Our research team is comprised of leading threat researchers, authors, and frequent speakers at the largest security conferences in the world. We perform ongoing analysis of the wireless and IoT threat landscapes for emerging publicized threats and 0-days to understand the methods of attack, reproduce them in our labs, and infuse countermeasures into our solution. Additionally, the team performs organic research to identify yet-to-be-weaponized threats stemming from the influx of new forms of IoT. This involves reverse engineering and penetration testing to reveal these new risks. We infuse this into our threat detection modeling through prototyping, thus allowing us to inspire innovation within our solutions to customers.
Our achievements include:
Discovery and responsible disclosure of new 0-day exploits
E.g. Samsung Gear 2 Neo side-jacking and privilege escalation for smartwatch data access and exfiltration (Disclosed at DEF CON 23).
Speakers at the largest security conferences in the world (Black Hat, DEF CON, HackCon, DoD CyberCrime, SANS, RSA, OWASP, Gartner, Forr
E.g. IoT Protocol exploits for use in data exfiltration and network infiltration (Disclosed at DEF CON 25)
Authors of numerous security books
E.g. Data Hiding book, included in the NSA’s National Cryptologic Museum
Brief international defense agencies (FBI, Pentagon, Queensland Police, etc.)
Awarded Pentagon Certificate of Appreciation
Participation in governing bodies
PCI Council, FSISAC, and American Bankers Association
TIME, Forbes, Bloomberg, Associated Press, Dark Reading, Tech Crunch, The Register, and countless others