Kodex (@kodexinc) 's Twitter Profile
Kodex

@kodexinc

We make it easy for companies to process data requests from governments around the world.

ID: 1409695153934135302

linkhttp://kodexglobal.com calendar_today29-06-2021 02:11:22

136 Tweet

65 Followers

115 Following

Merkle Science (@merklescience) 's Twitter Profile Photo

Crypto crime is getting smarter. So should investigations. Join Merkle Science + Kodex for: Crypto Investigations & Tracing Techniques (2025) 📅 Sept 9 | 9AM EST 🎙️ Robert Whitaker & AJ Iafrate 💻 Hands-on training + case studies Register 👉 info.merklescience.com/crypto-investi…

Crypto crime is getting smarter.
So should investigations.

Join Merkle Science + <a href="/KodexInc/">Kodex</a> for:
Crypto Investigations &amp; Tracing Techniques (2025)

📅 Sept 9 | 9AM EST
🎙️ Robert Whitaker &amp; AJ Iafrate
💻 Hands-on training + case studies

Register 👉 info.merklescience.com/crypto-investi…
Know2Protect (@know2protect) 's Twitter Profile Photo

#K2P’s Pledge2Protect is in full swing, and we’re committed to protecting kids while they explore the digital world. We have the tools to help keep them safe online. Visit dhs.gov/know2protec/p2p to learn how to take the pledge today and access free resources today.

#K2P’s Pledge2Protect is in full swing, and we’re committed to protecting kids while they explore the digital world. We have the tools to help keep them safe online. Visit dhs.gov/know2protec/p2p to learn how to take the pledge today and access free resources today.
Kodex (@kodexinc) 's Twitter Profile Photo

Not all data requests are created equally! At least in terms of urgency. ⏰ Kodex & @Coinbase joined up to break down how the crypto powerhouse prioritizes and processes thousands of requests while protecting millions of users. Watch the full convo: bit.ly/45igHxw

Kodex (@kodexinc) 's Twitter Profile Photo

Want to prevent real-world harm with your work? Join our mission! 🚀 Kodex is building the first secure, global standard for data requests, transforming how companies handle sensitive information. Explore roles: bit.ly/43HTNAk

Want to prevent real-world harm with your work? Join our mission! 🚀 Kodex is building the first secure, global standard for data requests, transforming how companies handle sensitive information.

Explore roles: bit.ly/43HTNAk
Kodex (@kodexinc) 's Twitter Profile Photo

DHS's Know2Protect campaign launched #Pledge2Protect resources specifically for parents: ✅ AI/deepfake protection tips ✅ Online communication guide ✅ Parental controls setup ✅ Sextortion prevention Knowledge = protection 🛡️ 🔗 bit.ly/3VhkuGp

DHS's <a href="/Know2Protect/">Know2Protect</a> campaign launched #Pledge2Protect resources specifically for parents:
✅ AI/deepfake protection tips
✅ Online communication guide
✅ Parental controls setup
✅ Sextortion prevention

Knowledge = protection 🛡️
🔗 bit.ly/3VhkuGp
Kodex (@kodexinc) 's Twitter Profile Photo

Fraudsters aren't hacking banks anymore. They're impersonating law enforcement to trick you into giving them customer data. Email workflows can't tell the difference between a real federal agent and a convincing scammer. Your manual processes are your weakest link. 🔗💔

Kodex (@kodexinc) 's Twitter Profile Photo

Bad actors will stop at nothing to get your customer data. Which means data request workflows need to scale securely and stay ahead of rising fraud. Learn how to transform from email chaos to operational excellence in our on-demand webinar ▶️ bit.ly/45igHxw

Kodex (@kodexinc) 's Twitter Profile Photo

You're busy hardening your own systems, but threat actors are moving on to new tactics. ⏩⏩ Instead of breaking into your systems, they're targeting your outsourced support teams with bribes and social engineering. 😬

You're busy hardening your own systems, but threat actors are moving on to new tactics. ⏩⏩

Instead of breaking into your systems, they're targeting your outsourced support teams with bribes and social engineering. 😬
Kodex (@kodexinc) 's Twitter Profile Photo

.Bitget's compliance team got 𝒎𝒐𝒓𝒆 effective as their workload grew 5x. 🤯 How? They stopped treating law enforcement requests like email support tickets and started treating them like critical security operations. The right processes are a competitive advantage. 💪

.<a href="/bitgetglobal/">Bitget</a>'s  compliance team got 𝒎𝒐𝒓𝒆 effective as their workload grew 5x. 🤯

How? They stopped treating law enforcement requests like email support tickets and started treating them like critical security operations.

The right processes are a competitive advantage. 💪
Kodex (@kodexinc) 's Twitter Profile Photo

Crypto crime is evolving. Your investigation techniques should too. Join @AJiafrateTT (Kodex) & Robert Whitaker (Merkle Science) for hands-on training: 🔍 Advanced tracing for 2025 🛡️ High-risk actor profiling 📋 Airtight evidence packaging Sign up now: bit.ly/3JfuRbi

Kodex (@kodexinc) 's Twitter Profile Photo

Mission-driven work feels good because it *IS* good. At Kodex, we're on a mission to prevent real-world harm by creating the first secure, global standard for data requests. And we're hiring in our Operations department! Check out open roles: bit.ly/43HTNAk

Mission-driven work feels good because it *IS* good. 

At Kodex, we're on a mission to prevent real-world harm by creating the first secure, global standard for data requests. And we're hiring in our Operations department! 

Check out open roles: bit.ly/43HTNAk
Kodex (@kodexinc) 's Twitter Profile Photo

Another week, another data breach 🙈 This time: a major HR tech provider's third-party database exposed contact info for millions of users. A reminder that no company handling your data, even for "simple" contact management, is ever fully secure. tcrn.ch/45ugTLm

Kodex (@kodexinc) 's Twitter Profile Photo

While you're scrambling to meet deadlines, top performers are crushing benchmarks you didn't even know existed. 4-day average resolution time. 2% rejection rate. <3 days for first response. This is what the best teams are already achieving. See where you really stand. 📊

Kodex (@kodexinc) 's Twitter Profile Photo

Law Enforcement Email Compromise (AKA LEEC) is on the rise. Bad guys are out here buying email addresses to try and exploit your vulnerable processes. What ya gonna do? (Yes, you were supposed to read that in the COPS theme song rhythm.)

Law Enforcement Email Compromise (AKA LEEC) is on the rise. 

Bad guys are out here buying email addresses to try and exploit your vulnerable processes. 

What ya gonna do? (Yes, you were supposed to read that in the COPS theme song rhythm.)