Managing encryption keys in Azure Key Vault, Azure Storage, or Azure API Management introduces security, complexity, and operational costs. Eclypses MicroToken Exch...
Kubernetes (K8s) is the go-to platform for containerized applications, but it introduces significant security risks—especially when sensitive data, API communicat...
A technology-driven company in software, AI, fintech, biotech, or engineering relies on intellectual property (IP) to maintain its competitive advantage. However, I...
Secure File Transfer Protocol (SFTP) has been the standard for securely transferring files between systems, but it comes with significant limitations. Unlike SFTP, ...
C-level executives are facing unprecedented challenges as cyber insurance premiums soar. Rising threats, regulatory demands, and the high cost of data breaches have...
A global leader in smart manufacturing, TechForge operates a network of interconnected machines, IoT devices, and industrial control systems (ICS) across its factor...
Eclypses MTE delivers superior data security by preventing breaches at the application layer, reducing insurance costs, and future-proofing organizations against qu...
A growing financial services company faced increasing risks from identity theft, session hijacking, and unauthorized access. As their business expanded, the company...
MediTrust, a regional healthcare provider, falls victim to a ransomware attack via a compromised third-party electronic health record (EHR) integration. Traditional...
FinTrust, a fintech company, suffers a ransomware attack via a compromised third-party API in its payment processing system. Unlike traditional encryption, which st...
A leading financial institution uses an AI-driven fraud detection system to analyze millions of transactions daily, identifying suspicious activities in real time. ...
A regional healthcare provider managing electronic health records (EHRs), telemedicine services, and patient portals faces increasing cybersecurity risks and regula...
In today’s environment, management of proper application authentication, authorization, and identification is a tedious task that can often be overlooked or negle...
In the ever-evolving landscape of cybersecurity, the need for quantum-resistant encryption has never been more critical. One of the most promising solutions in this...
In the relentless pursuit of cybersecurity excellence, Eclypses has emerged victorious in a pen test, showcasing an unparalleled resilience against adversarial forc...
Learn about the easy 3 minute deployment process of Eclypses MTE API Relay on AKS (Azure Kubernetes Service). Discover the unique characteristics that establish the...
Written By: Weiyee In, CIO Protego Trust Bank Jim Skidmore, CISSP, PgMP, VP intiGrow Adam McElroy, Eclypses Principal Architect (Special Thanks to Brandon Miller, J...
Eclypses recently announced their continued partnership with Archethought, a smart technology company focused on environment sensing while reducing urban noise poll...
Written by Champion and Author Weiyee In, Chief Information Officer, Protego Trust Bank Executive Summary This white paper examines some of the key differences betw...
Executive Summary Large Automotive Association needed enhanced security to match rising interconnectivity trends. As cars continue to develop more computer functio...
Executive Summary Liveplex partners with a group of large global commercial and investment banks to transform the digital banking experience. By combining innovati...
Executive Summary One of Africa’s largest digital banks, with over $26 billion in assets, aimed to revolutionize personalized banking services for its rapidl...
Executive Summary WILLPORT Trust set out to migrate their existing web applications to Amazon Web Services (AWS) for its advanced infrastructure and security featu...
Written by Champion and Author Weiyee In, Chief Information Officer, Protego Trust Bank Abstract This white paper examines the critical role of cryptographic teleme...
In this video, we dive into a technology demo of the MTE Relay Server and MTE API Relay, now available on the AWS Marketplace. Discover how these cutting-edge solut...
Protect your organization’s critical credentials and prevent unauthorized access with Eclypses MTE. Download our use case to learn how this advanced solution secu...
Strengthen your data governance strategy and protect your most valuable asset—your data. Download our use case to discover how Eclypses MTE can help you set robus...
Unlock cost savings while enhancing your data security with Eclypses MTE. Download our use case to discover how you can optimize technology expenses, eliminate unne...
Protect your business and your customers by safeguarding Personally Identifiable Information (PII). Download our use case to learn how Eclypses MTE technology can h...
Enhance your AI security strategy and protect your data from sophisticated threats. Download our detailed use case to discover how Eclypses MTE technology can shiel...
Protect your business from potential threats by mastering the essentials of API security. Read our use case to learn how to safeguard your APIs and keep your data s...
Introduction When the need arises to securely use remote devices such as Mobile Robots or Drones, certain vulnerabilities that are essential to secure operation mus...
Boston, Mass., July 10, 2024 – Eclypses, a provider of data protection solutions, today announced that EclypsesSecure MTE® is now available in AWS Marketplace, a...
We are proud to have been named an HFS OneEcosystem Hot Vendor for 2024. Read the full HFS Hot Vendor Report to learn more!...
In a galaxy not-so-far away… Eclypses is thrilled to announce sponsorship of the highly anticipated After Party for AWS Summit New York: Cloud Wars VI: Return of ...
National Institute of Standards and Technology Validation of Eclypses Secure MTE Technology Provides Data Security in a Zero Trust Global Economy Eclypses, a leader...
Eclypses, a leading innovator in data security, has been nominated for the esteemed FTF News Award for Best Compliance Solution 2024. This recognition underscores ...
When implementing cybersecurity, it’s crucial to create a strategy that protects everything from your personal information to the systems that run your business. ...
The rapid adoption of AI technologies in various industries has opened new frontiers in innovation but has also introduced security concerns. AI-driven attacks, whi...
The Cloud-Centric Dilemma: A Data Revolution Beckons In the rapidly evolving digital landscape, businesses are encountering a pivotal dilemma: Are traditional data ...
Eclypses, Inc., a trailblazer in data security innovation, proudly announces the release of Secure MTE 4.0, a cutting-edge update introducing exciting features to e...
Protecting sensitive information is vital in today’s connected world. With the rise of data breaches and cyber threats, utilizing a proactive data security so...
Dive into the intricate landscape of data breaches in 2023 with this comprehensive overview sourced from Varonis, unraveling key insights and alarming trends. From ...
In the digital age, where information is a valuable asset, protecting an organization’s data is not just a best practice, but a fundamental necessity. The imp...
What happened? One of the largest gambling firms, MGM Resorts International, announced that in October 2023 they had been forced to shut down their systems after a ...
Quantum computer attacks could soon jeopardize the digital world, putting your online security, privacy and data at risk. As it stands, quantum-resistant security i...
Ensuring the security of sensitive information has become paramount. As cyber threats continue to evolve every day, the need for robust data security technology has...
Eclypses, the developer behind the cutting-edge application data security solution, MTE technology, has appointed David Gomes as Chief Executive Officer (CEO) as of...
Cybersecurity Awareness Month was created in 2004 as a collaborative effort between government and cyber security industry to ensure every American has the resource...
Machine learning (ML) is becoming one of the most vital assets for data security. Threat actors innovate daily, compromising data stores with greater frequency and ...
Where our everyday lives are increasingly intertwined with technology, the healthcare industry is a critical pillar of our society. As healthcare providers continue...
We are thrilled to welcome four exceptional individuals to our esteemed advisory team. These seasoned experts bring a wealth of knowledge, diverse backgrounds, and ...
Two new emerging threats have surfaced named HTTPSnoop and PipeSnoop, which are being used in cyberattacks on telecommunication service providers in the Middle East...
Safeguarding sensitive healthcare data is now more critical than ever. Watch this webinar featuring industry experts, Jefferson Dance, Chief Innovation Officer at E...
In today’s digital landscape, the cloud offers unparalleled advantages. However, as organizations embrace cloud technology, they face new challenges in data s...
Eclypses has been featured as a Top Cybersecurity Company in Colorado from DesignRush. DesignRush’s expert analysts list Colorado’s top-rated cybersecur...
People and businesses rely on technology every day. However, with these modern innovations also comes risk. Cyberattacks pose a massive threat to organizations. It ...
Liveplex, a prominent technology firm at the forefront of the next-generation internet revolution, announces another milestone in its strategic partnership with Ecl...
With MTE technology embedded into their platform, financial organizations can offer complete end-to-end data protection for all their clients. First Rate, Inc., a g...
Check out this interview between WriteForMe Podcast “Business Ninja” Kelsey and Bryan Champagne that explores MTE Technology and the importance of Inte...
Eclypses offers a robust solution to enhance data security in the healthcare setting. In today’s digital era, data security is paramount, particularly for ...
Learn about the exciting partnership between Apexa iQ and Eclypses in this interview video between Apexa CEO, Lokesh Aggarwal and Bryan Champagne. Our collaboration...
With MTE technology embedded into their platform, Apexa iQ offers complete end-to-end data protection for all clients. Apexa iQ, a SaaS platform that gives visibili...
Apexa iQ, a SaaS platform that gives visibility into the hygiene of your entire IT environment on a single dashboard, announced their most recent data security inte...
Cybersecurity is in a constant state of evolution, adapting to new technological advancements while cybercriminals seize new opportunities. In order to keep up with...
In an era of widespread connectivity and increasing cybersecurity threats, endpoint verification has become paramount for safeguarding networks. It involves the pro...
Recognized for its next-generation data security solution, Eclypses is thrilled to announce that it has been named the winner of the reputable “Best Security ...
Web applications have become an integral part of our daily lives, offering convenience, accessibility, and efficiency. However, the increasing reliance on web appli...
Mobile applications have become an essential part of our daily lives, allowing us to access information, connect with others, and perform a wide range of tasks on-t...
With today’s advancing technology comes drastic increases in cyber-attacks across all industries. In the IoT space, industries continue to grow and become more vu...
With a vast majority of the population using mobile phones on a daily basis and relying heavily on them, it would be devastating for a hacker to gain access to thes...
Utilizing Eclypses MTE technology, WholesalePayroll has obfuscated and safeguarded all data exchanged between persons over its platform. Read our full case study be...
A featured article by Aron Seader from Eclypses in Top Cyber News Magazine on what to know about SIM swapping and cloning attacks. Click here to read the full artic...
Eclypses has been short-listed for the 2023 Financial Technologies Forum (FTF) News Technology Innovation Awards for Best Security Solution, cast your vote here bef...
What is RSA? RSA is a cryptography that continues to be prevalent in many technologies and products. RSA is a public-key mechanism for orchestrating secure data t...
The Zero Trust Architecture (ZTA) is a strategy for completely protecting computer infrastructure and systems. In June 2021, the Cybersecurity and Infrastructure Se...
Implementing cybersecurity software can help protect a business from cyber-attacks, data breaches, and other security threats. However, the process of implementing ...
On March 2, 2023, the Biden-Harris Administration announced the new National Cybersecurity Strategy. This strategy is to “secure the full benefits of a safe a...
How to Create a Strategic Approach when Implementing Data Protection Technology In the data protection industry, successful software implementations are crucial f...
WholesalePayroll Hired Independent Third-Party Threat Penetration Team to Test the MTE Secured Platform WholesalePayroll, a payroll software product, has successf...
Whoever said that efficiency is maximized through simplicity needed to be more familiar with microservices. Compared to the monolithic applications of the past, mic...
What Happened? According to a report published on Naked Security by Sophos, Apple has released an urgent security update for all devices running the latest Apple ...
Since the amount of data circulating is increasing rapidly, businesses need to be aware of the existing and emerging data privacy laws state and federal governments...
Liveplex moves into the new year to deliver new Web 3.0 capabilities combined with a disruptive data protection solution to protect their customer’s most sensitiv...
What keeps business executives up at night? This question comes up more often now than ever before in the cybersecurity landscape. As we see cybercrime continually ...
T-Mobile January 2023 Hack On January 19th, 2023 T-Mobile disclosed a new data breach when a bad actor stole the personal information of 37 million customer accou...
The National Cybersecurity Alliance is hosting Data Privacy Week as a way to spread awareness about the importance of online privacy and data security across all...
According to BleepingComputer, PayPal sent out data breach notifications to thousands of their users who had their accounts breached through a large-scale credentia...
According to Gov Info Security, a security incident at CircleCI may have resulted in attackers gaining access to their customer’s code development environment...
Why should you be concerned about quantum computing? Quantum computing is a different technology than what we use today, which is known as classical computing. It i...
United States President Joe Biden signed the “Quantum Computing Preparedness Act” on December 21, 2022, issued by The White House. This act, named H.R. 7535, wo...
The Cyber Express recently published an article, Why Weak Mobile App Security Will Impact Retailers in 2023. Mobile devices have certainly made it more convenient...
Cybersecurity is a continually evolving field. As new tech trends emerge, cybercriminals shift to take advantage of new opportunities. Security must likewise adapt ...
In a recent DARKreading article, “3 xIoT Attacks Companies Aren’t Prepared for” they highlight why it is important to pay attention to the securit...
Discover security that protects your (and your customers) most sensitive asset – your data! Eclypses MTE® Technology was developed to be the most innovative ...
PTC Partner Eclypses, Inc. Offers New PTC Marketplace Solution, MTE Technology Enabling ThingWorx Users to Provide Security to Data-in-Transit Eclypses, Inc. announ...
As we continue in Infrastructure Security Month, we’re sharing a recent report from the U.S. Government Accountability Office (GAO), which highlights that a c...
Infrastructure Security Month increases awareness about one of the most influential aspects of everyone’s daily lives. So much of the world relies upon infrastruc...
IoT for All shared an article by Senet’s Ken Lynch on why managing IoT security risks in utility infrastructure is essential for defeating emerging threats. The a...
It’s a full-time job keeping up with digital threats, including phishing, ransomware and denial-of-service attacks. Since their usage is so versatile and clever, ...
In honor of October Cybersecurity Awareness Month 2022, Eclypses shared daily tips to raise awareness about digital security and empower people to protect their dat...
This article was previously published in Cybersecurity Trends, authored by Joe Jeanjaquet, Eclypses Sr. Director of Applied Technology The destruction cyber-attac...
Cybersecurity Awareness Month is celebrating its 19th year, as it continues to make a large impact on the cybersecurity community and is co-led by the National Cybe...
A relay attack is a form of hacking technique related to replay attacks and man-in-the-middle attacks. A relay attack involves the interception of information with ...
With RPKI vulnerable and new mandates coming in, it’s time to put protections in place to secure your company data. RPKI (Resource Public Key Infrastructur...
An Interview with Dan Lemoine on how Eclypses MTE technology keeps your data protected and keeps your organization ahead of regulatory changes in your industry. Re...
Judson Stone, Sr. Global Sales Director at Eclypses, Joe Jeanjaquet, Sr. Director of Applied Technologies at Eclypses, and David Gomes, Chief Operating Officer at E...
Bryan Champagne of Eclypses, Jose Luis Delgado of Consultec-TI Corp., and moderator Juan Carlos Paris discuss MTE Technology and its uses during the joint Eclypses ...
Bryan Champagne of Eclypses, Jose Luis Delgado of Consultec-TI Corp., and moderator Juan Carlos Paris discuss the history of MTE Technology and data protection at t...
Bryan Champagne of Eclypses, Jose Luis Delgado of Consultec Ti, and moderator Juan Carlos Paris discuss MTE Technology and its uses during the joint Eclypses and Co...
With the widespread adoption of mobile devices, the workforce relies heavily on mobile technologies to complete important tasks throughout the day. The mobile appli...
Why application-level security tools are essential to the modern development lifecycle In the past, the roles of development, operations, and security were isolated...
Eclypses released an update for their MTE technology bringing IoT customers a smaller library size and improved performance. October 3, 2022 – Eclypses...
New and emerging technologies will drive digital transformation across most industries, will your company be ready? We have gathered data from industry experts to...
IoT for All shared an article written by Senet’s Ken Lynch on the impact of LoRaWAN on water utilities and other critical infrastructure sectors as a way to ...
DUKPT stands for “Derived Unique Key Per Transmission” and is a method for managing encryption keys between two parties. DUKPT offers a way of generatin...
On August 22, 2022, the HIPAA Journal released updated statistics on the number of data breaches in the Healthcare industry across the past twelve months. This repo...
When thinking about hacking, we often imagine the practice as complex and sophisticated, right? Yet one of the most successful cyberattacks today is so easy that yo...
Quantum computing opens up a world of new possibilities, however, the ramifications of this new tech will include threats to current cryptographic standards. The U....
What Happened? While investigating an attempted business email compromise attack for a large business, cloud incident response vendor Mitiga found that bad actors h...
Lloyd’s of London is an insurance and reinsurance market located in London, United Kingdom, providing specialist insurance services to companies in over 200 count...
Just about everyone uses a smartphone today – for entertainment, sending messages, taking pictures, storing information, sending money, and of course, talking on ...
What Happened? According to TechSpot, a security researcher and blogger claimed that all VPNs on iOS are broken. Researcher Michael Horowitz and ProtonVPN believe...
MTE Mobile utiliza la tecnología Eclypses MTE para proteger sus datos confidenciales a nivel de aplicación antes de que lleguen al sistema operativo. El kit de he...
What Happened? Apple released an emergency security update on August 17, 2022, according to a report released by Bleeping Computer. The updates released by Apple ...
What Happened? On August 16, 2022, Google pushed out patches for the Chrome browser for desktops to contain an actively exploited high-severity zero-day flaw in the...
Eclypses has partnered with Beasy to change how people view the security standards in the crypto market. With the number of cyberattacks on the blockchain steadily ...
This summer, Eclypses partnered with Pikes Peak Business & Education Alliance (PPBEA) to host six summer interns in the areas of Business Intelligence & Ana...
Conozca cómo funciona la tecnología MTE por separado y junto con otros tipos de seguridad para brindar protección de datos integral en este video de analogía de...
In a report released on August 4, 2022, the Health Sector Cybersecurity Coordination Center (HC3) highlighted the many security risks faced by the IoT market today ...
The Unknown Threats to Your Data According to BleepingComputer, “Twitter has confirmed a recent data breach was caused by a now-patched zero-day vulnerability u...
Intertrust Technologies is a Silicon Valley-based software company specializing in trusted computing products and services. Intertrust’s 2021 State of Mobile Fina...
On May 24, 2022, CyberNews released their top picks for the best data protection solutions on the market, and Eclypses’ MTE Technology made the list. The Cybe...
Aron Seader, Eclypses Senior Director of Core Engineering, was recently featured as a guest on the Privacy Pros Podcast, Episode 34: “How To Secure Your Data ...
Senet, Inc., a leading provider of cloud-based software and services platforms that enable global connectivity and on-demand network build-outs for the Internet of ...
What happened? The Harmony blockchain is a well-known trading platform where users can buy, sell, trade, and move cryptocurrencies throughout a variety of differe...
Eclypses announced their partnership with Apexa iQ to bring Eclypses MTE® technology to the Apexa iQ platform. The Apexa iQ platform discovers your entire IT estat...
According to a report by BleepingComputer, in March of 2022 researchers at Confiant uncovered an operation that uses trojanized mobile cryptocurrency wallet applica...
BleepingComputer reported on May 22, 2022, that Google’s Threat Analysis Group (TAG) has found that state backed threat actors have utilized five zero-day vulnera...
Cyber security in Latin America is strengthened with Eclypses’ disruptive technologies, deployed in the region by Consultec. Eclypses’ patented MTE tec...
Eclypses announced that they have been named the winner for “Best Cyber-Security Solution” in the 2022 FTF News Technology Innovation Awards for their MTE Techn...
We’ve gathered the following information from a video interview with Joe Jeanjaquet, Senior Director of Applied Technologies at Eclypses. What is a zero-day a...
What happened? WonderHero is a popular blockchain NFT (non-fungible token) game where players earn revenue in cryptocurrencies and NFTs through gameplay. Accordin...
In this interview with Eclypses Senior Director of Applied Technologies, Joe Jeanjaquet, he discusses the vulnerabilities of zero-day attacks and what is making the...
The latest crypto hack may be the largest yet, according to a recent CoinDesk article. What happened? It was reported that approximately $625 million worth of cry...
The healthcare sector has always been an appealing target for cyber criminals, as it stores and transfers sensitive information such as patient records and medical ...
According to Yahoo News, millions of customers who rely on the popular money-transferring app Zelle were scammed. It was reported that scammers are using the Zelle ...
UPDATE JULY 2022 As of July 11, 2022, BleepingComputer has reported that a team of security researchers has found that several modern Honda car models are vulnerabl...
What Happened? Two large cryptocurrency trading platforms had their repository of user private keys breached. Once private keys were hacked by cyber criminals, they...
As the global climate and technological landscape continue to grow and change rapidly, it is more important than ever before to be prepared for a cyber attack. Cybe...
Breaches in online sports betting have always been a substantial issue in the gambling industry. The online gambling industry has become extremely lucrative in the ...
Our CEO Bryan Champagne recently spoke with CyberNews to talk about the most serious threats surrounding mobile applications today, tips on how organizations can pr...
Eclypses has been short-listed in the 2022 Financial Technologies Forum (FTF) News Technology Innovation Awards for Best Cyber Security Solution, cast your vote her...
In mid-February, Google announced a privacy change that will cut tracking across apps on Android devices. The technological powerhouse will develop new, privacy-f...
Learn how MTE Technology works both separately and alongside other types of security to provide end-to-end data protection in this Bank Analogy video....
Current memory storage security leaves sensitive data, such as a username or password, visible while your applications are running. Learn How Eclypses MTE Technolog...
Relying on Operating System level security to protect data leaves large holes for bad actors to use to gain access to your information. Learn how moving security ba...
How do attackers get access to a username and password data? Eclypses MTE Technology is different than any other security solution because it has the ability to be ...
Cyber risks are hardly infrequent, but there is an alarming number of risks in the world of mobile applications – especially those in the financial services secto...
As multi-factor authentication (MFA) becomes a mandatory security practice, especially for almost all cyber insurance policies, cyber criminals are seeking new ways...
This article was previously published in Cybersecurity Trends, authored by Aron Seader, Eclypses Sr. Director of Core Engineering Society has already benefited from...
President Joe Biden recently signed a National Security Memorandum (NSM) to improve the cybersecurity of National Security, Department of Defense (DoD), and Intelli...
The National Cybersecurity Alliance hosts Data Privacy Week to help spread awareness about online privacy and provide education on how to manage their personal info...
According to data from IBM, the total number of cyber attacks in 2021 went up by 27% compared to 2020. The cost of cyber attacks within companies and organizations ...
Apple’s website shows you the many ways apps use the privacy permissions you have allowed them. “With iOS 15.2 and iPadOS 15.2, users can turn on the Ap...
As we embark on the new year, the Eclypses team has come up with a few predictions for 2022 based on what came from 2021. We’re talking about zero-day attacks...
According to TechJury, 300,000 new pieces of malware are created daily, ranging from viruses, adware, Trojans, keyloggers, etc. all with the same goal – to steal...
What is happening? Cyber criminals have found a number of effective ways to get around your 2FA (two-factor authentication) protections – and they’re using thes...
Your data is being shoplifted. While ransomware attacks dominate news headlines, a patient/organized enemy is reaping the rewards one vulnerability at a time. These...
Cyber regulations are here, how are you reducing your risk? Cybersecurity continues to be at the forefront of this year’s business concerns. With the expansion of...
We interviewed cybersecurity expert, Scott Foote to learn more about mobile application threats today and what mobile developers should know to enhance their mobile...
Looking ahead to 2022, Eclypses anticipates a rise in mobile application cyber attacks. Eclypses, a leader in end-point data protection, concludes 2021 with new cus...
A brute force attack may seem simple, but it has been effective for a long time. In fact, recent news indicates that state actors have developed much faster computi...
We sat down with cybersecurity expert, Scott Foote to learn more about mobile application threats today and what mobile developers should know to enhance their mobi...
Eclypses’ Faye Danis sat down with cybersecurity expert, Scott Foote to learn more about the impacts of a weak mobile application security strategy. Scott Foote h...
Voatz is a mobile election voting application. Their mission is to “make voting not only more accessible and secure but also more transparent, auditable and accou...
Archethought faced tough choices after learning their IoT components were vulnerable to hackers. Despite their components having newer encryption software, it was l...
In this clip from the Cybersecurity Awareness Month webinar hosted by Eclypses and Voatz, Bryan Champagne, CEO of Eclypses, offers his insight on if our fear of and...
In this clip from the Cybersecurity Awareness Month webinar hosted by Eclypses and Voatz, Bryan Champagne, CEO of Eclypses, explains what people are getting wrong w...
In this clip from the Cybersecurity Awareness Month webinar hosted by Eclypses and Voatz, Bryan Champagne, CEO of Eclypses, discusses new mobile application threats...
Meet the companies and the technology leaders who keep some of our most high-stakes applications safe. It takes the collaboration of several companies to ensure tha...
We talked with cybersecurity expert, Scott Foote to learn more about the risks of 5G on devices and what we need to look out for. Scott Foote has over 30 years of c...
We interviewed cybersecurity expert, Scott Foote to learn about his opinion on Eclypses’ MTE technology. Scott Foote has over 30 years of cybersecurity leadership...
This article was previously published in Cybersecurity Trends, authored by David Schoenberger, Eclypses Chief Innovation Officer In the cybersecurity world, securit...
Using TLS + MTE = full resiliency! As many know, TLS has areas of vulnerability, but paired with our MTE technology you’ll eliminate those vulnerabilities. TLS an...
Critical infrastructure in the United States – pipelines, electrical grids, election systems, among others – are at constant risk from hackers all over ...
With the creation of faster, more powerful computers and technology has come a steadily increasing number of cyber and ransomware attacks. Now more than ever, compa...
We sat down with Aron Seader, Eclypses Senior Director of Core Engineering to learn more about his technical background, his thoughts on how MTE technology will hel...
We sat down with Joe Jeanjaquet, Eclypses Senior Director of Applied Technologies to learn more about his technical background and his thoughts on why MTE technolog...
With recent front-page news about the cyber-hack of the Colonial Pipeline, JBS USA and agencies of the federal government, data security is on everyone’s mind. In...
Eclypses has partnered with Coforge, a leading global IT solutions organization that enables its clients to transform at the intersect of unparalleled domain expert...
As of May 12, 2021, President Biden has signed an Executive Order to strengthen cybersecurity defenses across the United States. With the recent Colonial Pipeline a...
MTE Web uses MTE technology to protect individual fields of sensitive data on a webpage, for when exposure cannot be tolerated. The MTE Web toolkit is a solution th...
MTE Mobile uses Eclypses MTE technology to protect your sensitive data at the application level before it hits the operating system. The MTE Mobile toolkit is a sol...
Eclypses’ MTE Connect delivers security that meets the needs for highly scalable, low-power, widely dispersed endpoints for all IoT environments by using MTE ...
What is MTE Technology? Standard encryption schemes leave your most sensitive data at risk. The MTE technology eliminates that risk by replacing valuable data with ...
There are two types of businesses out there: those that have experienced a cyber attack and those that will. Mobile and web security have increased significantly ov...
A conversation about mobile application security in a democracy has become especially important amid evolving threats and unprecedented expansion of the surface of ...
Eclypses CIO David Schoenberger and Voatz CEO Nimit Sawhney discuss mobile application security in democracy and how to prepare for threats as we expand the use of ...
An Interview with Eclypses Chief Innovation Officer, David Schoenberger The United States Federal Government passed the first IoT security legislation. This bans fe...
Eclypses has recently partnered with ACEIS Electric and Power to add MTE technology into ACEIS’ current systems to provide a more secure solution to their clien...
Eclypses has partnered with Voatz, a leading mobile voting platform provider to pilot its “Quantum Resistant” security solution in upcoming elections. Voatz mad...
Internet of Things (IoT) devices use wireless sensor software to facilitate the automatic transfer of data from low-powered hubs to analytic engines. With the conti...
Watch an overview of how Archethought utilizes the Eclypses’ MTE technology, with Archethought CEO Dixon Dick. Learn how the MTE technology was the answer for...