In this quick video, Chief Technology Officer, Collin Sweeney gives a brief introduction to how ZKX’s patented technology works.
Filter by Category:
Every few years, society advocates for the retirement of some technology thought to be no longer sufficient. This generation chooses to attack the password for perceived security risks. At ZKX, we make the argument that the password is not the problem; the technology behind it is. Our technologies seek to make cybersecurity a responsibility left […]
In this short video, ZKX Software Engineer Emerald Rafferty explains what a “man in the middle” attack is, gives us a theoretical and a real-world example of where this may occur, and explains how ZKX technology mitigates this type of cyber attack, keeping the user, and their device safe from cyber adversaries.
Here at ZKX Solutions, prospective customers or business partners often ask us how we go about structuring a good defensive cyber security posture. In this video, Chief Technology Officer Collin Sweeney discusses the importance of three categories that fully encompass a good defensive cybersecurity posture: policy, technology, and culture. Read the article.
In this webinar, ZKX chief technologist Collin Sweeney leads a roundtable discussion with members of the ZKX R&D Team Alexis Korensky and Emerald Rafferty. This discussion will break down what a true ZTA means and how to get started today by focusing on the most critical pillars as identified by the Cybersecurity and Infrastructure Security Agency Zero Trust maturity model: authentication of the user and the device.
At ZKX Solutions we often talk about how we employ zero-knowledge proofs to help achieve our zero trust, multi-factor authentication technology. In this video, Chief Technologist Collin Sweeney talks a little bit about what zero knowledge proofs are and why ZKX Solutions chose to employ them in pursuit of actualizing zero trust parameters.
In this 3-minute video, ZKX Chief Technologist Collin Sweeney gives a brief overview of ZKX, who we are, and what we do.
In this 3-minute animated explainer video, we identify the numerous limitations of the “traditional” authentication model used today, and show how ZKX solves all of these problems.
Zero Trust Architecture (ZTA) is an exciting theoretical approach to total information security, but it is just that – an approach. While ZTA technologies are already being developed, tested, and implemented, it is important to not lose sight of the ripples which changes in the enterprise will cause downstream to the edge.