Filter by Category:

From Buzzword to Brass Tacks: Resetting the Conversation on Zero Trust

In this webinar, ZKX chief technologist Collin Sweeney leads a roundtable discussion with members of the ZKX R&D Team Alexis Korensky and Emerald Rafferty. This discussion will break down what a true ZTA means and how to get started today by focusing on the most critical pillars as identified by the Cybersecurity and Infrastructure Security Agency Zero Trust maturity model: authentication of the user and the device.

Zero Knowledge Proofs Explained

At ZKX Solutions we often talk about how we employ zero-knowledge proofs to help achieve our zero trust, multi-factor authentication technology. In this video, Chief Technologist Collin Sweeney talks a little bit about what zero knowledge proofs are and why ZKX Solutions chose to employ them in pursuit of actualizing zero trust parameters.

ZKX vs Traditional Authentication

In this 3-minute animated explainer video, we identify the numerous limitations of the “traditional” authentication model used today, and show how ZKX solves all of these problems.

Zero Trust Architecture for the Tactical Edge | REDCOM Webinar

Zero Trust Architecture (ZTA) is an exciting theoretical approach to total information security, but it is just that – an approach. While ZTA technologies are already being developed, tested, and implemented, it is important to not lose sight of the ripples which changes in the enterprise will cause downstream to the edge.