CryptoniteNXT in the Media

Blog Posts

Understanding the California Consumer Privacy Act

AB 375, entitled the California Consumer Privacy Act, was approved by the California State Governor on June 28, 2018, and goes into effect on January 1, 2020. The law applies to any business that meets one of these criteria and does business in the State of California: Revenue over $25 million; Buys or sells the […]

Zero Trust Can Help You Lock Down Medical Devices

Health care networks have been under constant and continuous attack for the theft of medical records. Between 2009 and 2017 there have been over 2,100+ healthcare data breaches involving more than 500 records. Those breaches alone have resulted in the theft of 175 million healthcare records. Consider that number again. 175 million records is more […]

Two Essential Technologies for Zero Trust Deployment

Per our earlier blog on this topic, Zero Trust is a new cybersecurity strategy for hardening your cyber defense to meet (and defeat) the recent waves of advanced cyberattacks. Zero Trust is compatible with your existing perimeter defense strategy and enables you to bring in additional technology layers to complement and support your existing cybersecurity […]

The Three Biggest Challenges in the Security Operations Center

Cybercrime rates continue to soar. The fact is that your security operations center (SOC) is both your front line and last line of defense. The volume of cyberattacks is increasing, as is the relative speed of individual attacks. At Cryptonite, we measure relative speed as the time measured from initial network or endpoint penetration, followed […]

Protecting the Unprotected – Missing Updates and Patches

As a security professional, you already know that TCP/IP networks were not designed with security as the primary goal is. At some point in time, cyberattackers will penetrate your network perimeter. Once inside, they have free and virtually unrestricted movement. They can search and enumerate the network, and then almost as quickly, determine the vulnerabilities […]

The Big News About Zero Trust

Zero Trust brings a new and highly innovative strategy to cyber defense practitioners. The term Zero Trust was first coined in 2009 by Forrester Research and has gained increasing acceptance and adoption across commercial enterprise and government. Forrester’s position was that the notion of treating the internal network as trusted and the external networks as […]

Disincentivizing Ransomware Attacks

Ransomware, malicious software designed to prevent access to resources until a ransom is paid, has grown in prominence over the past few years, and shows no signs of slowing down. Well-known ransomware examples include CryptoLocker, WannaCry, and SamSam, are all highly successful from an attacker’s point of view. These successes have further incentivized the perpetrators […]

Four Quick Questions with Cybersecurity Expert Ron Gula

We sat down with Ron Gula, the president of Gula Tech Adventures, to ask some pressing questions about cybersecurity. Ron is also the Co-founder of Tenable Network Security, a world leader in vulnerability management, Co-founder of Network Security Wizards, which produced the Dragon intrusion detection system, and is knowledgeable in many aspects of cyber security […]

New Integration from CryptoniteNXT and Palo Alto Networks provides best-in-class security to secure IOT and shut down advanced threats.

We’re pleased to share our new integration with Palo Alto Networks. Together, we’re harnessing the power of CryptoniteNXT and the Palo Alto Networks Next-Generation Firewall (NGFW) to stop endpoint reconnaissance directed into the network that might compromise unprotected Internet of Things (IoT) devices. Attackers are using increasingly sophisticated techniques to penetrate the best-defended network architectures. […]

Press Releases

1st Half 2018 US Healthcare Breaches Involving Ransomware Decreased 57% Over the Same Time Period in 2017

Moving Target Defense Firm Releases Report on Top US 1st Half 2018 Healthcare Cyberattacks ROCKVILLE, Md. Cryptonite, a leader in moving target cyber defense, today announced the availability of its “1st Half 2018 Healthcare Cyber Research Report,” which shares the company’s findings on healthcare cyberattacker activity in the first half of 2018. The past several […]

Cryptonite and MDISS Partner to Reveal Cybersecurity Solutions in the “Health Care Cybersecurity Best Practices” Report

Moving Target Defense Start-Up and Medical Device Innovation, Safety and Security Consortium Join Forces to Promote Solutions to Health Care Vulnerabilities and Systemic Issues ROCKVILLE, Md. & SAN FRANCISCO–(BUSINESS WIRE)–Cryptonite, a leader in moving target cyber defense, and MDISS, the Medical Device Innovation, Safety and Security Consortium, released today the joint “Health Care Cybersecurity Best Practices” […]

Industry Leaders Launch Non-Profit ICS Village to Raise Awareness of Industrial Control System Security Issues and Provide Hands-On Training

VIA ICS Village ARLINGTON, Va.–(BUSINESS WIRE)–Cybersecurity industry leaders Bryson Bort, CEO of SCYTHE and Chairman of GRIMM, Beau Woods, Cyber Safety Innovation Fellow at The Atlantic Council and leader in the volunteer I Am The Cavalry initiative, Larry Vandenaweele, Cyber Security Manager at PwC Australia, and Thomas VanNorman, Director of Application Engineering at Veracity Industrial Networks, announced the launch of the non-profit Industrial Control System […]

2017 US Healthcare Breaches Involving Ransomware Increased 89% Year-Over-Year

Moving Target Defense Firm Unveils Top US 2017 Healthcare Attacks and Sets Sights on IoT Attack Surface Impact in 2018   Rockville, MD, January 5, 2018 — Cryptonite, a leader in moving target cyber defense, today announced the availability of its “2017 Health Care Cyber Research Report,” which shares the company’s findings on healthcare cyberattacker […]

CryptoniteNXT Moving Target Cyber Defense (MTD) Takes the Battle Back to the Attackers

Cryptonite Emerges From Stealth Mode and Launches CryptoniteNXT, a Defensive Cyber Platform to Prevent Reconnaissance and Stop Lateral Movement   Rockville, MD, October 26, 2017 — Cryptonite, a leader in moving target cyber defense, launched today from stealth mode with the release of the company’s flagship network security solution, CryptoniteNXT. CryptoniteNXT enables any network to […]

In the News

The grim state of cybersecurity: It’s awful, and it’s only going to get worse

This year has witnessed the embarrassing disclosure of 119,000 documents left on an unprotected server by Fedex Corp., a similar compromise of 37 million customer records by Panera Bread Co., the theft of up to 5 million records of Saks Fifth Avenue and Lord & Taylor customers, ransomware attacks at Boeing Co. and the City of Atlanta, and Facebook Inc.’s admission that 87 million customer accounts […]

Q&A with Mike Simon, President and CEO of CryptoniteNXT a Defensive Security Platform that Prevents all Cyber Attacker Reconnaissance and Lateral Movement stopping the Spread of a Ransomware Attack throughout an Entire Network or Organization

CEOCFO Magazine has a Q&A with Mike Simon, President and CEO of CryptoniteNXT, discussing how our defensive security platform prevents all cyber attacker reconnaissance and lateral movement stopping the Spread of a ransomware attack throughout an entire network or organization.