Cybersecurity Advisory Services
for Growing and Global Brands
We help clients defend against cyberattacks across all attack surfaces, including hardware, software, network-to-cloud, people, and emerging technologies. Our clients gain confidence in an intricate and ever-changing digital landscape.
Your Trusted Partner in Cyber-Resilience
Since 2005, Palindrome Technologies has been a trusted cybersecurity partner to Fortune 500 companies and growing organizations in the communications, finance, manufacturing, utilities, healthcare, and government sectors.
We forge strong partnerships with our customers to help them develop the cyber-resilience required to keep their digital assets and operations safe from adversaries.
We take a comprehensive approach to cybersecurity with our Symmetric Defense philosophy. This means combining in-depth expertise with the latest research to actively identify and eliminate weaknesses in your organization's cyber defenses. It's like having a trusted security partner working alongside you to orchestrate a seamless defense against evolving threats.
Peter Thermos has over 25 years of experience in cybersecurity, consulting with leading commercial organizations (Healthcare, Financial, Telecommunications) and conducting security research for US government organizations (i.e. DARPA, DHS-CISA, NIST). As founder of Palindrome Technologies and subject matter expert he helps customers secure emerging technologies and networks including 5G, MEC, IoT and V2X.
Since 2010 Peter has been an active contributor to IEEE CQR in various roles including speaker, session-chair and General co-chair (2017-19 and 2022-23).
Peter is the primary author of the book “Securing VoIP Networks” by Addison-Wesley and has been a speaker at various industry conferences (i.e. IEEE, ICIW, VoN, SANS, Blackhat, MIS InfoSec, ISSE, NATO NMIOTC Cybersecurity conference), and has published research papers in academic and industry journals (i.e. IEEE, ACM, ISSA, IEC) and articles in trade magazines such as Information Security, ZDNET, Forbes, TechTarget and Wired. He has also been the Co-Chair for IEEE CQR Workshop, IEEE World Forum IoT and committee member of ICCWS. Peter is a contributor to the FCC CSRIC VII Report on Risk to 5G from Legacy Vulnerabilities and Best Practices for Mitigation. (June 10, 2020).
Peter holds a Master’s degree in Computer Science from Columbia University, NY and is a senior member of IEEE and ISSA and member of IETF and ACM.
Sony Cherukara has over 20 years of experience in Information Security Assurance and software development. From developing innovative network modeling solutions for Telecom Operators to assessing security risks in software design and architecture, his broad experience is valuable to customers in various industries and sectors. He is a Subject Matter Expert in the security of 4G LTE networks and devices, OSS implementations and enterprise applications.
Sony leads Palindrome's application development services. His interests include Zero-day vulnerability discovery, flexible cryptographic frameworks and machine learning for threat prediction in IoT implementations. Sony holds degrees in Computer Science from Rutgers and Seton Hall universities.
Aman Singh is a subject matter expert in Identity and Access Management, Cloud Computing, and Enterprise platforms. At Palindrome Technologies, he leads an applied research team exploring topics such as cloud-native 5G networks, autonomous information security, context-aware IoT systems, data portability and privacy-aware computing. He has worked with multiple large enterprise teams in building secure mission critical data services across transactional, operational, and analytical layers. He holds a graduate degree in Computer Science from Columbia University, NY, and is a senior member of IEEE and ACM.
Paul Rohmeyer has over 25 years of professional experience, including work in IT Management, IT Audit, Information Security, Disaster Recovery Planning, and Vendor Management. Paul has delivered executive-level guidance in the areas of risk management, information assurance and network security to premier corporate clients in the financial services, pharmaceutical and energy industries.
Paul has served as Director of IT for AXA Financial, where he designed and implemented a complex data warehouse and business intelligence environment, and as Director of IT Architecture Planning for SAIC/Bellcore, leading secure computing and messaging architecture development and large data center management. Paul also held management positions with CitiBank and Midlantic National Bank.
Paul is an adjunct faculty member in the School of Business at Stevens Institute of Technology and an advisor to the Academic Computing organization. He has been cited in information security, IT, and business publications. Paul holds a B.A. in Economics from Rutgers University, an MBA in Finance from St. Joseph’s University, and M.S. and Ph.D. degrees in Information Management with a focus on Information Security Management from Stevens Institute.
David Rhoades has been active in information security since 1996, when he began his career with the computer security and telephony fraud group at Bell Communications Research (Bellcore). David’s expertise includes web application security and vulnerability assessment.
An experienced teacher and presenter in the cybersecurity field, David has presented at many high profile security conferences around the globe, including Interop, OWASP, USENIX, ISACA, SANS, DefCon, and Black Hat.
David holds a BS in Computer Engineering from Penn State University and is a Chapter Lead for the OWASP Delaware chapter (https://www.owasp.org/index.php/Delaware). David resides in Delaware.
Michael Stauffer has over 20 years of experience in Information Security and Assurance, providing consulting to commercial organizations and government agencies. He provides security assurance and compliance services to Telcos and OEMs.
Michael has held Voice Network SME positions at Cisco Systems, Nortel Networks, Booz Allen Hamilton, and Avaya. His primary interest and expertise is in converged technology, Telco networks (i.e. LTE/IMS/FMC), and security protocols.
Michael is an acknowledged contributor to NIST Special Publication 800-58 and has been a speaker at conferences for the Veterans Administration and Department of Defense. Michael holds a Master’s degree in Information Technology from the Johns Hopkins University in Baltimore, Maryland.
John Schelewitz has over 20 years of leadership and management experience in the GRC and Cybersecurity markets, consistently exceeding goals in competitive, fast-paced and complex environments. John’s strong career trajectory is a testimony to his multi-vertical exposure, client-centric approach and solution-based mindset.
John has vast experience guiding organizations on how to best leverage compliance and cybersecurity. He is committed to internal and external team-building, believing that a relational, pragmatic approach is critical when seeking long-term, fruitful partnerships.
A graduate of the University of Iowa, John has earned multiple certifications in his field, including Cyber Security Architect (CCSA), Security Compliance Specialist (CSCS), HIPAA Administrator (CHA) and HIPAA Professional (CHP). John resides in Phoenix, Arizona.
YOU CAN COUNT ON US
We're in this Together
Cyber-resilience is built on technical insight, continuous knowledge acquisition and research, and skilled people. We operate as an extension of your team, navigating with the same compass to meet your organizational objectives and aligning with your strategy to help accelerate your vision.
We're Proven
Our past performance and decades of experience provide your organization with tactical and strategic insights to protect your existing assets and anticipate threats from emerging technologies.
We're Methodical
We guide customers through complex security challenges using app;lied research, scientific analysis, and rigorous testing to provide optimal and effectiove solutions in mitigating threats affecting their attack surface. The result? Cybersecurity solutions that give our clients confidence in their security posture.
We're Adaptable
Given our decades of experience, we recognize that every organization is unique, with its attack surface and corresponding threats. The concept of Symmetric Defense stems from the need to adopt and implement the most optimal tactical and strategic methods for protecting organizational assets and aligning with the organization's velocity and capital allocation requirements.
We break code, 'coz we care...
Peter Thermos, CEO
Palindrome Technologies
Our Core Values
-
Excellence
We expect excellence in every engagement and interaction and in all we do. We continuously set and achieve new performance objectives to align with our clients’ business objectives. Excellence is non-negotiable.
-
Curiosity
We thrive on curiosity. We question conventional thinking and look for the patterns others overlook. We have a deep thirst for knowledge and empower our team members to learn and grow. We eagerly share our insights - and love to educate others.
-
Integrity
We earn the trust of our colleagues, clients, and partners through diligence, honesty, candor, and 100% transparency. We are accountable both individually and to our colleagues and customers.
Recognized Competence
Trusted by some of the world's largest mobile carriers and product vendors.
Accredited by globally recognized authorities in cybersecurity.
Palindrome Technologies is Cloud Security Alliance (CSA) Certified Trusted Cloud Consultant.
Trusted Cloud Consultants provide cloud security assessment and remediation services to enterprise organizations that need to improve their cloud security postures.