In the digital age, where information is a valuable asset, protecting an organization’s data is not just a best practice, but a fundamental necessity. The imp...
We are proud to have been named an HFS OneEcosystem Hot Vendor for 2024. Read the full HFS Hot Vendor Report to learn more!...
In a galaxy not-so-far away… Eclypses is thrilled to announce sponsorship of the highly anticipated After Party for AWS Summit New York: Cloud Wars VI: Return of ...
When implementing cybersecurity, it’s crucial to create a strategy that protects everything from your personal information to the systems that run your business. ...
The Cloud-Centric Dilemma: A Data Revolution Beckons In the rapidly evolving digital landscape, businesses are encountering a pivotal dilemma: Are traditional data ...
In the relentless pursuit of cybersecurity excellence, Eclypses has emerged victorious in a recent pen test, showcasing an unparalleled resilience against adversari...
Dive into the intricate landscape of data breaches in 2023 with this comprehensive overview sourced from Varonis, unraveling key insights and alarming trends. From ...
What happened? One of the largest gambling firms, MGM Resorts International, announced that in October 2023 they had been forced to shut down their systems after a ...
Quantum computer attacks could soon jeopardize the digital world, putting your online security, privacy and data at risk. As it stands, quantum-resistant security i...
Ensuring the security of sensitive information has become paramount. As cyber threats continue to evolve every day, the need for robust data security technology has...
Machine learning (ML) is becoming one of the most vital assets for data security. Threat actors innovate daily, compromising data stores with greater frequency and ...
Where our everyday lives are increasingly intertwined with technology, the healthcare industry is a critical pillar of our society. As healthcare providers continue...
Embracing adaptability is the key to charting a course for continuous business success. In today’s dynamic market, understanding consumer preferences and mark...
Two new emerging threats have surfaced named HTTPSnoop and PipeSnoop, which are being used in cyberattacks on telecommunication service providers in the Middle East...
Eclypses has been featured as a Top Cybersecurity Company in Colorado from DesignRush. DesignRush’s expert analysts list Colorado’s top-rated cybersecur...
People and businesses rely on technology every day. However, with these modern innovations also comes risk. Cyberattacks pose a massive threat to organizations. It ...
Eclypses offers a robust solution to enhance data security in the healthcare setting. In today’s digital era, data security is paramount, particularly for ...
Cybersecurity is in a constant state of evolution, adapting to new technological advancements while cybercriminals seize new opportunities. In order to keep up with...
Web applications have become an integral part of our daily lives, offering convenience, accessibility, and efficiency. However, the increasing reliance on web appli...
Mobile applications have become an essential part of our daily lives, allowing us to access information, connect with others, and perform a wide range of tasks on-t...
With a vast majority of the population using mobile phones on a daily basis and relying heavily on them, it would be devastating for a hacker to gain access to thes...
Data security is a paramount concern for businesses today, especially as the amount of data being generated and processed continues to grow at an unprecedented rate...
Charting a future of continual business success requires adaptability. Business owners need to learn what their consumers want and how the market is responding to g...
A featured article by Aron Seader from Eclypses in Top Cyber News Magazine on what to know about SIM swapping and cloning attacks. Click here to read the full artic...
Eclypses has been short-listed for the 2023 Financial Technologies Forum (FTF) News Technology Innovation Awards for Best Security Solution, cast your vote here bef...
What is RSA? RSA is a cryptography that continues to be prevalent in many technologies and products. RSA is a public-key mechanism for orchestrating secure data t...
Implementing cybersecurity software can help protect a business from cyber-attacks, data breaches, and other security threats. However, the process of implementing ...
On March 2, 2023, the Biden-Harris Administration announced the new National Cybersecurity Strategy. This strategy is to “secure the full benefits of a safe a...
How to Create a Strategic Approach when Implementing Data Protection Technology In the data protection industry, successful software implementations are crucial f...
Whoever said that efficiency is maximized through simplicity needed to be more familiar with microservices. Compared to the monolithic applications of the past, mic...
What Happened? According to a report published on Naked Security by Sophos, Apple has released an urgent security update for all devices running the latest Apple ...
Since the amount of data circulating is increasing rapidly, businesses need to be aware of the existing and emerging data privacy laws state and federal governments...
T-Mobile January 2023 Hack On January 19th, 2023 T-Mobile disclosed a new data breach when a bad actor stole the personal information of 37 million customer accou...
The National Cybersecurity Alliance is hosting Data Privacy Week as a way to spread awareness about the importance of online privacy and data security across all...
According to BleepingComputer, PayPal sent out data breach notifications to thousands of their users who had their accounts breached through a large-scale credentia...
According to Gov Info Security, a security incident at CircleCI may have resulted in attackers gaining access to their customer’s code development environment...
United States President Joe Biden signed the “Quantum Computing Preparedness Act” on December 21, 2022, issued by The White House. This act, named H.R. 7535, wo...
The Cyber Express recently published an article, Why Weak Mobile App Security Will Impact Retailers in 2023. Mobile devices have certainly made it more convenient...
Cybersecurity is a continually evolving field. As new tech trends emerge, cybercriminals shift to take advantage of new opportunities. Security must likewise adapt ...
In a recent DARKreading article, “3 xIoT Attacks Companies Aren’t Prepared for” they highlight why it is important to pay attention to the securit...
As we continue in Infrastructure Security Month, we’re sharing a recent report from the U.S. Government Accountability Office (GAO), which highlights that a c...
Infrastructure Security Month increases awareness about one of the most influential aspects of everyone’s daily lives. So much of the world relies upon infrastruc...
IoT for All shared an article by Senet’s Ken Lynch on why managing IoT security risks in utility infrastructure is essential for defeating emerging threats. The a...
It’s a full-time job keeping up with digital threats, including phishing, ransomware and denial-of-service attacks. Since their usage is so versatile and clever, ...
In honor of October Cybersecurity Awareness Month 2022, Eclypses shared daily tips to raise awareness about digital security and empower people to protect their dat...
This article was previously published in Cybersecurity Trends, authored by Joe Jeanjaquet, Eclypses Sr. Director of Applied Technology The destruction cyber-attac...
Cybersecurity Awareness Month is celebrating its 19th year, as it continues to make a large impact on the cybersecurity community and is co-led by the National Cybe...
A relay attack is a form of hacking technique related to replay attacks and man-in-the-middle attacks. A relay attack involves the interception of information with ...
With RPKI vulnerable and new mandates coming in, it’s time to put protections in place to secure your company data. RPKI (Resource Public Key Infrastructur...
An Interview with Dan Lemoine on how Eclypses MTE technology keeps your data protected and keeps your organization ahead of regulatory changes in your industry. Re...
Judson Stone, Sr. Global Sales Director at Eclypses, Joe Jeanjaquet, Sr. Director of Applied Technologies at Eclypses, and David Gomes, Chief Operating Officer at E...
With the widespread adoption of mobile devices, the workforce relies heavily on mobile technologies to complete important tasks throughout the day. The mobile appli...
IoT for All shared an article written by Senet’s Ken Lynch on the impact of LoRaWAN on water utilities and other critical infrastructure sectors as a way to ...
On August 22, 2022, the HIPAA Journal released updated statistics on the number of data breaches in the Healthcare industry across the past twelve months. This repo...
When thinking about hacking, we often imagine the practice as complex and sophisticated, right? Yet one of the most successful cyberattacks today is so easy that yo...
Quantum computing opens up a world of new possibilities, however, the ramifications of this new tech will include threats to current cryptographic standards. The U....
What Happened? While investigating an attempted business email compromise attack for a large business, cloud incident response vendor Mitiga found that bad actors h...
Lloyd’s of London is an insurance and reinsurance market located in London, United Kingdom, providing specialist insurance services to companies in over 200 count...
Just about everyone uses a smartphone today – for entertainment, sending messages, taking pictures, storing information, sending money, and of course, talking on ...
What Happened? According to TechSpot, a security researcher and blogger claimed that all VPNs on iOS are broken. Researcher Michael Horowitz and ProtonVPN believe...
What Happened? Apple released an emergency security update on August 17, 2022, according to a report released by Bleeping Computer. The updates released by Apple ...
What Happened? On August 16, 2022, Google pushed out patches for the Chrome browser for desktops to contain an actively exploited high-severity zero-day flaw in the...
In a report released on August 4, 2022, the Health Sector Cybersecurity Coordination Center (HC3) highlighted the many security risks faced by the IoT market today ...
The Unknown Threats to Your Data According to BleepingComputer, “Twitter has confirmed a recent data breach was caused by a now-patched zero-day vulnerability u...
Intertrust Technologies is a Silicon Valley-based software company specializing in trusted computing products and services. Intertrust’s 2021 State of Mobile Fina...
On May 24, 2022, CyberNews released their top picks for the best data protection solutions on the market, and Eclypses’ MTE Technology made the list. The Cybe...
Aron Seader, Eclypses Senior Director of Core Engineering, was recently featured as a guest on the Privacy Pros Podcast, Episode 34: “How To Secure Your Data ...
What happened? The Harmony blockchain is a well-known trading platform where users can buy, sell, trade, and move cryptocurrencies throughout a variety of differe...
According to a report by BleepingComputer, in March of 2022 researchers at Confiant uncovered an operation that uses trojanized mobile cryptocurrency wallet applica...
BleepingComputer reported on May 22, 2022, that Google’s Threat Analysis Group (TAG) has found that state backed threat actors have utilized five zero-day vulnera...
We’ve gathered the following information from a video interview with Joe Jeanjaquet, Senior Director of Applied Technologies at Eclypses. What is a zero-day a...
What happened? WonderHero is a popular blockchain NFT (non-fungible token) game where players earn revenue in cryptocurrencies and NFTs through gameplay. Accordin...
The latest crypto hack may be the largest yet, according to a recent CoinDesk article. What happened? It was reported that approximately $625 million worth of cry...
The healthcare sector has always been an appealing target for cyber criminals, as it stores and transfers sensitive information such as patient records and medical ...
According to Yahoo News, millions of customers who rely on the popular money-transferring app Zelle were scammed. It was reported that scammers are using the Zelle ...
UPDATE JULY 2022 As of July 11, 2022, BleepingComputer has reported that a team of security researchers has found that several modern Honda car models are vulnerabl...
What Happened? Two large cryptocurrency trading platforms had their repository of user private keys breached. Once private keys were hacked by cyber criminals, they...
As the global climate and technological landscape continue to grow and change rapidly, it is more important than ever before to be prepared for a cyber attack. Cybe...
Breaches in online sports betting have always been a substantial issue in the gambling industry. The online gambling industry has become extremely lucrative in the ...
Our CEO Bryan Champagne recently spoke with CyberNews to talk about the most serious threats surrounding mobile applications today, tips on how organizations can pr...
Eclypses has been short-listed in the 2022 Financial Technologies Forum (FTF) News Technology Innovation Awards for Best Cyber Security Solution, cast your vote her...
In mid-February, Google announced a privacy change that will cut tracking across apps on Android devices. The technological powerhouse will develop new, privacy-f...
As multi-factor authentication (MFA) becomes a mandatory security practice, especially for almost all cyber insurance policies, cyber criminals are seeking new ways...
This article was previously published in Cybersecurity Trends, authored by Aron Seader, Eclypses Sr. Director of Core Engineering Society has already benefited from...
President Joe Biden recently signed a National Security Memorandum (NSM) to improve the cybersecurity of National Security, Department of Defense (DoD), and Intelli...
The National Cybersecurity Alliance hosts Data Privacy Week to help spread awareness about online privacy and provide education on how to manage their personal info...
According to data from IBM, the total number of cyber attacks in 2021 went up by 27% compared to 2020. The cost of cyber attacks within companies and organizations ...
Apple’s website shows you the many ways apps use the privacy permissions you have allowed them. “With iOS 15.2 and iPadOS 15.2, users can turn on the Ap...
As we embark on the new year, the Eclypses team has come up with a few predictions for 2022 based on what came from 2021. We’re talking about zero-day attacks...
According to TechJury, 300,000 new pieces of malware are created daily, ranging from viruses, adware, Trojans, keyloggers, etc. all with the same goal – to steal...
What is happening? Cyber criminals have found a number of effective ways to get around your 2FA (two-factor authentication) protections – and they’re using thes...
Your data is being shoplifted. While ransomware attacks dominate news headlines, a patient/organized enemy is reaping the rewards one vulnerability at a time. These...
We interviewed cybersecurity expert, Scott Foote to learn more about mobile application threats today and what mobile developers should know to enhance their mobile...
This article was previously published in Cybersecurity Trends, authored by David Schoenberger, Eclypses Chief Innovation Officer In the cybersecurity world, securit...
Critical infrastructure in the United States – pipelines, electrical grids, election systems, among others – are at constant risk from hackers all over ...
With the creation of faster, more powerful computers and technology has come a steadily increasing number of cyber and ransomware attacks. Now more than ever, compa...
We sat down with Aron Seader, Eclypses Senior Director of Core Engineering to learn more about his technical background, his thoughts on how MTE technology will hel...
We sat down with Joe Jeanjaquet, Eclypses Senior Director of Applied Technologies to learn more about his technical background and his thoughts on why MTE technolog...
As of May 12, 2021, President Biden has signed an Executive Order to strengthen cybersecurity defenses across the United States. With the recent Colonial Pipeline a...
There are two types of businesses out there: those that have experienced a cyber attack and those that will. Mobile and web security have increased significantly ov...
A conversation about mobile application security in a democracy has become especially important amid evolving threats and unprecedented expansion of the surface of ...
An Interview with Eclypses Chief Innovation Officer, David Schoenberger The United States Federal Government passed the first IoT security legislation. This bans fe...