Filter by Category:

Long Live the Password

Every few years, society advocates for the retirement of some technology thought to be no longer sufficient. This generation chooses to attack the password for perceived security risks. At ZKX, we make the argument that the password is not the problem; the technology behind it is.

Our technologies seek to make cybersecurity a responsibility left to be fulfilled by good technology and adequate policy, not a burden to be continually placed on the end user.

Man In the Middle Attacks Explained

In this short video, ZKX Software Engineer Emerald Rafferty explains what a “man in the middle” attack is, gives us a theoretical and a real-world example where this may occur, and explains how ZKX technology mitigates this type of cyber attack, keeping the user, and their device safe from cyber adversaries.

Constructing your Cybersecurity Posture

Here at ZKX Solutions, prospective customers or business partners often ask us how we go about structuring a good defensive cyber security posture. In this video, Chief Technology Officer Collin Sweeney discusses the importance of three categories that fully encompass a good defensive cybersecurity posture: policy, technology, and culture. Read the article.

From Buzzword to Brass Tacks: Resetting the Conversation on Zero Trust

In this webinar, ZKX chief technologist Collin Sweeney leads a roundtable discussion with members of the ZKX R&D Team Alexis Korensky and Emerald Rafferty. This discussion will break down what a true ZTA means and how to get started today by focusing on the most critical pillars as identified by the Cybersecurity and Infrastructure Security Agency Zero Trust maturity model: authentication of the user and the device.

Zero Knowledge Proofs Explained

At ZKX Solutions we often talk about how we employ zero-knowledge proofs to help achieve our zero trust, multi-factor authentication technology. In this video, Chief Technologist Collin Sweeney talks a little bit about what zero knowledge proofs are and why ZKX Solutions chose to employ them in pursuit of actualizing zero trust parameters.

ZKX vs Traditional Authentication

In this 3-minute animated explainer video, we identify the numerous limitations of the “traditional” authentication model used today, and show how ZKX solves all of these problems.

Zero Trust Architecture for the Tactical Edge | REDCOM Webinar

Zero Trust Architecture (ZTA) is an exciting theoretical approach to total information security, but it is just that – an approach. While ZTA technologies are already being developed, tested, and implemented, it is important to not lose sight of the ripples which changes in the enterprise will cause downstream to the edge.