Security Strategy

I have an impression that in the course of the day to day grind, many security leaders have lost sight of a core tenant of cybersecurity: that it is adversarial. Ultimately, the ...
Time To Market or Time For Better Security? Which Side Will Win?

Time To Market or Time For Better Security? Which Side Will Win?

Time To Market or Time For Better Security? Which Side Will Win?Has Security Become A Greater Priority Than A Product Launch?“Look, people, we need to get this product out now.”“Sir, we haven’t ...
A cure for the common cold call: freeze them out

A cure for the common cold call: freeze them out

Cold calls are a modern day nuisance becoming ever-more persistent. In this article, we show you how to limit the number of cold calls you receive and prevent potential damage they may ...