CTO, Eric Sackowitz gives an up close and personal look at SecureCo’s STRATUS Cloud Mesh Transport along with revealing some of the stealth and obfuscation tactics it employs to thwart adversarial exploitation.
A demonstration of the next generation SecureCo customer portal which provides easy access for customers, resellers and integrators to manage and monitor their SecureCo installation.
Here we dive a little deeper and showcase how a would-be attacker leverages vulnerabilities of an API through App key hijacking and then performs an API enumeration to exploit it. We show how SecureCo technology eliminates that exploitation by hiding the endpoint without sacrificing functionality or performance.
Learn how SecureCo uses stealth, obfuscation and deception to create the most untargetable and secure network connections possible to protect your Enterprise from breaches, fraud and disruption. Embrace the power of Stealth.
Webinar moderated by Ed Amoroso, CEO and Founder of TAG InfoSphere joined by panelists Tim Marsden, Chief Information Security Officer at Stifel Financial Corporation and Alex Harrington, Co-founder and CEO of SecureCo. Discussing Obfuscation as a Game Changer: A deep dive into the principles and potential of this innovative approach and the implications for Enterprise Risk Management.
Alex Harrington, CEO and Co-Founder of SecureCo, joins Jill Malandrino, Correspondent at TAG Cyber, in a discussion about SecureCo’s security products.
SecureCo connections can hide endpoints to render them invisible to scans and downstream network attacks, and shield networks against vulnerability exposure. SecureCo co-founder and CTO Eric Sackowitz demonstrates how our technology protects customer networks.
SecureCo Founders Alex Harrington and Eric Sackowitz discuss current issues in Federal cybersecurity with Vice Admiral TJ White, US Navy (ret.), the former commander of USCYBERCOM’s Cyber National Mission Force.
Listen here for an interview with Modern CTO’s Joel Beasley as Alex Harrington discusses the challenges facing businesses as the cyber threat level continues to climb.