Ted Harrington

Hi, my name is Ted.

If you need to understand how hackers think, so you can find vulnerabilities, fix them, and prove your app is secure: you’re in the right place.

I wrote the book “HACKABLE: How to Do Application Security Right,” and am the Executive Partner at Independent Security Evaluators (ISE). Our company is made up of ethical hackers, and we’ve been doing security assessments and security consulting for a long time. Since 2005, we’ve been hired by hundreds of companies, and helped them discover tens of thousands of security vulnerabilities. We’ve helped fix every single one.

Research is in our blood. The company was born out of the PhD program at The Johns Hopkins University. In our first piece of research, we built a weaponized software radio and used it to start a car without the authentic key. We were the first company to hack the iPhone, and the first company to hack Android OS. We broke new ground hacking medical devices, IoT devices, password managers, and cryptocurrency wallets.

Our research has discovered vulnerabilities in products by General Electric, Apple, Google, Verizon, ExxonMobil, Ford Motors, Toyota Financial, Liberty Mutual, PayPal, Allstate, ADP, Equifax, GEICO, PNC Bank, and MetLife.

Our work has appeared in the New York Times, Wall Street Journal, Washington Post, USA Today, Financial Times, Wired, and CBS News On Assignment.

We started IoT Village, a hands-on hacking event that’s facilitated the discovery of more than 300 previously unknown security vulnerabilities. The winners of our hacking contests have been awarded the elusive DEFCON Black Badge, which is the security community’s version of a Hall of Fame jacket. This has happened not once, not twice, but three times.

The bottom line is that we know what we’re doing, and we’ve been doing it a long time. Literally everything we advise to our clients has been field tested by ethical hackers. All of it is backed by research. It’s all proven to work, for both large enterprise and funded startups (and everyone in between). It will work for you, too.

You’re in good hands. Let’s seek solve your security problems together.