SUBROSA – Simple User Based Resource Oriented Segmentation Architecture SUBROSA is our access authorization and password replacement web service that helps companies eliminate the vulnerabilities associated with password-based authentication. It effectively thwarts brute-force attacks by allowing users to choose unique data resources to generate their keys and establish a personal interaction pattern with the resource.

In The News

FBI
CEO Richard Blech Provides Expert Comments on Wall Street Journal Report
CEO Richard Blech Comments on Cryptographers Fighting the FBI on Mobile Security Richard Blech...
Cybercriminals Exploit Gmail Feature to Scale Up Attacks
Criminals are taking advantage of Gmail's 'dots don't matter' feature to set up multiple...
URGENT WARNING: How To Protect Every Lazy U.S. Citizen From Cyber Attack
Published on December 10, 2018 Steve Morgan Publisher at Cybersecurity Ventures, the world’s...

Marriott may face GDPR fine of more than £17m

Marriott International could face a multimillion-pound fine in Europe, following news that the...
security breaches

Massive Security Breach Hits 25,000 DHS Federal Workers

AP is now reporting that the federal workers at the DHS were hit in a massive attack: In yet...
Gov’t Log-ins

CEO Richard Blech Comments On Gov’t Log-In Theft

Security Expert Comments on CIA Finds Stolen Gov’t Log-ins Across the Web “This is further...

SUBROSA and your Business

  • Authentication factor and cryptographic key generation tool – more secure than PINS or user-generated passwords
  • Users choose a selection of photos/ images, then choose a customized tile pattern that is personal to them
  • The chosen tile pattern is converted into a 65,000+ character long, randomized, encrypted key as their password
  • SURBOSA exceeds “Password Best Practices” in being: very long, random, encrypted, difficult to socially engineer

Technology in the News

Suspected State-Sponsored Hackers Pummel US and Australia

Dozens of companies in the U.S. and political parties in Australia have been targeted in recent attacks that appear to have state sponsorship. Did you enjoy this article? Then read the full version from the author's...

Chinese and Iranian Hackers Renew Their Attacks on U.S. Companies

SAN FRANCISCO — Businesses and government agencies in the United States have been targeted in aggressive attacks by Iranian and Chinese hackers who security experts believe have been energized by President Trump’s withdrawal from the Iran nuclear deal la Did you enjoy...

Over 92 Million New Accounts Up for Sale from More Unreported Breaches

All these numbers…. Now, a new set of databases containing millions of hacked accounts from several websites has been made available for sale on the dark web marketplace by the same hacker who goes by online alias Gnosticplayers. Did you enjoy this article? Then read...

620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts

Exclusive Some 617 million online account details stolen from 16 hacked websites are on sale from today on the dark web, according the data trove's seller. Did you enjoy this article? Then read the full version from the author's...

Cybercriminals Exploit Gmail Feature to Scale Up Attacks

Criminals are taking advantage of Gmail's 'dots don't matter' feature to set up multiple fraudulent accounts on websites, using variations of the same email address, Agari says. Did you enjoy this article? Then read the full version from the author's...

191 Million US Voter Registration Records Leaked In Mystery Database

A whitehat hacker has uncovered a database sitting on the Web containing various pieces of personal information related to 191 million American citizens registered to vote. Did you enjoy this article? Then read the full version from the author's...

Cloud Customers Faced 681M Cyberattacks in 2018

The most common attacks involved software vulnerabilities, stolen credentials, Web applications, and IoT devices. Cloud customers were hit with 681 million cyberattacks last year, according to analysts at cloud security provider Armor, which recently analyzed cloud...

7 Key Elements of a Successful Encryption Strategy

The most common method of protecting data in motion is the use of a secure sockets layer virtual private network (SSL VPN). Technologies such as SSL VPN are critical in the effort to protect against man-in-the-middle attacks and packet sniffers. Did you enjoy this...

Data breach attack surfaces to expand in 2019

When it comes the gauging the newsworthiness of a story, there’s an old adage in journalism that reporters should ask themselves whether or not the story is of the “dog bites man” or “man bites dog” variety. Did you enjoy this article? Then read the full version from...

Mother of All Breaches Exposes 773 Million Emails, 21 Million Passwords

There’s no shortage of data breaches these days, but this one should make you sit up and pay attention. The newly discovered “Collection #1" is the largest public data breach by volume, with 772,904,991 unique emails and 21,222,975 unique...

SCI Solutions Using SUBROSA Technology

SCI Subsidiaries Using SUBROSA Technology

What is SUBROSA?

  • Users choose their own pictures or digital images then select an easy to remember tile pattern
  • SUBROSA converts this tile pattern into a very long encrypted password/ log-in (65,000 characters min.)
  • Replaces hard to remember passwords and PINS with easy to remember picture tiles