Validation ensures Eclypses customers are using a product validated by a National Institute of Standards and Technology approved testing laboratory. Eclypses, a lea...
Eclypses has partnered with Beasy to change how people view the security standards in the crypto market. With the number of cyberattacks on the blockchain steadily ...
This summer, Eclypses partnered with Pikes Peak Business & Education Alliance (PPBEA) to host six summer interns in the areas of Business Intelligence & Ana...
Conozca cómo funciona la tecnología MTE por separado y junto con otros tipos de seguridad para brindar protección de datos integral en este video de analogía de...
In a report released on August 4, 2022, the Health Sector Cybersecurity Coordination Center (HC3) highlighted the many security risks faced by the IoT market today ...
The Unknown Threats to Your Data According to BleepingComputer, “Twitter has confirmed a recent data breach was caused by a now-patched zero-day vulnerability u...
Intertrust Technologies is a Silicon Valley-based software company specializing in trusted computing products and services. Intertrust’s 2021 State of Mobile Fina...
On May 24, 2022, CyberNews released their top picks for the best data protection solutions on the market, and Eclypses’ MTE Technology made the list. The Cybe...
Aron Seader, Eclypses Senior Director of Core Engineering, was recently featured as a guest on the Privacy Pros Podcast, Episode 34: “How To Secure Your Data ...
Senet, Inc., a leading provider of cloud-based software and services platforms that enable global connectivity and on-demand network build-outs for the Internet of ...
What happened? The Harmony blockchain is a well-known trading platform where users can buy, sell, trade, and move cryptocurrencies throughout a variety of differe...
Eclypses announced their partnership with Apexa iQ to bring Eclypses MTE® technology, a FIPS 140-3 validated technology to the Apexa iQ platform. The Apexa iQ plat...
According to a report by BleepingComputer, in March of 2022 researchers at Confiant uncovered an operation that uses trojanized mobile cryptocurrency wallet applica...
Eclypses has partnered with DataSetGo LLC., an enterprise-level solution partner in the payroll processing industry. DataSetGo recognized the need for the latest se...
BleepingComputer reported on May 22, 2022, that Google’s Threat Analysis Group (TAG) has found that state backed threat actors have utilized five zero-day vulnera...
Cyber security in Latin America is strengthened with Eclypses’ disruptive technologies, deployed in the region by Consultec. Eclypses’ patented MTE tec...
Eclypses announced that they have been named the winner for “Best Cyber-Security Solution” in the 2022 FTF News Technology Innovation Awards for their FIPS 140-...
We’ve gathered the following information from a video interview with Joe Jeanjaquet, Senior Director of Applied Technologies at Eclypses. What is a zero-day a...
What happened? WonderHero is a popular blockchain NFT (non-fungible token) game where players earn revenue in cryptocurrencies and NFTs through gameplay. Accordin...
In this interview with Eclypses Senior Director of Applied Technologies, Joe Jeanjaquet, he discusses the vulnerabilities of zero-day attacks and what is making the...
The latest crypto hack may be the largest yet, according to a recent CoinDesk article. What happened? It was reported that approximately $625 million worth of cry...
The healthcare sector has always been an appealing target for cyber criminals, as it stores and transfers sensitive information such as patient records and medical ...
According to Yahoo News, millions of customers who rely on the popular money-transferring app Zelle were scammed. It was reported that scammers are using the Zelle ...
UPDATE JULY 2022 As of July 11, 2022, BleepingComputer has reported that a team of security researchers has found that several modern Honda car models are vulnerabl...
What Happened? Two large cryptocurrency trading platforms had their repository of user private keys breached. Once private keys were hacked by cyber criminals, they...
As the global climate and technological landscape continue to grow and change rapidly, it is more important than ever before to be prepared for a cyber attack. Cybe...
Breaches in online sports betting have always been a substantial issue in the gambling industry. The online gambling industry has become extremely lucrative in the ...
Our CEO Bryan Champagne recently spoke with CyberNews to talk about the most serious threats surrounding mobile applications today, tips on how organizations can pr...
Eclypses has been short-listed in the 2022 Financial Technologies Forum (FTF) News Technology Innovation Awards for Best Cyber Security Solution, cast your vote her...
In mid-February, Google announced a privacy change that will cut tracking across apps on Android devices. The technological powerhouse will develop new, privacy-f...
Learn how MTE Technology works both separately and alongside other types of security to provide end-to-end data protection in this Bank Analogy video....
Current memory storage security leaves sensitive data, such as a username or password, visible while your applications are running. Learn How Eclypses MTE Technolog...
Relying on Operating System level security to protect data leaves large holes for bad actors to use to gain access to your information. Learn how moving security ba...
How do attackers get access to a username and password data? Eclypses MTE Technology is different than any other security solution because it has the ability to be ...
Cyber risks are hardly infrequent, but there is an alarming number of risks in the world of mobile applications – especially those in the financial services secto...
As multi-factor authentication (MFA) becomes a mandatory security practice, especially for almost all cyber insurance policies, cyber criminals are seeking new ways...
This article was previously published in Cybersecurity Trends, authored by Aron Seader, Eclypses Sr. Director of Core Engineering Society has already benefited from...
Eclypses has recently announced their partnership with WILLPORTtrust, a micro-estate manager that utilizes blockchain technology and allows users to set up an “af...
President Joe Biden recently signed a National Security Memorandum (NSM) to improve the cybersecurity of National Security, Department of Defense (DoD), and Intelli...
The National Cybersecurity Alliance hosts Data Privacy Week to help spread awareness about online privacy and provide education on how to manage their personal info...
According to data from IBM, the total number of cyber attacks in 2021 went up by 27% compared to 2020. The cost of cyber attacks within companies and organizations ...
Apple’s website shows you the many ways apps use the privacy permissions you have allowed them. “With iOS 15.2 and iPadOS 15.2, users can turn on the Ap...
As we embark on the new year, the Eclypses team has come up with a few predictions for 2022 based on what came from 2021. We’re talking about zero-day attacks...
According to TechJury, 300,000 new pieces of malware are created daily, ranging from viruses, adware, Trojans, keyloggers, etc. all with the same goal – to steal...
What is happening? Cyber criminals have found a number of effective ways to get around your 2FA (two-factor authentication) protections – and they’re using thes...
Your data is being shoplifted. While ransomware attacks dominate news headlines, a patient/organized enemy is reaping the rewards one vulnerability at a time. These...
Cyber regulations are here, how are you reducing your risk? Cybersecurity continues to be at the forefront of this year’s business concerns. With the expansion of...
We interviewed cybersecurity expert, Scott Foote to learn more about mobile application threats today and what mobile developers should know to enhance their mobile...
Looking ahead to 2022, Eclypses anticipates a rise in mobile application cyber attacks. Eclypses, a leader in end-point data protection, concludes 2021 with new cus...
A brute force attack may seem simple, but it has been effective for a long time. In fact, recent news indicates that state actors have developed much faster computi...
Does your current security and technology require FIPS (Federal Information Processing Standard) certification? FIPS is required for most regulated environments ...
We sat down with cybersecurity expert, Scott Foote to learn more about mobile application threats today and what mobile developers should know to enhance their mobi...
Eclypses’ Faye Danis sat down with cybersecurity expert, Scott Foote to learn more about the impacts of a weak mobile application security strategy. Scott Foote h...
Voatz is a mobile election voting application. Their mission is to “make voting not only more accessible and secure but also more transparent, auditable and accou...
Archethought faced tough choices after learning their IoT components were vulnerable to hackers. Despite their components having newer encryption software, it was l...
In this clip from the Cybersecurity Awareness Month webinar hosted by Eclypses and Voatz, Bryan Champagne, CEO of Eclypses, offers his insight on if our fear of and...
In this clip from the Cybersecurity Awareness Month webinar hosted by Eclypses and Voatz, Bryan Champagne, CEO of Eclypses, explains what people are getting wrong w...
In this clip from the Cybersecurity Awareness Month webinar hosted by Eclypses and Voatz, Bryan Champagne, CEO of Eclypses, discusses new mobile application threats...
Meet the companies and the technology leaders who keep some of our most high-stakes applications safe. It takes the collaboration of several companies to ensure tha...
We talked with cybersecurity expert, Scott Foote to learn more about the risks of 5G on devices and what we need to look out for. Scott Foote has over 30 years of c...
We interviewed cybersecurity expert, Scott Foote to learn about his opinion on Eclypses’ MTE technology. Scott Foote has over 30 years of cybersecurity leadership...
FIPS 140-3 Update: After working with Penumbra, our accredited testing laboratory, as of September 2021, our MTE Technology has been officially FIPS 140-3 validated...
This article was previously published in Cybersecurity Trends, authored by David Schoenberger, Eclypses Chief Innovation Officer In the cybersecurity world, securit...
Using TLS + MTE = full resiliency! As many know, TLS has areas of vulnerability, but paired with our MTE technology you’ll eliminate those vulnerabilities. TLS an...
Critical infrastructure in the United States – pipelines, electrical grids, election systems, among others – are at constant risk from hackers all over ...
With the creation of faster, more powerful computers and technology has come a steadily increasing number of cyber and ransomware attacks. Now more than ever, compa...
We sat down with Aron Seader, Eclypses Senior Director of Core Engineering to learn more about his technical background, his thoughts on how MTE technology will hel...
We sat down with Joe Jeanjaquet, Eclypses Senior Director of Applied Technologies to learn more about his technical background and his thoughts on why MTE technolog...
With recent front-page news about the cyber-hack of the Colonial Pipeline, JBS USA and agencies of the federal government, data security is on everyone’s mind. In...
Eclypses has partnered with Coforge, a leading global IT solutions organization that enables its clients to transform at the intersect of unparalleled domain expert...
As of May 12, 2021, President Biden has signed an Executive Order to strengthen cybersecurity defenses across the United States. With the recent Colonial Pipeline a...
MTE Web uses MTE technology to protect individual fields of sensitive data on a webpage, for when exposure cannot be tolerated. The MTE Web toolkit is a solution th...
MTE Mobile uses Eclypses MTE technology to protect your sensitive data at the application level before it hits the operating system. The MTE Mobile toolkit is a sol...
Eclypses’ MTE Connect delivers security that meets the needs for highly scalable, low-power, widely dispersed endpoints for all IoT environments by using MTE ...
What is MTE Technology? Standard encryption schemes leave your most sensitive data at risk. The MTE technology eliminates that risk by replacing valuable data with ...
There are two types of businesses out there: those that have experienced a cyber attack and those that will. Mobile and web security have increased significantly ov...
A conversation about mobile application security in a democracy has become especially important amid evolving threats and unprecedented expansion of the surface of ...
Eclypses CIO David Schoenberger and Voatz CEO Nimit Sawhney discuss mobile application security in democracy and how to prepare for threats as we expand the use of ...
An Interview with Eclypses Chief Innovation Officer, David Schoenberger The United States Federal Government passed the first IoT security legislation. This bans fe...
Eclypses has recently partnered with ACEIS Electric and Power to add MTE technology into ACEIS’ current systems to provide a more secure solution to their clien...
Eclypses has partnered with Voatz, a leading mobile voting platform provider to pilot its “Quantum Resistant” security solution in upcoming elections. Voatz mad...
Internet of Things (IoT) devices use wireless sensor software to facilitate the automatic transfer of data from low-powered hubs to analytic engines. With the conti...
Watch an overview of how Archethought utilizes the Eclypses’ MTE technology, with Archethought CEO Dixon Dick. Learn how the MTE technology was the answer for...