Get Information

Thank you for your interest. Please fill out the form below or call us at 800.921.2414 to request more information.
* required fields

Ntrepid Blog - IT Professionals

Category for blogging content related to information technology, business security, and professional development.

Ntrepid Technologies Working to Keep Coalition SOF Cyber Secure

Ntrepid Technologies Working to Keep Coalition SOF Cyber Secure

As we get further into the 21st century, one of the biggest shifts in the intelligence community is toward more open-source intelligence gathering tools. The evolution of the internet and the emergence of the collaborative web has created a wealth of new information sources. Whether it's publicly available information (PAI) like Google, blogs, and web pages, or open source intelligence (OSINT) like Twitter and Facebook, valuable data is readily available to anyone who knows where to look.

    Share This Article

In The News

Expert Panel Discussion: WannaCry Ransomware Attack

I recently had the opportunity to participate in a panel discussion with some fellow industry thought-leaders to discuss the latest unprecedented ransomware attack. On the panel with me were Brian Minick, CEO of Morphick, Sven Krasser, Chief Scientist at CrowdStrike, and RJ Gazarek, Product Manager at Thycotic. This enormous attack afflicted over 230,000 computers in more than 150 countries in a matter of three days.

Posted by Lance Cottrell on 06/09 in Cyber SecurityIn The NewsIT ProfessionalsPassagesPodcast

    Share This Article

Looking at data with binoculars

(ISC)2 Webinar: Be Vewy, Vewy Quiet… I’m Hunting Threats!

It’s easy to search for lost items where the light is better, but they wouldn’t be lost if you could see them.

Posted by Lance Cottrell on 05/23 in Cyber SecurityIT ProfessionalsPassages

    Share This Article

Login screen

Google Chrome Vulnerability Puts Many Users at Risk

recently discovered vulnerability in the Chrome Browser on Windows could allow an attacker to capture user credentials and lead to additional levels of compromise.

Posted by Lance Cottrell on 05/18 in Cyber SecurityIT ProfessionalsPassages

    Share This Article

Page 1 of 20 pages

Download White Paper

Thanks for your interest in Passages. Your white paper will automatically download after you submit this form.

* required field