Apple takes the number one spot from PayPal as the most phished brand. IID CTO Rod Rasmussen explains different attack vectors used by cybercriminals to attack Apple.
Once upon a time, you could raise the drawbridge, bar the gates, and hope to stay safe. But that day is over.
Exchanging threat intelligence is the next wave of Internet security, and we’re the experts leading the way. Connecting, sharing and implementing clear, concise threat data is the best defense.
ActiveTrust gives the good guys a competitive edge.
Because working together is good for all of us.
We created ActiveTrust, one of the largest commercial threat intelligence networks, to deliver clear, actionable data to Fortune 50 companies, state and federal government entities, top security experts, law enforcement at every level around the world—and now, you.
ActiveTrust accelerates big collaboration on a global scale, with the speed and ease of social networking. You get timely, concise security intelligence you can act on, distributd through a private, peer-based platform.
The ActiveTrust Hub
The ActiveTrust Hub is the social network for threat intelligence. It’s the secure platform for accessing the collective strength of ActiveTrust and the trusted place where security professionals go to communicate, collaborate and exchange information with peers at the speed of a click.Find Out More
A culture of curiosity. An ethic of diligence. A passion for what’s right. That’s what drives the cybersecurity experts and veteran technologists behind IID. Our executive team consists of globally respected thought leaders who help guide government policy and play prominent roles in industry associations.
Chief Financial Officer
Our CFO’s from Manhattan — Manhattan Beach. Buttoned-down when needed, Ben's as balanced in the boardroom as he is on a longboard.
Sharing Threat Intelligence
IID CEO, Lars Harvey, talks about the importance of sharing cybercrime threat intelligence.