The National Cybersecurity Center of Excellence (NCCoE) has released a draft of National Institute of Standards and Technology (NIST) Cybersecurity Special Publication 1800-25, Identifying and Protecting Assets Against Ransomware and Other Destructive Events, for public comment. CryptoniteNXT is one of the collaborating vendors in developing this document. Read the full document for best practices and […]
CryptoniteNXT and several other cyber security vendors have joined the National Cybersecurity Center of Excellence (NCCoE) as technology collaborators in the Securing Property Management Systems project. CryptoniteNXT is contributing expertise and products to help refine a reference design and build an example standards-based implementation. This collaboration will result in a publicly available Cybersecurity Practice Guide […]
HealthITSecurity covers Cryptonite’s Healthcare Cyber Research Report covering the First Half of 2018 in an article discussing the trend away from ransomware and toward the use of cryptocurrency miners.
Moving Target Defense Firm Releases Report on Top US 1st Half 2018 Healthcare Cyberattacks ROCKVILLE, Md. Cryptonite, a leader in moving target cyber defense, today announced the availability of its “1st Half 2018 Healthcare Cyber Research Report,” which shares the company’s findings on healthcare cyberattacker activity in the first half of 2018. The past several […]
AB 375, entitled the California Consumer Privacy Act, was approved by the California State Governor on June 28, 2018, and goes into effect on January 1, 2020. The law applies to any business that meets one of these criteria and does business in the State of California: Revenue over $25 million; Buys or sells the […]
Health care networks have been under constant and continuous attack for the theft of medical records. Between 2009 and 2017 there have been over 2,100+ healthcare data breaches involving more than 500 records. Those breaches alone have resulted in the theft of 175 million healthcare records. Consider that number again. 175 million records is more […]
Per our earlier blog on this topic, Zero Trust is a new cybersecurity strategy for hardening your cyber defense to meet (and defeat) the recent waves of advanced cyberattacks. Zero Trust is compatible with your existing perimeter defense strategy and enables you to bring in additional technology layers to complement and support your existing cybersecurity […]
Cybercrime rates continue to soar. The fact is that your security operations center (SOC) is both your front line and last line of defense. The volume of cyberattacks is increasing, as is the relative speed of individual attacks. At Cryptonite, we measure relative speed as the time measured from initial network or endpoint penetration, followed […]
As a security professional, you already know that TCP/IP networks were not designed with security as the primary goal is. At some point in time, cyberattackers will penetrate your network perimeter. Once inside, they have free and virtually unrestricted movement. They can search and enumerate the network, and then almost as quickly, determine the vulnerabilities […]
Zero Trust brings a new and highly innovative strategy to cyber defense practitioners. The term Zero Trust was first coined in 2009 by Forrester Research and has gained increasing acceptance and adoption across commercial enterprise and government. Forrester’s position was that the notion of treating the internal network as trusted and the external networks as […]
This year has witnessed the embarrassing disclosure of 119,000 documents left on an unprotected server by Fedex Corp., a similar compromise of 37 million customer records by Panera Bread Co., the theft of up to 5 million records of Saks Fifth Avenue and Lord & Taylor customers, ransomware attacks at Boeing Co. and the City of Atlanta, and Facebook Inc.’s admission that 87 million customer accounts […]
Ransomware, malicious software designed to prevent access to resources until a ransom is paid, has grown in prominence over the past few years, and shows no signs of slowing down. Well-known ransomware examples include CryptoLocker, WannaCry, and SamSam, are all highly successful from an attacker’s point of view. These successes have further incentivized the perpetrators […]
We sat down with Ron Gula, the president of Gula Tech Adventures, to ask some pressing questions about cybersecurity. Ron is also the Co-founder of Tenable Network Security, a world leader in vulnerability management, Co-founder of Network Security Wizards, which produced the Dragon intrusion detection system, and is knowledgeable in many aspects of cyber security […]
Moving Target Defense Start-Up and Medical Device Innovation, Safety and Security Consortium Join Forces to Promote Solutions to Health Care Vulnerabilities and Systemic Issues ROCKVILLE, Md. & SAN FRANCISCO–(BUSINESS WIRE)–Cryptonite, a leader in moving target cyber defense, and MDISS, the Medical Device Innovation, Safety and Security Consortium, released today the joint “Health Care Cybersecurity Best Practices” […]
VIA ICS Village ARLINGTON, Va.–(BUSINESS WIRE)–Cybersecurity industry leaders Bryson Bort, CEO of SCYTHE and Chairman of GRIMM, Beau Woods, Cyber Safety Innovation Fellow at The Atlantic Council and leader in the volunteer I Am The Cavalry initiative, Larry Vandenaweele, Cyber Security Manager at PwC Australia, and Thomas VanNorman, Director of Application Engineering at Veracity Industrial Networks, announced the launch of the non-profit Industrial Control System […]
We’re pleased to share our new integration with Palo Alto Networks. Together, we’re harnessing the power of CryptoniteNXT and the Palo Alto Networks Next-Generation Firewall (NGFW) to stop endpoint reconnaissance directed into the network that might compromise unprotected Internet of Things (IoT) devices. Attackers are using increasingly sophisticated techniques to penetrate the best-defended network architectures. […]
Cryptonite CTO Justin Yackoski was interviewed as part of an article by Jack Germain of Linux Insider on the problem of vulnerabilities in WiFi router firmware.
Cryptonite CEO Mike Simon discusses the Health Care Cyber Research Report for 2017 in the January 30, 2018 CyberWire Daily Podcast.
Dark Reading’s Jai Vijayan interviews Cryptonite CEO Mike Simon and discusses Cryptonite’s Health Care Cyber Reseatch Report for 2017 as part of an article on ransomware in the health care industry.
vmblog.com covers Cryptonite’s predictions for 2018 in an interview with CEO Mike Simon.
CryptoniteNXT CEO Mike Simon discusses recent IoT security trends, the emergence of DDoS IoT attacks, industries affected, and ways of mitigating these risks in your network.
Data Privacy + Security Insider agrees with the key observation of CryptoniteNXT’s 2017 Health Care Cyber Security Report.
JD Supra reports observations consistent with CryptoniteNXT’s 2017 Health Care Cyber Security Report.
Bitdefender covers the increasing threats faced by healthcare IoT devices, based on CryptoniteNXT’s 2017 Healthcare Cyber Security Report.
Heather Landi of Healthcare Informatics covers the increase in healthcare ransomware and cyber threats in 2017.
Filip Truta from Security Boulevard discusses challenges faced by health care providers, including the findings within CryptoniteNXT’s Health Care Cyber Research Report for 2017.
See the entire interview with Mike Simon and Dan Patterson discussing prominent healthcare attacks in 2017.
Information Management covers 7 ways cyber attacks have become more dangerous according to CryptoniteNXT’s report.
Using CryptoniteNXT’s research, HealthIT Security discusses trends in 2017 which show surges in healthcare ransomware and phishing attacks, proving why entities need to adapt their data security approaches.
Becker’s Health IT and CIO Review boils down the top 5 findings of CryptoniteNXT’s 2017 ransomware study.
MedCityNews covers Cryptonite’s 2017 ransomware report and highlights that despite all the hopes that breaches would decrease, 2017 was still a year full of healthcare cyberattacks.
Health Data Management highlights some of the top findings from our 2017 ransomware findings.
Help Net Security covers CryptoniteNXT’s 2017 healthcare report.
Healthcare IT News covers our study indicating ransomware breaches in healthcare jumped 89 percent in 2017, compared with the year before.
The Daily Record covers CryptoniteNXT’s assessment of health care cyber security trends in 2017.
Moving Target Defense Firm Unveils Top US 2017 Healthcare Attacks and Sets Sights on IoT Attack Surface Impact in 2018 Rockville, MD, January 5, 2018 — Cryptonite, a leader in moving target cyber defense, today announced the availability of its “2017 Health Care Cyber Research Report,” which shares the company’s findings on healthcare cyberattacker […]
CryptoniteNXT’s Rick Olesek, CRO, and Rich walchuck, VP of Technical Operations, discuss taking a proactive as opposed to a reactive approach to security.
Under the security category, CryptoniteNXT has been announced as a finalist for a 2017 Tech Trailblazers Award
CEOCFO Magazine has a Q&A with Mike Simon, President and CEO of CryptoniteNXT, discussing how our defensive security platform prevents all cyber attacker reconnaissance and lateral movement stopping the Spread of a ransomware attack throughout an entire network or organization.
Mike Simon, CEO of CryptoniteNXT and Ron Gula, investor and founder of Gula Tech Adventures, speak along with Michael Hoffman, director of marketing at GovernmentCIO Media during an interview on WTOP.
Pipeline covers CryptoniteNXT’s launch in an article titled “CryptoniteNXT uncloaks to reveal a new weapon against cyber warfare”
The Daily Record covers CryptoniteNXT’s launch in an article titled Md. cyber firm launches network security appliance
Paul Gillin, Senior Editor at Silicon Angle, covers CryptoniteNXT’s launch and discusses applications and customers in manufacturing, healthcare, and industrial control.
ExecutiveBiz covers CryptoniteNXT’s launch in an article titled “Cryptonite Unveils Moving Target Cyber Defense Tech to Protect Client Networks”
Government Computer News coverage of CryptoniteNXT’s launch.
TechSpot’s Cal Jeffrey covers CryptoniteNXT’s launch.
Read John Leyden’s technical analysis of CryptoniteNXT at The Register.
American Inno covers Cryptonite’s history,spin-out from federal funding and share more on the uniqueness and power of CryptoniteNXT technology.
Security Week international correspondent Eduard Kovacs describes CryptoniteNXT’s launch in an IT security news headline article.
CryptoniteNXT’s launch was featured on the front page of Technical.ly DC in an interview by Technical.ly DC Market Editor Stephen Babcock with CryptoniteNXT CEO Mike Simon.
Jessica Lyons Hardcastle, Senior Editor at SDxCentral, interviewed CEO Mike Simon in an article titled Security Startup Cryptonite Makes Networks ‘Invisible’ to Attackers.
Cryptonite Emerges From Stealth Mode and Launches CryptoniteNXT, a Defensive Cyber Platform to Prevent Reconnaissance and Stop Lateral Movement Rockville, MD, October 26, 2017 — Cryptonite, a leader in moving target cyber defense, launched today from stealth mode with the release of the company’s flagship network security solution, CryptoniteNXT. CryptoniteNXT enables any network to […]
On Thursday, October 26nd, CEO Mike Simon will speak at the “Cyber Security: How You Can Protect Your Business From a Cyber Attack” forum hosted by EagleBank and the Montgomery County Economic Development Corporation (MCEDC).
Ron Gula, cyber security entrepreneur and expert of 20+ years interviews Mike Simon, CEO of Cryptonite about NXT’s effectiveness against insider threats.
Mike Simon fields questions from the Startup Security hosts in this 30 min interview featured on the prominent YouTube channel.
On March 22nd, the nonprofit Cybersecurity Association of Maryland, Inc. (CAMI), presented Cryptonite with an award for the Best Cyber Security Product of Montgomery County.