Using data science to provide state-of-the-art cybersecurity products and user awareness.
Transcript
Incident Response
defendIT TM : Security
subscribe, login
buttressIT TM : Audit
answerIT TM : Expertise
Trojan Hunter TM
StreetSmart Secure Coding
locateIT TM
protectIT TM : Data Protection
Security Alerts for North America
Take Action: Secure our Internet
Understand: Articles on Cybersecurity
Services
Have you been hacked?
at Home
answerIT -- for individuals
Trojan Hunter -- for individuals
Incident Response: Clean-Up -- for individuals
defendIT -- for IT professionals
Digital Forensics -- for individuals
Hardened Devices -- for targeted individuals
Travel Kits -- for international travelers
at Work
Trojan Hunter -- for corporations
Incident Response: Clean-Up -- for corporations
defendIT -- for IT professionals
buttressIT -- for corporations
buttressIT Stealth -- for corporations
StreetSmart Secure Coding
Digital Forensics -- for corporations
Cybercop Training -- for IT departments
Password-Free Seamless Authentication
Resources
FAQ
Clean-Up Tutorial
Computer Security is Algorithmically Intractable - Aug. 17, 2018.
Quantum Communication - Aug. 13, 2018.
Panther Shadow: A Linux Worm - Jun. 29, 2018
buttressIT: Artificial Intelligence for Network Audits - Dec. 15, 2017
defendIT: Artificial Intelligence for Cybersecurity - Dec. 4, 2017
Cybersecurity in Salt Lake - Nov. 30, 2016
Cybersecurity in Boise - Sept. 9, 2016
Cybersecurity in Miami - Jul. 7, 2016
Cybersecurity in Montana - Jun. 25, 2016
Open Letter to Genetics Researchers - Jan. 5, 2016
Hacking as an Anathema to Computer Science - Dec. 27, 2015
Encouraging Vulnerability Bounties - Dec. 19, 2015.
|