Category

Quick Read

Preventing Future Data Breaches with Helix

AT&T has confirmed a data breach of call and text records between May 1, 2022, and October 31, 2022. In this article, we explain how Helix’s patented MFA system would have prevented the data breach and kept customers safe. By utilizing Zero Knowledge Proofs and Zero Trust Policies, bad actors cannot phish login information or crack passwords through traditional methods.

National Cybersecurity Strategy Pillar Four: Invest in a resilient future 

Investments in technology and culture need to be made today to ensure a resilient future. By combining federal and private sector resources, we can leverage investments in R&D, innovation, and education to enhance our digital presence and cyber infrastructure. However, innovation is not enough. Without making cybersecurity a top priority, our innovation and technological advancements are open for infiltration by our adversaries.

National Cybersecurity Strategy Pillar Two: Disrupt and dismantle threat actors

They key to mitigating cybercrimes is disrupting and dismantling the actors perpetrating such offenses. The next great fight is set to take part in the cyber domain. The goal is to disrupt these attacks and the entities initiating them before they can even get started. With the increase of federal resources allocated to this initiative, we have proven successful in frustrating threat efforts by malicious actors, foreign governments, and criminals.

Constructing your Cybersecurity Posture

Here at ZKX Solutions, prospective customers or business partners often ask us how we go about structuring a good defensive cyber security posture. In this article, we disucuss the importance of three categories that fully encompass a good defensive cybersecurity posture: policy, technology, and culture.

Security vs. Encryption

People often link security and encryption together. While they go hand in hand, they are in fact two entirely different concepts. Security is all about protecting data and information, and encryption is just one of the means of accomplishing this.

Refocusing the Zero Trust Conversation

Zero Trust is doomed to forever be a moving target that organizations will only be able to sufficiently achieve with heightened awareness, agility, and, perhaps most importantly, an operating culture that is human-centered, progress-oriented, and not totally insufferable. These are things that cannot simply be purchased from the free market, despite what you might read on industry websites. These solutions literally must be architected, hence the A in ZTA.

Killing the CAC

Since 1999 the Common Access Card (CAC) has been the norm for service members. The CAC has been the standard for so long that the industry has now created technology that far surpasses the CAC. The industry is moving from a net-centric to a data-centric approach. This shift is part of the call to “Kill the CAC.”

Federal Zero Trust Strategy

In January 2022, the Executive Office of the President: Office of Management and Budget released a memorandum for executive departments and agencies. This memo is aligned with the executive order detailing the U.S. government’s shift to a Zero Trust enterprise. As President Biden stated in EO 14028, “Incremental improvements will not give us the security we need; instead, the Federal Government needs to make bold changes and significant investments to defend the vital institutions that underpin the American way of life.”

Road to Zero Trust Authentication

Why the road to Zero Trust Authentication goes through ZKX 

The Zero Trust security model requires a revolutionary shift from traditional authentication methods that have been in use for decades. While the DoD has mandated migration to zero-trust networks, most organizations are still unclear on how to get started. This briefing outlines why the road to zero trust networks logically starts with the ZKX MFA authentication engine.