Cyber Security

laptop computer on the table with notepad and coffee cup with Ntrepid logo in foam

Inside the Minds of Tech CIOs

We had the pleasure of speaking at Artis Ventures Enterprise Disrupt 2014 Conference in San Francisco last week to an impressive audience of tech industry visionaries, entrepreneurs, CTOs and CIOs. We introduced our Passages secure browser and shared our insights on enterprise cyber security.

laptop computer on the table with notepad and coffee cup with Ntrepid logo in foam

Malware Protection

https://ntrepidcorp.com/assets/uploads/2017/06/Ntrepid-Podcast-2-Nfusion-Malware-Protection.mp3 Welcome to the Ntrepid Podcast: Episode 2. My name is Lance Cottrell, Chief Scientist for Ntrepid Corporation. In this episode, I will be talking about the threats from the new breed of hackers and malware and how virtualization can be used to protect yourself. The nature and purpose of malware has...

laptop computer on the table with notepad and coffee cup with Ntrepid logo in foam

Antivirus Pioneer Changes Course

Symantec finally had the courage to admit what many in the security community have been saying for a long time: “Antivirus is dead”. Rapidly evolving threats and zero day vulnerabilities routinely circumvent conventional antivirus solutions. It is critical to handle infection without compromising valuable data or resources. Passages isolates malware...

Online Filter Bubbles Are Here

In his 2011 Ted Talk, Eli Pariser raised concerns that our view of the world was being distorted by algorithms making choices to customize what we see based on our preferences. Running a geographically distributed network provides us insight into just how diverse the Internet is and how different it...

laptop computer on the table with notepad and coffee cup with Ntrepid logo in foam

Evolving Perspectives on Security

Malware is like vampires. Traditionally, a vampire cannot enter your house without being invited. The same is true of most malware. The user needs to click, open, or authorize the malware before it can attack. Unfortunately malware, like vampires, has the ability to beguile us with irresistible enticements. Once invited...