RSAC 2018, RSA Conference Peer2Peer session, Lance Cottrell, IoT, Blockchain, trends in cyber, threats, firewalls

Another RSA: Evolving Trends in Cyberthreats

The idea that firewalls and the perimeter are becoming less important is a growing trend. There is so much opportunity for compromised devices inside the network, including BYOD laptops and phones, that we can’t think of the inside as safe anymore. If the inside is dangerous, then we need to secure all the internal surfaces to withstand attack. And if we are doing that, why not make everything easier and make them public facing? This idea is not completely crazy. It will be interesting to see how it stands up in real world use.

Read More...
We are proud to announce that Info Security Products Guide, the industry’s leading information security research and advisory guide, has named Ntrepid a winner in the 14th Annual 2018 Info Security PG’s Global Excellence Awards® in two categories. Nfusion 2, our secure virtual desktop, was named the Gold Winner of Deception Based Security, and the Silver Winner for Security Products and Solutions for Government.

Nfusion Awarded Gold and Silver in 2018 ISPG Global Excellence Awards

We are proud to announce that Info Security Products Guide, the industry’s leading information security research and advisory guide, has named Ntrepid a winner in the 14th Annual 2018 Info Security PG’s Global Excellence Awards® in two categories. Nfusion 2, our secure virtual desktop, was named the Gold Winner of Deception Based Security, and the Silver Winner for Security Products and Solutions for Government.

Read More...
toxic data, breach, data leak, stolen data, confidential information

Data is a Toxic Asset

Don’t keep data that you don’t need on your network. It seems simple, yet it is not put into practice by many organizations worldwide. By regularly purging unnecessary information you can greatly reduce the relative degree of the toxicity within your network. If you don’t need immediate access to your confidential information, limit your risk of exposure by following the suggestions in this blog.
Read More...
Investigator anonymity

How Stand-Alone Laptops Put Law Enforcement Investigations at Risk

The internet is now part of almost all investigations, bringing significant new complexity to gathering evidence or conducting covert activity. Consequently, internet-based investigations create a whole new category of risks. Just as detectives work in plain clothes and drive unmarked cars, it is often important to avoid identification as a law enforcement officer when investigating online. This is often called being “non-attributed,” but is more accurately labeled “misattributed” or “anonymous.” A common method for conducting these investigations is to use a dedicated laptop connected to the internet over personal WiFi. Unfortunately, this is an unsafe way to operate, with significant risk of identification, location exposure, content blocking, and infection.

Read More...

Did You Know: Browsing the Internet is a Risk to the M&A Process?

While mergers and acquisitions (M&A) are generally known for bringing economic growth and opportunity, people are beginning to realize that the process also brings serious cybersecurity risks. For example, along with the acquired company’s valuable assets, buyers also inherit all previous and current vulnerabilities and breach history. But there are also risks that exist for buyers before they sign on the dotted line or take action to merge technologies, processes and resources – during the M&A process, an organization is vulnerable from the moment they set out to do online research.

Read More...