RSA Peer2Peer

RSA 2018 Peer2Peer Session: Successes and Pitfalls of Penetrating Hostile Online Groups

Earlier this month, I had the privilege of hosting a Peer2Peer speaker session at RSA 2018, where I joined attendees on an exploratory deep-dive through the pros, cons, and intricacies that surround the practice of proactively infiltrating malicious groups online. My goal was simple: learn how my peers are conducting anonymous operations, what problems they are experiencing, and where they have seen success.

Read More...
CDM award winner Ntrepid

Ntrepid’s Managed Attribution Suite Named Winner in 2018 CDM Awards

We are thrilled to announce that Ntrepid has been named a winner in the 2018 Cyber Defense Magazine Awards. Ntrepid’s managed attribution (MA) suite was named Best Product for Deception Based Security Solutions, and recognized as the Next Generation in Digital Footprint Security.

Read More...
digital misattribution

Misattribution Lessons From the Unmasking of Guccifer 2.0

Anonymity is hard to maintain over time against an aggressive adversary. There are many ways you can accidentally leak your identity or tie your activity to some other identity. One minor error in hiding any of those identifiers can ruin an entire mission and potentially invite retribution. Over the course of months, this adds up to potentially thousands of opportunities for error. Unfortunately, humans are not very good at achieving that level of consistency with their operational security (OPSEC).

Read More...
We are proud to announce that Info Security Products Guide, the industry’s leading information security research and advisory guide, has named Ntrepid a winner in the 14th Annual 2018 Info Security PG’s Global Excellence Awards® in two categories. Nfusion 2, our secure virtual desktop, was named the Gold Winner of Deception Based Security, and the Silver Winner for Security Products and Solutions for Government.

Nfusion Awarded Gold and Silver in 2018 ISPG Global Excellence Awards

We are proud to announce that Info Security Products Guide, the industry’s leading information security research and advisory guide, has named Ntrepid a winner in the 14th Annual 2018 Info Security PG’s Global Excellence Awards® in two categories. Nfusion 2, our secure virtual desktop, was named the Gold Winner of Deception Based Security, and the Silver Winner for Security Products and Solutions for Government.

Read More...
toxic data, breach, data leak, stolen data, confidential information

Data is a Toxic Asset

Don’t keep data that you don’t need on your network. It seems simple, yet it is not put into practice by many organizations worldwide. By regularly purging unnecessary information you can greatly reduce the relative degree of the toxicity within your network. If you don’t need immediate access to your confidential information, limit your risk of exposure by following the suggestions in this blog.
Read More...
Investigator anonymity

How Stand-Alone Laptops Put Law Enforcement Investigations at Risk

The internet is now part of almost all investigations, bringing significant new complexity to gathering evidence or conducting covert activity. Consequently, internet-based investigations create a whole new category of risks. Just as detectives work in plain clothes and drive unmarked cars, it is often important to avoid identification as a law enforcement officer when investigating online. This is often called being “non-attributed,” but is more accurately labeled “misattributed” or “anonymous.” A common method for conducting these investigations is to use a dedicated laptop connected to the internet over personal WiFi. Unfortunately, this is an unsafe way to operate, with significant risk of identification, location exposure, content blocking, and infection.

Read More...