Services

Access a world-class intelligence capability tailored to your specific needs. Control a multi-million dollar program without the time or expense and solve problems both lasting and acute.

Services Overview

Insider Threat Webinar

Getting Inside Insider Threats: Response and Mitigation. Stopping malicious or simply incompetent insiders from doing damage isn't just an exercise in analyzing where the damage came from. Insider Threats aren’t just malicious employees. They can run the gamut from incompetent to accidental to theft.

White Papers

Securing Linux Against Negligent or Malicious Administrators

By Willis McDonald & Vincas Čižiūnas on Apr 22, 2020 9:27:28 AM

Linux monitoring is deceptively difficult.  The most common tools for performing monitoring - the Linux audit system, log journals and syslog sources - are all, at best, standardized by Linux distribution, and at worst, unique per host in an enterprise environment.  File-based logging can be spoofed by intruders, while kernel-based subsystems have performance issues.  Many hosts will often be under low latency or high performance requirements, either due to cost saving measures on equipment, or due to an application that sees high utilization.There are few strong solutions today that don't leave gaping holes for intruders to achieve their low resource usage.

Continue Reading

Insider Threat: Reducing Gaps and Increasing Visibility for a Remote Workforce

By Bryan Clements & Chris DiSalle on Apr 10, 2020 2:26:46 PM

While the rapid shift from office to home or remote-based activity has allowed work to continue, the idea that corporate assets are physically leaving the corporate space, and with them access to proprietary or sensitive data, could be a disaster if your security policies and practices are not adapting to this new norm.  Now more than ever, companies need to be evaluating information technology and security practices surrounding insider threats.

Continue Reading

Featured