Gartner says Automated Moving Target Defense is the future of cyber security Gartner’s “Emerging Tech: Security – The Future of Cyber Is Automated Moving Target Defense” report focuses on their perceived evolution of Moving Target Defense in the future. According to Gartner “MTD approaches have been particularly valuable in those instances of prevention where attackers […]
CryptoniteNXT is hosting a live challenge at ShmooCon 2023 in Washington, D.C. January 20-22. Stop by the CryptoniteNXT / BlueHalo booth at the conference to see the area’s best hackers go up against CryptoniteNXT for prizes and glory. In this timed challenge, attackers are trying to gather information, gain access, and discover information about the […]
Gartner says Moving Target Defense offers greater assurance and resiliency against attacks Gartner’s updated “Emerging Tech Impact Radar: Security” report focuses on new and better ways to achieve security for your organization. Moving Target Defense (MTD) is once again listed as one of these technologies, with Gartner describing key benefits of MTD as offering greater […]
CryptoniteNXT is pleased to announce the release of version 3.4. This release is a feature release with several significant additions. Virtual interfaces may now be configured to simplify deployment in networks where existing subnets were used for isolation prior to installation of CryptoniteNXT. Devices in virtual interfaces have various new automations to simplify onboarding, control […]
In this report, Forrester describes best practices for microsegmentation. Find out how to ensure your microsegmentation project is successful and pitfalls to avoid during vendor selection, C-suite buy in for your project, and deployment. Read the full Forrester report.
The CryptoniteNXT Battle Royale was a live-challenge event hosted at Halo U on February 24, 2022, when two of BlueHalo’s elite ethical hackers tried to get around CryptoniteNXT. Watch as BlueHalo engineers employ different techniques and learn about CryptoniteNXT’s power in the process! A recording of the event is available here.
CryptoniteNXT is pleased to announce the release of version 3.3. This feature release includes additional DHCP configuration options including the ability to directly specify reservations. To simplify policy creation, groups can now be easily created from the current filter results when viewing endpoints or events. Improvements to event severity throughout the user interface allow admins […]
In this report, Gartner describes evolving network security technologies, shifts in risk management activities, and how business initiatives are driving a change in who is involved in the buying process. Once again, Moving Target Defense such as that provided by CryptoniteNXT is mentioned as technology to watch. Read the full Gartner report here (membership/payment required).
BlueHalo, a leading provider of advanced engineering solutions and technology to the national security community, today announced it has entered into a definitive agreement to acquire Intelligent Automation, Inc. (IAI), the maker of CryptoniteNXT. Read the full press release here.
CryptoniteNXT is pleased to announce the release of version 3.2. This release improves usability in a number of areas including improved processes for using TLS certificates for the portal and admin UI, improved information about IP addresses in certain events, and additional configuration to simplify maintenance tasks. CryptoniteNXT now provides both manufacturer and estimated manufacture […]
The National Cybersecurity Center of Excellence (NCCoE) has released a draft of National Institute of Standards and Technology (NIST) Cybersecurity Special Publication 1800-25, Identifying and Protecting Assets Against Ransomware and Other Destructive Events, for public comment. CryptoniteNXT is one of the collaborating vendors in developing this document. Read the full document for best practices and […]
Read top security patterns recommended by Gartner to protect against evasive, novel, and unique attacks. These patterns include network level Moving Target Defense, such as that offered by CryptoniteNXT. Read the report report (Gartner membership required).
CryptoniteNXT and several other cyber security vendors have joined the National Cybersecurity Center of Excellence (NCCoE) as technology collaborators in the Securing Property Management Systems project. CryptoniteNXT is contributing expertise and products to help refine a reference design and build an example standards-based implementation. This collaboration will result in a publicly available Cybersecurity Practice Guide […]
HealthITSecurity covers Cryptonite’s Healthcare Cyber Research Report covering the First Half of 2018 in an article discussing the trend away from ransomware and toward the use of cryptocurrency miners.
Moving Target Defense Firm Releases Report on Top US 1st Half 2018 Healthcare Cyberattacks ROCKVILLE, Md. Cryptonite, a leader in moving target cyber defense, today announced the availability of its “1st Half 2018 Healthcare Cyber Research Report,” which shares the company’s findings on healthcare cyberattacker activity in the first half of 2018. The past several […]
AB 375, entitled the California Consumer Privacy Act, was approved by the California State Governor on June 28, 2018, and goes into effect on January 1, 2020. The law applies to any business that meets one of these criteria and does business in the State of California: Revenue over $25 million; Buys or sells the […]
Health care networks have been under constant and continuous attack for the theft of medical records. Between 2009 and 2017 there have been over 2,100+ healthcare data breaches involving more than 500 records. Those breaches alone have resulted in the theft of 175 million healthcare records. Consider that number again. 175 million records is more […]
Per our earlier blog on this topic, Zero Trust is a new cybersecurity strategy for hardening your cyber defense to meet (and defeat) the recent waves of advanced cyberattacks. Zero Trust is compatible with your existing perimeter defense strategy and enables you to bring in additional technology layers to complement and support your existing cybersecurity […]
Cybercrime rates continue to soar. The fact is that your security operations center (SOC) is both your front line and last line of defense. The volume of cyberattacks is increasing, as is the relative speed of individual attacks. At Cryptonite, we measure relative speed as the time measured from initial network or endpoint penetration, followed […]
As a security professional, you already know that TCP/IP networks were not designed with security as the primary goal is. At some point in time, cyberattackers will penetrate your network perimeter. Once inside, they have free and virtually unrestricted movement. They can search and enumerate the network, and then almost as quickly, determine the vulnerabilities […]
Zero Trust brings a new and highly innovative strategy to cyber defense practitioners. The term Zero Trust was first coined in 2009 by Forrester Research and has gained increasing acceptance and adoption across commercial enterprise and government. Forrester’s position was that the notion of treating the internal network as trusted and the external networks as […]
This year has witnessed the embarrassing disclosure of 119,000 documents left on an unprotected server by Fedex Corp., a similar compromise of 37 million customer records by Panera Bread Co., the theft of up to 5 million records of Saks Fifth Avenue and Lord & Taylor customers, ransomware attacks at Boeing Co. and the City of Atlanta, and Facebook Inc.’s admission that 87 million customer accounts […]
Ransomware, malicious software designed to prevent access to resources until a ransom is paid, has grown in prominence over the past few years, and shows no signs of slowing down. Well-known ransomware examples include CryptoLocker, WannaCry, and SamSam, are all highly successful from an attacker’s point of view. These successes have further incentivized the perpetrators […]
We sat down with Ron Gula, the president of Gula Tech Adventures, to ask some pressing questions about cybersecurity. Ron is also the Co-founder of Tenable Network Security, a world leader in vulnerability management, Co-founder of Network Security Wizards, which produced the Dragon intrusion detection system, and is knowledgeable in many aspects of cyber security […]
Moving Target Defense Start-Up and Medical Device Innovation, Safety and Security Consortium Join Forces to Promote Solutions to Health Care Vulnerabilities and Systemic Issues ROCKVILLE, Md. & SAN FRANCISCO–(BUSINESS WIRE)–Cryptonite, a leader in moving target cyber defense, and MDISS, the Medical Device Innovation, Safety and Security Consortium, released today the joint “Health Care Cybersecurity Best Practices” […]
This Gartner report identifies core patterns to prevent highly evasive attacks. These attacks do not re-use exploits or other artifacts and so are not stopped by traditional detection or signature-based security products. One way Gartner says you can stop such attacks is with Moving Target Defense, such as the network level protection offered by CryptoniteNXT. […]
VIA ICS Village ARLINGTON, Va.–(BUSINESS WIRE)–Cybersecurity industry leaders Bryson Bort, CEO of SCYTHE and Chairman of GRIMM, Beau Woods, Cyber Safety Innovation Fellow at The Atlantic Council and leader in the volunteer I Am The Cavalry initiative, Larry Vandenaweele, Cyber Security Manager at PwC Australia, and Thomas VanNorman, Director of Application Engineering at Veracity Industrial Networks, announced the launch of the non-profit Industrial Control System […]
We’re pleased to share our new integration with Palo Alto Networks. Together, we’re harnessing the power of CryptoniteNXT and the Palo Alto Networks Next-Generation Firewall (NGFW) to stop endpoint reconnaissance directed into the network that might compromise unprotected Internet of Things (IoT) devices. Attackers are using increasingly sophisticated techniques to penetrate the best-defended network architectures. […]
Cryptonite CTO Justin Yackoski was interviewed as part of an article by Jack Germain of Linux Insider on the problem of vulnerabilities in WiFi router firmware.
Cryptonite CEO Mike Simon discusses the Health Care Cyber Research Report for 2017 in the January 30, 2018 CyberWire Daily Podcast.
Dark Reading’s Jai Vijayan interviews Cryptonite CEO Mike Simon and discusses Cryptonite’s Health Care Cyber Reseatch Report for 2017 as part of an article on ransomware in the health care industry.
vmblog.com covers Cryptonite’s predictions for 2018 in an interview with CEO Mike Simon.
CryptoniteNXT CEO Mike Simon discusses recent IoT security trends, the emergence of DDoS IoT attacks, industries affected, and ways of mitigating these risks in your network.
Data Privacy + Security Insider agrees with the key observation of CryptoniteNXT’s 2017 Health Care Cyber Security Report.
JD Supra reports observations consistent with CryptoniteNXT’s 2017 Health Care Cyber Security Report.
Bitdefender covers the increasing threats faced by healthcare IoT devices, based on CryptoniteNXT’s 2017 Healthcare Cyber Security Report.
Heather Landi of Healthcare Informatics covers the increase in healthcare ransomware and cyber threats in 2017.
Filip Truta from Security Boulevard discusses challenges faced by health care providers, including the findings within CryptoniteNXT’s Health Care Cyber Research Report for 2017.
See the entire interview with Mike Simon and Dan Patterson discussing prominent healthcare attacks in 2017.
Information Management covers 7 ways cyber attacks have become more dangerous according to CryptoniteNXT’s report.
Using CryptoniteNXT’s research, HealthIT Security discusses trends in 2017 which show surges in healthcare ransomware and phishing attacks, proving why entities need to adapt their data security approaches.
Becker’s Health IT and CIO Review boils down the top 5 findings of CryptoniteNXT’s 2017 ransomware study.
MedCityNews covers Cryptonite’s 2017 ransomware report and highlights that despite all the hopes that breaches would decrease, 2017 was still a year full of healthcare cyberattacks.
Help Net Security covers CryptoniteNXT’s 2017 healthcare report.
Healthcare IT News covers our study indicating ransomware breaches in healthcare jumped 89 percent in 2017, compared with the year before.
The Daily Record covers CryptoniteNXT’s assessment of health care cyber security trends in 2017.
Moving Target Defense Firm Unveils Top US 2017 Healthcare Attacks and Sets Sights on IoT Attack Surface Impact in 2018 Rockville, MD, January 5, 2018 — Cryptonite, a leader in moving target cyber defense, today announced the availability of its “2017 Health Care Cyber Research Report,” which shares the company’s findings on healthcare cyberattacker […]
CryptoniteNXT’s Rick Olesek, CRO, and Rich walchuck, VP of Technical Operations, discuss taking a proactive as opposed to a reactive approach to security.
Under the security category, CryptoniteNXT has been announced as a finalist for a 2017 Tech Trailblazers Award
CEOCFO Magazine has a Q&A with Mike Simon, President and CEO of CryptoniteNXT, discussing how our defensive security platform prevents all cyber attacker reconnaissance and lateral movement stopping the Spread of a ransomware attack throughout an entire network or organization.
Mike Simon, CEO of CryptoniteNXT and Ron Gula, investor and founder of Gula Tech Adventures, speak along with Michael Hoffman, director of marketing at GovernmentCIO Media during an interview on WTOP.
Pipeline covers CryptoniteNXT’s launch in an article titled “CryptoniteNXT uncloaks to reveal a new weapon against cyber warfare”
The Daily Record covers CryptoniteNXT’s launch in an article titled Md. cyber firm launches network security appliance
Paul Gillin, Senior Editor at Silicon Angle, covers CryptoniteNXT’s launch and discusses applications and customers in manufacturing, healthcare, and industrial control.
ExecutiveBiz covers CryptoniteNXT’s launch in an article titled “Cryptonite Unveils Moving Target Cyber Defense Tech to Protect Client Networks”
Government Computer News coverage of CryptoniteNXT’s launch.
TechSpot’s Cal Jeffrey covers CryptoniteNXT’s launch.
Read John Leyden’s technical analysis of CryptoniteNXT at The Register.
American Inno covers Cryptonite’s history,spin-out from federal funding and share more on the uniqueness and power of CryptoniteNXT technology.
Security Week international correspondent Eduard Kovacs describes CryptoniteNXT’s launch in an IT security news headline article.
CryptoniteNXT’s launch was featured on the front page of Technical.ly DC in an interview by Technical.ly DC Market Editor Stephen Babcock with CryptoniteNXT CEO Mike Simon.
Jessica Lyons Hardcastle, Senior Editor at SDxCentral, interviewed CEO Mike Simon in an article titled Security Startup Cryptonite Makes Networks ‘Invisible’ to Attackers.
Cryptonite Emerges From Stealth Mode and Launches CryptoniteNXT, a Defensive Cyber Platform to Prevent Reconnaissance and Stop Lateral Movement Rockville, MD, October 26, 2017 — Cryptonite, a leader in moving target cyber defense, launched today from stealth mode with the release of the company’s flagship network security solution, CryptoniteNXT. CryptoniteNXT enables any network to […]
On Thursday, October 26nd, CEO Mike Simon will speak at the “Cyber Security: How You Can Protect Your Business From a Cyber Attack” forum hosted by EagleBank and the Montgomery County Economic Development Corporation (MCEDC).
Ron Gula, cyber security entrepreneur and expert of 20+ years interviews Mike Simon, CEO of Cryptonite about NXT’s effectiveness against insider threats.
Mike Simon fields questions from the Startup Security hosts in this 30 min interview featured on the prominent YouTube channel.
On March 22nd, the nonprofit Cybersecurity Association of Maryland, Inc. (CAMI), presented Cryptonite with an award for the Best Cyber Security Product of Montgomery County.