Ted Harrington

Ted Harrington is the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, and password managers. He’s helped hundreds of companies such as Google, Amazon, Microsoft, and Netflix fix tens of thousands of security vulnerabilities. Ted has been featured in more than one hundred media outlets, including the Wall Street Journal, Financial Times, and Forbes. His team founded and organizes IoT Village, an event whose hacking contest has produced three DEF CON Black Badges. To get help with security consulting and security assessments, or to book Ted to keynote your next event, visit https://www.tedharrington.com.
Find me on:

Recent Posts

What Is A Certified Ethical Hacker? A Conversation With John Hammond

On this Episode of Tech Done Different with Ted Harrington, Executive Partner ...
Podcast | Read

What Type of Application Security Testing Do I Need?

We’ve all had a moment when we woke up at night wondering if we’re really ...
| Read

Strong Security Provides a Competitive Edge

“Every bit of security adds value to your customers,” a CTO once told me.
| Read

Secure Your Application As You Develop

Carbon monoxide is colorless, odorless, and tasteless. You don’t even know it’s ...
| Read

Know Thy Enemy: Understanding Attackers

In order to secure your software, you need to understand your attackers, their ...
| Read

How to Budget For Application Security

You’ve heard the fable: Goldilocks goes for a walk in the woods and comes upon ...
| Read

Why Reassessments And Their Frequency Matters

In karate, earning a black belt isn’t the end of your journey; it’s just the ...
| Read

What Steps Are Necessary to Fix Your Application Vulnerabilities?

School taught us that making mistakes is bad. Teachers literally punished us ...
| Read

How to Hack Your Own System

“Think bad thoughts and ask hard questions.”
| Read

How Do You Know What Type of Security Test You Need?

When it comes to testing applications for security vulnerabilities, terms are ...
| Read

Subscribe to Our Blog

Stay up-to-date on the latest ISE and cybersecurity news.

We're committed to your privacy. ISE uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our privacy policy.