Thursday, October 31, 2019

Tiversa

Michepman: creating article on Tiversa


'''Tiversa''' is an American [[cybersecurity]] firm headquartered in [[Pittsburgh]], Pennsylvania. It was founded by a retired chiropractor and real estate entrepreneur named Robert Boback in 2004<ref name= LabMD></ref>. The company specialized in trawling the [[deep web]], investigating [[peer to peer]] networks, and helping businesses counteract data breaches and other cybersecurity risks. Its main product was EagleVision X1, a piece of software that monitored the deep web for sensitive data.<ref name= Downfall></ref>

== History ==

Before entering the cybersecurity field, Boback was a chiropractor and real estate entrepreneur.<ref name= Downfall/><ref name= LabMD/> He started Tiversa in 2004 as a two-person shop. Tiversa quickly obtained a high-profile board of advisers, including [[Maynard Webb]] (former eBay executive and chairman of Yahoo), [[Howard Schmidt]] ([[Obama]]-era cybersecurity chief), and [[Wesley Clark]] (former [[Supreme Allied Commander]] of [[NATO]]).<ref name= Downfall/>

=== Marine One hack ===

In 2009, Tiversa claimed to have discovered a major security breach involving then-President [[Barack Obama]]'s helicopter, [[Marine One]]. The breach involved the leak to [[Iran]] of sensitive procurement information about the helicopter as well as the helicopter's blueprints. According to Tiversa's CEO, the breach was caused by a defense contractor employee who downloaded a peer-to-peer file-sharing client onto a laptop which contianed the sensitive materials<ref name= MarineOne></ref>. This discovery made national news, but a [[whistleblower]] later claimed that the Iranian hack was actually fabricated by Tiversa employees.<ref name= Whistleblower></ref><ref name= LabMD/> Boback, the CEO of Tiversa, denied the allegation.

=== LabMD scandal ===

In May 2008, a Tiversa executive contacted LabMD (a urology testing laboratory) claiming to have discovered evidence of a major data breach and offered to sell LabMD monitoring services to counteract the breach.<ref name= LabMD/> When the head of LabMD declined to purchase the monitoring services, Tiversa allegedly leaked information about the breach to the U.S. [[Federal Trade Commission]], which pursues cybersecurity issues. The FTC launched a probe into LabMD's practices under section 5 of the Federal Trade Commission Act in 2010, which evolved into a formal administrative complaint in 2013. LabMD's revenues fell and the business itself collapsed in 2014 due to the costs of litigating the case. However, in November 2014, an administrative law judge threw out the complaint against LabMD, citing a lack of unreliability in the evidence provided by Tiversa to the FTC. This stemmed from a whistleblower complaint by a former Tiversa employee, Richard Wallace, who claimed that he was the one who breached LabMD's systems and that LabMD's data was never leaked outside of its network. He also alleged that Tiversa was responsible for the FTC complaint against LabMD, which was made in retaliation for LabMD's refusal to purchase Tiversa's monitoring services.<ref name= LabMD/>

=== Federal probe ===

Following Wallace's whistleblower complaint, the federal government began probing Tiversa under allegations that it deliberately provided false information about data breaches to the FTC to retaliate against companies that declined to purchase its data protection services. The [[Department of Justice]] lauched a criminal investigation in 2015 following the whistleblower complaint and the FTC also launched a probe of whether Tiversa had lied about any among the 80 companies that it had reported to them.<ref name= DOJProbe></ref>

== Prominent clients ==

* [[Capital One]]<ref name= Downfall/>
* [[Lehman Brothers]]<ref name= Downfall/>
* [[Goldman Sachs]]<ref name= Downfall/>
* [[American Express]]<ref name= Downfall/>

== References ==



== External links ==

* [tiversa.com Tiversa's website]


from Wikipedia - New pages [en] https://ift.tt/2q56RyV
via IFTTT

No comments:

Post a Comment