About Us

Xcitium ZeroDwell Containment isolates all unknown or suspect code that enters a business 

Xcitium has released ZeroDwell Containment, an endpoint security solution for customers with or without legacy EDR products. Traditional detection methods leave gaps in enterprise cybersecurity defenses, which Xcitium multi-patented technology fills. 

Tim Bandos, EVP of SOC services at Xcitium stated, “However sophisticated your security stack, there will always be new threats that slip through the cracks. With an estimated 560,000 new pieces of malware created every day, legacy EDR vendors will fail to detect anywhere between 1% and 5% of Unknown hostile payloads that cause immense damage.” 

The solution that guarantees zero dwell time for cyberattacks and is able to thwart unknown threats without sacrificing productivity is called ZeroDwell Containment. The dwell time is the amount of time it takes for an attacker to infect a system for the first time and for that infection to be discovered. 

The likelihood of harm, disruption, or theft from malware, phishing, ransomware, and other types of cyber-attack rises as dwell time does. The industry’s average dwell times on average are well known to be 21 days. 

Ken Levine, CEO of Xcitium stated, “No system that relies on detection alone can ensure all malware will be found and eliminated before it causes damage. Traditional detection is unable to detect Unknown objects, and this is why breaches and ransoms persist worldwide! Xcitium, however, contains all Unknown objects that have no known signature or hash, preventing attacker damage. This protection-first approach closes the cyber security gap. Organizations that run Zero Dwell Containment either with our full endpoint or alongside their existing solutions are more secure. To prove the point, Xcitium publishes weekly statistics.” 

Julio Guapo, CIO of Positivo Tecnologia shared, “We selected Xcitium as the cybersecurity solution to protect our internal company environment and users. During the POC process, the Positivo Tecnologia IT Security team put Xcitium through its paces, testing and repeatedly challenging its ZeroDwell Containment technology. Xcitium isolated the attacker’s execution path every single test period, so the threat was prevented from harming any endpoint.” 

Cox collaborates with Intel, and Future Technologies to provide end-to-end private networks for business clients

Cox Communications has announced its collaboration with Intel and Future Technologies to create and implement end-to-end regulated private network solutions for business customers in the public and private sectors. The new go-to-market agreement brings together Cox’s Edge infrastructure, fiber assets, and its potential to end-to-endpr design, manage, and deliver private wireless connectivity for a wide range of commercial industries and sizes with Intel’s portfolio of cloud-to-edge solutions, Future Technologies’ segment expertise, and system integration experience.

Cox Private Networks is a component of the company’s portfolio that functions as a whole to meet the connectivity, telecom, and IT demands of commercial customers. It debuted in 2022 and makes use of both LTE/5G and fixed wireless access. Cox Communications deploys service to millions of homes and companies across 18 states as the largest private broadband provider in America. More than 370,000 business owners nationwide, including healthcare providers, K–12 and college education, financial institutions, and governmental organizations, rely on the managed and cloud solutions offered by Cox Business, a division of Cox Communications that specializes in commercial services. These services create connected environments and support applications.

Jeff Breaux, executive vice president of Cox Business, the company’s comprehensive commercial services division explained, “The combined knowledge and expertise created by this new relationship will help us solve the biggest operational challenges with end-to-end network solutions, accelerate the journey of digital transformation and provide a better experience for employees, customers and visitors.”

Several smart city technologies have been implemented in the initial Cox Private Network deployments. A regulated private network that uses a millimeter wave spectrum to convey high-quality data for insights on park utilization, vehicle volumes, and health facility, was constructed by Cox as part of an early smart park trial with the city of Las Vegas.

In the Fremont District of Downtown Las Vegas, the company is currently putting in place an extra private network that spans eight city blocks and will provide customers and companies with real-time data on safety, parking, air quality, noise levels, and pedestrian counting. To increase digital equity in the district, Cox has also built a private wireless network extension using Citizens Broadband Radio Service (CBRS) to link low-income public schools kids at home. Further business use cases in sectors including healthcare, government, manufacturing/distribution, higher education, and campus- and venue-based environments are supported by tailored private network solutions.

 “Private LTE/5G is one of the fastest growing and most promising technologies, and customers are asking for assistance to pull together solutions for their unique business needs. This collaboration with Cox and Future Technologies brings together our collective domain expertise, system integration, product portfolio and customer support to help our customers implement private network solutions and meet the growing demands of enterprises,” said Caroline Chan, vice president and general manager, Intel Network Business Incubator Division. 

CyberSaint Executive Dashboard to empower CISO for cyber risk communication 

CyberSaint will enable CISOs to present their cyber risk posture to the C-suite and Directors using CyberSaint’s Executive Dashboard in a credible, financially quantifiable manner that facilitates informed decision-making. 

Jerry Layden, CEO of CyberSaint stated, “At CyberSaint, we understand the importance of transparency and clear communication when it comes to cybersecurity, one of today’s most existential risks. 

With the new SEC regulations requiring boards to report on their cyber risk posture, it is more important than ever for companies to have a real-time, flexible, and intuitive platform with which to assess, measure, and remediate cyber risk. We are confident that this new dashboard will be an invaluable asset to our customers and help them build cyber resilience.” 

The Executive Dashboard is just the newest of many features that CyberSaint makes available through its CyberStrong platform. The platform offers a thorough and automated approach to assisting organizations in assessing, measuring, and resolving their particular cyber risks. 

The Executive Dashboard compares an organization’s cyber risk profile to that of competitors in the same industry and enables security and business leaders to show progress over time. 

The Executive Dashboard gives security leaders the ability to communicate their organization’s cyber risk level as well as the steps being taken to mitigate cyber risks succinctly and clearly. It was co-developed with the top cyber risk consultancies and forward-thinking CISOs. It enables simple progress monitoring and the capability to pinpoint areas that need improvement. 

Padraic O’Reilly, CPO at CyberSaint commented, “The Executive Dashboard is a game-changer for CISOs looking to tell a credible story about the past, present, and future of their cyber risk posture to business leadership. 

We are constantly looking for ways to improve and enhance our platform, and the Executive Dashboard is a testament to our commitment to delivering data-driven solutions to our customers and partners.” 

Protecting Your Privacy in the Era of 5G

The adoption of 5G technology has opened a wide range of new possibilities for advancement and innovation in the areas of connectivity and communication. 5G has the potential to revolutionize how we communicate, work, and handle large amounts of data at faster speeds than ever before. But new cybersecurity risks and privacy worries come along with this new technology.

The fifth generation of wireless technology, or 5G, offers higher capacity, lower latency, and faster internet speeds than 4G. It operates by using radio waves with a higher frequency, which enables the transmission of more data over the air. With more available bandwidth, data can be downloaded and uploaded more quickly, and high-definition video and audio can stream more smoothly. Additionally, 5G’s low latency enables real-time communication between devices, enabling the use of services like virtual reality and autonomous vehicles that need a quick and dependable connection.

5G and Potential Cybersecurity Risks

One of the most serious security concerns with 5G is the possibility of increased cyber-attacks. The surface area for potential attacks is much larger now, as more devices and applications are connected to the network. This makes it easier for hackers to exploit flaws and steal sensitive data. Furthermore, 5G technology is still in its early stages, and many security measures are yet to be fully developed, making it more vulnerable to attacks.

The use of small cell stations, which are required for the rollout of 5G technology, is another issue. Because these small cell stations are both smaller in size and several in number than the conventional cell towers, they can be positioned closer to the end users. While this enables faster and more dependable connectivity, it also makes them more vulnerable to tampering and hacking. Additionally, a large number of these small cell stations are internet-connected, making them susceptible to cyberattacks that could bring down the entire network.

Major privacy concerns in 5G

Privacy is yet another important issue with 5G technology. With 5G, it is now possible to gather, store, and process enormous amounts of data in real-time due to its increased speed and capacity. Sensitive information about people’s locations, online behaviors, and personal particulars may be included in this data.

Another concern of privacy is data protection at endpoints such as mobile devices and IoT devices. Because they are frequently connected to the internet and can be used to access sensitive information, these devices are the most vulnerable. These new connected environments will introduce new vulnerabilities, which, if not properly secured, will have unintended consequences. Because these devices will not necessarily be connected to a central network in the traditional hub-spoke model, attacks on them are unavoidable. Every device in the security chain has the potential to become vulnerable as billions of IoT devices are connected across a mesh edge environment, endangering the entire enterprise and its customers’ businesses.

Effective security measures

Organizations must be aware of these risks and prepare to take the necessary precautions to address them. Furthermore, it is essential that you keep software and devices up to date with the most recent security updates and patches. This will help to reduce the likelihood of vulnerabilities being exploited by hackers. Another way to improve security is to use virtual private networks (VPNs) when connecting to the internet via 5G. VPNs establish a secure, encrypted connection between your device and the internet, preventing sensitive information from being intercepted. To prevent unauthorized access, it is critical to implement strong security measures on these devices, such as biometric authentication and encryption.

It is extremely crucial to have strong security measures in place to protect privacy. This includes data encryption over the network, secure user authentication, and the ability to detect and respond to potential threats in real-time. Furthermore, organizations must be open about what data they collect, how it is used, and with whom it is shared.

Moving Ahead

5G technology is a major step forward in terms of internet connectivity and communication. However, with this new technology comes new risks to security and privacy. It is essential that both individuals and organizations are informed about these risks and take precautions to stay safe. This includes being cautious about what information they share online, using encryption, and being vigilant about potential threats. By being informed and proactive, we can ensure that we enjoy the benefits of 5G technology while protecting our privacy and security.

Privacy Management Software in 2022!

Do you think data privacy has become an overriding concern in today’s world?

Even though data has increased at an exponential rate over the last decade, poor security procedures continue to put businesses in danger of a data breach. One of the most serious threats to data privacy is Personal Identifiable Information (data used to identify a person). Handling millions, if not billions, of data records, becomes overwhelming in our technology-driven society due to the volume of data. Many businesses have no idea where to access or control personal information. The inability to manage personal data accurately poses several corporate hazards. These dangers are amplified for businesses with global operations.

Compliance with legislation is one of the major risks that enterprises encounter. Compliance with data privacy laws like the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA), and the new Colorado Privacy Act (CPA) becomes nearly impossible if an organization doesn’t know what personal data it has, where that personal data resides, and who has access to that personal data. GDPR, CCPA, and CPA carry one thing in common which is that they all require a company to be able to produce documents to an individual upon request in a reasonable amount of time. Failure to respond to an individual’s request might result in hefty fines and a tarnished image.

According to the latest report from Infosecurity Outlook, personal data is a major target for cybercriminals. It is extremely difficult to identify the severity of a data security incident and ascertain any associated reporting obligations if a business does not have an accurate data map.

Privacy management software help organizations to conduct privacy impact assessments, check processing activities against privacy regulations and track occurrences that result in unlawful data released through investigating, rectifying, and reporting. Depending on the sensitivity of the information handled and the implications of unauthorized disclosure, different companies employ various privacy technologies. The firms then assess and document personal data flow, assist in creating and distributing privacy rules, and measure user awareness.

The great news is that technologies to aid firms with data discovery are available in today’s market. Organizations can use privacy management software to discover and classify the various sorts of data they have, map where it lives, and establish who has (or should have) access to it. Some tools even have built-in features that help with data subject access requests management. An organization can then design a plan of action to lower its total data privacy risk based on the insights provided by those tools. Investing in those tools now can save a company a lot of money in the long run, including penalties, legal bills, and reputational damage.

AuthenticID and 1Kosmos partner to deliver identity proofing and authentication solutions to customers

AuthenticID and 1Kosmos have established a cross-product strategic partnership to provide governments, organizations, and individuals with a comprehensive suite of identity proofing and authentication solutions.

Organizations may use AuthenticID and 1Kosmos together to validate a user’s identity for new account creation, accelerate customer onboarding, decrease expenses associated with manual document checks, and provide a quick and simple customer experience for password-less access deployment.

CEO of 1Kosmos, Hemen Vimadalal said, “This partnership provides customers with integrated end-to-end identity verification and proofing on a global basis. The 1Kosmos and AuthenticID standards-based solution have received every major market certification, including FIDO Alliance, NIST 800-63-3 IAL-2 / AAL-2, iBeta Biometric PAD-2 Liveness, GDPR, and SOC-2 for interoperability, security, and reliability.”

“Our combined products now allow us to support every identity use case for the physical, digital, blockchain, and metaverse ‘Web3.0’ economies and become the first identity platform to achieve both highest level certifications in the areas of proofing, verification, and authentication of Digital Identity. The combined platform leverages blockchain for credential verification keeping privacy by design principle at the core,” said Jeff Jani, CEO of AuthenticID.

The organizations will now collaborate to provide frictionless KYC onboarding and authentication to the workforce, end consumers, and citizens. The combined benefits of AuthenticID’s proofing and 1Kosmos BlockID password-less authentication technologies are also helpful in expanding use case support, lowering operating expenses, and enabling speedy and cost-effective scalability, all while adhering to worldwide privacy rules.

Blackcloak Launches New Deception Technology To Detect Cyberattacks On Executives And High-Profile Individuals

BlackCloak, Inc., the Concierge Cybersecurity & Privacy Protection Platform for Leaders and High-Profile People, introduced exclusive deception technology to detect attackers’ blatant tactics to compromise a member’s privacy, home networks, or personal devices.

BlackCloak’s deception technique, often known as a honeypot, deceives attackers into engaging with a service by replicating a real-world home network. The prospective data that is within cybercriminals’ reach will lure them. When an attack is identified, BlackCloak’s deception technology notifies the firm’s Security Operations Center (SOC), which can investigate and act before any damage is caused.

“Our members are increasingly exposed to sophisticated cyberattacks. Hackers are diversifying their preferred attack vectors beyond corporations and supply chain partners to include executives, high-net-worth individuals and high-profile individuals, many of whom have easily exploitable vulnerabilities in their personal digital lives. Advanced deception technology increases our ability to proactively detect, mitigate, and respond to threats before they manifest. It is the perfect complement to BlackCloak’s other concierge cybersecurity and privacy services,” said Dr. Chris Pierson, BlackCloak Founder & CEO.

BlackCloak’s deception engine, which has been operational with existing clients since earlier this year, has already detected malicious activities in  home environments. The first cybersecurity and privacy firm to bring enterprise-grade honeypot technology to clients is the leader in digital executive protection.

“BlackCloak’s design and implementation of deception technology into the personal lives of corporate executives further strengthens their concierge platform. The ability to know an adversary might be lurking inside the footprint of their digital home independent of other common controls is game changing,” said Bob Ackerman, Co-Founder of DataTribe.

BlackCloak is a digital executive protection leader with an aim to secure digital life. In order to accomplish this, the company is developing a comprehensive, SaaS-based cybersecurity and privacy platform with a concierge experience. BlackCloak helps real people protect their personal and corporate reputations, finances, and information by employing technology to secure their homes, gadgets, and internet presence. BlackCloak focuses on high-profile people who have limited time and a lot to lose. BlackCloak ensures that everything they do is seamless and discreet.

Xiaomi Showcased Privacy Rules and Protections Practices at June Meeting

At the Xiaomi Science and Technology Park, Xiaomi’s Security and Privacy Awareness Month ended today. Xiaomi showcased its information security and privacy protection procedures to its staff, industry professionals and the general public during the June activities. It also issued white papers on security and privacy, as well as a data security transparency report.

Xiaomi’s Security and Privacy Awareness Month is in its second year. The topic for this year was ” Security is our shared responsibility. Always think before you act.” The goal was to demonstrate Xiaomi’s dedication to industry-leading security and privacy standards, as well as its commitment to transparency.

“As a leading Android smartphone manufacturer, we carry a great responsibility. We are committed to letting consumers know how their personal information is collected, used, and protected. We are proud to say that Xiaomi upholds world-class standards on security, privacy, and transparency,” said Cui Baoqiu, Xiaomi Vice President and Chairman of Xiaomi Security and Privacy Committee.

Xiaomi has always prioritised the security and privacy of its users’ data. Xiaomi formed its Security and Privacy Committee in 2014. Xiaomi was the first Chinese company to receive TrustArc accreditation in 2016. In 2018, Xiaomi passed the European Union’s General Data Protection Regulation (GDPR) compliance assessment. Xiaomi’s security and privacy processes like ISO/IEC 27001 and ISO/IEC 27018 were certified in 2019. The first version of the MIUI security and privacy white paper were published.

Employees and guests learnt about security and privacy issues during this year’s month-long event. These included an interactive exhibition on how to preserve personal information. Employees were also given classes from Xiaomi’s Security Academy, which covered subjects such as “How to Stick to Privacy Protection in Product Development,” “General Safety Research and Development,” and “Business Risk Control,” among others. Thousands of engineers were given the opportunity to act as “hackers” and compete in a coding competition to tackle privacy concerns as part of the Xiaomi Cup CTF competition.

During the month, two key privacy papers were released: the MIUI Privacy White Paper and the Xiaomi loT Privacy White Paper. They provide an overview of Xiaomi’s privacy rules and practices in MIUI and IoT products, as well as information on what types of user data are collected and how they are handled and safeguarded. They also showed the privacy policies of each MIUI app as well as all regularly used loT goods.

Xiaomi’s privacy protection principles are transparency, responsibility, user control, security, and compliance. Xiaomi complies with local regulations in every market where it operates. It will never stop producing safe and dependable products all around the world in order to enable everyone live a better life through innovative technology.