Projects Overview

CTM (Change The Model) Insights exists to identify and incubate solutions to structural issues in CyberSecurity. What follows are a set of past, present, and potential areas of research

 
 

Solving Internet Trust

internet security

The Internet lacks a Trust Model - CTM led a consortium that developed technology and concepts to mitigate attacks closest to the edge, resulting in an Internet Draft


Beyond Encryption

Encryption slows attackers down, but given enough time and compute they
have everything they need to defeat it.  CTM explored alternatives to encryption for data at rest and in flight, resulting in the launch of ShardSecure, Inc
 


Controlling Data Movement

Current Data Leakage Prevention leverages a single perimeter defense model.  The new perimeter isn't a corporate firewall, it's the edge of the data itself.  Cloud Data protection that follows data protects this new perimeter

 

 

iStock-187115358.jpg

stock-photo-marines-soldiers-watching-from-their-military-camp-429226633.jpg

Unsharing Data


Modern business models require sharing data with numerous partners and service providers, but we are still responsible if our data is breached externally.  New methods to revoke data access outside of our perimeter seek to resolve this challenge


Transaction Authorization

Consumer Identities are leaked and misused for fraudulent purposes.  CTM built a new approach to prevent misuse of Identifiers and Personally Identifiable Information, resulting in the launch of The Authoriti Network, Inc.

shutterstock_365834957.jpg

Data Integrity

iStock-480496490.jpg

What happens when bad actors stealthily change data? Social media contains deepfakes. Bank balances are wrong. Books wont reconcile. Medical imaging is inaccurate. Payroll wont run. CTM developed new ways to counter this new threat by efficiently isolating untrustworthy data


Stopping Ransomware

Ransomware needs disk access to encrypt files. We thought of a new approach to limit the damage by limiting access. Then we made the IP free to anyone who wants it. Read how to do it here

ransomware- shutterstock.jpg

Software Supply Chain

How can you know the existence and quality of every component of a complex software product? Without knowing what’s inside, how can you manage the risk? CTM is investigating a behavioral approach to managing software supply chains and dependencies, based on the principle of Zero Trust