Use your computer fearlessly.




[ Security | Consulting | Research ]



What's New?

Oct, 2017:defendIT
July, 2017:Paper: Efficient Computation of the Kinship Coefficients (manuscript in preparation)
Spring 2017: Articles: Topics in Computer Security

 
Nov. 30, 2016: Report: Cybersecurity in Salt Lake City
Sept. 9, 2016: Report: Cybersecurity in Boise
Jul. 12, 2016: Cyber-Securing Miami
Jul. 8, 2016: Solidarity in Mourning
Jul. 7, 2016: Report: Cybersecurity in Miami
Jul. 5, 2016: Preserving the Evidence Chain of Custody
Jun. 29, 2016: Five-Year Delays on Critical Security Upgrades
Jun. 26, 2016: Take Action: Secure our Internet
Jun. 25, 2016: Report: Cybersecurity in Montana
Jun. 25, 2016: Security Alert Map of North America

 
Jun. 15, 2016: Our logo has a new look. The old logo is here.
Jun. 6, 2016: ISBRA 2016 paper Haplotype inference for pedigrees with few recombinations (slides, talk)
Jun. 4, 2016: Security tips for living in South Florida and mobile security.
Jun. 4, 2016: Audit, surprise audits, and clean-up services are on offer.
Mar. 15, 2016 This paper accepted to ISBRA 2016: Haplotype inference for pedigrees with few recombinations
Feb. 26, 2016 Full Paper: Non-identifiable pedigrees and a Bayesian solution
Feb. 25, 2016 Preprint: Correcting for cryptic relatedness in genome-wide association studies
Feb. 15, 2016 Preprints: Fast computation of the kinship coefficients and Haplotype inference for pedigrees with few recombinations
Feb. 6, 2016: PedKin, an open source program for computing the kinship coefficients of a pedigree
Feb. 3, 2016: How to Identify Hacking: discover if you have been a victim
Jan. 20, 2016: Client-only resources for paying customers to keep up-to-date with the latest security advice, computing equipment, travel warnings, and security alert levels.
Jan. 9, 2016: Product lines: lease hardened devices, purchase hardened devices, or get a travel kit to harden your devices.
Jan. 5, 2016: Open Letter to Genetics Researchers
Dec. 27, 2015: Whitepaper: Hacking as an Anathema to Computer Science
Dec. 19, 2015: Several whitepapers: Trojan Detection, Encouraging Vulnerability Bounties, Patching Buffer Over-runs Using Compilers (available in defendIT)




bbkirk@intrepidnetcomputing.com



© 2015, 2016, 2017 Intrepid Net Computing. All rights reserved.