CryptoniteNXT in the Media

CryptoniteNXT Releases Version 3.4

CryptoniteNXT is pleased to announce the release of version 3.4. This release is a feature release with several significant additions. Virtual interfaces may now be configured to simplify deployment in networks where existing subnets were used for isolation prior to installation of CryptoniteNXT. Devices in virtual interfaces have various new automations to simplify onboarding, control […]

CryptoniteNXT Battle Royale

The CryptoniteNXT Battle Royale was a live-challenge event hosted at Halo U on February 24, 2022, when two of BlueHalo’s elite ethical hackers tried to get around CryptoniteNXT. Watch as BlueHalo engineers employ different techniques and learn about CryptoniteNXT’s power in the process! A recording of the event is available here.

CryptoniteNXT Releases Version 3.3

CryptoniteNXT is pleased to announce the release of version 3.3. This feature release includes additional DHCP configuration options including the ability to directly specify reservations. To simplify policy creation, groups can now be easily created from the current filter results when viewing endpoints or events. Improvements to event severity throughout the user interface allow admins […]

Gartner – Emerging Technologies and Trends Impact Radar: Security

In this report, Gartner describes evolving network security technologies, shifts in risk management activities, and how business initiatives are driving a change in who is involved in the buying process. Once again, Moving Target Defense such as that provided by CryptoniteNXT is mentioned as technology to watch. Read the full Gartner report here (membership/payment required).

CryptoniteNXT is now part of BlueHalo

BlueHalo, a leading provider of advanced engineering solutions and technology to the national security community, today announced it has entered into a definitive agreement to acquire Intelligent Automation, Inc. (IAI), the maker of CryptoniteNXT. Read the full press release here.

CryptoniteNXT Releases Version 3.2

CryptoniteNXT is pleased to announce the release of version 3.2. This release improves usability in a number of areas including improved processes for using TLS certificates for the portal and admin UI, improved information about IP addresses in certain events, and additional configuration to simplify maintenance tasks. CryptoniteNXT now provides both manufacturer and estimated manufacture […]

NCCoE releases draft of NIST Cybersecurity Special Publication 1800-25, Identifying and Protecting Assets Against Ransomware and Other Destructive Events

The National Cybersecurity Center of Excellence (NCCoE) has released a draft of National Institute of Standards and Technology (NIST) Cybersecurity Special Publication 1800-25, Identifying and Protecting Assets Against Ransomware and Other Destructive Events, for public comment. CryptoniteNXT is one of the collaborating vendors in developing this document. Read the full document for best practices and […]

NCCoE Announces Collaboration with CryptoniteNXT to Secure Property Management Systems for the Hospitality Sector

CryptoniteNXT and several other cyber security vendors have joined the National Cybersecurity Center of Excellence (NCCoE) as technology collaborators in the Securing Property Management Systems project. CryptoniteNXT is contributing expertise and products to help refine a reference design and build an example standards-based implementation. This collaboration will result in a publicly available Cybersecurity Practice Guide […]

1st Half 2018 US Healthcare Breaches Involving Ransomware Decreased 57% Over the Same Time Period in 2017

Moving Target Defense Firm Releases Report on Top US 1st Half 2018 Healthcare Cyberattacks ROCKVILLE, Md. Cryptonite, a leader in moving target cyber defense, today announced the availability of its “1st Half 2018 Healthcare Cyber Research Report,” which shares the company’s findings on healthcare cyberattacker activity in the first half of 2018. The past several […]

Understanding the California Consumer Privacy Act

AB 375, entitled the California Consumer Privacy Act, was approved by the California State Governor on June 28, 2018, and goes into effect on January 1, 2020. The law applies to any business that meets one of these criteria and does business in the State of California: Revenue over $25 million; Buys or sells the […]

Zero Trust Can Help You Lock Down Medical Devices

Health care networks have been under constant and continuous attack for the theft of medical records. Between 2009 and 2017 there have been over 2,100+ healthcare data breaches involving more than 500 records. Those breaches alone have resulted in the theft of 175 million healthcare records. Consider that number again. 175 million records is more […]

Two Essential Technologies for Zero Trust Deployment

Per our earlier blog on this topic, Zero Trust is a new cybersecurity strategy for hardening your cyber defense to meet (and defeat) the recent waves of advanced cyberattacks. Zero Trust is compatible with your existing perimeter defense strategy and enables you to bring in additional technology layers to complement and support your existing cybersecurity […]

The Three Biggest Challenges in the Security Operations Center

Cybercrime rates continue to soar. The fact is that your security operations center (SOC) is both your front line and last line of defense. The volume of cyberattacks is increasing, as is the relative speed of individual attacks. At Cryptonite, we measure relative speed as the time measured from initial network or endpoint penetration, followed […]

Protecting the Unprotected – Missing Updates and Patches

As a security professional, you already know that TCP/IP networks were not designed with security as the primary goal is. At some point in time, cyberattackers will penetrate your network perimeter. Once inside, they have free and virtually unrestricted movement. They can search and enumerate the network, and then almost as quickly, determine the vulnerabilities […]

The Big News About Zero Trust

Zero Trust brings a new and highly innovative strategy to cyber defense practitioners. The term Zero Trust was first coined in 2009 by Forrester Research and has gained increasing acceptance and adoption across commercial enterprise and government. Forrester’s position was that the notion of treating the internal network as trusted and the external networks as […]

The grim state of cybersecurity: It’s awful, and it’s only going to get worse

This year has witnessed the embarrassing disclosure of 119,000 documents left on an unprotected server by Fedex Corp., a similar compromise of 37 million customer records by Panera Bread Co., the theft of up to 5 million records of Saks Fifth Avenue and Lord & Taylor customers, ransomware attacks at Boeing Co. and the City of Atlanta, and Facebook Inc.’s admission that 87 million customer accounts […]

Disincentivizing Ransomware Attacks

Ransomware, malicious software designed to prevent access to resources until a ransom is paid, has grown in prominence over the past few years, and shows no signs of slowing down. Well-known ransomware examples include CryptoLocker, WannaCry, and SamSam, are all highly successful from an attacker’s point of view. These successes have further incentivized the perpetrators […]

Four Quick Questions with Cybersecurity Expert Ron Gula

We sat down with Ron Gula, the president of Gula Tech Adventures, to ask some pressing questions about cybersecurity. Ron is also the Co-founder of Tenable Network Security, a world leader in vulnerability management, Co-founder of Network Security Wizards, which produced the Dragon intrusion detection system, and is knowledgeable in many aspects of cyber security […]

Cryptonite and MDISS Partner to Reveal Cybersecurity Solutions in the “Health Care Cybersecurity Best Practices” Report

Moving Target Defense Start-Up and Medical Device Innovation, Safety and Security Consortium Join Forces to Promote Solutions to Health Care Vulnerabilities and Systemic Issues ROCKVILLE, Md. & SAN FRANCISCO–(BUSINESS WIRE)–Cryptonite, a leader in moving target cyber defense, and MDISS, the Medical Device Innovation, Safety and Security Consortium, released today the joint “Health Care Cybersecurity Best Practices” […]

Gartner – Beyond Detection: 5 Core Security Patterns to Prevent Highly Evasive Attacks

This Gartner report identifies core patterns to prevent highly evasive attacks. These attacks do not re-use exploits or other artifacts and so are not stopped by traditional detection or signature-based security products. One way Gartner says you can stop such attacks is with Moving Target Defense, such as the network level protection offered by CryptoniteNXT. […]

Industry Leaders Launch Non-Profit ICS Village to Raise Awareness of Industrial Control System Security Issues and Provide Hands-On Training

VIA ICS Village ARLINGTON, Va.–(BUSINESS WIRE)–Cybersecurity industry leaders Bryson Bort, CEO of SCYTHE and Chairman of GRIMM, Beau Woods, Cyber Safety Innovation Fellow at The Atlantic Council and leader in the volunteer I Am The Cavalry initiative, Larry Vandenaweele, Cyber Security Manager at PwC Australia, and Thomas VanNorman, Director of Application Engineering at Veracity Industrial Networks, announced the launch of the non-profit Industrial Control System […]

New Integration from CryptoniteNXT and Palo Alto Networks provides best-in-class security to secure IOT and shut down advanced threats.

We’re pleased to share our new integration with Palo Alto Networks. Together, we’re harnessing the power of CryptoniteNXT and the Palo Alto Networks Next-Generation Firewall (NGFW) to stop endpoint reconnaissance directed into the network that might compromise unprotected Internet of Things (IoT) devices. Attackers are using increasingly sophisticated techniques to penetrate the best-defended network architectures. […]

2017 US Healthcare Breaches Involving Ransomware Increased 89% Year-Over-Year

Moving Target Defense Firm Unveils Top US 2017 Healthcare Attacks and Sets Sights on IoT Attack Surface Impact in 2018   Rockville, MD, January 5, 2018 — Cryptonite, a leader in moving target cyber defense, today announced the availability of its “2017 Health Care Cyber Research Report,” which shares the company’s findings on healthcare cyberattacker […]

Q&A with Mike Simon, President and CEO of CryptoniteNXT a Defensive Security Platform that Prevents all Cyber Attacker Reconnaissance and Lateral Movement stopping the Spread of a Ransomware Attack throughout an Entire Network or Organization

CEOCFO Magazine has a Q&A with Mike Simon, President and CEO of CryptoniteNXT, discussing how our defensive security platform prevents all cyber attacker reconnaissance and lateral movement stopping the Spread of a ransomware attack throughout an entire network or organization.

CryptoniteNXT Moving Target Cyber Defense (MTD) Takes the Battle Back to the Attackers

Cryptonite Emerges From Stealth Mode and Launches CryptoniteNXT, a Defensive Cyber Platform to Prevent Reconnaissance and Stop Lateral Movement   Rockville, MD, October 26, 2017 — Cryptonite, a leader in moving target cyber defense, launched today from stealth mode with the release of the company’s flagship network security solution, CryptoniteNXT. CryptoniteNXT enables any network to […]