Profile cover photo
Profile photo
Intensity Analytics
14 followers -
Intensity Analytics is the leader in Digital Behavior Analytics for the workplace.
Intensity Analytics is the leader in Digital Behavior Analytics for the workplace.

14 followers
About
Posts

Post has attachment
Boo-hoo for Yahoo. A few months ago, they admitted to one of the largest data breaches in history. Now comes a disclosure that hackers stole data on 1 billion user accounts, in a completely new, separate breach. That's 1,000,000,000. One-thousand million. Since the ITU estimates there are a little over 3 billion Internet users, this affects as much as 33% of ALL Internet users. Credit monitoring isn't going to fix this problem, and given how bad security is at these companies, are really going to trust them with your fingerprints, etc.? SMS/Phone tokens maybe? Well, NIST agrees those are a joke and have deemed them inadequate for Federal security. The only thing that can stop this very human problem is a solution that deals with humans. TickStream.KeyID uses your behavior when you type your username and password, so when the next billion passwords are stolen, you can relax: nobody is you, so they can't use what they have stolen. Devalue the hack. http://intensityanalytics.com/keyid
Add a comment...

Post has attachment
In Gulliver's Travels, a "yahoo" was defined as "unsophisticated". Well, Yahoo's lack of sophistication about cybersecurity may lead to a new era in SEC enforcement. Along with the FTC and other government agencies, they are taking different view what constitutes normal cybersecurity practices. As these regulations change, and the courts take a hard stance against cybersecurity laziness, what are you doing to protect your systems? In just minutes, Intensity Analytics can protect you against phishing and credential attacks that represent more than 80% of the cybersecurity problem.
Read more at: http://intensityanalytics.com
Add a comment...

Post has attachment
“Current security solutions in the market are incomplete, as evidenced by constant breaches, resulting in substantial economic losses and legal risk to enterprises and government agencies.”
We solve this most common problem we all struggle with everyday: how to keep our passwords secure. As we saw just recently with the breach of 500M accounts at Yahoo, the lost password problem is inevitable. We solve it by making that stolen password useless. They won't get into your account, because they aren't you.
Read more at: http://intensityanalytics.com
Add a comment...

Post has attachment
500,000,000 Yahoo accounts breached. That's a whole mountain of stolen credentials, and security questions, and other associated data. Information that can easily be repurposed to access your bank, your company, government agencies, etc. How can you protect your systems against 500 million stolen accounts? With TickStream.KeyID. You can ensure that no one can ever reuse your credentials. It's fast and easy, with no custom hardware and no software installation required. Read more at: http://intensityanalytics.com
Add a comment...

Post has attachment
We are happy to announce that Intensity Analytics has received it's first patent (#9,430,626) on our breakthrough TickStream solution that solves the predominant cybersecurity problem: lost and stolen credentials. These patented algorithms can positively identify someone by how they enter their username and password - and keep the bad guys out, even if they have stolen the login information. Best of all, the user doesn't have to do anything extra, and it can be installed in minutes. Plus, it can do a whole lot more. Read more at: http://intensityanalytics.com
Add a comment...

Post has attachment
So what can you do? Hide all your money in a mattress, or bury it in the yard? Pretending security problems don't exist is a solution, but a frictionless approach to cybersecurity is: TickStream.KeyID http://intensityanalytics.com/tickstream-keyid
Add a comment...

Post has attachment
You're protected because your cellphone provides second factor authentication? Well, that's what the chief technologist for the Federal Trade Commission thought also. The trouble is, the cellphone, like any other physical token, can be compromised. All it does is authenticate possession. TickStream.KeyID authenticates the actual person, and without any additional hardware: http://intensityanalytics.com/tickstream-keyid
Add a comment...

Post has attachment
Well, tweet this: social media is a land of information without attribute. How can you put any value on posts unless you know who posted it? With TickStream, you can know exactly who did what, when: http://intensityanalytics.com
Add a comment...

Post has attachment
In Denver next week? Hear John Rome speak on the future of the practice of law and technical innovations attorneys can put to work for the benefit of their clients, at the Client-Driven Technology Solutions event organized by EvolveLaw and Lawgical. It's at the Lawgical offices in downtown Denver, at 5:30p on Thursday, May 19th. For more information, go to: http://evolvelawnow.com/…/client-driven-technology-solutions
Add a comment...

Post has attachment
When you read things like "could be malicious insiders or external attackers", and "hopefully patched", it doesn't take long to figure out that they don't really know what's happening or how to stop it. Trying to keep up with threats by plugging holes doesn't work, and that's why these things keep happening. The one element that doesn't change, though, is human behavior. So, put the power behavior analytics to work for you, with TickStream.KeyID: http://intensityanalytics.com/tickstream-keyid
Add a comment...
Wait while more posts are being loaded