Partners - Support - Contact Us

Xceedium News Coverage


January 26, 2015

Lack of security in small companies means big risk for the enterprise
CSO’s David Geer explains how small businesses share their vulnerabilities with their larger customers, making it easy to access those networks. Xceedium’s Mo Rosen discusses why hackers use small business networks as a portal to larger, more lucrative targets, ways businesses can push back, and how privileged identity management can be implemented to mitigate risk.

Signal Magazine

January 13, 2015

U.S. Central Command Twitter Feed Hacked
Xceedium’s Ken Ammon questions password policies in place at U.S. CENTCOM, following the hack of the service’s Twitter and You Tube accounts by sympathizers of the Islamic State militant Group. As noted by Signal Magazine editor Sandra Jontz, the hack took place the same day President Obama delivered a speech on recent cybersecurity modifications to government regulations — timing that Ammon sees as purposeful.

Signal Magazine

January 1, 2015

Internet of Things Promises to Transform Life, But at What Cost?
Researchers predict between 26 billion and 100 billion devices will be connected to the Internet of Things by 2020, and Signal Magazine editor Sandra Jontz explores the resulting security implications in this cover story. Xceedium’s Ken Ammon provides a perspective on insider threats in this environment, and the broader risk privileged users can pose to the security of the massive amount of data that is being produced.

Government Security News

December 30, 2014

The Do’s and Don’ts of privileged user access control
Xceedium’s Ken Ammon writes that establishing privileged user access controls are a critical element of an agency’s security program – but can be a complex undertaking given the number of regulations and programs involved. In this article, he tackles the basics with a focused list of “Do’s and Don’ts” that will get you started down the path to managing and controlling these high risk users.


December 17, 2014

Will CDM finally be ‘the realization of IT security’?
Phase II of the Department of Homeland Security’s Continuous Diagnostics and Mitigation program could be a major step forward in Federal security, and could be “transformative, rather than evolutionary” according to Xceedium’s Ken Ammon.

Network World

November 24, 2014

5 ways to escape password hell
Passwords and multi factor technologies can “confuse the hell out of users,” according to this Network World article by Maria Korolov. Xceedium’s Ken Ammon argues for starting with privileged users to gain the biggest return on authentication investments. (Registration required)

Federal Times

November 19, 2014

CDM Phase II centers on monitoring user privileges, activities
Federal Time’s Aaron Boyd provides a look at the DHS’s Continuous Diagnostic and Mitigation (CDM) Phase II, with Xceedium’s Ken Ammon offering insights into what the program means for departments and agencies.

SC Magazine

November 3, 2014

Upping the ante: PCI Security Standard
Change is coming to the PCI DSS security standard, with compliance to version 3.0 required by the end of the year. SC Magazine’s Jim Romeo explains the new requirements will change compliance — and security.


October 27, 2014

DHS Expects To Outsource Employment Verification Checks To The Cloud
NextGOV’s Aliya Sternstein talks with Xceedium’s Ken Ammon about a novel identity check model that lets citizens put a freeze on their Social Security numbers, forthcoming from the Department of Homeland Security.

Ars Technica

October 15, 2014

Ghost in the (Bourne Again) Shell: Fallout of Shellshock far from over
Sean Gallagher assesses the state of recovery from the Shellshock vulnerability, noting the cleanup could be long and expensive. Xceedium’s Mo Rosen discusses customer reactions to the discovery of the vulnerability, and points out security teams need to begin operating with a new mindset.


Blog: Webcast: Unmanaged Risk: SSH Key Management for Privileged...

In spite of a global security spend of $71 Billion, a seemingly never ending string... Read More

CDM Phase II is Here

Xsuite delivers support for CDM Phase 2 Least Privilege and Infrastructure Integrity Requirements...Read More

Video: 2-Minute Explainer

This quick video, just two minutes in length, will rapidly deliver insights into the risks posed by privileged users, and how Xsuite circumvents the risks.Read More