Entries by Ian Curry

High Privilege Admin Accounts and MSSPs

Every organization faces the threat of administrators (and hackers with administrator credentials) using their high privilege accounts to access sensitive data. This is especially risky when outsourcing to MSSPs that have full system and data access as privileged administrators. Because of their access to privileged administrator accounts for many customers, MSSPs have become the most […]

Cord3 Innovation Announces Financing from BDC Capital to Support Growth

Cord3’s Unique Solutions Focus on Strongly Protecting Customers’ Data With Easy-to-Use and Easy-to-Deploy Software OTTAWA, ON           3 October 2019 Cord3 Innovation, Inc., a data-centric cybersecurity company headquartered in Ottawa, Canada, announced today that it has secured $2 million of growth financing from BDC Capital’s Growth & Transition Capital division. This financing will enable Cord3 […]

Cord3 Named 2020 TAG Cyber Distinguished Vendor

Ottawa, ON – Sept. 24, 2019 – Cord3, a leader in data-centric security solutions, announces today its selection by TAG Cyber as a Distinguished Vendor in this year’s 2020 Security Annual. Cord3 is part of an industry collective supporting democratization of cyber security research and advisory materials. Each distinguished vendor is selected by Dr. Edward […]

Protect Your Data from Privileged Credential Attacks – Detecting Attacks is Too Late!

A recent Forbes article states – “The bottom line is that investing in securing perimeters leaves the most popular attack vector of all unprotected, which are privileged credentials.” We could not agree more.Some of the solutions proposed in the article, however, do not prevent privileged credential attacks – they just detect attacks, maybe, once they have occurred.

LightNeuron malware – Cord3’s Solution!

Numerous media sources are reporting newly discovered Exchange malware, called LightNeuron, believed to have been created by a Russian hacking organization known as Turla. LightNeuron is a “backdoor” that allows attackers to read and modify any email passing through compromised Microsoft Exchange servers. The malware also allows attackers to create and send new emails, as […]