Law Enforcement Data Requests: The Supply Chain Vulnerability Nobody’s Talking About
Law enforcement and government agencies have always been an attractive target for criminal hackers. By stealing and using their credentials or spoofing government domains, criminals obtain a perception of authenticity that helps them social engineer businesses. Unfortunately, there has been an upward trend in public sector targeting for some time…
Kodex Raises $10M Seed, Delivering the Only Complete Solution for Law Enforcement Response
Kodex, the only complete solution for law enforcement response, raised a $10 million seed round, led by a16z with participation from Tusk Venture Partners and other strategic investors (full list below). This brings the company’s total funding to $12 million to date…
We use multiple layers of defense with built-in redundancies to verify law enforcement agents and prevent their Kodex accounts from unauthorized use. Law enforcement officers are required to sign up with a verified agency email. However, criminals know that law enforcement agencies often have weaker security than the companies they’re trying to exploit…
Why Kodex is on a Mission to Modernize Law Enforcement Response for Business
Today, most crimes involve some element of technology – whether that’s using online platforms to communicate with others to plan a terrorist attack or an abuser luring children through private messages. This means most law enforcement investigations will involve following some kind of digital footprint to gather the necessary facts and evidence…
“I’ve never sent a fax in my life and this is the FBI! What are we doing here?”
Matt recently joined the Decipher Security podcast with host Dennis Fisher and Nick Selby, a seasoned CISO and law enforcement officer, to discuss the challenges organizations face when responding to data requests and how companies can address them. One of the greatest challenges for organizations is verifying that requests come from legitimate law enforcement officers…
Removing Friction for LERT Teams with Legal and Technical Advancements
It’s no secret that laws often lag behind the pace of technology. As criminals increasingly adopt the use of technology in their campaigns to harm others, the volume of law enforcement requests for data from private companies has increased exponentially…
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.