Identity Protections After Private Information Enters the Public Domain

We live in the age of large-scale data breaches. Equifax, Target, Home Depot, LinkedIn - take your pick. Users have become jaded to such phenomena since they seemingly occur on a daily basis. This fact only exacerbates the problem even further. We are all guilty of hearing about a breach and simply looking the other way in the hope that our data wasn’t affected. After all, who am I that a criminal on the other side of the world would want MY personal information? Well, you may not see yourself as being important, but that doesn’t mean that your data is equally unimportant. Identity theft is a festering wound that we would rather ignore than acknowledge and treat. If we have learned anything from the 24 hour news cycle it should be that we can no longer simply rely on companies to protect our personal information. Due to this fact, it…


Patrick Kelley interviewed by 11Alive/NBC News – Money laundering using Uber Rides.

That person uses online chat groups and other social media to reach out and recruit Uber and Lyft drivers for the scheme. Uber says that part is key, because if there are no drivers willing to participate – there is no scheme. Once on board, the drivers can say where and when they want to take a ride, allowing them to make money on everyday errands or even long distance trips they were already planning to take for personal reasons. Ensign says the ringleader overseas initiates the ride by hacking into existing Uber accounts. Uber says credit card and personal information are encrypted, so there’s no concern about identity theft, but weak and leaked passwords are allowing crooks to manipulate the service. People usually never even know their account has been hacked because their credit card information gets swapped out with a stolen card to pay for the ride. The…


Promotion! Glenn Holzmacher, Director of Platform Development

We are pleased to announce the promotion of Glenn Holzmacher to Director of Platform Development (Léargas). Glenn has been with Critical Path Security since the beginning, during which time he has held positions in Security and Threat Analysis, proving himself to be a committed company advocate. Glenn came to Critical Path Security from ConcieHRge and brought with him energy and enthusiasm that he has continued to use while leading his employees to consistently improve the development of Léargas. His background in full stack development gives him an overall understanding of how to improve customer satisfaction with ongoing and cutting edge development of Léargas, and his ability to motivate his team has led to his continued success in the United States, Canada, Mexico, and Ireland. Please join us in congratulating him on his new position. Regards, Patrick Kelley CTO, Critical Path Security


Léargas – Road Apples

  “I have no illusions of the future. Or maybe it’s all an illusion. I don’t know. I’ve always been ready for it.” — Gord Downie When the Critical Path Security team set out to build Léargas, we knew it would be quite the undertaking. For some of us it was about unfinished business, for others it was an opportunity to solve interesting problems in novel ways, using a mix of open source platforms and custom development. It started as a desire to build a Next Generation Network Security Monitoring platform that performed analysis in multi-dimensional and multi-contextual methods, without the brutal licensing fees. It turned in to so much more! Today, we’re thrilled to announce a list of brand new features available for our current and future customers. North-South / East-West - Our clients can now add profile-based sensor and aggregation points anywhere they wish in their network. Léargas will…

Comments Off on Léargas – Road Apples
Close Menu