Projects Overview
CTM (Change The Model) Insights exists to identify and incubate solutions to structural issues in CyberSecurity. What follows are a set of past, present, and potential areas of research
Solving Internet Trust
The Internet lacks a Trust Model - CTM led a consortium that developed technology and concepts to mitigate attacks closest to the edge, resulting in an Internet Draft
Beyond Encryption
Encryption slows attackers down, but given enough time and compute they
have everything they need to defeat it. CTM explored alternatives to encryption for data at rest and in flight, resulting in the launch of ShardSecure, Inc
Controlling Data Movement
Current Data Leakage Prevention leverages a single perimeter defense model. The new perimeter isn't a corporate firewall, it's the edge of the data itself. Cloud Data protection that follows data protects this new perimeter
Unsharing Data
Modern business models require sharing data with numerous partners and service providers, but we are still responsible if our data is breached externally. New methods to revoke data access outside of our perimeter seek to resolve this challenge
Transaction Authorization
Consumer Identities are leaked and misused for fraudulent purposes. CTM built a new approach to prevent misuse of Identifiers and Personally Identifiable Information, resulting in the launch of The Authoriti Network, Inc.
Data Integrity
What happens when bad actors stealthily change data? Social media contains deepfakes. Bank balances are wrong. Books wont reconcile. Medical imaging is inaccurate. Payroll wont run. CTM developed new ways to counter this new threat by efficiently isolating untrustworthy data
Stopping Ransomware
Ransomware needs disk access to encrypt files. We thought of a new approach to limit the damage by limiting access. Then we made the IP free to anyone who wants it. Read how to do it here
Software Supply Chain
How can you know the existence and quality of every component of a complex software product? Without knowing what’s inside, how can you manage the risk? CTM is investigating a behavioral approach to managing software supply chains and dependencies, based on the principle of Zero Trust
Detecting AI-synthesized deepfakes
What happens when you can’t trust your own eyes and ears? AI can develop realistic audio, video, and images of real people. This opens up new avenues for fraud, election interference, and reputational harm. Trying to detect fakes is an increasingly impossible challenge as there are too many good ones. Instead, StreamShield focuses on knowing if something is real. It works with real-time phone calls and video conferences, in addition to pre-recorded clips posted online. StreamShield protects the essence of what’s being communicated instead of the bits and bytes used to deliver it.