suite of products
Agentless malware protection for website visitors
Protector Air actively stops man-in-the-middle attacks, data exfiltration and social engineering at the point of transaction.Explore Solutions
“Our login security has never been more solidified than it is now since we installed Protector Air. Their ability to account for multiple user instances brings protection to a new level.”read more about how protector Air can keep you secure
The Latest from our Blog
A dangerous form of backdoor malware was found in the firmware of at least four low-end smartphone models sold in Germany recently. Das Bundesamt für Sicherheit in der Informationstechnik (BSI), the German government’s cyber security agency, alerted users to the […]
Supply chain attacks are on the rise. According to Symantec’s 2019 Internet Security Threat Report (ISTR), the number of attacks targeting third-party providers of widgets, plug-ins and analytics tools increased by 78 percent during 2018. Such is the extent of this […]
“Never trust, always verify”. That’s the guiding principle behind the Zero Trust approach to cyber security. Gartner recently defined Zero Trust as “a concept for secure network connectivity where the initial security posture has no implicit trust between different entities, regardless of whether they are inside or outside […]
Together, we learn from the past and then we adapt
Attacks against retailer
point-of-sale (pos) systems
In recent years, a number of large retailers have suered the compromise of customers credit card data from point-of-sale (PoS) systems. In 2013 and 2014, Target and Home Depot became two of the more high-profile victims of this type of breach. It is likely that both intrusions were the work of the same criminal group…
Internal Data Theft
at JP Morgan Chase
In July of 2014, J.P. Morgan Chase discovered a month-long breach of their corporate network that exposed personal information of about 76 million households and more than 7 million small businesses. Attackers leveraged their initial entry to eventually gain access to over 90 servers across the enterprise….
Keylogger Theft of Consumer
On December 26, 2014, a group of criminals claiming aliation with Anonymous released a file of more than 13,000 credentials for sites including Walmart, Amazon, Playstation Live, and Hulu Plus. These were clearly obtained from keylogging botnets and almost certainly represent only a portion of the credentials captured from the compromised computers as the attackers likely kept the higher-value data for themselves…
Demo Our Solutions Today!
Experience the simplicity of Trusted Knight's full suite of security solutions
Try our solutions for 14 days with no changes to existing applications, security tools or infrastructure.Questions?