Master Article Index 2017-05-11T18:22:22+00:00

Our online directory of documents, articles, and other resources authored or referenced. Due to the vast subjects covered by these documents, we have chosen to simply list them in alphabetical order based on title.

Document type and format legend:

Certitude document

Article

Our blog

Page on our website

HTML format

PDF format

“”

Type Document  Links Description
  15 data security policies ignored by modern worker… html  pdf
link
“IT isn’t the only department stretched thin….IT policies—designed to educate employees and manage risk—are white noise for the modern worker……”
  2016 California Data Breach Report html  pdf
  2016 Cyberthreat Defense Report – CyberEdge Group html  pdf “The effectiveness and value of traditional endpoint security solutions, especially those that rely on signature-based detection mechanisms, have been in question for some time. However, with advanced malware now featuring countless tricks – such as polymorphism, active sandbox deception, and the ability to erase all traces of its presence after striking – the answer is clearly in….”
  2016 State of the Endpoint Report – Ponemon Instit… html  pdf
  3.2 million debit cards compromised; SBI, HDFC Ban… html  pdf
link
“Banks in India will either replace or ask users to change the security codes of as many as 3.2 million debit cards in what’s emerging as one of the biggest ever breaches of financial data in India, people aware of the matter said. Several victims have reported unauthorised usage from locations in China….”
  44% Of Companies Miss Breach Reporting Deadlines html  pdf
link
A slew of quality links on companies hiding, failing to report, or under-reporting cyber-security events, as well as the lack of laws forcing vendors to disclose breaches:
  About Us html About the Certitude team
  Amulets in history…(fun facts) #1 html  pdf
link
This 6,000-year-old amulet is the oldest example of a technology still used by NASA
  Amulets in history…(fun facts) #2 html  pdf
link
AMULET: Wikipedia
  AMULETS™ and Code Cocoons™ html  pdf Document covering details of Code Cocoons™, an invention which, in addition to other things, prevents or makes difficult the comparisons between what is on the hard drive in one environment and what is in memory in another, keeping even momentarily-exposed intellectual property in a different environment than the one which is native to the host computer.
  AMULET™ html Summary page of links for AMULET™ pages
  AMULET™ Auto Registration for Multimedia html  pdf Allows consumers, along with authors, to specify frictionless ecosystem for access to published multimedia works
  AMULET™ Corporate Container Simulation™ (CCS™) html  pdf A collection of applications, tools, services and helper utilities to quickly and efficiently use Certitude Digital AMULETs™ to wrap effective fail-safe cybersecurity around very large numbers of digital assets as files residing in existing Container-Related Asset Protection (CRAP) folders, disk drives, servers, server farms, the cloud, and other aggregates and collections.
  AMULET™ Editor Instructions html  pdf Instructions for using the AMULET™ to make changes to an AMULET™ configuration file, which is one of the four main components to the Certitude Digital system.
  AMULET™ Framework Services html
  AMULET™ Multimedia Rights Suite™ (MRS™) html  pdf A comprehensive, cooperating set of applications, framework components, processes, utilities and website helpers that ensure multimedia content providers have a secure, convenient means to publish their work and know they will be paid fairly for every rendition of that work, and also ensure that content consumers (users) have an uninterrupted, painless experience enjoying the art they’ve purchased.
  AMULET™ Patent Application html  pdf One of our published patent applications behind our AMULET™ technology.
  AMULET™ Technology Time Validation Implementation html  pdf This document covers how the AMULET™ editor allows you to pre-define unlimited arrays of time period definitions that can overlap each other to provide intricate patterns for controlling access to a digital asset though an AMULET™ based on time access is requests and the intended duration of use.
  AMULET™ Technology to Turn Digital Security Industry Upside Down html  pdf
link
Our press release today, announcing the release of our demonstration application, along with letting the security industry know we have a proven technology capable of solving many of today’s security issues. [read the full press release]
  AMULET™ Versus CRAP Technologies html  pdf AMULET™ technology versus Container-Related Asset Protection (CRAP) technology
  AMULET™ White Paper html  pdf Our white paper for business, government and industry – a free-wheeling, frank, irreverent and educational presentation of the problem of, and solution for, digital asset security,
  An Open Letter to In-Q-Tel html  pdf
link
We are Certitude Digital, Inc. (http://www.CertitudeDigital.com), the inventors of disruptive patent-pending cyber-security technologies that could handily resolve the largest portion of the current national cyber-security disaster all by themselves, assuming the assistance of investors and the cooperation of our government….
  Another push for industry to begin earlier reporti… html  pdf
link
A recent article, titled “Inside LeakedSource and Its Database of 3 Billion Hacked Accounts” discusses another push for industry to begin reporting breaches earlier, but there’s no mention of reporting the corrupt/failed security technology vendors whose products were successfully hacked!
  Anything the NSA thinks it knows today, the best … html “Anything the NSA thinks it knows today, the best hackers knew yesterday, and the average hacker will know tomorrow.”
  At This Very Moment, Five Percent of Your Workforc… html  pdf
link
As one of the very few experts in effective cyber-security (that is, protection of digital assets that is non-disruptive and actually works), at Certitude Digital we find ourselves as much engaged in public education as we are in the architecture and implementation of our technology. …
  Build-Your-Own html
  Cisco 2016 – Midyear Cybersecurity Report html  pdf
link
The report from Cisco offers that “organizations are unprepared for future strains of more sophisticated ransomware. Fragile infrastructure, poor network hygiene, and slow detection rates are providing ample time and air cover for adversaries to operate…
  Clinton Foundation Allegedly Hacked html  pdf
link
“Documents allegedly taken from the Clinton Foundation were released online Tuesday by the hacker Guccifer 2.0…”
  Code Cocoons™ (web page) html An invention which, in addition to other things, prevents or makes difficult the comparisons between what is on the hard drive in one environment and what is in memory in another, keeping even momentarily-exposed intellectual property in a different environment than the one which is native to the host computer.
  Companies hiding, failing to report, or under-repo… html Article touching on the issue with companies failing, or delaying, on reporting breaches
  Company Videos html A page of instructional and informational videos
  Contact Us html Contact form for sending information and requests
  Containers html Defines what ‘container-based security’ is and what the issues are.
  Databases html Protecting assets in a database…
  Defended IBM’s security technologists yesterday, … html “I defended IBM’s security technologists yesterday during a heated argument – I tried to make the case…
  Demonstration App – Text Editor Install And Use html  pdf Installation and usage instructions for our demonstration application, which uses a plain text editor to let the user try out and understand some of the AMULET™ technology capabilities.
  Digital Assets html Summary page of links for Digital Asset related pages
  Digital Workplace html  pdf
link
A slew of quality links on companies hiding, failing to report, or under-reporting cyber-security events, as well as the lack of laws forcing vendors to disclose breaches:
  Donate html Learn about donating to support our technology
  Dongles html Discussion of dongle approach to security and the various issues
  Editorials by our CTO html Our CTO’s blog where he publishes articles, notes, quips, and the like…
  Employees Working With Hackers To Steal Corporate Data (article 1) html  pdf
pdf
This would all be fascinating if it weren’t so disturbing:
  Employees Working With Hackers To Steal Corporate Data (article 2) html  pdf
link
This would all be fascinating if it weren’t so disturbing:
  Employees Working With Hackers To Steal Corporate Data (article 3) html  pdf
link
This would all be fascinating if it weren’t so disturbing:
  Encryption vs AMULET™ Technology html Breakdown of the differences between Encryption vs AMULET™ Technology
  Fail Safe html What is ‘fail safe’
  FAQs (Frequently Asked Questions) html Answers to frequently asked questions
  Fight against hackers hurt by huge shortage of cyb… html  pdf
link
“At the very moment hacking is expanding exponentially, analysts said, there are hundreds of thousands of cybersecurity jobs left unfilled in the U.S. The extent of this problem is the subject of debate; the estimated tally of vacancies ranges from 100,000 to 350,000, with as many as 45,000 in California”
  For investors html Investor overview information
  Future Application of Code Cocoons™ html Discussion of another use for our Code Cocoon™ technology
  Glossary of Cybersecurity Terms html Glossary of common terms used in cybersecurity
  GPS Point Grabber And Editor Instructions html  pdf For defining precision custom GPS point polygons to support AMULET™ location-based criteria for determining access to a digital asset.
  Hacker claims to be selling stolen NSA spy tools html  pdf
link
“The NSA develops high-powered hacking tools. Now a hacker claims to be selling a stolen batch of them.”
  Hacker claims to leak new season of Netflix’s Orang is the New Black html  pdf
link
“A hacker claims to have stolen the upcoming season of Netflix’s hit series “Orange Is The New Black” and has purportedly released most of the new episodes online.”
  How many cyber-heists go unreported? html  pdf
link
A slew of quality links on companies hiding, failing to report, or under-reporting cyber-security events, as well as the lack of laws forcing vendors to disclose breaches:
  How to Tell a Secret in the Digital Age html  pdf
link
Interesting article describing several ways employees can get even by sending tips to news organizations (something AMULETs can prevent by denying access to sensitive supporting data).
  Immediate reporting of breaches to government and… html blog/we-need-immediate-reporting-of-breaches-to-governm…
  In case of cyberattack – break glass and pull cabl… html blog/in-case-of-cyberattack-break-glass-and-pull-cables
  Industry News html Our news page where we publish security-related articles
  Industry Reports html A page of industry reports for view or download
  In-flight Systems Hack Exposed html  pdf
link
Remember a few years ago when it was widely reported that in-flight systems could be hacked from the passenger seat of a flying aircraft?
  Intel Hijacking Flaw html  pdf
link
There isn’t a coder alive who doesn’t forget to take one, two, or a dozen back doors out of their code before production (especially if the coder left the project in the middle for some reason)
  Intellectual Property html Discussion of different types of intellectual property and protection
  Investor Application html Application for more information to become an investor in our technology.
  IPhone Users Urged to Update Software After Securi… html  pdf
link
“One of the world’s most evasive digital arms dealers is believed to have been taking advantage of three security vulnerabilities in popular Apple products in its efforts to spy on dissidents and journalists.”
  Kaspersky Report – The Evolving Role of SaaS and I… html  pdf Industry report from Kaspersky
  Master Index html Exhaustive listing of documents, web pages, and resources
  Microsoft: Windows bug exploited by hackers tied t… html  pdf
link
“Microsoft has confirmed some Windows users were under attack earlier this month by a specialized hacking group.”
  Mozilla plans Firefox fix for same malware vulnera… html  pdf
link
“Mozilla officials say they’ll release a Firefox update on Tuesday that fixes the same cross-platform, malicious code-execution vulnerability patched Friday in the Tor browser.”
  Multimedia Types html Discussion of the various types of multimedia and approaches to protect.
  Mystery Hackers Blow Up Secret NSA Hacking Tools i… html  pdf
link
“A gang of elite hackers, believed by many to be Russian, say they’re quitting—just as Donald Trump gets ready to enter the Oval Office.”
  Nearly 1 of 3 banks don’t require vendors to report data breaches html  pdf
link
A slew of quality links on companies hiding, failing to report, or under-reporting cyber-security events, as well as the lack of laws forcing vendors to disclose breaches:
  Nearly one million Android phones infected by hack… html  pdf
link
“Hackers have gained access to more than 1.3 million Google accounts — emails, photos, documents and more — by infecting Android phones through illegitimate apps.”
  New security vulnerability puts 900 million Androi… html  pdf
link
“Security firm Check Point has identified vulnerabilities affecting 900 million smartphones and tablets that use chipsets from component maker Qualcomm.”
  New Windows password cracking app version makes cr… html  pdf
link
“The release of the original L0phtCrack was 19 years ago and its password cracking capability forced Microsoft to make improvements to the way Windows stored password hashes. Microsoft eventually deprecated the weak LANMAN password hash and switched to only the stronger NTLM password hash it still uses today.
  Nothing to See Here: Underreporting Cyber Security Incidents Impacts Cyber Insurance html  pdf
link
A slew of quality links on companies hiding, failing to report, or under-reporting cyber-security events, as well as the lack of laws forcing vendors to disclose breaches:
  Ohio taps National Guard to defend election system from hackers html  pdf
link
“Ohio is calling upon the National Guard to help defend the state’s election system from hackers. ‘Lets face it: Cyberwarfare is a new front for the military, for business and now for elections,’ said Ohio Secretary of State Jon Husted.”

“To combat that threat, Husted has done something unprecedented in the state’s history. He’s called on the Ohio National Guard’s elite cyberprotection unit to help secure the election”… read the full article

  Overview html Overview of our technology
  Police Department Loses Digital Evidence Dating Ba… html  pdf
link
“”A police department based in Texas has lost digital evidence and other files dating back to 2009 as a result of a ransomware attack.””

On 25 January 2017, the Cockrell Hill Police Department issued a press release in which it reveals a computer virus had recently affected one of its servers”” read the full article

  Privacy policy html Privacy policy regarding your use of our website
  Products html
  Questions you MUST ask Your Security Provider (and… html Questions you MUST ask Your Security Provider (and Yourself) – or “the questions Watson can’t, or won’t, answer”
  Response to Intel/McAfee article on thinking small in cyber-security html  pdf
link
My response to the referenced article…
  Russian hacking activity continues unabated html  pdf
link
“Russian cyberhacking activity has continued largely unabated since the November election, including against US political organizations, US officials briefed on the investigation told CNN on Thursday.”
  Russia’s arrests of cybersecurity officials prompt speculation html  pdf
link
“With mystery surrounding the recent arrests in Moscow of several high-level Russian cybersecurity figures, speculation mounted Friday that one of the men may have been an informant who provided crucial information to the United States about Russian meddling in the U.S. election campaign.”

“The speculation came from two former employees of the National Security Agency, which intercepts, deciphers and analyzes the world’s electronic communications.” read the full article

  Scam Report: USB sticks can bring ransomware to of… html  pdf
link
“The new Spora ransomware strain has been dissected by more malware researchers. The team from G Data discovered that Spora uses an innovative way to spread itself via universal serial bus, or USB, sticks. This strain is highly sophisticated and could become the new Locky.”
  Should Companies Be Required to Share Information About Cyberattacks? html  pdf
link
A slew of quality links on companies hiding, failing to report, or under-reporting cyber-security events, as well as the lack of laws forcing vendors to disclose breaches:
  Should Consumer Reports set cybersecurity standards html  html  pdf
  Six Security Experts Offer Cybersecurity Predictio… html  pdf
link
From Keeper Security: “With a new year just over the horizon, we asked six security experts for their views and opinions on what events and trends will unfold in 2017 in the cyber security space. These are people that have spent a great deal of time and energy on the front lines of the contemporary threat environment” read the full article
  Smart locks yield to simple hacker tricks html  pdf
link
“It’s an open secret that the Internet of Things (if we must call it so) is pretty terrible, whether in standards, interoperability or security. You don’t really expect good security in a smart light bulb or coffee maker, though. A smart front door lock, however, really shouldn’t be quite this easy to hack.”
  Software Types html Protecting software applications.
  Symantec under fire for bugs and flaws html  pdf
link
“A U.S. federal agency issued a security alert over a vulnerability in Symantec’s anti-virus software that allows attackers to remotely control affected computers”….
  Text Editor Demo Application html Download our demonstration application to learn ‘hands on’ about how the AMULET™ technology works.
  That Massive Google Docs Phishing Attack Has Taken A Weird Turn html  pdf
link
Yesterday, a phishing attack that security experts called ‘incredibly sophisticated’ ripped through Gmail accounts at a blistering pace.
  The biggest threat to innovation is internal polit… html blog/the-biggest-threat-to-innovation-is-internal-polit…
  The Challenges of Finding a Tech Startup CEO (or, “How NOT to Apply for A Startup CEO position”​) html  pdf
link
So you want to be a CEO of a hot new technology startup? You might want to make sure your attitude is in the right place and that you nail the small details pre- and post-interview….
  The Pearl Harbor of Internet Attacks happened on F… html  pdf
link
“On Friday Dyn, a company that monitors and routes Internet traffic, was attacked causing sites like Twitter, Spotify, Netflix, Amazon, Tumblr, Reddit, PayPal, and others to shut down.”
  The state of cyber security: we’re all screwed html  pdf
link
“When cybersecurity professionals converged in Las Vegas last week to expose vulnerabilities and swap hacking techniques at Black Hat and Defcon, a consistent theme emerged: the internet is broken, and if we don’t do something soon, we risk permanent damage to our economy.”
  The true evil of IBM – the primary Container-Relat… html  link
link
IBM is the primary Container-Related Asset Protection (CRAP) ‘security’ vendor in the U.S., but I doubt you understand just how evil they truly are.
  There are truly no secrets. There are merely… html Quote:”There are truly no secrets. There are merely delays in the communication of the information.”
  Third Party Vendor Breaches Still A Major Cybersecurity Issue in 2016 html  pdf
link
A slew of quality links on companies hiding, failing to report, or under-reporting cyber-security events, as well as the lack of laws forcing vendors to disclose breaches:
  Timeline html Noteworthy achievements or events in the course of our history…
  Top 5 scary hacks that emerged from the Black Hat … html  pdf
link
“The annual Black Hat USA conference attracts thousands in the cybersecurity community every year and thanks to the milling hackers, new and innovative cyber-exploits have emerged, which can be both fascinating and scary.”
  US Report Risk Value Public Approved html  pdf
pdf
A slew of quality links on companies hiding, failing to report, or under-reporting cyber-security events, as well as the lack of laws forcing vendors to disclose breaches:
  Use Cases html Lots of examples of scenarios and how the patent-pending AMULET technology could be applied to the situation.
  War Stories html Short anecdotes, illustrations, suggestions, or stories which describe a unique real-world situation in which AMULETs™ have been, or could be, applied. These are intended to help further understanding of AMULETs and their use.
  War Stories – Horses and buggies html Having to do with mobility, transport, and destination…
  War Stories – Intelligent battlefield weaponry html Fail-safe weaponry discussion…
  War Stories – The Samsung rental refrigerator html Intelligent appliances – a real world specific example and discussion.
  What Is a Code Cocoon™? html Read about this ‘active’ defense method – part of the whole AMULET™ technology approach.
  What Is a Digital Asset? html Defines what we mean when we talk about ‘digital assets’.
  What is an AMULET™? html Learn about the AMULET™, a key element within our patent-pending technology
  Will 2017 be the year your home becomes under atta… html  pdf
link
“Experts expect the number of attacks on the Internet of Things (IoT) will likely increase in 2017. IoT includes devices like webcams, DVRs and connected thermostats that make life easier for homeowners, but are susceptible to cyber-intrusions.”
  ‘Xagent’ malware arrives on Mac, steals passwords, screenshots, iPhone backups html  pdf
link
“A Russian hacking group accused of interfering with last year’s presidential election has evolved its Xagent malware package, known for its ability to infiltrate Windows, iOS, Android and Linux devices, to target Macs, according to a report on Tuesday.”
  Yahoo expected to confirm a massive data breach html  pdf
link
“Yahoo is poised to confirm a massive data breach of its service, according to several sources close to the situation. The company was the victim of hacking that has exposed several hundred million user accounts.”
  Yahoo says data stolen from 1 billion accounts html  pdf
link
“Yahoo disclosed a new security breach on Wednesday that may have affected more than one billion accounts. The breach dates back to 2013 and is thought to be separate from a massive cybersecurity incident announced in September.”