- Prelude is among the first autonomous platform developed to attack, defend and train critical assets through continuous red-teaming.
- Prelude has raised $24 million funding in the series-A funding round.
- Prelude was looking to scale the company in 2020 but the pandemic postponed the plan.
Prelude has raised $24 million funding in the series-A funding round. The company is based in Washington D.C and helps the companies strengthen their cyber security.
Prelude is among the first autonomous platform developed to attack, defend and train critical assets through continuous red-teaming, making it an exceptional cybersecurity startup. The founder, Spencer Thompson, started his career with an app called Sokanu which accounted for 10-million-plus monthly users before it was sold in 2021.
Walking us through the company’s journey, Spencer Thompson said, “The transition to deep security came because the first version of Prelude was, oddly, a school. It was a school focused on helping people that are typically left behind by the labor market transition into being junior cybersecurity analysts.”
Prelude funds strengthen the defenses
They was looking to scale the company in 2020 but the pandemic postponed the plan. One of the investors of the company was deeply involved with the MITRE Caldera adversary emulation framework. Its core development team joined Prelude and pivoted towards continuous testing.
The funds will be utilized in strengthening its client’s cyber defenses. Prelude will be continually asking questions through denatured cyberattacks, and these attacks respond to the latest vulnerabilities and cyber vents. The aim is to turn complex technical descriptions into easily deployable questions.
Spencer explained, “When you think about what happens when there’s an attack, your CEO and CTO are saying ‘are we vulnerable to this thing happening to us?’ and the resounding answer today is a version of ‘I don’t know’. The reason, in some cases, is that organizations are not able to ask their system that question. That’s what we do, and we do that through offensive security. We launch safe attacks against infrastructure — servers, containers, and workstations — to elicit that information.”