Latest Posts
- Cord3 Innovation | Data-Centric Security Innovation Inc. is thrilled to be at CANSEC 2024 with our amazing Microsoft partner and team!! -
- 2024 Carleton University Winter Virtual Career Fair -
- Cord3 is proud to announce that the United States Patent Office has granted Cord3 another patent in the field of Zero Management Symmetric Key infrastructure (USPTO US 11,728,983). -
- Cord3 has been featured in the book entitled “Safety and Security Science and Technology” -
Contact Us
900 Morrison Drive Suite 202
Ottawa, Canada
info@cord3inc.com
+1 343 488 8720
What does Cord3 do?
/in Data Governance, Data-Centric Security, Privileged Credential Abuse, Resources /by Ian CurryCord3 solves the most difficult challenge in data security – protecting data from administrator accounts with high privilege! Read this brief intro for a quick understanding.
High Privilege Admin Accounts and MSSPs
/in Data Governance, Privileged Credential Abuse, Resources /by Ian CurryEvery organization faces the threat of administrators (and hackers with administrator credentials) using their high privilege accounts to access sensitive data. This is especially risky when outsourcing to MSSPs that have full system and data access as privileged administrators. Because of their access to privileged administrator accounts for many customers, MSSPs have become the most […]
Protect Your Data from Privileged Credential Attacks – Detecting Attacks is Too Late!
/in News, Privileged Credential Abuse, Resources /by Ian CurryA recent Forbes article states – “The bottom line is that investing in securing perimeters leaves the most popular attack vector of all unprotected, which are privileged credentials.” We could not agree more.Some of the solutions proposed in the article, however, do not prevent privileged credential attacks – they just detect attacks, maybe, once they have occurred.
LightNeuron malware – Cord3’s Solution!
/in News, Resources /by Ian CurryNumerous media sources are reporting newly discovered Exchange malware, called LightNeuron, believed to have been created by a Russian hacking organization known as Turla. LightNeuron is a “backdoor” that allows attackers to read and modify any email passing through compromised Microsoft Exchange servers. The malware also allows attackers to create and send new emails, as […]
The Cloud & Privileged Credential Abuse
/in Privileged Credential Abuse, Resources /by mmstaffOne thing that does not improve when moving to the Cloud (or outsourcing to any MSP) is privileged credential abuse. In fact, when you use the Cloud, the opportunity for privileged credential attacks expands substantially beyond what is available to attackers in the Enterprise – which is bad enough.