Cyber Security

Ntrepid headquarters, managed attribution solutions for government

Implications of Universal Facial Recognition

In my recent Security Week Article, “The Impending Facial Recognition Singularity,” I discuss how it is more difficult to remain anonymous, both online and off, these days. A major reason is that facial recognition systems are becoming cheaper, better, easier to use, and more widely deployed, while social media platforms...

Ntrepid headquarters, managed attribution solutions for government

Another RSA: Evolving Trends in Cyberthreats

The idea that firewalls and the perimeter are becoming less important is a growing trend. There is so much opportunity for compromised devices inside the network, including BYOD laptops and phones, that we can’t think of the inside as safe anymore. If the inside is dangerous, then we need to...

Ntrepid headquarters, managed attribution solutions for government

Data is a Toxic Asset

Don't keep data that you don't need on your network. It seems simple, yet it is not put into practice by many organizations worldwide. By regularly purging unnecessary information you can greatly reduce the relative degree of the toxicity within your network. If you don't need immediate access to your...

Ntrepid headquarters, managed attribution solutions for government

How Stand-Alone Laptops Put Law Enforcement Investigations at Risk

The internet is now part of almost all investigations, bringing significant new complexity to gathering evidence or conducting covert activity. Consequently, internet-based investigations create a whole new category of risks. Just as detectives work in plain clothes and drive unmarked cars, it is often important to avoid identification as a...

Ntrepid headquarters, managed attribution solutions for government

Browsing the Internet is a Risk to the M&A Process

While mergers and acquisitions (M&A) are generally known for bringing economic growth and opportunity, people are beginning to realize that the process also brings serious cybersecurity risks. For example, along with the acquired company’s valuable assets, buyers also inherit all previous and current vulnerabilities and breach history. But there are...

Ntrepid headquarters, managed attribution solutions for government

Black Hat USA 2017

Last month I traveled to Las Vegas to meet with some colleagues and analysts that attended Black Hat USA 2017, the world’s leading information security event.