Research and Innovation - Think Like a Hacker

Ph.D. Research - Malicious Actor Motivations

While there have been significant advances in intrusion detection systems (IDS) as well as security incident and event management solutions (SIEM). These technologies fail to take into consideration the human aspect in computer use and network activity.


The best defense is a good offense. Understand your attacker to better protect your networks and valuable information.

Real-time Analytics and reporting

Understanding place in time behaviors, network and security administrators are able to effectively react to anomalies and malicious behavior to better protect networks and information.

Latest News On OkotoSecure

Beware of an Unpatched Microsoft Word 0-Day Flaw being Exploited in the Wild

It's 2017, and opening a simple MS Word file could compromise your system. Security researchers are warning of a new in-the-wild attack that silently installs malware on fully-patched computers by exploiting a serious — and yet unpatched — zero-day vulnerability in all current versions of Microsoft Office on fully-patched PCs. The Microsoft Office zero-day attack, uncovered