Recognized for its next-generation data security solution, Eclypses is thrilled to announce that it has been named the winner of the reputable “Best Security ...
Safeguarding sensitive healthcare data is now more critical than ever. Watch this webinar featuring industry experts, Jefferson Dance, Chief Innovation Officer at E...
In today’s digital landscape, the cloud offers unparalleled advantages. However, as organizations embrace cloud technology, they face new challenges in data s...
Eclypses has been featured as a Top Cybersecurity Company in Colorado from DesignRush. DesignRush’s expert analysts list Colorado’s top-rated cybersecur...
People and businesses rely on technology every day. However, with these modern innovations also comes risk. Cyberattacks pose a massive threat to organizations. It ...
Liveplex, a prominent technology firm at the forefront of the next-generation internet revolution, announces another milestone in its strategic partnership with Ecl...
Live Podcast Interview with Bryan Champagne, CEO of Eclypses and Evan Kirstel on YouTube discussing MTE Technology...
With MTE technology embedded into their platform, financial organizations can offer complete end-to-end data protection for all their clients. First Rate, Inc., a g...
Check out this interview between WriteForMe Podcast “Business Ninja” Kelsey and Bryan Champagne, CEO of Eclypses that explores MTE Technology and the im...
Eclypses offers a robust solution to enhance data security in the healthcare setting. In today’s digital era, data security is paramount, particularly for ...
Learn about the exciting partnership between Apexa iQ and Eclypses in this interview video between Apexa CEO, Lokesh Aggarwal and Eclypses CEO, Bryan Champagne. Our...
With MTE technology embedded into their platform, Apexa iQ offers complete end-to-end data protection for all clients. Apexa iQ, a SaaS platform that gives visibili...
Apexa iQ, a SaaS platform that gives visibility into the hygiene of your entire IT environment on a single dashboard, announced their most recent data security inte...
Cybersecurity is in a constant state of evolution, adapting to new technological advancements while cybercriminals seize new opportunities. In order to keep up with...
In an era of widespread connectivity and increasing cybersecurity threats, endpoint verification has become paramount for safeguarding networks. It involves the pro...
MTE Nano is the ultimate solution for end-to-end data protection for resource-constrained IoT devices. MTE Nano offers quantum-resistant security that provides over...
Web applications have become an integral part of our daily lives, offering convenience, accessibility, and efficiency. However, the increasing reliance on web appli...
MTE Nano will benefit customers in the IoT landscape by reducing RAM usage and library size. Eclypses introduced MTE Nano, a new toolkit focused on securing re...
Mobile applications have become an essential part of our daily lives, allowing us to access information, connect with others, and perform a wide range of tasks on-t...
With today’s advancing technology comes drastic increases in cyber-attacks across all industries. In the IoT space, industries continue to grow and become more vu...
With a vast majority of the population using mobile phones on a daily basis and relying heavily on them, it would be devastating for a hacker to gain access to thes...
Kafka is a distributed event-streaming architecture widely used in various industries for data integration and processing. As Kafka is a real-time streaming platfor...
Data security is a paramount concern for businesses today, especially as the amount of data being generated and processed continues to grow at an unprecedented rate...
Utilizing Eclypses MTE technology, WholesalePayroll has obfuscated and safeguarded all data exchanged between persons over its platform. Read our full case study be...
MTE Kafka secures real-time Kafka streams and data. MTE enables security to be embedded in the Kafka ecosystem at the data level, removing outside dependencies allo...
Charting a future of continual business success requires adaptability. Business owners need to learn what their consumers want and how the market is responding to g...
MTE Kafka secures real-time Kafka streams and data, protecting the business data in any phase Eclypses introduced MTE Kafka, a new toolkit focused on securing the...
A featured article by Aron Seader from Eclypses in Top Cyber News Magazine on what to know about SIM swapping and cloning attacks. Click here to read the full artic...
Eclypses has been short-listed for the 2023 Financial Technologies Forum (FTF) News Technology Innovation Awards for Best Security Solution, cast your vote here bef...
What is RSA? RSA is a cryptography that continues to be prevalent in many technologies and products. RSA is a public-key mechanism for orchestrating secure data t...
The Zero Trust Architecture (ZTA) is a strategy for completely protecting computer infrastructure and systems. In June 2021, the Cybersecurity and Infrastructure Se...
Implementing cybersecurity software can help protect a business from cyber-attacks, data breaches, and other security threats. However, the process of implementing ...
On March 2, 2023, the Biden-Harris Administration announced the new National Cybersecurity Strategy. This strategy is to “secure the full benefits of a safe a...
How to Create a Strategic Approach when Implementing Data Protection Technology In the data protection industry, successful software implementations are crucial f...
WholesalePayroll Hired Independent Third-Party Threat Penetration Team to Test the MTE Secured Platform WholesalePayroll, a payroll software product, has successf...
Whoever said that efficiency is maximized through simplicity needed to be more familiar with microservices. Compared to the monolithic applications of the past, mic...
What Happened? According to a report published on Naked Security by Sophos, Apple has released an urgent security update for all devices running the latest Apple ...
Since the amount of data circulating is increasing rapidly, businesses need to be aware of the existing and emerging data privacy laws state and federal governments...
Liveplex moves into the new year to deliver new Web 3.0 capabilities combined with a disruptive data protection solution to protect their customer’s most sensitiv...
What keeps business executives up at night? This question comes up more often now than ever before in the cybersecurity landscape. As we see cybercrime continually ...
T-Mobile January 2023 Hack On January 19th, 2023 T-Mobile disclosed a new data breach when a bad actor stole the personal information of 37 million customer accou...
The National Cybersecurity Alliance is hosting Data Privacy Week as a way to spread awareness about the importance of online privacy and data security across all...
According to BleepingComputer, PayPal sent out data breach notifications to thousands of their users who had their accounts breached through a large-scale credentia...
According to Gov Info Security, a security incident at CircleCI may have resulted in attackers gaining access to their customer’s code development environment...
Why should you be concerned about quantum computing? Quantum computing is a different technology than what we use today, which is known as classical computing. It i...
United States President Joe Biden signed the “Quantum Computing Preparedness Act” on December 21, 2022, issued by The White House. This act, named H.R. 7535, wo...
The Cyber Express recently published an article, Why Weak Mobile App Security Will Impact Retailers in 2023. Mobile devices have certainly made it more convenient...
Cybersecurity is a continually evolving field. As new tech trends emerge, cybercriminals shift to take advantage of new opportunities. Security must likewise adapt ...
In a recent DARKreading article, “3 xIoT Attacks Companies Aren’t Prepared for” they highlight why it is important to pay attention to the securit...
Discover security that protects your (and your customers) most sensitive asset – your data! Eclypses MTE® Technology was developed to be the most innovative ...
PTC Partner Eclypses, Inc. Offers New PTC Marketplace Solution, MTE Technology Enabling ThingWorx Users to Provide Security to Data-in-Transit Eclypses, Inc. announ...
As we continue in Infrastructure Security Month, we’re sharing a recent report from the U.S. Government Accountability Office (GAO), which highlights that a c...
Infrastructure Security Month increases awareness about one of the most influential aspects of everyone’s daily lives. So much of the world relies upon infrastruc...
IoT for All shared an article by Senet’s Ken Lynch on why managing IoT security risks in utility infrastructure is essential for defeating emerging threats. The a...
It’s a full-time job keeping up with digital threats, including phishing, ransomware and denial-of-service attacks. Since their usage is so versatile and clever, ...
In honor of October Cybersecurity Awareness Month 2022, Eclypses shared daily tips to raise awareness about digital security and empower people to protect their dat...
This article was previously published in Cybersecurity Trends, authored by Joe Jeanjaquet, Eclypses Sr. Director of Applied Technology The destruction cyber-attac...
Cybersecurity Awareness Month is celebrating its 19th year, as it continues to make a large impact on the cybersecurity community and is co-led by the National Cybe...
A relay attack is a form of hacking technique related to replay attacks and man-in-the-middle attacks. A relay attack involves the interception of information with ...
With RPKI vulnerable and new mandates coming in, it’s time to put protections in place to secure your company data. RPKI (Resource Public Key Infrastructur...
An Interview with Dan Lemoine on how Eclypses MTE technology keeps your data protected and keeps your organization ahead of regulatory changes in your industry. Re...
Judson Stone, Sr. Global Sales Director at Eclypses, Joe Jeanjaquet, Sr. Director of Applied Technologies at Eclypses, and David Gomes, Chief Operating Officer at E...
Bryan Champagne of Eclypses, Jose Luis Delgado of Consultec-TI Corp., and moderator Juan Carlos Paris discuss MTE Technology and its uses during the joint Eclypses ...
Bryan Champagne of Eclypses, Jose Luis Delgado of Consultec-TI Corp., and moderator Juan Carlos Paris discuss the history of MTE Technology and data protection at t...
Bryan Champagne of Eclypses, Jose Luis Delgado of Consultec Ti, and moderator Juan Carlos Paris discuss MTE Technology and its uses during the joint Eclypses and Co...
With the widespread adoption of mobile devices, the workforce relies heavily on mobile technologies to complete important tasks throughout the day. The mobile appli...
Why application-level security tools are essential to the modern development lifecycle In the past, the roles of development, operations, and security were isolated...
Eclypses released an update for their MTE technology bringing IoT customers a smaller library size and improved performance. October 3, 2022 – Eclypses...
New and emerging technologies will drive digital transformation across most industries, will your company be ready? We have gathered data from industry experts to...
IoT for All shared an article written by Senet’s Ken Lynch on the impact of LoRaWAN on water utilities and other critical infrastructure sectors as a way to ...
MTE Web utiliza la tecnología MTE para proteger campos individuales de datos confidenciales en una página web, para cuando no se puede tolerar la exposición. El ...
DUKPT stands for “Derived Unique Key Per Transmission” and is a method for managing encryption keys between two parties. DUKPT offers a way of generatin...
On August 22, 2022, the HIPAA Journal released updated statistics on the number of data breaches in the Healthcare industry across the past twelve months. This repo...
When thinking about hacking, we often imagine the practice as complex and sophisticated, right? Yet one of the most successful cyberattacks today is so easy that yo...
Quantum computing opens up a world of new possibilities, however, the ramifications of this new tech will include threats to current cryptographic standards. The U....
What Happened? While investigating an attempted business email compromise attack for a large business, cloud incident response vendor Mitiga found that bad actors h...
Lloyd’s of London is an insurance and reinsurance market located in London, United Kingdom, providing specialist insurance services to companies in over 200 count...
Just about everyone uses a smartphone today – for entertainment, sending messages, taking pictures, storing information, sending money, and of course, talking on ...
What Happened? According to TechSpot, a security researcher and blogger claimed that all VPNs on iOS are broken. Researcher Michael Horowitz and ProtonVPN believe...
MTE Mobile utiliza la tecnología Eclypses MTE para proteger sus datos confidenciales a nivel de aplicación antes de que lleguen al sistema operativo. El kit de he...
What Happened? Apple released an emergency security update on August 17, 2022, according to a report released by Bleeping Computer. The updates released by Apple ...
What Happened? On August 16, 2022, Google pushed out patches for the Chrome browser for desktops to contain an actively exploited high-severity zero-day flaw in the...
Eclypses has partnered with Beasy to change how people view the security standards in the crypto market. With the number of cyberattacks on the blockchain steadily ...
This summer, Eclypses partnered with Pikes Peak Business & Education Alliance (PPBEA) to host six summer interns in the areas of Business Intelligence & Ana...
Conozca cómo funciona la tecnología MTE por separado y junto con otros tipos de seguridad para brindar protección de datos integral en este video de analogía de...
In a report released on August 4, 2022, the Health Sector Cybersecurity Coordination Center (HC3) highlighted the many security risks faced by the IoT market today ...
The Unknown Threats to Your Data According to BleepingComputer, “Twitter has confirmed a recent data breach was caused by a now-patched zero-day vulnerability u...
Intertrust Technologies is a Silicon Valley-based software company specializing in trusted computing products and services. Intertrust’s 2021 State of Mobile Fina...
On May 24, 2022, CyberNews released their top picks for the best data protection solutions on the market, and Eclypses’ MTE Technology made the list. The Cybe...
Aron Seader, Eclypses Senior Director of Core Engineering, was recently featured as a guest on the Privacy Pros Podcast, Episode 34: “How To Secure Your Data ...
Senet, Inc., a leading provider of cloud-based software and services platforms that enable global connectivity and on-demand network build-outs for the Internet of ...
What happened? The Harmony blockchain is a well-known trading platform where users can buy, sell, trade, and move cryptocurrencies throughout a variety of differe...
Eclypses announced their partnership with Apexa iQ to bring Eclypses MTE® technology to the Apexa iQ platform. The Apexa iQ platform discovers your entire IT estat...
According to a report by BleepingComputer, in March of 2022 researchers at Confiant uncovered an operation that uses trojanized mobile cryptocurrency wallet applica...
Eclypses has partnered with DataSetGo LLC., an enterprise-level solution partner in the payroll processing industry. DataSetGo recognized the need for the latest se...
BleepingComputer reported on May 22, 2022, that Google’s Threat Analysis Group (TAG) has found that state backed threat actors have utilized five zero-day vulnera...
Cyber security in Latin America is strengthened with Eclypses’ disruptive technologies, deployed in the region by Consultec. Eclypses’ patented MTE tec...
Eclypses announced that they have been named the winner for “Best Cyber-Security Solution” in the 2022 FTF News Technology Innovation Awards for their MTE Techn...
We’ve gathered the following information from a video interview with Joe Jeanjaquet, Senior Director of Applied Technologies at Eclypses. What is a zero-day a...
What happened? WonderHero is a popular blockchain NFT (non-fungible token) game where players earn revenue in cryptocurrencies and NFTs through gameplay. Accordin...
In this interview with Eclypses Senior Director of Applied Technologies, Joe Jeanjaquet, he discusses the vulnerabilities of zero-day attacks and what is making the...
The latest crypto hack may be the largest yet, according to a recent CoinDesk article. What happened? It was reported that approximately $625 million worth of cry...
The healthcare sector has always been an appealing target for cyber criminals, as it stores and transfers sensitive information such as patient records and medical ...
According to Yahoo News, millions of customers who rely on the popular money-transferring app Zelle were scammed. It was reported that scammers are using the Zelle ...
UPDATE JULY 2022 As of July 11, 2022, BleepingComputer has reported that a team of security researchers has found that several modern Honda car models are vulnerabl...
What Happened? Two large cryptocurrency trading platforms had their repository of user private keys breached. Once private keys were hacked by cyber criminals, they...
As the global climate and technological landscape continue to grow and change rapidly, it is more important than ever before to be prepared for a cyber attack. Cybe...
Breaches in online sports betting have always been a substantial issue in the gambling industry. The online gambling industry has become extremely lucrative in the ...
Our CEO Bryan Champagne recently spoke with CyberNews to talk about the most serious threats surrounding mobile applications today, tips on how organizations can pr...
Eclypses has been short-listed in the 2022 Financial Technologies Forum (FTF) News Technology Innovation Awards for Best Cyber Security Solution, cast your vote her...
In mid-February, Google announced a privacy change that will cut tracking across apps on Android devices. The technological powerhouse will develop new, privacy-f...
Learn how MTE Technology works both separately and alongside other types of security to provide end-to-end data protection in this Bank Analogy video....
Current memory storage security leaves sensitive data, such as a username or password, visible while your applications are running. Learn How Eclypses MTE Technolog...
Relying on Operating System level security to protect data leaves large holes for bad actors to use to gain access to your information. Learn how moving security ba...
How do attackers get access to a username and password data? Eclypses MTE Technology is different than any other security solution because it has the ability to be ...
Cyber risks are hardly infrequent, but there is an alarming number of risks in the world of mobile applications – especially those in the financial services secto...
As multi-factor authentication (MFA) becomes a mandatory security practice, especially for almost all cyber insurance policies, cyber criminals are seeking new ways...
This article was previously published in Cybersecurity Trends, authored by Aron Seader, Eclypses Sr. Director of Core Engineering Society has already benefited from...
Eclypses has recently announced their partnership with WILLPORTtrust, a micro-estate manager that utilizes blockchain technology and allows users to set up an “af...
President Joe Biden recently signed a National Security Memorandum (NSM) to improve the cybersecurity of National Security, Department of Defense (DoD), and Intelli...
The National Cybersecurity Alliance hosts Data Privacy Week to help spread awareness about online privacy and provide education on how to manage their personal info...
According to data from IBM, the total number of cyber attacks in 2021 went up by 27% compared to 2020. The cost of cyber attacks within companies and organizations ...
Apple’s website shows you the many ways apps use the privacy permissions you have allowed them. “With iOS 15.2 and iPadOS 15.2, users can turn on the Ap...
As we embark on the new year, the Eclypses team has come up with a few predictions for 2022 based on what came from 2021. We’re talking about zero-day attacks...
According to TechJury, 300,000 new pieces of malware are created daily, ranging from viruses, adware, Trojans, keyloggers, etc. all with the same goal – to steal...
What is happening? Cyber criminals have found a number of effective ways to get around your 2FA (two-factor authentication) protections – and they’re using thes...
Your data is being shoplifted. While ransomware attacks dominate news headlines, a patient/organized enemy is reaping the rewards one vulnerability at a time. These...
Cyber regulations are here, how are you reducing your risk? Cybersecurity continues to be at the forefront of this year’s business concerns. With the expansion of...
We interviewed cybersecurity expert, Scott Foote to learn more about mobile application threats today and what mobile developers should know to enhance their mobile...
Looking ahead to 2022, Eclypses anticipates a rise in mobile application cyber attacks. Eclypses, a leader in end-point data protection, concludes 2021 with new cus...
A brute force attack may seem simple, but it has been effective for a long time. In fact, recent news indicates that state actors have developed much faster computi...
We sat down with cybersecurity expert, Scott Foote to learn more about mobile application threats today and what mobile developers should know to enhance their mobi...
Eclypses’ Faye Danis sat down with cybersecurity expert, Scott Foote to learn more about the impacts of a weak mobile application security strategy. Scott Foote h...
Voatz is a mobile election voting application. Their mission is to “make voting not only more accessible and secure but also more transparent, auditable and accou...
Archethought faced tough choices after learning their IoT components were vulnerable to hackers. Despite their components having newer encryption software, it was l...
In this clip from the Cybersecurity Awareness Month webinar hosted by Eclypses and Voatz, Bryan Champagne, CEO of Eclypses, offers his insight on if our fear of and...
In this clip from the Cybersecurity Awareness Month webinar hosted by Eclypses and Voatz, Bryan Champagne, CEO of Eclypses, explains what people are getting wrong w...
In this clip from the Cybersecurity Awareness Month webinar hosted by Eclypses and Voatz, Bryan Champagne, CEO of Eclypses, discusses new mobile application threats...
Meet the companies and the technology leaders who keep some of our most high-stakes applications safe. It takes the collaboration of several companies to ensure tha...
We talked with cybersecurity expert, Scott Foote to learn more about the risks of 5G on devices and what we need to look out for. Scott Foote has over 30 years of c...
We interviewed cybersecurity expert, Scott Foote to learn about his opinion on Eclypses’ MTE technology. Scott Foote has over 30 years of cybersecurity leadership...
This article was previously published in Cybersecurity Trends, authored by David Schoenberger, Eclypses Chief Innovation Officer In the cybersecurity world, securit...
Using TLS + MTE = full resiliency! As many know, TLS has areas of vulnerability, but paired with our MTE technology you’ll eliminate those vulnerabilities. TLS an...
Critical infrastructure in the United States – pipelines, electrical grids, election systems, among others – are at constant risk from hackers all over ...
With the creation of faster, more powerful computers and technology has come a steadily increasing number of cyber and ransomware attacks. Now more than ever, compa...
We sat down with Aron Seader, Eclypses Senior Director of Core Engineering to learn more about his technical background, his thoughts on how MTE technology will hel...
We sat down with Joe Jeanjaquet, Eclypses Senior Director of Applied Technologies to learn more about his technical background and his thoughts on why MTE technolog...
With recent front-page news about the cyber-hack of the Colonial Pipeline, JBS USA and agencies of the federal government, data security is on everyone’s mind. In...
Eclypses has partnered with Coforge, a leading global IT solutions organization that enables its clients to transform at the intersect of unparalleled domain expert...
As of May 12, 2021, President Biden has signed an Executive Order to strengthen cybersecurity defenses across the United States. With the recent Colonial Pipeline a...
MTE Web uses MTE technology to protect individual fields of sensitive data on a webpage, for when exposure cannot be tolerated. The MTE Web toolkit is a solution th...
MTE Mobile uses Eclypses MTE technology to protect your sensitive data at the application level before it hits the operating system. The MTE Mobile toolkit is a sol...
Eclypses’ MTE Connect delivers security that meets the needs for highly scalable, low-power, widely dispersed endpoints for all IoT environments by using MTE ...
What is MTE Technology? Standard encryption schemes leave your most sensitive data at risk. The MTE technology eliminates that risk by replacing valuable data with ...
There are two types of businesses out there: those that have experienced a cyber attack and those that will. Mobile and web security have increased significantly ov...
A conversation about mobile application security in a democracy has become especially important amid evolving threats and unprecedented expansion of the surface of ...
Eclypses CIO David Schoenberger and Voatz CEO Nimit Sawhney discuss mobile application security in democracy and how to prepare for threats as we expand the use of ...
An Interview with Eclypses Chief Innovation Officer, David Schoenberger The United States Federal Government passed the first IoT security legislation. This bans fe...
Eclypses has recently partnered with ACEIS Electric and Power to add MTE technology into ACEIS’ current systems to provide a more secure solution to their clien...
Eclypses has partnered with Voatz, a leading mobile voting platform provider to pilot its “Quantum Resistant” security solution in upcoming elections. Voatz mad...
Internet of Things (IoT) devices use wireless sensor software to facilitate the automatic transfer of data from low-powered hubs to analytic engines. With the conti...
Watch an overview of how Archethought utilizes the Eclypses’ MTE technology, with Archethought CEO Dixon Dick. Learn how the MTE technology was the answer for...